The EPI could potentially establish a session with any VTAM application. Assuming that the correct protocols are used, nothing prevents a REXX program from accessing the VTAM application once the EPI has logged onto it.
Copyright © 2014 CA.
All rights reserved.
|
|