Hi Howard, I have deliberately not included snippets from previous posts as your original question was answered early on which I think you acknowledged.
As to the rest, either deliberately or otherwise I think somebody is pulling your chain. My interpretation of the use of IF/THEN/ELSE with procedures is that it is an effective, and some would say superior tool for the conditional execution of steps provided that it is built into the procedure, i.e. contained within the procedure. I am reasonably certain that IF/THEN/ELSE logic cannot be used outside the procedure to control the execution order within the procedure. I do not believe there is any positioning attributes to facilitate this. The concept of overrides requires a stepname or procstepname to position at a step other than the first. This does not fit too well with IF/THEN/ELSE having to be placed prior to the step it is required to influence. Indeed a search for 'override' in the JCL reference manual will produce many hits, but none under IF/THEN/ELSE, at least not in the z/OS 1.9 manual. I use IF/THEN/ELSE processing in preference to COND parameters, and always recommend its use when starting afresh. Although this may well introduce override difficulties in itself. COND is probably as old as JCL itself, and certainly pre-dates IF/THEN/ELSE. COND was designed, whether we like it or not, to bypass rather than include steps which is why it appears to be inverse logic. With regard to Paul's question on how to override something within a nested procedure, I would assume this is rhetorical as it has been discussed in the forum many times, and the override construct does not facilitate nested overrides, as it only penetrates to the first level stepname within the procedure. Kind regards - Terry Terry Sambrooks Director KMS-IT Limited 228 Abbeydale Road South Dore, Sheffield, S17 3LA, UK Tel: +44 (0)114 262 0933 WEB: www.legac-e.co.uk Company Reg: 3767263 at the above address All outgoing E-mail is scanned, but it remains the recipients responsibility to ensure their system is protected from spy-ware, trojans, viruses, and worms. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

