On Sun, 13 Jan 2008 18:06:14 -0500, Gerhard Postpischil wrote:
>
>The "user" in TCBUSER and CVTUSER would appear to be the
>installation, rather than the casual programmer, since both are
>store protected. One of my colleagues found this nifty CBT
>IEFACTRT that added I/O counts on the listing (object or load
>module form), and never noticed that it used TCBUSER. We lost
>billing data for a week! Since then I have found other
>installations that take advantage of the USER fields. And in
>Lindy's case getting privileged in a REXX subroutine is somewhat
>unlikely.
>
Yah.  Only one guy at a time may use TCBUSER.  And you never
know whether that guy is you or someone else.

Name/token sounds like a better choice, even though it's innovative.

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to