-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
> From: Jan Harkes [mailto:[EMAIL PROTECTED]]
> To: Mourad De Clerck
> Subject: Re: coda questions...
>
> On Tue, May 29, 2001 at 03:21:46PM +0200, Mourad De Clerck wrote:
> > My questions now are:
> > * do you think
> -Messaggio originale-
> Da: Jan Harkes [mailto:[EMAIL PROTECTED]]
> Inviato: martedi 29 maggio 2001 17.21
> A: Mourad De Clerck
> Cc: [EMAIL PROTECTED]
> Oggetto: Re: coda questions...
>
> > * i've heard that coda doesn't scale so well - is this true
On Tue, May 29, 2001 at 03:21:46PM +0200, Mourad De Clerck wrote:
> My questions now are:
> * do you think cable/adsl is adequate for such an application,
> considering the overhead of coda?
It is definitely adequate, I myself am using a slow dialup link, but
several of the graduate students her
Hi - i'm trying to figure out if i should use coda for our setup at work.
Basically we've got a vpn with one of our servers on a leased line, and
each of our people (around 5-10) on a cable or adsl connection. the
upstream speeds are only 16KB/s and downstream is usually much better
(500KB/s)
> There is an unexportable patch, which allows a user to get a Coda token
> without typing a password if he is Kerberos authenticated.
>
> >o If using Kerberos V authentication, can we use Kerberos keytab files
> > to obtain tokens? (this ties into the previous question)
>
> Likely, I
On Tue, Sep 14, 1999 at 02:05:44AM -0500, Christopher P. Lindsey wrote:
>o How similar to Transarc's AFS is Coda? I imagine that the commands
> are close in terms of functionality, but probably differ in name
> (I come from a strictly AFS background)
Not very similar, they both `or
Howdy all,
I've been a lurker on this list for quite some time now, as I've been
anticipating using Coda for various applications. It looks like I'm
finally at a point where I can use it, so now I'm beginning to investigate
certain aspects a little more seriously. I've searched the (brief) FAQ
Hi,
>
> =>" Browsing the network with huge number of binary files may be a
> common activity of windows users. User may just browse the directory to
> look for some information, but never execute any of those
> programs...bringing down those large binaries may really slow down the
> perform
Some more comments below within " " ...thanks, som.
"These are absolutely my opinion. My opinion
do not represent those of my employer"
>>> Marc Schnieder <[EMAIL PROTECTED]> 05/27 3:47 PM >>>
SOM Bandyopadhyay wrote:
>
> 4. How is CODA client's performance when using Windows explorer a
SOM Bandyopadhyay wrote:
>
> 4. How is CODA client's performance when using Windows explorer and browsing the
>network? Does Venus tries to bring the entire file when explorer does a
>FIND_FIRST/FIND_NEXT operation? If so, isn't there a heavy degradation of performance?
>
> 5. What is the Win
1. On Windows platform ( e.g Win95 Coda client ) does CODA( I mean Venus) cache all
files irrespective of the mode in which files are opened? When clients are not
connected it must be doing this, but what happens in connected state?
If yes, then how the "conflic resolution" done in connected m
This is kind of ambitious. Why don't you first play with it a bit, to
find out if it suits your needs.
- Peter -
Kevin Day wrote:
>
> If this isn't the correct place to ask these questions, let me know and i'll
> repost elsewhere. :)
>
> I'm currently using NFS in a smallish network, where
If this isn't the correct place to ask these questions, let me know and i'll
repost elsewhere. :)
I'm currently using NFS in a smallish network, where i've got one NFS server
where all users's home directories and mail is stored, and 3 NFS client
servers, that users actually login to.
My probl
13 matches
Mail list logo