Online backup user guide
... Continuous data protection - start backup whenever a file is being modified "Backup and Sleep (Hibernate)" and "Backup and standby" Allow backup schedule to run every X minutes Full support of Microsoft Exchange individual email, contacts, calendars, tasks etc. Choose whether to restore “file permis ...
... Continuous data protection - start backup whenever a file is being modified "Backup and Sleep (Hibernate)" and "Backup and standby" Allow backup schedule to run every X minutes Full support of Microsoft Exchange individual email, contacts, calendars, tasks etc. Choose whether to restore “file permis ...
XML Extender Administration and Programming DB2 Universal Database for OS/390 and z/OS
... Using the administration wizard . . . . Using the command line . . . . . . Storing a DTD in the DTD repository table . Using the administration wizard . . . . From the command line . . . . . . Disabling a server for XML . . . . . . Before you begin . . . . . . . . . Using the administration wizard . ...
... Using the administration wizard . . . . Using the command line . . . . . . Storing a DTD in the DTD repository table . Using the administration wizard . . . . From the command line . . . . . . Disabling a server for XML . . . . . . Before you begin . . . . . . . . . Using the administration wizard . ...
Teradata Viewpoint Installation, Configuration, and Upgrade Guide
... Other product and company names mentioned herein may be the trademarks of their respective owners. The information contained in this document is provided on an "as-is" basis, without warranty of any kind, either express or implied, including the implied warranties of merchantability, fitness for a p ...
... Other product and company names mentioned herein may be the trademarks of their respective owners. The information contained in this document is provided on an "as-is" basis, without warranty of any kind, either express or implied, including the implied warranties of merchantability, fitness for a p ...
Introduction to Data Factory, a data integration service | Microsoft Docs
... the output data is written by the activity. Linked services Linked services are much like connection strings, which define the connection information needed for Data Factory to connect to external resources. Think of it this way - a linked service defines the connection to the data source and a data ...
... the output data is written by the activity. Linked services Linked services are much like connection strings, which define the connection information needed for Data Factory to connect to external resources. Think of it this way - a linked service defines the connection to the data source and a data ...
MySQL for NetWare Administration Guide for OES
... information in a corporate network. To access, manipulate, and process data stored in a database, you need a DBMS. Because computers are very effective at handling large amounts of data, database management plays a central role in computing. But more than being a DBMS, MySQL is a relational database ...
... information in a corporate network. To access, manipulate, and process data stored in a database, you need a DBMS. Because computers are very effective at handling large amounts of data, database management plays a central role in computing. But more than being a DBMS, MySQL is a relational database ...
IBM Redbook: Informix Dynamic Server 11 Extending
... 5.1.1 The Primary server in an RSS environment . . . . . . . . . . . . . . . . . . . 94 5.1.2 The RSS server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 ...
... 5.1.1 The Primary server in an RSS environment . . . . . . . . . . . . . . . . . . . 94 5.1.2 The RSS server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 ...
Using IBM DB2 for i as a Storage Engine of MySQL Front cover
... 2.3 Using the IBMDB2I Storage Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3.1 Plugging in the storage engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3.2 Unplugging the storage engine . . . . . . . . . . . . . . ...
... 2.3 Using the IBMDB2I Storage Engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3.1 Plugging in the storage engine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3.2 Unplugging the storage engine . . . . . . . . . . . . . . ...
BlackBerry Enterprise Server for Microsoft Exchange - 5.0
... Users experience unexpected behavior with message lists and calendars on BlackBerry devices...................................... Various BlackBerry Enterprise Server components do not start............................................................................................... Could not crea ...
... Users experience unexpected behavior with message lists and calendars on BlackBerry devices...................................... Various BlackBerry Enterprise Server components do not start............................................................................................... Could not crea ...
WhatsUp Gold - Ipswitch Documentation Server
... Kerberos Key Distribution Service. Monitors the Kerberos Key Distribution Service which enables users to log on to the network using the Kerberos authentication protocol and manages tickets and sessions. If this service is stopped on the domain controller, users are unable to logon to the network. F ...
... Kerberos Key Distribution Service. Monitors the Kerberos Key Distribution Service which enables users to log on to the network using the Kerberos authentication protocol and manages tickets and sessions. If this service is stopped on the domain controller, users are unable to logon to the network. F ...
Tungsten Replicator 4.0 Manual
... 1.1. Tungsten Replicator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1. Extractor . . . . . . . . ...
... 1.1. Tungsten Replicator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1. Extractor . . . . . . . . ...
Overview of Oracle RAC
... Terminating Sessions On a Specific Cluster Instance.................................................................... 3-10 Overview of Initialization Parameter Files in Oracle RAC .......................................................... 3-11 Setting SPFILE Parameter Values for Oracle RAC........ ...
... Terminating Sessions On a Specific Cluster Instance.................................................................... 3-10 Overview of Initialization Parameter Files in Oracle RAC .......................................................... 3-11 Setting SPFILE Parameter Values for Oracle RAC........ ...
IBM Informix Flexible Grid Extending Data Availability Front cover
... 5.1.1 Why replicate data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 5.1.2 Why use Enterprise Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 5.2 An example replication scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 ...
... 5.1.1 Why replicate data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 5.1.2 Why use Enterprise Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 5.2 An example replication scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 ...
Command Line Reference Guide
... as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by Arcserve at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of Arcserve. This D ...
... as the “Documentation”) is for your informational purposes only and is subject to change or withdrawal by Arcserve at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of Arcserve. This D ...
Agilent OpenLAB ECM Intelligent Reporter
... possibility to easily query analytical result data – across different samples, sequences, instruments or even projects. To query results, the Reporter Client offers a convenient filter function, where filter definitions can be saved and reused. You can choose one of the report templates that are pro ...
... possibility to easily query analytical result data – across different samples, sequences, instruments or even projects. To query results, the Reporter Client offers a convenient filter function, where filter definitions can be saved and reused. You can choose one of the report templates that are pro ...
Migrating WebLogic Applications to WebSphere Advanced Edition
... Preface This redbook will help you plan the migration of an application developed for BEA WebLogic Server, so that the application will run on WebSphere Application Server, Advanced Edition. We explain the differences between the implementations of WebLogic and WebSphere, provide guidance to develo ...
... Preface This redbook will help you plan the migration of an application developed for BEA WebLogic Server, so that the application will run on WebSphere Application Server, Advanced Edition. We explain the differences between the implementations of WebLogic and WebSphere, provide guidance to develo ...
SAP Business One Administrator`s Guide
... Technical names of system objects. These include report names, program names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body text, for example, SELECT and INCLUDE. ...
... Technical names of system objects. These include report names, program names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body text, for example, SELECT and INCLUDE. ...
SAP Business One Administrator`s Guide
... Technical names of system objects. These include report names, program names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body text, for example, SELECT and INCLUDE. ...
... Technical names of system objects. These include report names, program names, transaction codes, table names, and key concepts of a programming language when they are surrounded by body text, for example, SELECT and INCLUDE. ...
Oracle Database VLDB and Partitioning Guide
... The Programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherently dangerous applications. It shall be the licensee's responsibility to take all appropriate fail-safe, backup, redundancy and other measures to ensure the safe use of such applications if the Pro ...
... The Programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherently dangerous applications. It shall be the licensee's responsibility to take all appropriate fail-safe, backup, redundancy and other measures to ensure the safe use of such applications if the Pro ...
OReilly.Enterprise.JavaBeans.3.0.5th.Edition.May.2006 [EJB 3.0]
... The Java language metadata facility, newly added to Java SE, aided us in making these simplifications. EJB 3.0 uses metadata annotations to express within Java code the dependencies of EJB components upon container services, and thus to avoid the need to provide a deployment descriptor. Further, EJB ...
... The Java language metadata facility, newly added to Java SE, aided us in making these simplifications. EJB 3.0 uses metadata annotations to express within Java code the dependencies of EJB components upon container services, and thus to avoid the need to provide a deployment descriptor. Further, EJB ...
Back up a site collection (SharePoint Server 2010)
... Determining the size of the source site collection .............................................................................. 110 Moving site collections between content databases .......................................................................... 110 Run a farm that uses read-only databa ...
... Determining the size of the source site collection .............................................................................. 110 Moving site collections between content databases .......................................................................... 110 Run a farm that uses read-only databa ...
Open Source Java Frameworks on NonStop User`s Guide
... Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard com ...
... Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard com ...
SPICE DL/I Product Reference Manual
... All rights reserved. No part of this publication may be re-produced, store d in a r etrieval system or transmitted, in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of the publisher. 18 June 2009 ...
... All rights reserved. No part of this publication may be re-produced, store d in a r etrieval system or transmitted, in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of the publisher. 18 June 2009 ...
IBM Lotus Enterprise Integrator for Domino (LEI) Activities and User
... 2 Starting and Running the LEI Server . . . . . . . . . . . . . . . . . . . . . . . . . 19 Starting the LEI Server . . . . . . . . . . . . . . . . . . 19 Executing LEI Server Commands From the Console . . . . . . . . . . . . . . . . . . . . . . 20 Executing LEI Server Commands from the Administrator ...
... 2 Starting and Running the LEI Server . . . . . . . . . . . . . . . . . . . . . . . . . 19 Starting the LEI Server . . . . . . . . . . . . . . . . . . 19 Executing LEI Server Commands From the Console . . . . . . . . . . . . . . . . . . . . . . 20 Executing LEI Server Commands from the Administrator ...
ESXi Installable and vCenter Server Setup Guide
... RAM – ESXi 4.0 hosts require more RAM than typical servers. An ESXi 4.0 host must be equipped with sufficient RAM to run concurrent virtual machines. For example, operating four virtual machines with Red Hat Enterprise Linux or Windows XP requires at least 3GB of RAM for baseline performance. This i ...
... RAM – ESXi 4.0 hosts require more RAM than typical servers. An ESXi 4.0 host must be equipped with sufficient RAM to run concurrent virtual machines. For example, operating four virtual machines with Red Hat Enterprise Linux or Windows XP requires at least 3GB of RAM for baseline performance. This i ...
Understanding SAP HANA Security Concepts and
... Speed of SAP HANA translated into efficient work and process improvements No separate hardware needed for SAP HANA applications when deployed on the SAP ERP application running on SAP HANA Leverage full feature set of SAP HANA SAP HANA Live for SAP Business Suite delivers business view on a ...
... Speed of SAP HANA translated into efficient work and process improvements No separate hardware needed for SAP HANA applications when deployed on the SAP ERP application running on SAP HANA Leverage full feature set of SAP HANA SAP HANA Live for SAP Business Suite delivers business view on a ...