On Sat, 3 May 2008 07:28:43 -0400, J R wrote:
> 
>Requesting a Data Set That Is In Use: 
>Rather than wait for another user to release a data set, volume, 
>or device to obtain use of it, dynamic allocation fails a request 
>by an unauthorized program.  ...
> 
I've long wondered why.  Is there some particular integrity
or security hazard associated with a program's waiting for
another user to release a data set?

-- gil

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to