• Publications
  • Influence
The User Environment
This chapter discusses the OpenVMS user environment; how to work with files, directories, printers, and batch queues; and how to run programs and perform other common tasks. Most OpenVMS operationsExpand
Hardware Platforms Supporting OpenVMS
This chapter describes the hardware that supports OpenVMS, and compares these three architectures, highlighting the most important characteristics of each. Expand
Chapter 9 – Command Procedures
This chapter discusses command procedures, which are text files containing DCL commands that DCL executes sequentially, allowing user to create a command procedure that has many of the features of a compiled program. Expand
Chapter 14 – Using DECnet
Publisher Summary This chapter provides information to DECnet, which is a suite of peer-to-peer networking software developed by Digital Equipment Corporation to work with several of its operatingExpand
The Files-11 File System
This chapter describes a file system supplied with OpenVMS: Files-11, which provides support for several types of multivolume disk sets, including volume sets, shadow sets, hardware- and software-based stripe sets, and RAID arrays. Expand
Chapter 22 – DECnet Details
This chapter provides information to the technology of DECnet, which consists of some DECnet nodes are routers, while others are end nodes. Expand
Appendix A – The User Environment
Logging In and Out of the System
This chapter outlines the steps necessary to establish a connection and log into an OpenVMS system and describes several connections methods:if user has a directly connected terminal; if user has Telnet access; if users has terminal server access; and ifuser has a GUI-based workstation. Expand
Your Personal OpenVMS System
This chapter provides information to users who have acquired their own personal OpenVMS system. It provides brief explanation of how to start up and shut down their personal OpenVMS computersExpand
Chapter 4 – User Accounts
This chapter provides information about user accounts, which defines nearly every aspect of the user identity on the system: the username, the location for files, rights and privileges, and limits on resource consumption. Expand