>And, further, I ask myself, Why must the facility be controlled?
>And I answer myself with a couple possible reasons:

>o Some system symbols might have sensitive values (passwords?
>  the CIO's personal phone number?) which must be concealed.

Can't be that one. The symbols and their values are in non-fetch-protected 
common storage.

Peter Relson
z/OS Core Technology Design


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to