IBM Tivoli Monitoring: Administrator's Guide Private Situation Operation

Total Page:16

File Type:pdf, Size:1020Kb

IBM Tivoli Monitoring: Administrator's Guide Private Situation Operation IBM Tivoli Monitoring Version 6.2.3 Fix Pack 1 Administrator's Guide SC32-9408-05 IBM Tivoli Monitoring Version 6.2.3 Fix Pack 1 Administrator's Guide SC32-9408-05 Note Before using this information and the product it supports, read the information in “Notices” on page 467. This edition applies to version 6, release 2, modification 3, fix pack 1 of IBM Tivoli Monitoring (product number 5724-C04 ) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2005, 2012. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ..............vii Enabling the HTTP proxy server ......49 Setting application properties for Linux and Tables ...............ix UNIX systems ............50 Setting the environment variable when the hub is on a z/OS system ...........51 About this information ........xi Tivoli Enterprise Portal Server configuration settings 52 Editing the portal server environment file . 52 Chapter 1. Introduction ........1 Portal server environment variables .....53 New in this release ............1 Pruning events on the portal server database . 54 New in Version 6.2.3 Fix Pack 1 .......1 Controlling the size of event attachments . 55 New in Version 6.2.3...........2 Controlling the number of logon attempts . 56 New in Version 6.2.2 Fix Pack 2 .......4 Duper process for optimizing situations ....57 New in Version 6.2.2 Fix Pack 1 .......8 New in Version 6.2.2...........9 Chapter 4. Setting up asymmetric New in Version 6.2.1 ..........12 encryption .............59 New in Version 6.2.0 ..........15 Setting the JRE for GSKit and starting Key Manager 59 IBM Tivoli Monitoring family of products ....18 Creating a new key database ........60 Tivoli Management Services components ....19 Creating a new public-private key pair and Tivoli Enterprise Portal client ........20 certificate request ............60 Desktop, Browser, and Java Web Start clients . 20 Using a temporary self-signed certificate.....61 Historical data collection .........21 Receiving the CA-signed certificate ......61 System administrator tasks ........21 Saving the password to a stash file ......62 Importing embedded WebSphere Application Server Chapter 2. Preparing your Tivoli (eWAS) certificates ............62 Enterprise Portal environment ....23 Browser client .............23 Chapter 5. Enabling user authentication 65 Java runtime environment (JRE) versions . 23 User authentication through the hub monitoring Allocating additional memory for the applet . 23 server ................66 First time logon ............25 Prerequisites for configuring authentication on Internet Explorer security settings ......25 the hub monitoring server ........66 Windows write and delete privileges .....26 Configuration procedure .........68 Adding your company logo and URL ....26 Ldapsearch for LDAP information ......70 Starting the Tivoli Enterprise Portal client ....27 User authentication through the portal server . 72 Using Web Start to download and run the desktop Prerequisites for configuring authentication on client ................27 the portal server ............72 Installing the IBM JRE ..........28 About single sign-on ..........74 Enabling tracing for the JRE ........29 Using Manage Tivoli Monitoring Services to Downloading and running the desktop client . 30 configure the portal server for LDAP Manually creating a shortcut for the Web Start authentication ............76 client ...............31 Using the Linux or UNIX command line to Starting the desktop client on another portal server 32 configure the portal server for LDAP Starting the browser client on another portal server 33 authentication ............79 Specifying the browser used for Launch Application Disabling LDAP authentication on the portal and for online help ............34 server ...............80 Add operating platforms to the Navigator view . 36 TEPS/e administration console .......81 Secure Socket Layer transmissions .......36 Mapping Tivoli Enterprise Portal user IDs to Enabling the Tivoli Integrated Portal Web Service LDAP distinguished names ........85 for charts ...............36 Importing and exporting LTPA keys .....86 Enabling FIPS for IBM Tivoli Monitoring ....37 Reconfiguring the browser client for SSO . 87 Tivoli Enterprise Portal distinguished names . 87 Chapter 3. Editing the portal Migrating authentication from the monitoring server configuration settings ........43 to the portal server ............88 Tivoli Enterprise Portal client configuration settings 43 Editing the client parameters .......43 Chapter 6. User administration ....91 Portal client parameter list ........44 Administer Users ............91 © Copyright IBM Corp. 2005, 2012 iii Users and User Groups .........92 Chapter 10. Configuring connectors Permissions .............92 for the common event console ....143 Applications .............95 Common Event Console Configuration window 143 Navigator views ............96 ITM Connector tab ..........144 Member Of and Members ........96 TEC Connector tab ..........144 Managing user IDs ............96 OMNIbus Connector tab ........146 Adding a user ID ...........97 Names of Extra Columns tab .......147 Viewing and editing a user ID .......98 Best practices for using event synchronization . 149 Removing a user ID ..........99 Troubleshooting problems with connection to Tivoli Default user .............99 Enterprise Console server on Linux systems . 149 Managing user groups ..........100 Viewing user group memberships .....100 Chapter 11. Maintaining monitoring Adding a user group ..........101 Reviewing and editing a user group.....102 agents ..............151 Removing a user group .........102 Agent tasks in the Tivoli Enterprise Portal....151 Notes on user administration ........103 Adding an agent through the Tivoli Enterprise Troubleshooting logon error messages .....106 Portal ...............151 Configuring an agent through the Tivoli Chapter 7. Audit logging ......109 Enterprise Portal ...........152 Starting, stopping, and recycling an agent Audit log XML elements mapped to the ITM Audit through the Tivoli Enterprise Portal .....153 attribute group .............111 Updating an agent through the Tivoli Enterprise Audit log XML example ..........113 Portal ...............154 Audit environment variables ........115 Removing an agent through the Tivoli Enterprise Portal ...........155 Chapter 8. Situation event integration Updating an agent through the command-line with Tivoli Enterprise Console ....119 interface ...............156 Default mapping of situation events to Tivoli Changing the monitoring server an agent connects Enterprise Console events .........119 to.................156 Expanding a generic event message situation Self-describing monitoring agents ......157 description .............121 Self-describing event flow at the monitoring Generic mapping for agent specific slots . 122 server ...............159 Assigning severity for Tivoli Enterprise Console Self-describing agent installation ......161 events ...............123 Self-describing auto refresh and seeding . 166 Localizing message slots.........123 Environment variables that control the Situation event statuses and Tivoli Enterprise self-describing capability ........168 Console event generation ........124 Disabling the self-describing capability at the Synchronizing situation events .......126 monitoring server ...........169 Checking the Tivoli Enterprise Console event Disabling the self-describing capability at the cache ...............126 agent ...............170 Changing the configuration of the event Determining if agents are enabled for synchronization on the event server .....127 self-description ............171 Defining additional monitoring servers for the Troubleshooting for self-describing agents . 173 event synchronization on the event server . 127 Closing sampled events .........128 Chapter 12. Agent Management Changing rule set parameters for the omegamon.rls Services .............177 rule set file ..............128 Features of the Tivoli Agent Management Services 177 Tuning considerations .........130 Tivoli Agent Management Services installation and Using the Rules Check utility ........130 configuration .............179 Editing the Event Integration Facility configuration 131 Monitoring the availability of agents .....183 Specifying EIF forwarding for a situation event . 134 Managing the agent manually ........183 Customizing the event message .......135 Updating the XML used by the MCS Attribute Service ...............136 Chapter 13. Agent autonomy .....185 Displaying events from the Universal Agent on the Autonomous capabilities .........185 Tivoli Enterprise Console .........139 Environment variables for autonomous behavior 189 Using the NetView console through the Tivoli Situation limitations ...........195 Enterprise Console event viewer .......140 UTF-8 encoded XML files .........198 Configuring Agent Management Services on Tivoli Chapter 9. Situation event integration System Monitor Agents ..........199 with Tivoli Netcool/OMNIbus .....141 Private situations ............200 iv IBM Tivoli Monitoring: Administrator's Guide Private situation operation ........200 Impact of large amounts of historical data on Private situation XML specification .....203 the monitoring server or agent ......326 Exported enterprise situation XML specification 209 Requests for historical data from large tables 327 Private situation examples ........214 Scheduling
Recommended publications
  • OS 386 Multiuser/Multitasking Operating System
    OS 386 Multiuser/Multitasking Operating System REFERENCE GUIDE [Q] DIGITAL RESEARCH@ os REFERENCE GUIDE [jill DIGITAL RESEARCH~ COPYRIGHT Copyright © 1987 Digital Research Inc. All rights reserved. No part of this publication may be reproduced, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without the prior written permission of Digital Research Inc, 60 Garden Court, Box DRI, Monterey, California 93942 DISCLAIMER DIGITAL RESEARCH MAKES NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE CONTENTS HEREOF AND SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE. Further Digital Research Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research Inc to notify any person of such revision or changes. NOTICE TO USER This manual should not be construed as any representation or warranty with respect to the software named herein. Occasionally changes or variations exist in the software that are not reflected in the manual. Generally, if such changes or variations are known to exist and to affect the product significantly, a release note or READ.ME file accompanies the manual and the distribution disks. In that event, be sure to read the release note or READ.ME file before using the product. ii TRADEMARKS Digital Research and its logo, CP/M, and CP/M-86 are registered trademarks of Digital Research Inc. Cardfile, Concurrent, Concurrent DOS 386, Concurrent DOS XM, DR EDIX, DOS Plus and MP/M-86 are trademarks of Digital Research Inc.
    [Show full text]
  • Chapter 10 Introduction to Batch Files
    Instructor’s Manual Chapter 10 Lecture Notes Introduction to Batch Files Chapter 10 Introduction to Batch Files LEARNING OBJECTIVES 1. Compare and contrast batch and interactive processing. 2. Explain how batch files work. 3. Explain the purpose and function of the REM, ECHO, and PAUSE commands. 4. Explain how to stop or interrupt the batch file process. 5. Explain the function and use of replaceable parameters in batch files. 6. Explain the function of pipes, filters, and redirection in batch files. STUDENT OUTCOMES 1. Use Edit to write batch files. 2. Use COPY CON to write batch files. 3. Write and execute a simple batch file. 4. Write a batch file to load an application program. 5. Use the REM, PAUSE, and ECHO commands in batch files. 6. Terminate a batch file while it is executing. 7. Write batch files using replaceable parameters. 8. Write a batch file using pipes, filters, and redirection. CHAPTER SUMMARY 1. Batch processing means running a series of instructions without interruption. 2. Interactive processing allows the user to interface directly with the computer and update records immediately. 3. Batch files allow a user to put together a string of commands and execute them with one command. 4. Batch files must have the .BAT or .CMD file extension. 5. Windows looks first internally for a command, then for a .COM files extension, then for a .EXE file extension, and finally for a .BAT or .CMD file extension. 6. Edit is a full-screen text editor used to write batch files. 7. A word processor, if it has a means to save files in ASCII, can be used to write batch files.
    [Show full text]
  • Windows in Concurrent PC
    Using Concurrent PC DOS OTHER BOOKS BY THE AUTHOR Microcomputer Operating Systems (1982) The Byte Guide to CP/M-86 (1984) Using Concurrent PC DOS Mark Dahmke McGraw-Hili Book Company New York St. Louis San Francisco Auckland Bogota Hamburg Johannesburg London Madrid Mexico Montreal New Delhi Panama Paris Sao Paulo Singapore Sydney Tokyo Toronto Library of Congress Cataloging-in-Publication Data Dahmke, Mark. U sing Concurrent PC DOS. Bibliography: p. Includes index. 1. Concurrent PC DOS (Computer operation system) 1. Title. QA76.76.063D34 1986 005.4' 469 85-15473 ISBN 0-07-015073-7 Copyright © 1986 by McGraw-Hili, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of the publisher. 1234567890 DOC/DOC 893210876 ISBN 0-07-015073-7 The editors for this book were Steven Guty and Vivian Koenig, the designer was Naomi Auerbach, and the production supervisor was Teresa F. Leaden. It was set in Century Schoolbook by Byrd Data Imaging. Printed and bound by R. R. Donnelley & Sons Company. To my sister Patricia Contents Chapter 1. Introduction 1 What Is Concurrent PC DOS? 1 What Is an Operating System? 1 The DOS Family Tree 3 The Scope of This Book 5 Chapter 2. Concurrent PC DOS Compatibility 6 Concurrent PC DOS Compatibility 6 PC·DOS, TopView, and the IBM PC AT 7 Concurrent CP/M·86 9 Chapter 3.
    [Show full text]
  • MAX+PLUS II Getting Started, Appendix A-C, Glossary
    81_GSBOOK.fm5 Page 277 Tuesday, October 14, 1997 4:04 PM Appendix A MAX+PLUS II Command-Line Mode You can operate the MAX+PLUS II Compiler, Timing Analyzer, and Simulator from the command prompt under UNIX, Microsoft Windows NT, and Microsoft Windows 95. Altera Corporation 277 81_GSBOOK.fm5 Page 278 Tuesday, October 14, 1997 4:04 PM MAX+PLUS II Getting Started To run MAX+PLUS II from a command prompt, type: maxplus2 -h | -v | { <batch option(s)> [ <I/O option(s)> ] <project name> } 9 Multiple batch and I/O options can be used for a single project; multiple projects can be processed with the same command line. The <project name> indicates the end of the options for that project. The <batch options> are as follows: Batch Option: Action: -h or -help displays information about command line options -v or -version displays the MAX+PLUS II version number -c or -compile runs the Compiler -ta_delay runs the Timing Analyzer in Delay Matrix mode -ta_setup runs the Timing Analyzer in Setup/Hold Matrix mode -ta_reg runs the Timing Analyzer in Registered Performance mode -s or -simulate runs the Simulator -i or -ignore_errors ignores errors from the Compiler, Simulator, or Timing Analyzer, and continues processing other projects specified in the same command line, even if the processing on a previous project has failed 278 Altera Corporation 81_GSBOOK.fm5 Page 279 Tuesday, October 14, 1997 4:04 PM Appendix A: MAX+PLUS II Command-Line Mode The <I/O options> are shown below. For each option, the <filename> defaults to <project name> if you specify empty quotation marks ("").
    [Show full text]
  • IBM Tivoli Monitoring: Administrator's Guide Synchronizing Situation Events
    IBM Tivoli Monitoring Version 6.3 Administrator's Guide SC22-5446-00 IBM Tivoli Monitoring Version 6.3 Administrator's Guide SC22-5446-00 Note Before using this information and the product it supports, read the information in “Notices” on page 571. This edition applies to version 6, release 3 of IBM Tivoli Monitoring (product number 5724-C04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2005, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ...............ix Creating custom dashboard pages that display monitoring data .............51 Tables ...............xi Controlling UISolutions imports .......53 About this information........xiii Chapter 4. Editing your environment configuration settings ........55 Chapter 1. Introduction ........1 Tivoli Enterprise Portal client configuration settings 55 Editing the client parameters .......55 New in this release ............1 Portal client parameter list ........56 New in Version 6.3 ...........1 Enabling the HTTP proxy server ......62 IBM Tivoli Monitoring family of products ....4 Setting application properties for Linux and Tivoli Management Services components .....5 UNIX systems ............63 Tivoli Enterprise Portal client .........7 Setting the environment variable when the hub is Desktop, Browser, and Java Web Start clients . 7 on a z/OS system ...........64 Historical data collection .........8 Tivoli Enterprise Portal Server configuration settings 65 System administrator tasks ........9 Editing the portal server environment file . 65 Performance Monitoring service provider.....9 Portal server environment variables .....66 Pruning events on the portal server database . 67 Chapter 2. Preparing your Tivoli Controlling the size of event attachments .
    [Show full text]
  • Preview Batch Script Tutorial (PDF Version)
    About this Tutorial Batch scripts are stored in simple text files containing lines with commands that get executed in sequence, one after the other. Scripting is a way by which one can alleviate this necessity by automating these command sequences in order to make one’s life at the shell easier and more productive. This tutorial discusses the basic functionalities of batch scripting along with relevant examples for easy understanding. Audience This tutorial has been prepared for beginners to understand the basic concepts of batch scripting. Prerequisites A reasonable knowledge of computer programming and concepts such as variables, commands, syntax, etc. is desired. Copyright & Disclaimer Copyright 2016 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at [email protected] i Table of Contents About this Tutorial ..................................................................................................................................
    [Show full text]
  • Microsoft Windows XP - Command-Line Reference A-Z
    www.GetPedia.com *More than 150,000 articles in the search database *Learn how almost everything works Microsoft Windows XP - Command-line reference A-Z Windows XP Professional Product Documentation > Performance and maintenance Command-line reference A-Z To find information about a command, on the A-Z button menu at the top of this page, click the letter that the command starts with, and then click the command name. In addition to the tools installed with Windows XP, there are over 40 support tools included on the Windows XP CD. You can use these tools to diagnose and resolve computer problems. For more information about these support tools, see Windows Support Tools For information about installing support tools, see Install Windows Support Tools For more information about changes to the functionality of MS-DOS commands, new command-line tools, command shell functionality, configuring the command prompt, and automating commmand-line tasks, see Command-line reference Some command-line tools require the user to have administrator-level privileges on source and/or target computers. Command-line tools must be run at the prompt of the Cmd.exe command interpreter. To open Command Prompt, click Start, click Run, type cmd, and then click OK. To view help at the command-line, at the command prompt, type the following: CommandName /? A Arp Assoc At Atmadm Attrib Top of page B Batch files http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/ntcmds.mspx?pf=true (1 of 11)5/22/2004 10:58:52 PM Microsoft Windows XP - Command-line
    [Show full text]
  • Concurrent CP / M TM User's Guide
    Concurrent CP / M TM Operating System User's Guide VERSION 3.1 [Q] DIGITAL RESEARCH® Concurrent CP/M™ Operating System User's Guide -''---'''''------------- COPYRIGHT Copyright© 1984 by Digital Research. All rights reserved. No part-of this publication may be reproduced, transmitted, transcribed. stored in a retrieval system. or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permission of Digital Research, Post Office Box 579, Pacific Grove, California, 93950. Readers are granted permission to include the example programs, either in whole or in part, in their own programs. DISCLAIMER Digital Research makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any par­ ticular purpose. Further, Digital Research reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research to notify any person of such revision or changes. TRADEMARKS CP/M and CP/M-86 are registered trademarks of Digital Research. ASM-86, Concurrent CP/M, DDT-86, and MP/M-86 are trademarks of Digital Research. Intel is a registered trademark of Intel Corporation. The Concurrent CP/M Oper.ating System User's Guide was printed in the United States of America. First Edition: January 1984 Foreword Concurrent CP/M ™ is a multi- or single-user, multitasking operating system that allows you to do two or more jobs at the same time on one or more terminals.
    [Show full text]
  • User's Guide I
    Copyright © 2006 by Connectivity Systems, Incorporated All Rights Reserved RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure by the Government is subject to the restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013. This material contains confidential and proprietary material of Connectivity Systems, Inc. and may not be used in any way without written authorization from Connectivity Systems, Inc.. This material may not be reproduced, in whole or in part, in any way, without prior written permission from Connectivity Systems, Inc.. Permission is hereby granted to copy and distribute this document as follows: • Each copy must be a complete and accurate copy. • All copyright notices must be retained. • No modifications may be made. • Use of each copy is restricted to the evaluation and/or promotion of Connectivity Systems, Inc.’s BIM-FAQS/ASO product or in accordance with a license agreement. User Guide, Version 5 Release 3A September 2006 Published by Connectivity Systems, Inc. 8120 State Route 138, Williamsport OH 43164 Phone: 800-795-4914 Fax: 740-986-6022 E-Mail: [email protected] Internet: http://www.e-vse.com Contents About This Guide Purpose ..............................................................................................................................................................ATG–1 Who Should Use This Guide ..........................................................................................................................ATG–1
    [Show full text]
  • Cmd File Declare Variable
    Cmd File Declare Variable Prent thread his pursuivant fillip practicably, but headed Geo never harm so gibingly. Volatilizable Oleg still sandbagged: noncommercial and loud Odin chuckle quite inerasably but dewater her xylyls infra. Paton smirch piously? Batch file variables and scope AticleWorld. Used also for information sharing for all users robotframework-announce An. How staff Work with Variables in Bash. Declaring a variable declare a variable using set remember god put spaces around. Batch-file run multiple variables batch-file Tutorial. In variable definitions tfvars files either specified on the command line or. How various use Terraform variables Tutorial UpCloud. Specified the following command block operates on the file genericdata. The Windows command line is then stable no worrying about the PowerShell. Say we take exactly one would expect from keyword, known directive defines a cmd file declare variable? How to defend environment variable in Windows using the Windows command-line prompt CMD or using the Windows PowerShell. Path during installation it'll be maze like CProgram FilesJavajdk1065 You can not type where java at the command prompt. Several test cases can be expanded text that cmd file declare variable is always be placed in the cmd environment in general. The user has the have common way of safe the program which file to open. What is Alt f4? As a reminder about batch file FOR loop syntax The variable i needs two percent. The way in a separate class or lower priority based on variable file declare a new library needs to understand and load these instances. Batch files generally uses bat or cmd extensions bib instead of V bibliofilesfoo txt do set sname1a.
    [Show full text]
  • Z3PLUS the Z-System for CP/M-Plus
    Z3PLUS The Z-System for CP/M-Plus User's Manual by Jay Sage and Bridger Mitchell c Copyright 1988 Jay Sage and Bridger Mitchell Plu*Perfect Systems 410 23rd Street Santa Monica, CA 90402 This page will contain the copyright and trademark notices and credits. PREFACE Automatic, universal, and dynamic, the two new Z-Systems — NZ-COM for CP/M-2.2 computers and Z3PLUS for CP/M-Plus computers — are the result of the extensive cooperative efforts of Joe Wright, Bridger Mitchell, and Jay Sage. All three authors worked together on many aspects of both products; each has been particularly responsible for one essential characteristic. Joe Wright brought automatic operation. It was he who first conceived of and demonstrated with Z-COM what many deemed impossible – a version of Z-System that would install itself automatically on almost any CP/M-2.2 computer. Yet, even after Z-COM’s success, it still ap- peared that Z-System could never run on a CP/M-Plus computer with its radically different command processor and banked memory operat- ing system. Z3PLUS proves otherwise. Bridger Mitchell made the systems universal. From his first exposure to Z-System, he decried the complex, laborious effort required to make each code module run with any particular implementation of the sys- tem. He developed a universal ZRL file format and loader that would allow a single file to adapt to any Z-System, no matter what its con- figuration in terms of module addresses and sizes. Jay Sage added dynamics. He conceived an operating system that can change its size and character — right in the middle of a command line if necessary — to suit the needs of a particular task.
    [Show full text]
  • Concurrent CP/M System Guide Is Intended for Use by System Designers Who Want to Modify Either the User Or Hardware Interface to Concurrent CP/M
    DIGITAL RESEARCH ° Concurrent CP/M TM Operating System System Guide COPYRZGHT Copy~ightOlgO4 by Digital Research Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any fern or by any means, electronic, mechsnlcal, magnetic, opticalr chemical, manual or otherwise, without the prior written permission of Digital Research Zno,, POSt Office Box 579, Pacific Grove, California, g3950. DISCLAIMER Digital Research Inc. makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Further, Digital Research Inc. reserves the right to revise this publication and to make changes from tlme to time In the oontent hereof without obligation of Digital Research Inc. to notify any person of such revision o: ohen~e8. TRADEMARK8 CP/N, CP/M-86, and Digital Research and Its logo are registered trademarks of Digital Researoh Inc. ASH- 86, Concurrent OF/K, DDT-86, MP/M-86, UID-86, and GSX a:e tradeuarke of Digital Research InD. Intel is a registered trademark of Intel Corporation. IBM is a r~ietmre~ trade~nrk of ~nternatlcnel Business Hachinee. CompuFro is a registered trademark of CompuPro, a Godbout Company. MS-DOS is a trademark of Microsoft Corporation. The Concurrent CP/H" Operating System System Guide was prepared using the Digital Research TExTM Text Formatter and printed in the United States of America. * First Edition: January 1984 * Foreword Concurrent CP/M '= can be configured as a single or multiple user, multitasking, real-time operating system.
    [Show full text]