<snip>
How is using a field for what it is intended for abuse?
</snip>
"Abuse" in this case is creating a subsystem when there is no need to do 
so. 
In the past, subsystems were sometimes created solely to have access to 
the SSCTUSER field.

<snip>
 And how is N/T easier? 
</snip>
For the same reason as above -- there is no need to create a subsystem.
It is likely easier, also, for the application to retrieve the data.

Peter Relson
z/OS Core Technology Design


----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to