× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.


  • Subject: Re: Urgent: How to monitor jobs for .....
  • From: Krys_Theodore@xxxxxxxx
  • Date: Mon, 24 Jul 2000 09:54:35 -0500



I have a program set up that monitors for that and then sends a message to
operations.  I am certain that it can be adapted to fit your needs.  E-mail
me direct if you are interested.

Krys




Rajeev_Asthana@noida.tcs.co.in on 07/24/2000 03:53:40 AM

Please respond to MIDRANGE-L@midrange.com

To:   MIDRANGE-L@midrange.com
cc:    (bcc: Krys Theodore/WHJI)

Subject:  Urgent: How to monitor jobs for .....






Hello All,

Is there any way I can monitor jobs in the system for their possible CPU
usage
times exceeding some limit, say, 70% and kill them if they exceed.
Moreover, the other job attributes such as elapsed time etc. also have to
be
monitored.

Please send me the solutions at your earliest.

Thanks in advance.

Rajeev.

Please Note: This mail is also posted on RPG list. So, please ignore this
if you
already got it there.

---------------------------------------------------------------------------
----------
"This  email message and files transmitted with it are confidential,
proprietary
and legally privileged. If the message that is received is an error, or if
there
is  any  mistransmission,  the  originator  must  be notified immediately
as the
unauthorized  use,  dissemination, publication, transfer or any other use
of the
message  by  unauthorized person is strictly forbidden by law and
prohibited. If
anybody  commits  violation then he would be legally liable and punishable
under
the  relevant  law.  The  intended  recipient  can  be  rest  assured  that
the
confidentiality and privilege is not waived or lost by any such
mistransmission.

Internet  communications  are  not secure unless it is protected by using
strong
cryptography.  TCS  does not accept any responsibility whatsoever for
changes in
the nature of modifications, additions, deletions made to the message once
it is
sent.

TCS  reserves  the  right  to  monitor  all  e-mail  communications
through its
network."
---------------------------------------------------------------------------
----------

Tata Consultancy Services
www.tcs.com



+---
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to
MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator:
david@midrange.com
+---







+---
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com
+---

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.