On 4/30/2013 10:40 PM, Anthony Rudd wrote:
The latter - an unauthorised program.
I would have thought (hoped) that there is a short sequence of control blocks
accessible from an unauthorised program that can be processed to determine
whether a known job is running (is know to the system, if not - it has
completed).
When you say, "known to the system," what scope do you mean? Known to
the current MVS image? Known to the JESplex? Known to the sysplex?
--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
http://www.phoenixsoftware.com/
----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN