Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-15 Thread Kevin King
: [U2] [UD] LISTUSER output: phantom vs. iphantm Is there a definitive list of operations that makes something an iPhantom vs. a phantom? I know about sockets, but presume there is more, right? ___ U2-Users mailing list U2-Users@listserver.u2ug.org

Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-15 Thread David Taylor
...@listserver.u2ug.org [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King Sent: Friday, September 14, 2012 8:37 AM To: U2 Users List Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm Is there a definitive list of operations that makes something an iPhantom vs

Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-15 Thread Wally Terhune
...@listserver.u2ug.org] On Behalf Of David Taylor Sent: Saturday, September 15, 2012 11:15 AM To: U2 Users List Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm Wally, This reference is very helpful. Is it true, then, that the number of true Phantoms (not iPhantoms) allowed at any one

Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-14 Thread Brian Leach
iPhantoms are any background that perform interactive operations, such as opening a socket or device. They consume a licence. FWIH some time back a couple of naughty sites were buying small numbers of users and opening ttys directly with phantoms so IBM blocked that. Now it catches all of us who

Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-14 Thread Kevin King
Is there a definitive list of operations that makes something an iPhantom vs. a phantom? I know about sockets, but presume there is more, right? On Fri, Sep 14, 2012 at 1:26 AM, Brian Leach br...@brianleach.co.uk wrote: iPhantoms are any background that perform interactive operations, such as

Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-14 Thread Wally Terhune
-users-boun...@listserver.u2ug.org [mailto:u2-users-boun...@listserver.u2ug.org] On Behalf Of Kevin King Sent: Friday, September 14, 2012 8:37 AM To: U2 Users List Subject: Re: [U2] [UD] LISTUSER output: phantom vs. iphantm Is there a definitive list of operations that makes something an iPhantom

Re: [U2] [UD] LISTUSER output: phantom vs. iphantm

2012-09-13 Thread Doug Averch
Dean: iphanotm processes, I believe, stand for interactive phantoms. Therefore, iphantoms are counted as users because of using interactive processes like callhttp. Regards, Doug www.u2logic.com Rocket Software VAR ___ U2-Users mailing list