How is using a field for what it is intended for abuse? And how is N/T easier?
-- Shmuel (Seymour J.) Metz http://mason.gmu.edu/~smetz3 ________________________________________ From: IBM Mainframe Discussion List [IBM-MAIN@LISTSERV.UA.EDU] on behalf of Steve Smith [sasd...@gmail.com] Sent: Monday, July 20, 2020 8:43 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Using AN EAX value of PC Routineto index into the Authority Table Have you never heard of Name/Token Services? It's much easier than abusing the SSI, and much more efficient. sas On Mon, Jul 20, 2020 at 8:29 AM Seymour J Metz <sme...@gmu.edu> wrote: > If the server creates a system LX, how does the client locate it? Of those > ways, which is easiest? > > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN