In <[EMAIL PROTECTED]>, on 09/19/2006
   at 10:34 AM, Binyamin Dissen <[EMAIL PROTECTED]> said:

>The issue is that AC=1 programs expect to be called as job-step
>programs and may not completely clean up after themselves (expecting
>the initiator to do it).

Not the ones that I've seen. The standard used to be that all IBM
utilities were written to run as subroutines and they typically
allowed additional parameters when called as subroutines, e.g., ddname
lists. If anything, there are more eyeballs on the behavior of the
authorized programs.

I see it as a management issue; TSO limits the user to the authorized
programs that the installation wants available to him. That has to do
with the purposes of the programs, not just how housebroken they are.
 
-- 
     Shmuel (Seymour J.) Metz, SysProg and JOAT
     ISO position; see <http://patriot.net/~shmuel/resume/brief.html> 
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to