Why bother? It was going away for good. Actually, I had a VTAM (MVS) expert in the office when I laid the tired old thing to rest. He couldn't remember the command and neither did I, so #CP LOGOFF is what I used :-) I had already removed any trace of VTAM from our service machine list, so there was no chance of it being resuscitated before I could tell VM:Secure to get it out of the directory.
The strange thing is that even though there were 60 people accessing the system via TPX Monday morning and there were frequently as many as 150 concurrent TPXers in the weeks leading up to the decommissioning ceremony, I have been contacted by only 4 people who apparently could not click on the link to a document giving step-by-step, screenshot-by-screenshot, instructions on how to set up a TN3270 emulator session that would connect to VM. I expected the number to be more in line with the number who try to reply to mail that starts with "Do not reply to this email ...", a much higher number. Regards, Richard Schuh > -----Original Message----- > From: The IBM z/VM Operating System > [mailto:[EMAIL PROTECTED] On Behalf Of Mike Walter > Sent: Wednesday, April 02, 2008 3:18 PM > To: [email protected] > Subject: Re: VTAM R.I.P. > > VM/VTAM was an MVS product shoe-horned (with some pretty > clever work) into VM. > Wouldn't the appropriate VM and MVS-ish command be: > > Z NET,EOD > > Mike Walter > Hewitt Associates > Any opinions expressed herein are mine alone and do not > necessarily represent the opinions or policies of Hewitt Associates. > > > > > > "Rob van der Heij" <[EMAIL PROTECTED]> > > Sent by: "The IBM z/VM Operating System" <[email protected]> > 04/02/2008 05:13 PM > Please respond to > "The IBM z/VM Operating System" <[email protected]> > > > > To > [email protected] > cc > > Subject > Re: VTAM R.I.P. > > > > > > > Z NET,QUICK > > > > > > The information contained in this e-mail and any accompanying > documents may contain information that is confidential or > otherwise protected from disclosure. If you are not the > intended recipient of this message, or if this message has > been addressed to you in error, please immediately alert the > sender by reply e-mail and then delete this message, > including any attachments. Any dissemination, distribution or > other use of the contents of this message by anyone other > than the intended recipient is strictly prohibited. All > messages sent to and from this e-mail address may be > monitored as permitted by applicable law and regulations to > ensure compliance with our internal policies and to protect > our business. E-mails are not secure and cannot be guaranteed > to be error free as they can be intercepted, amended, lost or > destroyed, or contain viruses. You are deemed to have > accepted these risks if you communicate with us by e-mail. >
