Hi James, Actually, one could use Pchain to get around breaking Pkey. I am not actually proposing to do that, but it may be worth some additional thought after the book and 3.2 are done.There could be advantages to clarifying dependencies in this way if you were
ever to try to take advantage of multi-processing. RJK