Greetings from the sunny south.
I have been tasked with capturing the user profiles and IP addresses of
those who sign into our system remotely. An analyst has directed me to
the IBM site for instructions on TELNET processing. It uses a program at
the Exit Point - QIBM_QTG_DEVINIT, and this is where I am to capture the
data. I have downloaded and am reviewing the programs from the IBM site.
Have you worked with this type of data capture? It's new to me and I seek
Munday Software Consultants
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
This mailing list archive is Copyright 1997-2015 by MIDRANGE dot COM and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available here. If you have questions about this, please contact