Solved

How to Set Up dataComet to allow Mac to run applications on a UNIX server

Posted on 2008-09-30
5
374 Views
Last Modified: 2011-09-20
I have downloaded dataComet onto an IMAC computer to serve as a terminal emulator to run applications on a UNIX Server. How can I get directions on setting up this application? We have previously used J.River's ICE-TCP PRO as the terminal emulator for the PC's. The gentleman at databeast was quite helpful, but the setup was more complicated than he could walk me through.
0
Comment
Question by:gbm33
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 40

Assisted Solution

by:omarfarid
omarfarid earned 500 total points
ID: 22607954
0
 

Author Comment

by:gbm33
ID: 22609161
omarfarid: Actually, the article did help. It allowed me to make a connection and run the application on setting the emulator as scoansi the funciion keys do not work.
0
 
LVL 40

Expert Comment

by:omarfarid
ID: 22609190
what other emulations do you have? What is your unix server platform and version?
0
 

Author Comment

by:gbm33
ID: 22619059
omarfarid: The UNIX operating system is SCO Open Server Release 5.
In dataComet the emulations for:
Terminal type are: Automatic, SCO-Ansi, VT52, VT100, VT102, VT220, VT220, IBM 3278, and IBM 3279.

Host Menus and function keys are: Automatic, IBM 3270, IBM 5250, ICSA Telnet, Linux, scoansi, xterm, 386at, wyse-60, and UNIX tn3270.

In the J.River's ICE-TCP PRO emulator which we are using on the PC's the only choice is "Terminal type" and for that our selection is ANSI (25 line)

0
 

Accepted Solution

by:
gbm33 earned 0 total points
ID: 22635940
I am going to close this question.  dataComet appears to be a good product but I cannot get an emulation that will cause the Function keys to operate.  I will repost the question asking specifically about the function keys.
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question