|
>But... try telling that to a JDE shop or Infinium shop (S2KOBJOWNR) that wants to clean up the object ownership >issues for a "wide open" application like that. They can't just go in there and start changing stuff without >understanding the potential impact. Sounds like a 'vendor inflicted security exposure'. I've got that phrase stuck in the back of my brain from John's presentation :-) Scott
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.