In <[EMAIL PROTECTED]>, on 06/24/2005
at 11:15 AM, Richard Verville <[EMAIL PROTECTED]> said:
>When I started, we had 2311, punch cards, 087, 089, 2311 and 360
>model 30 running DOS/VS
That would be a good stunt.
>If what I need to do could be done by the rules, it would done
>already
Maybe; so far you haven't condescended to tell anybody *what* you are
trying to do, just how.
>So far I've received 8 emails , 2 having very good suggestions and 6
>coming from principal of operation manual police officers.
Well, if you're not going to listen to advise then I guess that you'll
simply dig yourself into a hole and then feel victimized when it blows
up in your face. It's not my dog.
>My problem is this one.
No. That's your proposed solution. Despite repeated requests, you
still haven't explained what you are trying to accomplish by bypassing
CICS services.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
ISO position; see <http://patriot.net/~shmuel/resume/brief.html>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html