On Sat, 3 May 2008 07:28:43 -0400, J R wrote: > >Requesting a Data Set That Is In Use: >Rather than wait for another user to release a data set, volume, >or device to obtain use of it, dynamic allocation fails a request >by an unauthorized program. ... > I've long wondered why. Is there some particular integrity or security hazard associated with a program's waiting for another user to release a data set?
-- gil ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html