Networker Error Message Guide Provides Information on Common Networker Error Messages

Total Page:16

File Type:pdf, Size:1020Kb

Networker Error Message Guide Provides Information on Common Networker Error Messages Dell EMC NetWorker Version 18.1 Error Message Guide 302-004-430 REV 01 Copyright © 2000-2018 Dell Inc. or its subsidiaries. All rights reserved. Published July 2018 Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA. Dell EMC Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.DellEMC.com 2 NetWorker 18.1 Error Message Guide CONTENTS Preface 25 Chapter 1 Introduction 31 Error message description.......................................................................... 32 Message types...............................................................................32 NetWorker messages file...............................................................32 Message variables...................................................................................... 33 Chapter 2 Messages: A 37 A daemon requested information for a user session, but the user session was not found in the list of valid sessions................................................... 38 A library configured on the NetWorker storage node will not enter “ready” state...........................................................................................................38 Add the license with the -c option before attempting to authorize it. (647)... 38 All devices are in use by nsrmmd................................................................ 39 Another diskette is required. (6877)...........................................................39 A Removable Storage jukebox could not be created. (15879).....................39 Argument list too long. (23861).................................................................. 40 Atmos label operation failed: Failed to write cloud label: Couldn't connect to server......................................................................................................... 42 Attempting to remove more usage than possible (<int>, <int>). (659).......43 Attempt to rename database '<db>' to '<db>' failed (<string>). (32911).... 43 Attribute '<attribute_name>' is missing from the jukebox command. (31994) ................................................................................................................... 44 Authentication type 0 not adequate........................................................... 44 Authentication warning: user <username> does not belong to group <groupname>, but claimed to belong to it. Removing group <groupname> from the credential for user <username>. (6622).......................................44 Authentication warning: the user’s OS groups cannot be verified and will not be included in the credential. This means that remote hosts may not see the user as being a member of any OS groups. (33719)....................................45 Automatically terminating operation <operation_name>, instance <operation_instance>, on jukebox <jukebox_name>. The operation timed out. (31835)............................................................................................... 46 Automatically terminating operation <operation_name>, instance <operation_instance>, on jukebox <jukebox_name>. Cannot allocate the <number_of_devices> required device(s). (31837).................................... 46 Chapter 3 Messages: B 49 Bad or missing record: save set ID <save_set_id>, low water mark <int>, current offset <int>....................................................................................50 Bad XBSA call sequence. (23551).............................................................. 50 Broken pipe................................................................................................ 50 Chapter 4 Messages: C 53 NetWorker 18.1 Error Message Guide 3 CONTENTS Cancellation is in progress.......................................................................... 56 Cannot access the <drive_letter>: drive. (38655)......................................56 Cannot add authorization codes to evaluation licenses. (646)....................57 Cannot add new device without a valid drive tag. (15319).......................... 57 Cannot allocate <int> devices for this operation: physical drives <int>, max. parallelism = <int>. (15431).........................................................................57 Cannot allocate <int> devices for this operation: max active devices for jukebox '<jukebox>' = <int>. (31842)..........................................................58 Cannot allocate 1 devices needed for label operation: number of available and usable devices = 0. (8382)...................................................................58 Cannot alter expiration date on a license in a grace period. (650).............. 59 Cannot alter expiration date on a nonexistent license. (649)......................59 Cannot bind socket to connection port range on system <hostname>....... 60 Cannot change <enabled> status while the jukebox is being auto- configured. (43230)................................................................................... 60 Cannot change volume flags without confirmation. (15381)....................... 60 Cannot connect to NSR service on <server> jbconfig RPC error: Program not registered. (7842).................................................................................61 Cannot delete device '<device_name>' as it is currently busy. (11895)....... 61 Cannot delete <file>: <error_string>. (889)............................................... 62 Cannot determine status of the backup process. Use mminfo to determine job status....................................................................................................62 Cannot fetch save set after <save_set> record <db>. (9791).................... 63 Cannot fetch volume after <vol> record <decimal>. (9787)....................... 63 Cannot find attribute '<attribute_name>' for jukebox '<jukebox>.' (43246)... 64 Cannot find attribute <attribute_name> for resource <resource_name>. (43245)...................................................................................................... 64 Cannot find any jukebox with a device named '<device_name>.' (15754).... 64 Cannot find any jukebox with a device named '<device_name>' for server '<server_name>.' (15753).............................. 65 Cannot find barcode <barcode_value> in jukebox '<jukebox>.' (15744)..... 65 Cannot find device '<device_name>' in the list of configured devices. (15435)...................................................................................................... 66 Cannot find file history info for ,filename....You may still be able to recover this file with a saveset recovery................................................................. 66 Cannot find media map file <full_path>. Removing additional map information. (31800)...................................................................................67 Cannot find jukebox '<jukebox>.' (15416)................................................... 67 Cannot find jukebox '<jukebox>' for server '<server_name>.' (15748)....... 67 Cannot find operation status resource instance <int>. (12560)..................68 Cannot find pool <pool_name>. (15424).................................................... 69 Cannot find proc address in ntmsapi.dll. (5177)..........................................69 Cannot find resource for jukebox '<jukebox>'. (11934)............................... 69 Cannot find the location of program <program>. The process is exiting. 32468..................................................................... 70 Cannot find volume '<volume_name>' in jukebox '<jukebox>'. (15763)...... 70 Cannot format database <string>. (32896)................................................ 70 Cannot increment the usage for this particular license type. (655).............71 Cannot load license resource. (7755)..........................................................71 Cannot load ntmsapi.dll. (15892)................................................................ 73 Cannot locate the license binding for appliance <appliance>. (661)............73 Cannot mount database <string>. (32897).................................................73 Cannot obtain unique operation instance number. (4179)........................... 74 Cannot open <device> for reading. No such file or directory. (8356)......... 74 4 NetWorker 18.1 Error Message Guide CONTENTS Cannot open <device> for writing. Permission denied. (8357)................... 75 Cannot open device map file <full_path>:<OS_error_ message>. (31796).... 75 Cannot operate on slot <slot_number> in jukebox '<jukebox>': slot is outside <range> ranges. (31908)............................................................................ 76 Cannot operate on volume '<volume>' in slot '<slot_name>' in jukebox '<jukebox>': slot is outside <range> ranges. (31845).................................. 76 Cannot query client ID map database. (9835).............................................77
Recommended publications
  • Virtual Memory
    Chapter 4 Virtual Memory Linux processes execute in a virtual environment that makes it appear as if each process had the entire address space of the CPU available to itself. This virtual address space extends from address 0 all the way to the maximum address. On a 32-bit platform, such as IA-32, the maximum address is 232 − 1or0xffffffff. On a 64-bit platform, such as IA-64, this is 264 − 1or0xffffffffffffffff. While it is obviously convenient for a process to be able to access such a huge ad- dress space, there are really three distinct, but equally important, reasons for using virtual memory. 1. Resource virtualization. On a system with virtual memory, a process does not have to concern itself with the details of how much physical memory is available or which physical memory locations are already in use by some other process. In other words, virtual memory takes a limited physical resource (physical memory) and turns it into an infinite, or at least an abundant, resource (virtual memory). 2. Information isolation. Because each process runs in its own address space, it is not possible for one process to read data that belongs to another process. This improves security because it reduces the risk of one process being able to spy on another pro- cess and, e.g., steal a password. 3. Fault isolation. Processes with their own virtual address spaces cannot overwrite each other’s memory. This greatly reduces the risk of a failure in one process trig- gering a failure in another process. That is, when a process crashes, the problem is generally limited to that process alone and does not cause the entire machine to go down.
    [Show full text]
  • Linux Physical Memory Analysis
    Linux Physical Memory Analysis Paul Movall International Business Machines Corporation 3605 Highway 52N, Rochester, MN Ward Nelson International Business Machines Corporation 3605 Highway 52N, Rochester, MN Shaun Wetzstein International Business Machines Corporation 3605 Highway 52N, Rochester, MN Abstract A significant amount of this information can alo be found in the /proc filesystem provided by the kernel. We present a tool suite for analysis of physical memory These /proc entries can be used to obtain many statis- usage within the Linux kernel environment. This tool tics including several related to memory usage. For ex- suite can be used to collect and analyze how the physi- ample, /proc/<pid>/maps can be used to display a pro- cal memory within a Linuxenvironment is being used. cess' virtual memory map. Likewise, the contents of / proc/<pid>/status can be used to retreive statistics about virtual memory usage as well as the Resident Set Size (RSS). Embedded subsystems are common in today's computer In most cases, this process level detail is sufficient to systems. These embedded subsystems range from the analyze memory usage. In systems that do not have very simple to the very complex. In such embedded sys- backing store, more details are often needed to analyze tems, memory is scarce and swap is non-existent. When memory usage. For example, it's useful to know which adapting Linux for use in this environment, we needed pages in a process' address map are resident, not just to keep a close eye on physical memory usage. how many. This information can be used to get some clues on the usage of a shared library.
    [Show full text]
  • A Hybrid Swapping Scheme Based on Per-Process Reclaim for Performance Improvement of Android Smartphones (August 2018)
    Received August 19, 2018, accepted September 14, 2018, date of publication October 1, 2018, date of current version October 25, 2018. Digital Object Identifier 10.1109/ACCESS.2018.2872794 A Hybrid Swapping Scheme Based On Per-Process Reclaim for Performance Improvement of Android Smartphones (August 2018) JUNYEONG HAN 1, SUNGEUN KIM1, SUNGYOUNG LEE1, JAEHWAN LEE2, AND SUNG JO KIM2 1LG Electronics, Seoul 07336, South Korea 2School of Software, Chung-Ang University, Seoul 06974, South Korea Corresponding author: Sung Jo Kim ([email protected]) This work was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education under Grant 2016R1D1A1B03931004 and in part by the Chung-Ang University Research Scholarship Grants in 2015. ABSTRACT As a way to increase the actual main memory capacity of Android smartphones, most of them make use of zRAM swapping, but it has limitation in increasing its capacity since it utilizes main memory. Unfortunately, they cannot use secondary storage as a swap space due to the long response time and wear-out problem. In this paper, we propose a hybrid swapping scheme based on per-process reclaim that supports both secondary-storage swapping and zRAM swapping. It attempts to swap out all the pages in the working set of a process to a zRAM swap space rather than killing the process selected by a low-memory killer, and to swap out the least recently used pages into a secondary storage swap space. The main reason being is that frequently swap- in/out pages use the zRAM swap space while less frequently swap-in/out pages use the secondary storage swap space, in order to reduce the page operation cost.
    [Show full text]
  • An Evolutionary Study of Linux Memory Management for Fun and Profit Jian Huang, Moinuddin K
    An Evolutionary Study of Linux Memory Management for Fun and Profit Jian Huang, Moinuddin K. Qureshi, and Karsten Schwan, Georgia Institute of Technology https://www.usenix.org/conference/atc16/technical-sessions/presentation/huang This paper is included in the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC ’16). June 22–24, 2016 • Denver, CO, USA 978-1-931971-30-0 Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC ’16) is sponsored by USENIX. An Evolutionary Study of inu emory anagement for Fun and rofit Jian Huang, Moinuddin K. ureshi, Karsten Schwan Georgia Institute of Technology Astract the patches committed over the last five years from 2009 to 2015. The study covers 4587 patches across Linux We present a comprehensive and uantitative study on versions from 2.6.32.1 to 4.0-rc4. We manually label the development of the Linux memory manager. The each patch after carefully checking the patch, its descrip- study examines 4587 committed patches over the last tions, and follow-up discussions posted by developers. five years (2009-2015) since Linux version 2.6.32. In- To further understand patch distribution over memory se- sights derived from this study concern the development mantics, we build a tool called MChecker to identify the process of the virtual memory system, including its patch changes to the key functions in mm. MChecker matches distribution and patterns, and techniues for memory op- the patches with the source code to track the hot func- timizations and semantics. Specifically, we find that tions that have been updated intensively.
    [Show full text]
  • A Comparison of Kernel Memory Protection for Docker Containers Across Host Operating Systems
    St. Cloud State University theRepository at St. Cloud State Culminating Projects in Information Assurance Department of Information Systems 5-2020 A Comparison of Kernel Memory Protection for Docker Containers Across Host Operating Systems Li Dai [email protected] Follow this and additional works at: https://repository.stcloudstate.edu/msia_etds Recommended Citation Dai, Li, "A Comparison of Kernel Memory Protection for Docker Containers Across Host Operating Systems" (2020). Culminating Projects in Information Assurance. 101. https://repository.stcloudstate.edu/msia_etds/101 This Thesis is brought to you for free and open access by the Department of Information Systems at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Information Assurance by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. A Comparison of Kernel Memory Protection for Docker Containers Across Host Operating Systems by Li Dai A Thesis Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Information Assurance May 2020 Thesis Committee: Dennis Guster, Chairperson Erich Rice Balasubramanian Kasi 2 Abstract Object oriented programming concepts have been widely adopted by the modern design of enterprise applications, which relies on heap memory mapping, and re-use of pre-coded class libraries. Computing resource sharing such as containerization, is a popular way to effectively reduce operation overhead by enlarging the scale of kernel accessibility among distributed computer systems. Thus, proper isolation between processes, containers and host operating systems is a critical task to assure system wide information security.
    [Show full text]
  • Memory Management
    University of Mississippi eGrove American Institute of Certified Public Guides, Handbooks and Manuals Accountants (AICPA) Historical Collection 1993 Memory management American Institute of Certified Public Accountants. Information echnologyT Division Follow this and additional works at: https://egrove.olemiss.edu/aicpa_guides Part of the Accounting Commons, and the Taxation Commons Recommended Citation American Institute of Certified Public Accountants. Information echnologyT Division, "Memory management" (1993). Guides, Handbooks and Manuals. 486. https://egrove.olemiss.edu/aicpa_guides/486 This Book is brought to you for free and open access by the American Institute of Certified Public Accountants (AICPA) Historical Collection at eGrove. It has been accepted for inclusion in Guides, Handbooks and Manuals by an authorized administrator of eGrove. For more information, please contact [email protected]. INFORMATION TECHNOLOGY DIVISION BULLETIN AICPA American Institute of Certified Public Accountants TECHNOLOGY Notice to Readers This technology bulletin is the first in a series of bulletins that provide accountants with information about a particular technology. These bulletins are issued by the AICPA Information Technology Division for the benefit of Information Technology Section Members. This bulletin does not establish standards or preferred practice; it represents the opinion of the author and does not necessarily reflect the policies of the AICPA or the Information Technology Division. The Information Technology Division expresses its appreciation to the author of this technology bulletin, Liz O’Dell. She is employed by Crowe, Chizek and Company in South Bend, Indiana, as a manager of firmwide microcomputer operations, supporting both hardware and software applications. Liz is an Indiana University graduate with an associate’s degree in computer information systems and a bachelor’s degree in business management.
    [Show full text]
  • Oracle Essbase Error Message Reference
    ORACLE® ESSBASE RELEASE 11.1.1 ERROR MESSAGE REFERENCE Essbase Error Message Reference, 11.1.1 Copyright © 1996, 2008, Oracle and/or its affiliates. All rights reserved. Authors: EPM Information Development Team This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS: Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • Understanding the Linux Virtual Memory Manager
    1 Understanding The Linux Virtual Memory Manager Mel Gorman 15th February 2004 Contents List of Figures 5 List of Tables 7 Acknowledgements 9 1 Introduction 12 1.1 General Kernel Literature . 13 1.2 Thesis Overview . 14 1.3 Typographic Conventions . 14 1.4 About this Document . 14 1.5 Companion CD . 15 2 Code Management 17 2.1 Managing the Source . 17 2.2 Getting Started . 23 2.3 Submitting Work . 24 3 Describing Physical Memory 26 3.1 Nodes . 27 3.2 Zones . 29 3.3 Pages . 31 3.4 High Memory . 33 4 Page Table Management 36 4.1 Describing the Page Directory . 37 4.2 Describing a Page Table Entry . 38 4.3 Using Page Table Entries . 39 4.4 Translating and Setting Page Table Entries . 42 4.5 Allocating and Freeing Page Tables . 42 4.6 Kernel Page Tables . 43 4.7 Mapping addresses to struct pages .................. 44 5 Process Address Space 47 5.1 Linear Address Space . 48 5.2 Managing the Address Space . 49 2 CONTENTS 3 5.3 Process Address Space Descriptor . 50 5.4 Memory Regions . 55 5.5 Exception Handling . 70 5.6 Page Faulting . 71 5.7 Copying To/From Userspace . 77 6 Boot Memory Allocator 80 6.1 Representing the Boot Map . 81 6.2 Initialising the Boot Memory Allocator . 81 6.3 Allocating Memory . 83 6.4 Freeing Memory . 85 6.5 Retiring the Boot Memory Allocator . 85 7 Physical Page Allocation 90 7.1 Managing Free Blocks . 90 7.2 Allocating Pages . 91 7.3 Free Pages .
    [Show full text]
  • Computer out of Application Memory
    Computer Out Of Application Memory Is Albert always paronymous and revertive when gurge some beacon very blasted and earliest? Reductionist Shamus pyramid preferentially. Francophone and titillated Philbert often waddled some spectaculars clockwise or gyrated fulgently. An external websites trigger low on your ram should request and all of the system, add the out of things i think Your computer is low on memory. If the chart is usually yellow and seldom green, images, taking all the guesswork out of finding which RAM is right for you. If a program has a memory leak and its memory usage is steadily increasing, a time comes when you need to launch the application. How do I discover memory usage of my application in Android? You must realize that you are the keeper of your Mac computer. Windows Task Manager showing wrong ram usage. Unfortunately, other data storage media such as hard disks, they work. Malwarebytes will automatically update the antivirus database and start scanning your computer for malware. Many disgruntled Mac users on Catalina have reported this mac memory usage error, which obviously imposes specific limits in terms of performance. You can manually deleting the computer time it can run out of memory consumed so of computer out application memory according to do you might no longer want an abnormally more. Auslogics to find out why exactly virtual memory is so slow on your PC. The cache holds on to information that your computer uses to reload pages it has seen before rather than downloading them again. Something else you can try is changing browsers, so you should look for recently added entities that appear to deviate from the norm.
    [Show full text]
  • DOS Extender (Often Called a DOS Extender,Or Even Just an Extender) Is a Library That Assists in Running 32-Bit MS-DOS-Based Programs
    Chen_Rev_Appendix B.qxp 12/6/06 10:54 AM Page 1 HOW TO ENSURE THAT YOUR PROGRAM DOES NOT RUN HUNDER WINDOWS 95 My primary focus for much of the Windows 95 project was MS-DOS application compatibility, specifically games. To help maintain my sanity, I found myself writing the following account, illustrating the phenomenal creativity of software developers in doing everything within their power to be incompatible with Windows 95. This chapter is a very technical one, originally written for an audience con- sisting of developers deeply steeped in the minutiae of protected-mode pro- gramming. I have attempted to clarify the jargon, but the issue is unavoidably technical. Here are some terms you will encounter: •The Global Descriptor Table (GDT) is a central data structure that is used by the CPU and that controls how programs access memory. Allowing access to the GDT effectively grants total control of the computer. • Real mode was the only mode supported by the CPU prior to the introduction of the 80286. MS-DOS was originally developed to run in real mode. Real mode has no memory protection. Modern operating systems use real mode only transitionally on their way to 1 Chen_Rev_Appendix B.qxp 12/6/06 10:54 AM Page 2 2 the old new thing protected mode, which is a mode of the CPU in which memory protection becomes available. •The DOS Protected-Mode Interface (DPMI) and the Virtual Control Program Interface (VCPI) are two popular interfaces for writing 32-bit DOS-based programs. Windows 3.0 and higher support DPMI.
    [Show full text]
  • Dynamic and Elastic Memory Management in Virtualized Clouds
    DYNAMIC AND ELASTIC MEMORY MANAGEMENT IN VIRTUALIZED CLOUDS A Dissertation Presented to The Academic Faculty By Wenqi Cao In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the School of Computer Science Georgia Institute of Technology May 2019 Copyright c Wenqi Cao 2019 DYNAMIC AND ELASTIC MEMORY MANAGEMENT IN VIRTUALIZED CLOUDS Approved by: Dr. Ling Liu, Advisor Dr. David Devecsery School of Computer Science School of Computer Science Georgia Institute of Technology Georgia Institute of Technology Dr. Calton Pu, Co-Advisor Dr. Joy Arulraj School of Computer Science School of Computer Science Georgia Institute of Technology Georgia Institute of Technology Dr. Jay Lofstead Date Approved: March 26, 2019 Scalable System Software Group Sandia National Laboratories To my parents and my wife ACKNOWLEDGEMENTS I would like to express my deepest gratitude to my advisor, Dr. Ling Liu, for her guid- ance in this research and the support throughout my graduate study. She always inspires me to be a better researcher in many ways. I was especially fortunate to work with her and ben- efit from her advises. In addition to academic research, she always shares her life lessons with me and always been available whenever I need help. Her principles and dedication will have a great influence on me. I would also like to give special thanks to Dr. Calton Pu, Dr. David Devecsery, Dr. Joy Arulraj, and Dr. Jay Lofstead for their time to serve on my thesis committee and their valu- able feedback on my thesis proposal and final dissertation. Their welcome suggestions and insightful comments have greatly contributed to my thesis.
    [Show full text]
  • Microsoft® MS-DOS® 3.3 Reference
    Microsoft® MS-DOS® 3.3 Reference HP 9000 Series 300/800 Computers HP Part Number 98870-90050 Flin- HEWLETT ~~ PACKARD Hewlett-Packard Company 3404 East Harmony Road, Fort Collins, Colorado 80525 NOTICE The information contained In this document is subject to change without notice HEWLETT-PACKARD MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MANUAL. INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or direct. indirect. special, incidental or consequential damages in connection with the furnishing, performance, or use of this material WARRANTY A copy of the specific warranty terms applicable to your Hewlett-Packard product and replacement parts can be obtained from your local Sales and Service Office MS -DOS is a US registered trademark of Microsoft, Incorporated. LOTUS and 1-2-3 are registered trademarks of LOTUS Development Corporation. Copynght 1988. 1989 Hewlett-Packard Company This document contains proprietary information which is protected by copyright. All rights are reserved. No part of this document may be photocopied. reproduced or translated to another language without the prior written consent of Hewlett-Packard Company. The information contained in this document is subject to change without notice. Restricted Rights Legend Use. duplication or disclosure by the Government is subject to restrictions as set forth in paragraph (b)(3)(B) of the Rights in Technical Data and Software clause in DAR 7-104.9(a). Use of this manual and flexible disc(s) or tape cartridge(s) supplied for this pack is restricted to this product only.
    [Show full text]