Terminal Emulation

We have, on a number of occasions, had the necessity to automatically extract or input data to or from third party software applications that we do not control and cannot alter. In these cases we have made our software ‘impersonate’ a user of the foreign system and get the job done.