Sun Microsystems Sun Fire X4150 User Manual
Page 128
112
Sun Fire X4150 Server Embedded Lights Out Manager Administration Guide • September 2007
command-line interface
(CLI)
A text-based interface that enables users to type executable instructions at a
command prompt.
Common Information
Model (CIM)
An open systems information model published by the Distributed
Management Task Force (DMTF) that enables a common application to manage
disparate resources, such as printers, disk drives, or CPUs.
console
A terminal or dedicated window on a screen where system messages are
displayed. The console window enables you to configure, monitor, maintain,
and troubleshoot many server software components.
Coordinated Universal
Time (UTC)
The international standard for time. UTC was formerly called Greenwich
Meridian Time (GMT). UTC is used by Network Time Protocol (NTP) servers
to synchronize systems and devices on a network.
core file
A file created by the Solaris or Linux operating system when a program
malfunctions and terminates. The core file holds a snapshot of memory, taken
at the time the fault occurred. Also called a “crash dump file.”
critical event
A system event that seriously impairs service and requires immediate
attention.
custom JumpStart™
A type of installation in which the Solaris software is automatically installed
on a system that is based on a user-defined profile.
customer-replaceable
unit (CRU)
A system component that the user can replace without special training or tools.
D
Data Encryption
Standard (DES)
A common algorithm for encrypting and decrypting data.
Desktop Management
Interface (DMI)
A specification that sets standards for accessing technical support information
about computer hardware and software. DMI is hardware and operating
system (OS) independent, and can manage workstations, servers, or other
computing systems. DMI is defined by the Distributed Management Task Force
(DMTF).
digital signature
A certification of the source of digital data. A digital signature is a number
derived from a public key cryptographic process. If the data is modified after
the signature was created, the signature becomes invalid. For this reason, a
digital signature can ensure data integrity and detection of data modification.