Sponsored Content
Operating Systems Solaris Help with Reviving a NETRA240 Pls? Post 303026796 by ozsavran on Monday 3rd of December 2018 12:06:36 PM
Old 12-03-2018
One Sparc Solaris Box Coming Up!

Dear Hicks,

Indeed it is delivered on that promising sparkle now... Smilie Big big thanks to you my old friend. Now I feel ready to tackle any old Sun hardware with more ease.

Help with Reviving a NETRA240 Pls?-wp_20181203_014jpg


Speaking of being held together by sticky tape, I am 53 with a open bypass surgery myself. Still get excited like a boy about adventures in silicon valley though. That High Noon book also delivered the goods. Poor old lady Karen Southwick did solid research and analysis. You can see Sun's demise even when she published in 2000. McNealy could have sold the company to some cool hardware guys like 1-Cisco or 2-HP we could still get some exciting designs. They were very approachable people. Sun Turkey country manager was humble enough to visit me at my home office in Istanbul. A struggling web developer at the time. Nobody else like that would let you dream of that. Seen McNealy circa 1999 in person. He was surprisingly short, very tired, and nervous like a common Turk. Smilie Obviously very down to earth and hard working. Wish they did something like Acorn did with ARM design to popularize SPARC further into tablets and phones, kick microsoft's ass finally.
These 2 Users Gave Thanks to ozsavran For This Post:
 

10 More Discussions You Might Find Interesting

1. Linux

pls help me

we hv a big enviroment networked. we use squid proxy. access allowed by src address previously. we have win2000 network with ads. my requirement is the proxy should allow domain users only for access. how can i map my windows userdatabase with squid is there any thing specific which has 2 b... (1 Reply)
Discussion started by: sriram.s
1 Replies

2. UNIX for Dummies Questions & Answers

Need help pls

Hi, I'm a newbie. I need help on my first assignment in UNIX. 1. How do I determine the number of non-empty directories? I was told to create a variable ARCHIVE, which points to the directory that contains the archive of the messages. But I'm so dumb and I don't even know how to do this. 2. In... (1 Reply)
Discussion started by: hygsg
1 Replies

3. UNIX for Dummies Questions & Answers

Pls Help

Hi every one I have got very very bad Email, My question is: How can I get all information about that f*** Email, I do mean IP,reall name, Adress, user name, password etc... I wonder if there is any program or website that I can see that email, help me please When I used windows Xp(old... (2 Replies)
Discussion started by: Cano
2 Replies

4. UNIX for Dummies Questions & Answers

Help pls!

Hi... Why should I press F1 to start windows?! I have Xp in my computer... thx 4 help Cano (1 Reply)
Discussion started by: Cano
1 Replies

5. Shell Programming and Scripting

pls help

I have a list of variables: ss1, ss5, ss6, ss8, st2 etc. (these values are not fixed, configurable). Now, I have assigned ss5=”test”. And I want to search in the list for the string “test” to know which variable is having the value “test”. Can u pls tell me how to do this? (10 Replies)
Discussion started by: kanchan_cp
10 Replies

6. Shell Programming and Scripting

pls help

Hi, I need your help guys. I have two data files, namely 101.amberized.pdb & 101.pdb . Now I want to replace the whole 3rd column of 101.amberized.pdb with the 3rd column of 101.pdb file. How do I do it in shell? Thanks in advance Parimal (11 Replies)
Discussion started by: chuchu
11 Replies

7. Shell Programming and Scripting

Pls Pls do help me

When i run this command, everything is ok. The file can be email and attached but soon after i download the file, the file cant be read. It's seem corrupted. Totally cant be read although i'm using context or wordfile. Original file generated at ek_bkup/alert/tbspace_datafile.log is OK..... ... (7 Replies)
Discussion started by: adzuanamir
7 Replies

8. UNIX for Dummies Questions & Answers

HELP PLs

I have this code: #!/bin/sh awk 'BEGIN NR == 2 repl = "PHI" $4 = repl print $0 'dryloop.txt and this code: #!/bin/sh sed -e '1s/\|$/\|COMID\|/g' -e 's/^087.*$/&PHI\|g' hl.dsldryloop > textdry.txt My code won't work. I want to change the COMID of lines starting with 087 . this is my... (15 Replies)
Discussion started by: arkhei
15 Replies

9. Homework & Coursework Questions

Help pls

How to find the ten most common words in a file (1 Reply)
Discussion started by: jass
1 Replies

10. Solaris

NETRA240 in HLR CDMA Wireless Exchange... help is apreciated

Greetings, I hope my post finds you all OK, I have a Netra240 server in an HLR inside a wireless CDMA Exchange, it works as a Hard Disk Unit (HDU) as shown in Local Management Terminal (LMT) as show in the picture 1 attached. The power went down because of a power failure in main UPS, when... (2 Replies)
Discussion started by: Sharista
2 Replies
netmasks(4)							   File Formats 						       netmasks(4)

NAME
netmasks - network mask database SYNOPSIS
/etc/inet/netmasks /etc/netmasks DESCRIPTION
The netmasks file contains network masks used to implement IP subnetting. It supports both standard subnetting as specified in RFC-950 and variable length subnetting as specified in RFC-1519. When using standard subnetting there should be a single line for each network that is subnetted in this file with the network number, any number of SPACE or TAB characters, and the network mask to use on that network. Network numbers and masks may be specified in the conventional IP `.' (dot) notation (like IP host addresses, but with zeroes for the host part). For example, 128.32.0.0 255.255.255.0 can be used to specify that the Class B network 128.32.0.0 should have eight bits of subnet field and eight bits of host field, in addition to the standard sixteen bits in the network field. When using variable length subnetting, the format is identical. However, there should be a line for each subnet with the first field being the subnet and the second field being the netmask that applies to that subnet. The users of the database, such as ifconfig(1M), perform a lookup to find the longest possible matching mask. It is possible to combine the RFC-950 and RFC-1519 form of subnet masks in the net- masks file. For example, 128.32.0.0 255.255.255.0 128.32.27.0 255.255.255.240 128.32.27.16 255.255.255.240 128.32.27.32 255.255.255.240 128.32.27.48 255.255.255.240 128.32.27.64 255.255.255.240 128.32.27.80 255.255.255.240 128.32.27.96 255.255.255.240 128.32.27.112 255.255.255.240 128.32.27.128 255.255.255.240 128.32.27.144 255.255.255.240 128.32.27.160 255.255.255.240 128.32.27.176 255.255.255.240 128.32.27.192 255.255.255.240 128.32.27.208 255.255.255.240 128.32.27.224 255.255.255.240 128.32.27.240 255.255.255.240 128.32.64.0 255.255.255.192 can be used to specify different netmasks in different parts of the 128.32.0.0 Class B network number. Addresses 128.32.27.0 through 128.32.27.255 have a subnet mask with 28 bits in the combined network and subnet fields (often referred to as the subnet field) and 4 bits in the host field. Furthermore, addresses 128.32.64.0 through 128.32.64.63 have a 26 bits in the subnet field. Finally, all other addresses in the range 128.32.0.0 through 128.32.255.255 have a 24 bit subnet field. Invalid entries are ignored. SEE ALSO
ifconfig(1M), inet(7P) Postel, Jon, and Mogul, Jeff, Internet Standard Subnetting Procedure, RFC 950, Network Information Center, SRI International, Menlo Park, Calif., August 1985. V. Fuller, T. Li, J. Yu, K. Varadhan, Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy, RFC 1519, Network Information Center, SRI International, Menlo Park, Calif., September 1993. T. Pummill, B. Manning, Variable Length Subnet Table For IPv4, RFC 1878, Network Information Center, SRI International, Menlo Park, Calif., December 1995. NOTES
/etc/inet/netmasks is the official SVr4 name of the netmasks file. The symbolic link /etc/netmasks exists for BSD compatibility. SunOS 5.10 7 Jan 1997 netmasks(4)
All times are GMT -4. The time now is 09:43 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy