>And, further, I ask myself, Why must the facility be controlled? >And I answer myself with a couple possible reasons:
>o Some system symbols might have sensitive values (passwords? > the CIO's personal phone number?) which must be concealed. Can't be that one. The symbols and their values are in non-fetch-protected common storage. Peter Relson z/OS Core Technology Design ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
