On Mon, 25 Feb 2008 13:08:53 -0600, Dave Kopischke wrote: > >We have a JCL checker application that verifies dataset access for a JOB. >Through routine use of this product, we end up with thousands of access >warnings on our daily RACF reports. This is not a hacking attempt. If there >were hacking attempts occuring, it would be tough to see them through the >noise though. > I wonder that you get "thousands of access warnings ... daily". Are your programmers commiting so many potential access errors in the course of coding their JCL? How many programmers does it take to do that?
And my thanks to Randy Evans for reminding us that design of interactive systems imposes requirements that are not encountered in batch jobs. -- gil ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

