Sponsored Content
Full Discussion: Configuration Management
The Lounge What is on Your Mind? Configuration Management Post 62336 by google on Tuesday 15th of February 2005 06:35:40 AM
Old 02-15-2005
Well with my client, we are being mandated to use Harvest. Do you remember what it was about Harvest that wasnt so good? I am hearing a lot of commments from the development team about how the product is not a "developers" tool, but rather it is a "managers" tool. Not really sure what that means. Harvest seems overly complicated if you ask me.
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Configuration management tool in SCO UNIXWARE 7.1.3

Hi all, :confused: I want to know about the configuration management tool that is used in SCO UNIXWARE 7.1.3. Please refer some sites where i could get the details. Thanks in advance kavitha (2 Replies)
Discussion started by: kavithadass
2 Replies

2. Shell Programming and Scripting

data management

I am wondering if there is either a unix file management utility out there. I currently manage about 4 TBs of data and sometimes need to determine who is using what space. ( i can run it either on solaris or linux). Frank (1 Reply)
Discussion started by: frankkahle
1 Replies

3. HP-UX

Software management HP/UX 9.00

Hello, all! I'm newbie in HP/UX and at my job I'm dealing with HP/UX 9.00. Due this OS is an old one, I couldn't find some info, concretely, about software management on it. Can you please help me? (5 Replies)
Discussion started by: Che_G
5 Replies

4. UNIX and Linux Applications

Password management / centralized password management

Hello all, I need help for build server call as Password management / centralized password management server. My situation and example: I have 600 server in my server room running on Linux then I need 1 server only can create login/password and then user can login to all 600 server no... (2 Replies)
Discussion started by: sheikh76
2 Replies

5. IP Networking

IP Management

Hello all, I was wondering which way do you use to manage you IPs? For example in our case we have excel sheets and we export them in html first and import it to a server running apache, so to be visible from all. But i was wondering if there are any way (prefer a way running in web server)... (2 Replies)
Discussion started by: @dagio
2 Replies

6. What is on Your Mind?

Proper configuration management

Recently i started to work in new company. I will replace old admin who is going into retirement and he has been showing me his procedures for server, database and network administration. From first point of view: there is absolutely no configuration management involved how they deploy software... (0 Replies)
Discussion started by: solaris_user
0 Replies

7. What is on Your Mind?

Individual Risk Management (Personal IT Security) and Browser Cache Management

Original post from this thread on browser caching. To add to this, it is an effective security measure to clear absolutely all cached data (cookies, web content, ....) when closing the browser - i.e. in case of a shutdown. It takes a bit of work to re-login to all the sites but websites will not... (7 Replies)
Discussion started by: bakunin
7 Replies
TALK(1) 						    BSD General Commands Manual 						   TALK(1)

NAME
talk -- talk to another user SYNOPSIS
talk person [ttyname] DESCRIPTION
talk is a visual communication program which copies lines from your terminal to that of another user. Options available: person If you wish to talk to someone on your own machine, then person is just the person's login name. If you wish to talk to a user on another host, then person is of the form 'user@host'. ttyname If you wish to talk to a user who is logged in more than once, the ttyname argument may be used to indicate the appropriate terminal name, where ttyname is of the form 'ttyXX'. When first called, talk sends the message Message from TalkDaemon@his_machine... talk: connection requested by your_name@your_machine. talk: respond with: talk your_name@your_machine to the user you wish to talk to. At this point, the recipient of the message should reply by typing talk your_name@your_machine It doesn't matter from which machine the recipient replies, as long as his login-name is the same. Once communication is established, the two parties may type simultaneously, with their output appearing in separate windows. Typing control-L '^L' will cause the screen to be reprinted, while your erase, kill, and word kill characters will behave normally. To exit, just type your interrupt character; talk then moves the cursor to the bottom of the screen and restores the terminal to its previous state. Permission to talk may be denied or granted by use of the mesg(1) command. At the outset talking is allowed. Certain commands, in particu- lar nroff(1) and pr(1), disallow messages in order to prevent messy output. ENVIRONMENT
If the TALKHOST environment variable is set, its value is used as the hostname the talk packets appear to be originating from. This is use- ful if you wish to talk to someone on another machine and your internal hostname does not resolve to the address of your external interface as seen from the other machine. FILES
/etc/hosts to find the recipient's machine /var/run/utmp to find the recipient's tty SEE ALSO
mail(1), mesg(1), who(1), write(1) HISTORY
The talk command appeared in 4.2BSD. BUGS
The version of talk released with 4.3BSD uses a protocol that is incompatible with the protocol used in the version released with 4.2BSD. BSD
January 7, 2007 BSD
All times are GMT -4. The time now is 11:50 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy