Find Answers

Filter Search Results
All Operating Systems:
All Products:

All Solution Types:
Source:
 
Ask a Question
Example: "Database could not be verified"  
Tips | Start Over | Solutions | Alerts | Patches | Defects  
Pages [Next]
  Results
CMS-XML Disaster Recovery: Creating a new license key
Many of Serena's products use the Serena License Manager to control and maintain license keys. These keys are signed with the HostID of the server where License Manager is installed. Depending on the operating system being used, this is either the MAC address of a network card, or the hardware ID of the system board.
CMS-XML Disaster Recovery Keys for Mainframe Products
In the event of a real Disaster Recovery scenario or a planned Disaster Recovery test, you will need to request license keys to run your Micro Focus mainframe products on the Disaster Recovery CPU.
PDF Serena Service Manager
... Numeric Standard Field used to store the setting used to calculate a ... ... Business Continuity and Disaster Recovery IMPACT_ON ... business continuity and disaster recovery . ... Pause Status Not Used The reason the ... ... Standard Currently not used . ... System Internal field used to track the ... ... on hold; used internally for tracking ... Applications Used APPLICATIONS_USED ... Standard The applications used for this configuration ... ... Single Relational Standard Used internally to track ... ... people who will use this configuration item ... ... Hidden Internal field used to track changes ... ... Single Relational Standard Used internally to store ...
PDF Serena Deployment Automation User's Guide
... and may be used or copied only ... Disaster Recovery with Hot Standby ... Disaster Recovery with Cold Standby ... Examples of Keys in the Properties Map ................................................... 145
PDF Serena Deployment Automation User's Guide
... and may be used or copied only ... ... -availability and Disaster Recovery ... ... Disaster Recovery with Hot Standby ... Disaster Recovery with Cold Standby ... Examples of Keys in the Properties Map ................................................... 139
PDF Serena Deployment Automation User's Guide
... and may be used or copied only ... ... -availability and Disaster Recovery ... ... Disaster Recovery with Hot Standby ... Disaster Recovery with Cold Standby ... Examples of Keys in the Properties Map ................................................... 127
PDF SER10TY User's Guide
The content of this document is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Serena. ... Invalid Value for Key ... LIC0161EInvalidvaluefor“ Key ”element:(Linenn,Columnnn). ... it is probably because you modified the license data, which caused the Key element to become invalid. ... * 2 Disaster Recovery
PDF MERANT Collage Installation and Setup Guide
The content of this document is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Serena. ... Invalid Value for Key ... LIC0161EInvalidvaluefor“ Key ”element:(Linenn,Columnnn). ... it is probably because you modified the license data, which caused the Key element to become invalid. ... * 2 Disaster Recovery
PDF Serena ChangeMan ZMF 5.3 Installation Guide
... scheduled downtime and disaster recovery priority. ... you want to use for your ChangeMan ... ... it may be used if you want to use ChangeMan ZDD primarily ... Using an existing SERNET ... ... each CPU that employs SERNET services. ... virtual memory is used . ... Serena ChangeMan ZDD uses these Serena enabling ... ZDD server, use the files unloaded ... ... you intend to use an existing SERNET ... ... Serena products by using JOBLIB and STEPLIB ... ... the case, use SERNET keyword option ... If you use any of the ... Use STEPLIB and JOBLIB ... ... If your installation uses Abend-AID ...
PDF Getting Started.book
... Data Extraction component uses record-level ... ... , with the keys and record- ... ... are fingerprinted as keyed or non- keyed files, depending ... ... software distribution, disaster recovery , and production ... Flat files are divided into three types: KEYED , POSITIONAL, and TEXT. KEYED files have a unique field in each record that can be designated as the key . ... • TEXT files have no specific key or relative position of records.
Pages [Next]

Welcome kb sso

My Recent Searches

Search Feedback

Are we answering your questions?

Additional Assistance

  • Submit a Case Online
  • FAQs