: [U2] [UD] LISTUSER output: phantom vs. iphantm
Is there a definitive list of operations that makes something an iPhantom
vs. a phantom? I know about sockets, but presume there is more, right?
___
U2-Users mailing list
U2-Users@listserver.u2ug.org
...@listserver.u2ug.org
[mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King
Sent: Friday, September 14, 2012 8:37 AM
To: U2 Users List
Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
Is there a definitive list of operations that makes something an iPhantom
vs
...@listserver.u2ug.org] On Behalf Of David Taylor
Sent: Saturday, September 15, 2012 11:15 AM
To: U2 Users List
Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
Wally,
This reference is very helpful.
Is it true, then, that the number of true Phantoms (not iPhantoms) allowed at
any one
iPhantoms are any background that perform interactive operations, such as
opening a socket or device. They consume a licence.
FWIH some time back a couple of naughty sites were buying small numbers of
users and opening ttys directly with phantoms so IBM blocked that. Now it
catches all of us who
Is there a definitive list of operations that makes something an iPhantom
vs. a phantom? I know about sockets, but presume there is more, right?
On Fri, Sep 14, 2012 at 1:26 AM, Brian Leach br...@brianleach.co.uk wrote:
iPhantoms are any background that perform interactive operations, such as
-users-boun...@listserver.u2ug.org
[mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King
Sent: Friday, September 14, 2012 8:37 AM
To: U2 Users List
Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm
Is there a definitive list of operations that makes something an iPhantom
Dean:
iphanotm processes, I believe, stand for interactive phantoms. Therefore,
iphantoms are counted as users because of using interactive processes like
callhttp.
Regards,
Doug
www.u2logic.com
Rocket Software VAR
___
U2-Users mailing list