Hi Howard,

I have deliberately not included snippets from previous posts as your
original question was answered early on which I think you acknowledged.

As to the rest, either deliberately or otherwise I think somebody is pulling
your chain.

My interpretation of the use of IF/THEN/ELSE with procedures is that it is
an effective, and some would say superior tool for the conditional execution
of steps provided that it is built into the procedure, i.e. contained within
the procedure.

I am reasonably certain that IF/THEN/ELSE logic cannot be used outside the
procedure to control the execution order within the procedure. I do not
believe there is any positioning attributes to facilitate this. The concept
of overrides requires a stepname or procstepname to position at a step other
than the first. This does not fit too well with IF/THEN/ELSE having to be
placed prior to the step it is required to influence. Indeed a search for
'override' in the JCL reference manual will produce many hits, but none
under IF/THEN/ELSE, at least not in the z/OS 1.9 manual.

I use IF/THEN/ELSE processing in preference to COND parameters, and always
recommend its use when starting afresh. Although this may well introduce
override difficulties in itself.

COND is probably as old as JCL itself, and certainly pre-dates IF/THEN/ELSE.
COND was designed, whether we like it or not, to bypass rather than include
steps which is why it appears to be inverse logic.  

With regard to Paul's question on how to override something within a nested
procedure, I would assume this is rhetorical as it has been discussed in the
forum many times, and the override construct does not facilitate nested
overrides, as it only penetrates to the first level stepname within the
procedure.

Kind regards - Terry 

Terry Sambrooks
Director
KMS-IT Limited
228 Abbeydale Road South
Dore, Sheffield, S17 3LA, UK

Tel: +44 (0)114 262 0933
WEB: www.legac-e.co.uk

Company Reg: 3767263 at the above address

All outgoing E-mail is scanned, but it remains the recipients responsibility
to ensure their system is protected from spy-ware, trojans, viruses, and
worms.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to