The EPI could potentially establish a session with any VTAM application. Assuming that the correct protocols are used, nothing prevents a REXX program from accessing the VTAM application once the EPI has logged onto it.
| Copyright © 2012 CA. All rights reserved. | Tell Technical Publications how we can improve this information |