On Mon, 25 Feb 2008 13:08:53 -0600, Dave Kopischke wrote:
>
>We have a JCL checker application that verifies dataset access for a JOB.
>Through routine use of this product, we end up with thousands of access
>warnings on our daily RACF reports. This is not a hacking attempt. If there
>were hacking attempts occuring, it would be tough to see them through the
>noise though.
>
I wonder that you get "thousands of access warnings ... daily".  Are
your programmers commiting so many potential access errors in the course
of coding their JCL?  How many programmers does it take to do that?

And my thanks to Randy Evans for reminding us that design of interactive
systems imposes requirements that are not encountered in batch jobs.

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to