Solved

Sun Workshop on solaris

Posted on 2001-07-18
6
272 Views
Last Modified: 2013-12-27
Anyone know any good web sites for this?
0
Comment
Question by:stu32934
6 Comments
 
LVL 4

Expert Comment

by:Otetelisanu
ID: 6297005
0
 

Expert Comment

by:emilhenriksson
ID: 6298176
Sun Workshop doesn't "exist" anymore SUN bought some company and the new developer tools are called Forte Developer. Newest release is Forte Developer 6 update 1.
Check out http://www.sun.com/forte

Emil...
0
 
LVL 2

Expert Comment

by:highstar1
ID: 6302411
Sun Workshop still exist as legacy software.
You have to dig for the info.
I found some information at  http://docs.sun.com
You should be able to find everything in the archive files.
There is also a discussion group on Sun developer connection
that can answer your questions.  What type of informatoin
do you need.  I have all the CD's for Sun Workshop to include the answer
books for it.

0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 20

Expert Comment

by:tfewster
ID: 8051535
No comment has been added lately, so it's time to clean up this Topic Area.
I will leave a recommendation for this question in the Cleanup topic area as follows:

- PAQ, no points refunded

Please leave any comments here within the next 7 days

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER !

tfewster
Cleanup Volunteer
0
 

Accepted Solution

by:
SpideyMod earned 0 total points
ID: 8100262
per recommendation

SpideyMod
Community Support Moderator @Experts Exchange
0
 

Expert Comment

by:dkamdar
ID: 11752265
here are few good links to get free documentation on Sun Workshop
http://docs.sun.com/db/doc/802-5659
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's say you need to move the data of a file system from one partition to another. This generally involves dismounting the file system, backing it up to tapes, and restoring it to a new partition. You may also copy the file system from one place to…
I promised to write further about my project, and here I am.  First, I needed to setup the Primary Server.  You can read how in this article: Setup FreeBSD Server with full HDD encryption (http://www.experts-exchange.com/OS/Unix/BSD/FreeBSD/A_3660-S…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now