Hi Len,
Your statement is somewhat naive.
RACF has a hierarchical structure (Users and Groups)
TSS is user-centric, unlike the other 2.
ACF2 has a 24-Byte UID String. G-d help you if it is not designed properly.

Regards,
David

On 2026-02-05 14:08, Len Rugen wrote:
I've wondered why you need to KNOW all 3, RACF, TSS and ACF2.  If you can build security 
with one, have the doc for the others, how hard is it?  Isn't that the life of a systems 
programmer, use tools we don't "know", by learning?
I saw an post yesterday that included knowledge of CA-1 and TLMS... really?

Len Rugen

rugenl at yahoo.com

GPG Public Key
     On Thursday, February 5, 2026 at 10:55:27 AM CST, Steve Thompson 
<[email protected]> wrote:
Before anyone starts arguments on supply and demand and
capitalism, free market and the like, (again) understand this:

What Steve and I and others like us are running into is a large
number of recruiter/ing firms who are all trying to get the same
contracts. So to get the account, they quote low.

Then on DICE, INDEED, Monster and the others (some of these are
being bought and merged), but the end effect is offering rates
that are below what we were making about 1990 and that is NOT
adjusted for inflation.

Add to this that the majority of the people contacting me do not
know how JES2 or JES3 is pronounced. They don't know most of the
acronyms we use in the industry. They can't read a tech based
resume to understand that one is not a sysprog, but is a software
developer.

Just wanted to get us on a level playing field before the noise
starts.


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to