Flylib.com
List of Examples
Previous page
Table of content
< Day Day Up >
Chapter 2: Planning
Example 2-1: Sample VM user definition
Chapter 3: z/VM Basics, Planning, and Tasks
Example 3-1: Directory entry for Linux guest
Chapter 5: Networking
Example 5-1: Examples of PING command
Example 5-2: Naming the server
Chapter 8: Domino Administration
Example 8-1: Starting Server using Domino Controller
Example 8-2: sample dcontroller.ini
Example 8-3: Logical disk
Example 8-4: show stat platform display
Example 8-5: tell router show command -partial output
Example 8-6: Continuation of tell router show command
Example 8-7: Final extract - tell show router
Example 8-8: Free-running memcheck
Chapter 9: Systems Management
Example 9-1: df command
Example 9-2: df -h command
Example 9-3: Messages log
Example 9-4: The top command
Example 9-5: TOP display
Example 9-6: vmstat output
Example 9-7: sar output
Example 9-8: Output of the indicate command
Example 9-9: indicate user command
Example 9-10: Output from indicate i/o command
Example 9-11: q dasd & q user output
Example 9-12: q mdisk
Example 9-13: Sample automated startup/shutdown script
Example 9-14: Sample profile exec
Example 9-15: Checking CPU
Example 9-16: Checking memory
Example 9-17: Checking iostats
Example 9-18: Sample dsm.sys file for TSM backup/archive client
Example 9-19: Sample dsm.sys file
Example 9-20: Sample dsm.opt file
Example 9-21: domdsmc query preferences
Example 9-22: domdsmc q domino command
Example 9-23: domdsmc q adsm command
Example 9-24: domdsmc archivelog with threshold
Example 9-25: Sample schedule for Data Protection for Lotus Domino using crontab
Chapter 14: Migrating to Domino 6.5 for Linux on zSeries
Example 14-1: Using different filenames during FTP
< Day Day Up >
Previous page
Table of content
IBM Lotus Domino 6.5 for Linux on Zseries Implementation
ISBN: 0738491748
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
IBM Redbooks
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 3.1 Use PuTTY as a Graphical Replacement for telnet and rlogin
Step 4.1 Authentication with Public Keys
Step 4.7 Using Public Key Authentication for Automated File Transfers
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Laying Out Forms
Working with Advanced Form Elements
Setting Form Template and Digital Signing Options
Introducing InfoPath Form Template Projects
Navigating the InfoPath Object Model
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Definition Language (DDL) to Create Data Tables and Other Database Objects
Using Data Control Language (DCL) to Setup Database Security
Performing Multiple-table Queries and Creating SQL Data Views
Working with Comparison Predicates and Grouped Queries
Working with SQL Database Data Across the Internet
VBScript Programmers Reference
Classes in VBScript (Writing Your Own COM Objects)
Windows Script Components
Script Encoding
Appendix B Variable Naming Convention
Appendix C Coding Convention
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Server-Side Programming
Summary
Client 1Connecting to the Server
Prerequisites
Creating a Replication Cluster
MySQL Cookbook
Calculating Intervals Between Times
Changing a Columns Default Value
Exporting Query Results as XML
Performing Searches and Presenting the Results
Web Page Access Counting
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies