Flylib.com
List of Examples
Previous page
Table of content
< Day Day Up >
Chapter 2: Planning
Example 2-1: Sample VM user definition
Chapter 3: z/VM Basics, Planning, and Tasks
Example 3-1: Directory entry for Linux guest
Chapter 5: Networking
Example 5-1: Examples of PING command
Example 5-2: Naming the server
Chapter 8: Domino Administration
Example 8-1: Starting Server using Domino Controller
Example 8-2: sample dcontroller.ini
Example 8-3: Logical disk
Example 8-4: show stat platform display
Example 8-5: tell router show command -partial output
Example 8-6: Continuation of tell router show command
Example 8-7: Final extract - tell show router
Example 8-8: Free-running memcheck
Chapter 9: Systems Management
Example 9-1: df command
Example 9-2: df -h command
Example 9-3: Messages log
Example 9-4: The top command
Example 9-5: TOP display
Example 9-6: vmstat output
Example 9-7: sar output
Example 9-8: Output of the indicate command
Example 9-9: indicate user command
Example 9-10: Output from indicate i/o command
Example 9-11: q dasd & q user output
Example 9-12: q mdisk
Example 9-13: Sample automated startup/shutdown script
Example 9-14: Sample profile exec
Example 9-15: Checking CPU
Example 9-16: Checking memory
Example 9-17: Checking iostats
Example 9-18: Sample dsm.sys file for TSM backup/archive client
Example 9-19: Sample dsm.sys file
Example 9-20: Sample dsm.opt file
Example 9-21: domdsmc query preferences
Example 9-22: domdsmc q domino command
Example 9-23: domdsmc q adsm command
Example 9-24: domdsmc archivelog with threshold
Example 9-25: Sample schedule for Data Protection for Lotus Domino using crontab
Chapter 14: Migrating to Domino 6.5 for Linux on zSeries
Example 14-1: Using different filenames during FTP
< Day Day Up >
Previous page
Table of content
IBM Lotus Domino 6.5 for Linux on Zseries Implementation
ISBN: 0738491748
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
IBM Redbooks
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Getting Started
Object Types, Predicates, and Basic Constraints
Configuring, Manipulating, and Reusing ORM Models
Reverse Engineering and Importing to ORM
Conceptual Model Reports
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
Asymmetric Key Cryptography
Distinguished Names and Certificates
Appendix C Using the Bouncy Castle API for Elliptic Curve
A Practitioners Guide to Software Test Design
Case Studies
State-Transition Testing
Use Case Testing
Scripted Testing
When to Stop Testing
Java How to Program (6th Edition) (How to Program (Deitel))
Modifying Our First Java Program
if Single-Selection Statement
Internet and Web Resources
Streams
Printing Floating-Point Numbers
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Expression Evaluation and Type Conversion
General Structure of Client Applications
Cursors
Client 3Processing Queries
Client 4An Interactive Query Processor
Microsoft VBScript Professional Projects
What Is VBScript?
Errors, Constants, and Variables
Conditional Logic and Iterative Structures
Project Case Study Desktop Customization and Deployment
Appendix B Whats on the Companion Web Site
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies