AIX Version 4.1 FX Series Configuring and Maintaining the System

Total Page:16

File Type:pdf, Size:1020Kb

AIX Version 4.1 FX Series Configuring and Maintaining the System FX SeriesTM AIX Version 4.1 Configuring and Maintaining the System FXCMSA/UM1 First Edition (January 1997) This edition of Configuring and Maintaining the System applies to AIX 4.1 and to all subsequent releases of this product until otherwise indicated in new releases or technical newsletters. The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: THIS MANUAL IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you. It is not warranted that the contents of this publication or the accompanying source code examples, whether individually or as one or more groups, will meet your requirements or that the publication or the accompanying source code examples are error-free. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. It is possible that this publication may contain references to, or information about, products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that such products, programming, or services will be offered in your country. Any reference to a licensed program in this publication is not intended to state or imply that you can use only that licensed program. You can use any functionally equivalent program instead. COPYRIGHT MOTOROLA, INC. 1995, 1996, 1997. ALL RIGHTS RESERVED. Printed in the United States of America. Copyright International Business Machines Corporation 1994, 1995. All rights reserved. Notice to U.S. Government Users — Documentation Related to Restricted Rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract. Trademarks and Acknowledgments AIX is a trademark of International Business Machines Corporation. AIXwindows is a trademark of International Business Machines Corporation. DEC VT100, VT220, VT320, and VT330 are trademarks of Digital Equipment Corporation. Diablo is a a trademark of Xerox Corporation. HP, HP-GL, Hewlett-Packard, HP LaserJet+, JetDirect, and LaserJet are trademarks of Hewlett-Packard Company. IBM is a registered trademark of International Business Machines Corporation. IMP is a trademark of Integrated Micro Products, Inc. Impactwriter is a trademark of International Business Machines Corporation. INed is a trademark of INTERACTIVE Systems Corporation. InfoExplorer is a trademark of International Business Machines Corporation. NCK is a trademark of Apollo Computer, Inc. Network Computing System is a trademark of Apollo Computer, Inc. NFS, Network File System, SunOS, and Sun Microsystems are trademarks of Sun Microsystems, Inc. Open Software Foundation, OSF, OSF/1, OSF/Motif, and Motif are trademarks of Open Software Foundation, Inc. Personal System/2 and PS/2 are trademarks of International Business Machines Corporation. Photo CD is a trademark of Eastman Kodak Company. POSIX is a trademark of the Institute of Electrical and Electronic Engineers (IEEE). PostScript is a trademark of Adobe Systems Incorporated. PRINTRONIX and PRINTRONIX P9012 are trademarks of Printronix, Inc. Proprinter is a trademark of International Business Machines Corporation. QMS, QMS Colorscript 100, and QMS-PS 2200 are trademarks of QMS, Inc. QuattroPro is a trademark of Boreland International Corporation. Quickwriter is a trademark of International Business Machines Corporation. Quietwriter is a trademark of International Business Machines Corporation. RISC System/6000 is a trademark of International Business Machines Corporation. RT and RT PC are trademarks of International Business Machines Corporation. SUN is a trademark of Sun Microsystems, Inc. TI Omnilaser is a trademark of Texas Instruments, Inc. UNIX is a registered trademark licensed exclusively by X/Open Company Ltd. WYSE, WYSE 30, WYSE 50, WY-50, WYSE 60, and WYSE 350 are trademarks of WYSE Corporation. iii Xstation Manager is a trademark of International Business Machines Corporation. X Window System is a trademark of The Open Group. Note to Users The term “network information service (NIS)” is now used to refer to the service formerly known as “Yellow Pages.” The functionality remains the same; only the name has changed. The name “Yellow Pages” is a registered trademark in the United Kingdom of British Telecommunications plc, and may not be used without permission. Legal Notice to Users Issued by Sun Microsystems, Inc. “Yellow Pages” is a registered trademark in the United Kingdom of British Telecommunications plc, and may also be a trademark of various telephone companies around the world. Sun will be revising future versions of software and documentation to remove references to “Yellow Pages.” iv Contents Chapter 1. Introduction. 1-1 About This Book . 1-2 Who Should Use This Book. 1-2 How to Use This Book. 1-2 Overview of Contents. 1-3 Highlighting . 1-4 Other Key Sources of System Management Information. 1-5 Publications Covering Other Aspects of System Management. 1-5 Reference Information. 1-5 Chapter 2. System Management with AIX. 2-1 System Management Overview. 2-2 The System Administrator’s Objectives. 2-2 A System Is More Than a Computer. 2-2 Unique Aspects of AIX System Management. 2-3 Available Interfaces. 2-4 Unique Features of the Operating System. 2-6 InfoExplorer and the man Command. 2-7 Chapter 3. System Management Interface Tool. 3-1 System Management Interface Tool (SMIT). 3-2 Using SMIT (Information Only) in SMIT. 3-3 Defining Fast Paths in SMIT. 3-4 Command Names. 3-4 F8 Function Key (ASCII Interface). 3-4 Show Menu or F8 Function Key (Graphical Interface). 3-4 FastPath Algorithm for Device Tasks. 3-5 Fast Path Lists. 3-5 SMIT Fast Path Lists. 3-6 Installing . 3-6 Managing System Access. 3-6 Managing the FX Series System (If Applicable). 3-6 Managing Graphic Input Devices. 3-7 Managing the Low-Function Terminal. 3-7 Managing System Environment, Performance, and Problems. 3-7 Managing Storage and File Systems. 3-7 Managing Printers, Terminals, and Tape Drives. 3-8 Managing Print Jobs and Print Queues. 3-8 Managing Networks. 3-8 SMIT in the Graphical Interface. 3-9 SMIT Window Design. 3-10 Menu Bar . 3-11 Return To: Panel. 3-11 Submenu/Dialog Panel. 3-11 Button Area . 3-11 Table of Contents v SMIT Window Menu and Button Functions. 3-12 Menus and Menu Options. 3-12 SMIT Buttons. 3-13 Entering and Exiting SMIT in the Graphical Interface. 3-15 Selecting SMIT Menu Titles (Graphical Interface). 3-16 SMIT Dialogs: Overview (Graphical Interface). 3-17 Text-Entry Fields. 3-18 Dialog Symbols. 3-18 Completing SMIT Dialogs (Graphical Interface). 3-19 Prerequisites. 3-19 Select a Text-Entry Box and Type Text. 3-19 Use the Option-Ring Buttons (Represented by Up Arrow and Down Arrow Buttons). 3-19 Select Items from a List (Represented by the List Button). 3-19 SMIT Output Windows. 3-22 SMIT Command Output Windows. 3-22 Alternate Command Execution Forms. 3-23 SMIT in the ASCII Interface. 3-24 Entering and Exiting SMIT in the ASCII Interface from a Terminal Environment . ..
Recommended publications
  • Web Vmstat Any Distros, Especially Here’S Where Web Vmstat Comes Those Targeted at In
    FOSSPICKS Sparkling gems and new releases from the world of FOSSpicks Free and Open Source Software Mike Saunders has spent a decade mining the internet for free software treasures. Here’s the result of his latest haul… Shiny statistics in a browser Web VMStat any distros, especially Here’s where Web VMStat comes those targeted at in. It’s a system monitor that runs Madvanced users, ship an HTTP server, so you can connect with shiny system monitoring tools to it via a web browser and see on the desktop. Conky is one such fancy CSS-driven charts. Before you tool, while GKrellM was all the rage install it, you’ll need to get the in the last decade, and they are websocketd utility, which you can genuinely useful for keeping tabs find at https://github.com/ on your boxes, especially when joewalnes/websocketd. Helpfully, you’re an admin in charge of the developer has made pre- various servers. compiled executables available, so Now, pretty much all major you can just grab the 32-bit or distros include a useful command 64-bit tarball, extract it and there line tool for monitoring system you have it: websocketd. (Of course, Here’s the standard output for vmstat – not very interesting, right? resource usage: vmstat. Enter if you’re especially security vmstat 1 in a terminal window and conscious, you can compile it from copy the aforementioned you’ll see a regularly updating (once its source code.) websocketd into the same place. per second) bunch of statistics, Next, clone the Web VMStat Git Then just enter: showing CPU usage, free RAM, repository (or grab the Zip file and ./run swap usage and so forth.
    [Show full text]
  • Tortoisemerge a Diff/Merge Tool for Windows Version 1.11
    TortoiseMerge A diff/merge tool for Windows Version 1.11 Stefan Küng Lübbe Onken Simon Large TortoiseMerge: A diff/merge tool for Windows: Version 1.11 by Stefan Küng, Lübbe Onken, and Simon Large Publication date 2018/09/22 18:28:22 (r28377) Table of Contents Preface ........................................................................................................................................ vi 1. TortoiseMerge is free! ....................................................................................................... vi 2. Acknowledgments ............................................................................................................. vi 1. Introduction .............................................................................................................................. 1 1.1. Overview ....................................................................................................................... 1 1.2. TortoiseMerge's History .................................................................................................... 1 2. Basic Concepts .......................................................................................................................... 3 2.1. Viewing and Merging Differences ...................................................................................... 3 2.2. Editing Conflicts ............................................................................................................. 3 2.3. Applying Patches ...........................................................................................................
    [Show full text]
  • A.5.1. Linux Programming and the GNU Toolchain
    Making the Transition to Linux A Guide to the Linux Command Line Interface for Students Joshua Glatt Making the Transition to Linux: A Guide to the Linux Command Line Interface for Students Joshua Glatt Copyright © 2008 Joshua Glatt Revision History Revision 1.31 14 Sept 2008 jg Various small but useful changes, preparing to revise section on vi Revision 1.30 10 Sept 2008 jg Revised further reading and suggestions, other revisions Revision 1.20 27 Aug 2008 jg Revised first chapter, other revisions Revision 1.10 20 Aug 2008 jg First major revision Revision 1.00 11 Aug 2008 jg First official release (w00t) Revision 0.95 06 Aug 2008 jg Second beta release Revision 0.90 01 Aug 2008 jg First beta release License This document is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License [http:// creativecommons.org/licenses/by-nc-sa/3.0/us/]. Legal Notice This document is distributed in the hope that it will be useful, but it is provided “as is” without express or implied warranty of any kind; without even the implied warranties of merchantability or fitness for a particular purpose. Although the author makes every effort to make this document as complete and as accurate as possible, the author assumes no responsibility for errors or omissions, nor does the author assume any liability whatsoever for incidental or consequential damages in connection with or arising out of the use of the information contained in this document. The author provides links to external websites for informational purposes only and is not responsible for the content of those websites.
    [Show full text]
  • Performance, Scalability on the Server Side
    Performance, Scalability on the Server Side John VanDyk Presented at Des Moines Web Geeks 9/21/2009 Who is this guy? History • Apple // • Macintosh • Windows 3.1- Server 2008R2 • Digital Unix (Tru64) • Linux (primarily RHEL) • FreeBSD Systems Iʼve worked with over the years. Languages • Perl • Userland Frontier™ • Python • Java • Ruby • PHP Languages Iʼve worked with over the years (Userland Frontier™ʼs integrated language is UserTalk™) Open source developer since 2000 Perl/Python/PHP MySQL Apache Linux The LAMP stack. Time to Serve Request Number of Clients Performance vs. scalability. network in network out RAM CPU Storage These are the basic laws of physics. All bottlenecks are caused by one of these four resources. Disk-bound •To o l s •iostat •vmstat Determine if you are disk-bound by measuring throughput. vmstat (BSD) procs memory page disk faults cpu r b w avm fre flt re pi po fr sr tw0 in sy cs us sy id 0 2 0 799M 842M 27 0 0 0 12 0 23 344 2906 1549 1 1 98 3 3 0 869M 789M 5045 0 0 0 406 0 10 1311 17200 5301 12 4 84 3 5 0 923M 794M 5219 0 0 0 5178 0 27 1825 21496 6903 35 8 57 1 2 0 931M 784M 909 0 0 0 146 0 12 955 9157 3570 8 4 88 blocked plenty of RAM, idle processes no swapping CPUs A disk-bound FreeBSD machine. b = blocked for resources fr = pages freed/sec cs = context switches avm = active virtual pages in = interrupts flt = memory page faults sy = system calls per interval vmstat (RHEL5) # vmstat -S M 5 25 procs ---------memory-------- --swap- ---io--- --system- -----cpu------ r b swpd free buff cache si so bi bo in cs us sy id wa st 1 0 0 1301 194 5531 0 0 0 29 1454 2256 24 20 56 0 0 3 0 0 1257 194 5531 0 0 0 40 2087 2336 34 27 39 0 0 2 0 0 1183 194 5531 0 0 0 53 1658 2763 33 28 39 0 0 0 0 0 1344 194 5531 0 0 0 34 1807 2125 29 19 52 0 0 no blocked busy but not processes overloaded CPU in = interrupts/sec cs = context switches/sec wa = time waiting for I/O Solving disk bottlenecks • Separate spindles (logs and databases) • Get rid of atime updates! • Minimize writes • Move temp writes to /dev/shm Overview of what weʼre about to dive into.
    [Show full text]
  • Text Editing in UNIX: an Introduction to Vi and Editing
    Text Editing in UNIX A short introduction to vi, pico, and gedit Copyright 20062009 Stewart Weiss About UNIX editors There are two types of text editors in UNIX: those that run in terminal windows, called text mode editors, and those that are graphical, with menus and mouse pointers. The latter require a windowing system, usually X Windows, to run. If you are remotely logged into UNIX, say through SSH, then you should use a text mode editor. It is possible to use a graphical editor, but it will be much slower to use. I will explain more about that later. 2 CSci 132 Practical UNIX with Perl Text mode editors The three text mode editors of choice in UNIX are vi, emacs, and pico (really nano, to be explained later.) vi is the original editor; it is very fast, easy to use, and available on virtually every UNIX system. The vi commands are the same as those of the sed filter as well as several other common UNIX tools. emacs is a very powerful editor, but it takes more effort to learn how to use it. pico is the easiest editor to learn, and the least powerful. pico was part of the Pine email client; nano is a clone of pico. 3 CSci 132 Practical UNIX with Perl What these slides contain These slides concentrate on vi because it is very fast and always available. Although the set of commands is very cryptic, by learning a small subset of the commands, you can edit text very quickly. What follows is an outline of the basic concepts that define vi.
    [Show full text]
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Learning the Vi Editor
    Learning the vi Editor en.wikibooks.org December 29, 2013 On the 28th of April 2012 the contents of the English as well as German Wikibooks and Wikipedia projects were licensed under Creative Commons Attribution-ShareAlike 3.0 Unported license. A URI to this license is given in the list of figures on page 103. If this document is a derived work from the contents of one of these projects and the content was still licensed by the project under this license at the time of derivation this document has to be licensed under the same, a similar or a compatible license, as stated in section 4b of the license. The list of contributors is included in chapter Contributors on page 101. The licenses GPL, LGPL and GFDL are included in chapter Licenses on page 107, since this book and/or parts of it may or may not be licensed under one or more of these licenses, and thus require inclusion of these licenses. The licenses of the figures are given in the list of figures on page 103. This PDF was generated by the LATEX typesetting software. The LATEX source code is included as an attachment (source.7z.txt) in this PDF file. To extract the source from the PDF file, you can use the pdfdetach tool including in the poppler suite, or the http://www. pdflabs.com/tools/pdftk-the-pdf-toolkit/ utility. Some PDF viewers may also let you save the attachment to a file. After extracting it from the PDF file you have to rename it to source.7z.
    [Show full text]
  • Linux Performance Tools
    Linux Performance Tools Brendan Gregg Senior Performance Architect Performance Engineering Team [email protected] @brendangregg This Tutorial • A tour of many Linux performance tools – To show you what can be done – With guidance for how to do it • This includes objectives, discussion, live demos – See the video of this tutorial Observability Benchmarking Tuning Stac Tuning • Massive AWS EC2 Linux cloud – 10s of thousands of cloud instances • FreeBSD for content delivery – ~33% of US Internet traffic at night • Over 50M subscribers – Recently launched in ANZ • Use Linux server tools as needed – After cloud monitoring (Atlas, etc.) and instance monitoring (Vector) tools Agenda • Methodologies • Tools • Tool Types: – Observability – Benchmarking – Tuning – Static • Profiling • Tracing Methodologies Methodologies • Objectives: – Recognize the Streetlight Anti-Method – Perform the Workload Characterization Method – Perform the USE Method – Learn how to start with the questions, before using tools – Be aware of other methodologies My system is slow… DEMO & DISCUSSION Methodologies • There are dozens of performance tools for Linux – Packages: sysstat, procps, coreutils, … – Commercial products • Methodologies can provide guidance for choosing and using tools effectively • A starting point, a process, and an ending point An#-Methodologies • The lack of a deliberate methodology… Street Light An<-Method 1. Pick observability tools that are: – Familiar – Found on the Internet – Found at random 2. Run tools 3. Look for obvious issues Drunk Man An<-Method • Tune things at random until the problem goes away Blame Someone Else An<-Method 1. Find a system or environment component you are not responsible for 2. Hypothesize that the issue is with that component 3. Redirect the issue to the responsible team 4.
    [Show full text]
  • Java Bytecode Manipulation Framework
    Notice About this document The following copyright statements and licenses apply to software components that are distributed with various versions of the OnCommand Performance Manager products. Your product does not necessarily use all the software components referred to below. Where required, source code is published at the following location: ftp://ftp.netapp.com/frm-ntap/opensource/ 215-09632 _A0_ur001 -Copyright 2014 NetApp, Inc. All rights reserved. 1 Notice Copyrights and licenses The following component is subject to the ANTLR License • ANTLR, ANother Tool for Language Recognition - 2.7.6 © Copyright ANTLR / Terence Parr 2009 ANTLR License SOFTWARE RIGHTS ANTLR 1989-2004 Developed by Terence Parr Partially supported by University of San Francisco & jGuru.com We reserve no legal rights to the ANTLR--it is fully in the public domain. An individual or company may do whatever they wish with source code distributed with ANTLR or the code generated by ANTLR, including the incorporation of ANTLR, or its output, into commerical software. We encourage users to develop software with ANTLR. However, we do ask that credit is given to us for developing ANTLR. By "credit", we mean that if you use ANTLR or incorporate any source code into one of your programs (commercial product, research project, or otherwise) that you acknowledge this fact somewhere in the documentation, research report, etc... If you like ANTLR and have developed a nice tool with the output, please mention that you developed it using ANTLR. In addition, we ask that the headers remain intact in our source code. As long as these guidelines are kept, we expect to continue enhancing this system and expect to make other tools available as they are completed.
    [Show full text]
  • UNIX OS Agent User's Guide
    IBM Tivoli Monitoring Version 6.3.0 UNIX OS Agent User's Guide SC22-5452-00 IBM Tivoli Monitoring Version 6.3.0 UNIX OS Agent User's Guide SC22-5452-00 Note Before using this information and the product it supports, read the information in “Notices” on page 399. This edition applies to version 6, release 3 of IBM Tivoli Monitoring (product number 5724-C04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1994, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables ...............vii Solaris System CPU Workload workspace ....28 Solaris Zone Processes workspace .......28 Chapter 1. Using the monitoring agent . 1 Solaris Zones workspace ..........28 System Details workspace .........28 New in this release ............2 System Information workspace ........29 Components of the monitoring agent ......3 Top CPU-Memory %-VSize Details workspace . 30 User interface options ...........4 UNIX OS workspace ...........30 UNIX Detail workspace ..........31 Chapter 2. Requirements for the Users workspace ............31 monitoring agent ...........5 Enabling the Monitoring Agent for UNIX OS to run Chapter 4. Attributes .........33 as a nonroot user .............7 Agent Availability Management Status attributes . 36 Securing your IBM Tivoli Monitoring installation 7 Agent Active Runtime Status attributes .....37 Setting overall file ownership and permissions for AIX AMS attributes............38
    [Show full text]
  • Software Licensing Flexibility Is
    Software licensing flexibility is key - SD Times file:///Users/mq/Desktop/Software licensing flexibility is key ... sdtimes.com Software licensing flexibility is key - SD Times Lisa Morgan Today’s businesses run on software, but the ways they want to license it are changing. To keep pace with end users’ expectations and to stay competitive, software companies are embracing more types of licensing models, including perpetual, subscription, pay-per-use, hybrid and others. On-premise licenses are being supplemented with or replaced by SaaS alternatives, and more developers are selling apps via app stores. Meanwhile, intelligent device manufacturers are putting more 1 von 3 08.10.15 14:28 Software licensing flexibility is key - SD Times file:///Users/mq/Desktop/Software licensing flexibility is key ... emphasis on software because it helps them differentiate their products and take advantage of new revenue opportunities. As technology evolves and as user expectations continue to change, software developers and intelligent device manufacturers need reliable and flexible means of protecting, monetizing and monitoring the use of their intellectual property. (Related: The big business of software licensing) “We’re noticing a steady shift away from the traditional models. What’s still top of mind is how you get from a perpetual license to a subscription-type model,” said Jon Gillespie-Brown, CEO of Nalpeiron. “Quite a few people say they like what Adobe did with Creative Suite, [not realizing] what it took to do that, but in general people want to know how they can transform their businesses.” Intelligent device manufacturers are changing their business models too.
    [Show full text]
  • Title VI Fact Sheet
    Title VI Fact Sheet Cleveland State Community College – P O Box 3570 – Cleveland, TN 37320-3570 RIGHTS UNDER TITLE VI OF THE CIVIL RIGHTS ACT OF 1964 The Civil Rights Act of 1964 was passed to ensure the people of the U.S. equal treatment, rights and opportunities regardless of race, color or national origin. Title VI of that Act prohibits discrimination in federally funded programs. It is important that all applicants and recipients of services know about their rights under the law. WHAT IS TITLE VI? “No person in the United States shall, on the ground of race, color or national origin, be excluded from participation in, be denied the benefits of, or be subjected to discrimination under any program or activity receiving federal financial assistance.” WHAT IS COVERED BY TITLE VI? • Veterans Administration educational benefits • equipment and building loans • employee or student recruitment • health care (i.e. Medicare, Medicaid, Tenncare) • social services • parks and recreation • construction • housing • transportation • contracting • the distribution of benefits and services tax benefits • the location of facilities enjoyed by private agencies, fraternal and non-profit • community development block grants organizations (i.e. 501 c3), as well as education • welfare services institutions • law enforcement • hiring • program effects on people in applicable communities List is not all-inclusive WHAT IS FEDERAL FINANCIAL ASSISTANCE? • Federal financial assistance means more than just money. Aid that enhances the ability to improve or expand allocation of a recipient’s own resources also constitutes assistance. Examples: o Student aid (releases recipient’s funds for other uses) or o Training of employees (permits better use of the employer) o Grants and Loans o Property o Loan or Personnel o Tax incentives o Technical assistance, etc.
    [Show full text]