On 4/30/2013 10:40 PM, Anthony Rudd wrote:
The latter - an unauthorised program.

I would have thought (hoped) that there is a short sequence of control blocks 
accessible from an unauthorised program that can be processed to determine 
whether a known job is running (is know to the system, if not - it has 
completed).

When you say, "known to the system," what scope do you mean? Known to the current MVS image? Known to the JESplex? Known to the sysplex?

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to