Debugging Prolog Programs. Contents The basic Prolog debugger Tracing program execution Spying on problem predicates

Size: px
Start display at page:

Download "Debugging Prolog Programs. Contents The basic Prolog debugger Tracing program execution Spying on problem predicates"

Transcription

1 Debugging Prolog Programs Prof. Geraint A. Wiggins Centre for Cognition, Computation and Culture Goldsmiths College, University of London Contents The basic Prolog debugger Tracing program execution Spying on problem predicates

2 The basic Prolog debugger When programs go wrong we need a means of working out why One way to do this is to analyse the logic of the program (declarative debugging) Declarative debugging is a relatively new area, and we do not yet have the technology to do it really well Another way is to look at its procedural behaviour This is less helpful, but relatively easy to do Goldsmiths College, University of London 2

3 The basic Prolog debugger (2) To use the debugger, we need SICStus, with our program loaded; a copy of the program, on paper or on screen; a clear idea of what the program is supposed to do; an example query, for which the program does not exhibit the correct behaviour To switch on the basic debugger, use the command?- trace. To switch it off again, use?- notrace. Goldsmiths College, University of London 3

4 The basic Prolog debugger (3) Once the debugger is switched on, any query you ask of Prolog will be explained as it is proven We think of each predicate in a program as having four ways in and out, or ports. These are: Call where control goes in on the first attempt to prove a goal; Succeed where control comes out when the goal succeeds; Retry where control goes in on subsequent attempts to prove a goal (ie after backtracking) Fail where control comes out when the goal fails. Some systems define a further port: Exception where control comes out on an error (eg instantiation error). Goldsmiths College, University of London 4

5 Tracing program execution The Prolog debugger will now stop and tell us what it is doing, each time it passes a port. For example:?- trace. {The debugger will first creep -- showing everything (trace)} yes {trace}?- append( [a], [b], X ). 1 1 Call: append([a],[b], 89)? 2 2 Call: append([],[b], 355)? 2 2 Exit: append([],[b],[b])? 1 1 Exit: append([a],[b],[a,b])? X = [a,b]? yes {trace}?- Goldsmiths College, University of London 5

6 Tracing program execution (2) {trace}?- append( X, Y, [a] ). 1 1 Call: append( 69, 83,[a])? 1 1 Exit: append([],[a],[a])? X = [], Y = [a]? ; 1 1 Redo: append([],[a],[a])? 2 2 Call: append( 365, 83,[])? 2 2 Exit: append([],[],[])? 1 1 Exit: append([a],[],[a])? X = [a], Y = []? ; 1 1 Redo: append([a],[],[a])? 2 2 Redo: append([],[],[])? 2 2 Fail: append( 365, 83,[])? 1 1 Fail: append( 69, 83,[a])? no Goldsmiths College, University of London 6

7 Tracing program execution (3) The main components of the trace output are: 2 2 Call: append( 365, 83,[])? Invocation number an identification number which is unique to this invocation of a predicate; Current depth an indication of how deep the proof process has gone; Port indictor tells us which port we are at; Current goal tells us the current goal and its instantiation; Prompt asks for what to do next. Goldsmiths College, University of London 7

8 Tracing program execution (4) There are several useful options to apply (mostly single character commands): c Creep (also carriage return) take one proof step to the next port; s Skip jump to the next exit port (Succeed or Fail) from this invocation of this predicate; a Abort drop out of execution and return to the Prolog prompt; n Nodebug switch off tracing and proceed as for normal execution; r Retry go back to the call whose invocation number is given? Help print out a list of available commands. Note that some commands (eg Skip) only make sense at some ports (eg input ports), and so will not work at others. Goldsmiths College, University of London 8

9 Spying on problem predicates In large programs, it is often not feasible to trace all the way through to an error Often, we have a clear idea of which predicate is going wrong, so we want to go straight to it, even in small programs To do this, we use spy points We can set the debugger to wait until it encounters a spy point in the program, and then it will switch on. Goldsmiths College, University of London 9

10 Spying on problem predicates (2) Example: append( [], L, L ). append( [H T], L, [H Z] ) :- append( T, L, Z ). test( X, XX ) :- append( X, X, XX ). Here, we can set a spy point on append/3:?- spy( append ). {The debugger will first leap -- showing spypoints (debug)} {Spypoint placed on user:append/3} yes {debug}?- Goldsmiths College, University of London 10

11 Spying on problem predicates (2) {debug}?- test( X, [a,b,c,d,e,f] ) Call: append( 69, 69,[a, 91,c, 111,e, 131])? Call: append( 471,[a 471],[ 91,c, 111,e, 131])? Call: append( 676,[a, ],[c, 111,e, 131])? Call: append( 881,[a, 91,c 881],[ 111,e, 131])? Exit: append([],[a,e,c],[a,e,c])? Exit: append([c],[a,e,c],[c,a,e,c])? Exit: append([e,c],[a,e,c],[e,c,a,e,c])? Exit: append([a,e,c],[a,e,c],[a,e,c,a,e,c])? 1 1 Exit: test([a,e,c],[a,e,c,a,e,c])? B = e, D = a, F = c, X = [a,e,c]? + means there is a spy point here Goldsmiths College, University of London 11

12 Spying on problem predicates (3) The same commands as before work in debug mode, plus l Leap switch off the debugger until the next spy point is found; + Add spypoint to the current predicate; - Remove spypoint from the current predicate. It is possible to choose which debug ports stop the execution, using the leash/1 predicate. See the manual for details. Goldsmiths College, University of London 12

simplicity hides complexity

simplicity hides complexity flow of control backtracking reasoning in logic and in Prolog 1 simplicity hides complexity simple and/or connections of goals conceal very complex control patterns Prolog programs are not easily represented

More information

The ProB Animator and Model Checker for B

The ProB Animator and Model Checker for B The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,

More information

Hermes.Net IVR Designer Page 2 36

Hermes.Net IVR Designer Page 2 36 Hermes.Net IVR Designer Page 2 36 Summary 1. Introduction 4 1.1 IVR Features 4 2. The interface 5 2.1 Description of the Interface 6 2.1.1 Menus. Provides 6 2.1.2 Commands for IVR editions. 6 2.1.3 Commands

More information

Introduction: Implementation of the MVI56-MCM module for modbus communications:

Introduction: Implementation of the MVI56-MCM module for modbus communications: Introduction: Implementation of the MVI56-MCM module for modbus communications: Initial configuration of the module should be done using the sample ladder file for the mvi56mcm module. This can be obtained

More information

From Release 8.0, IPv6 can also be used to configure the LDAP server on the controller.

From Release 8.0, IPv6 can also be used to configure the LDAP server on the controller. Information About LDAP, page 1 (GUI), page 2 (CLI), page 4 Information About LDAP An LDAP backend database allows the controller to query an LDAP server for the credentials (username and password) of a

More information

Debugging Network Communications. 1 Check the Network Cabling

Debugging Network Communications. 1 Check the Network Cabling Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps

More information

Overview. NetBorder Express Loggers Configuration Guide

Overview. NetBorder Express Loggers Configuration Guide Overview The Gateway service includes a powerful logging framework to enable you to control the logging of events. This document contains information about logging, including the following key topics:

More information

File Transfer Protocols In Anzio

File Transfer Protocols In Anzio The New File Transfer Protocols in Anzio version 12.6 What s New in Version 12.6 With the release of Anzio Lite and AnzioWin version 12.6 we are introducing a new user interface and support for additional

More information

System Administration Commands nslookup ( 1M )

System Administration Commands nslookup ( 1M ) NAME nslookup query name servers interactively SYNOPSIS nslookup [ option]... host [server] nslookup [ option]... - [server] nslookup DESCRIPTION nslookup sends queries to Internet domain name servers.

More information

Automatic Scheduling Using AutoTrack Command Line Options

Automatic Scheduling Using AutoTrack Command Line Options Automatic Scheduling Using AutoTrack Command Line Options Applies to AutoTrack and AutoTrack Pro v3.1.11 and higher A feature added in v3.1.11 allows you to use Command line options to set AutoTrack to

More information

A Program for PCB Estimation with Altium Designer

A Program for PCB Estimation with Altium Designer A Program for PCB Estimation with Altium Designer By: Steve Hageman AnalogHome.com One thing that I have had to do over and over on my new PCB jobs is to make an estimate of how long I think the layout

More information

Verizon Wireless Field Force Manager. Windows Mobile Devices

Verizon Wireless Field Force Manager. Windows Mobile Devices Verizon Wireless Field Force Manager User Guide for Windows Mobile Devices Verizon Wireless Field Force Manager User Guide for Windows Mobile Devices Table of Contents Application Requirements...3 Windows

More information

The structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao.

The structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao. Logging makes sense for testbench debug The structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao. SystemVerilog provides

More information

Prolog A Tutorial Introduction James Lu Jerud J. Mead

Prolog A Tutorial Introduction James Lu Jerud J. Mead Prolog A Tutorial Introduction James Lu Jerud J. Mead Computer Science Department Bucknell University Lewisburg, PA 17387 1 Contents 1 Introduction 1 2 Easing into Prolog 2 2.1 Logic Programming.........................................

More information

Week 2 Practical Objects and Turtles

Week 2 Practical Objects and Turtles Week 2 Practical Objects and Turtles Aims and Objectives Your aim in this practical is: to practise the creation and use of objects in Java By the end of this practical you should be able to: create objects

More information

Comparing RTOS to Infinite Loop Designs

Comparing RTOS to Infinite Loop Designs Comparing RTOS to Infinite Loop Designs If you compare the way software is developed for a small to medium sized embedded project using a Real Time Operating System (RTOS) versus a traditional infinite

More information

How to Use YouTube Ads to Grow Your Business

How to Use YouTube Ads to Grow Your Business How to Use YouTube Ads to Grow Your Business The different kinds of YouTube ads In broad terms there are two kinds of YouTube Ads: skippable ads and non-skippable ads. Non-skippable ads are ads that force

More information

List of FTP commands for the Microsoft command-line FTP client

List of FTP commands for the Microsoft command-line FTP client You are on the nsftools.com site This is a list of the commands available when using the Microsoft Windows command-line FTP client (requires TCP/IP to be installed). All information is from the Windows

More information

Research Data Management CODING

Research Data Management CODING CODING Coding When writing software or analytical code it is important that others and your future self can understand what the code is doing. published 10 steps that they regard as the Best Practices

More information

SYMETRIX SOLUTIONS: TECH TIP August 2015

SYMETRIX SOLUTIONS: TECH TIP August 2015 String Output Modules The purpose of this document is to provide an understanding of operation and configuration of the two different String Output modules available within SymNet Composer. The two different

More information

For Introduction to Java Programming, 5E By Y. Daniel Liang

For Introduction to Java Programming, 5E By Y. Daniel Liang Supplement H: NetBeans Tutorial For Introduction to Java Programming, 5E By Y. Daniel Liang This supplement covers the following topics: Getting Started with NetBeans Creating a Project Creating, Mounting,

More information

ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm

ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm Siddharth Chitnis, Madhu Yennamani, Gopal Gupta Department of Computer Science The University of Texas at Dallas Richardson,

More information

Code::Blocks Student Manual

Code::Blocks Student Manual Code::Blocks Student Manual Lawrence Goetz, Network Administrator Yedidyah Langsam, Professor and Theodore Raphan, Distinguished Professor Dept. of Computer and Information Science Brooklyn College of

More information

Release Notes. R&S ZVH4/ZVH8 Cable and Antenna Analyzer

Release Notes. R&S ZVH4/ZVH8 Cable and Antenna Analyzer Release Notes Revision: 01 R&S ZVH4/ZVH8 Cable and Antenna Analyzer Firmware Release V1.50 These Release Notes describe the following models and options of the R&S Cable and Antenna Analyzer: R&S Cable

More information

15-150 Lecture 11: Tail Recursion; Continuations

15-150 Lecture 11: Tail Recursion; Continuations 15-150 Lecture 11: Tail Recursion; Continuations Lecture by Dan Licata February 21, 2011 In this lecture we will discuss space usage: analyzing the memory it takes your program to run tail calls and tail

More information

Outline. 1 Denitions. 2 Principles. 4 Implementation and Evaluation. 5 Debugging. 6 References

Outline. 1 Denitions. 2 Principles. 4 Implementation and Evaluation. 5 Debugging. 6 References Outline Computer Science 331 Introduction to Testing of Programs Mike Jacobson Department of Computer Science University of Calgary Lecture #3-4 1 Denitions 2 3 4 Implementation and Evaluation 5 Debugging

More information

ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm

ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm Siddharth Chitnis, Madhu Yennamani, Gopal Gupta Department of Computer Science The University of Texas at Dallas Richardson,

More information

How to test and debug an ASP.NET application

How to test and debug an ASP.NET application Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult

More information

Hypercosm. Studio. www.hypercosm.com

Hypercosm. Studio. www.hypercosm.com Hypercosm Studio www.hypercosm.com Hypercosm Studio Guide 3 Revision: November 2005 Copyright 2005 Hypercosm LLC All rights reserved. Hypercosm, OMAR, Hypercosm 3D Player, and Hypercosm Studio are trademarks

More information

mdata from Mobile Commons enables organizations to make any data accessible to the public via text message, no programming required.

mdata from Mobile Commons enables organizations to make any data accessible to the public via text message, no programming required. mdata Web Services mdata from Mobile Commons enables organizations to make any data accessible to the public via text message, no programming required. How it Works 1. A user sends a text message with

More information

Wikto how does it work and how do I use it?

Wikto how does it work and how do I use it? Wikto how does it work and how do I use it? Introduction This document describes how to use Wikto to quickly and easily perform web server assessments. Before we start we need to know what Wikto does and

More information

Outline. Architecture of Web Applications. Example Web Application. Black Box Testing. Testing a Web Database Application

Outline. Architecture of Web Applications. Example Web Application. Black Box Testing. Testing a Web Database Application Outline AutoDBT: A Framework for Automatic Testing of Web Database Applications Lihua Ran, Curtis Dyreson, Anneliese Andrews School of E.E. and Computer Science Washington State University USA Two approaches

More information

FirewallTM. isecurity. Out-of-the Box. The Network Security Component of. Version 15. Copyright Raz-Lee Security Ltd.

FirewallTM. isecurity. Out-of-the Box. The Network Security Component of. Version 15. Copyright Raz-Lee Security Ltd. FirewallTM The Network Security Component of isecurity Out-of-the Box Version 15 Copyright Raz-Lee Security Ltd. Updated: 02/09/2011 This guide is intended to provide as a quick beginning to the principal

More information

RMAN What is Rman Why use Rman Understanding The Rman Architecture Taking Backup in Non archive Backup Mode Taking Backup in archive Mode

RMAN What is Rman Why use Rman Understanding The Rman Architecture Taking Backup in Non archive Backup Mode Taking Backup in archive Mode RMAN - What is Rman - Why use Rman - Understanding The Rman Architecture - Taking Backup in Non archive Backup Mode - Taking Backup in archive Mode - Enhancement in 10g For Rman - 9i Enhancement For Rman

More information

PostgreSQL Concurrency Issues

PostgreSQL Concurrency Issues PostgreSQL Concurrency Issues 1 PostgreSQL Concurrency Issues Tom Lane Red Hat Database Group Red Hat, Inc. PostgreSQL Concurrency Issues 2 Introduction What I want to tell you about today: How PostgreSQL

More information

[Refer Slide Time: 05:10]

[Refer Slide Time: 05:10] Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture

More information

PRN_LOAD 17.04.2002 16:22

PRN_LOAD 17.04.2002 16:22 PRN_LOAD.EXE is a user-friendly program for loading the HPR4915 with new firmware or fonts. It is based on the DOS operating system and also runs under WIN 95/89/NT WIN2000 WIN ME WIN XP and OS/2. However,

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

NHSmail mobile configuration guide NotifySync V4.7 for Blackberry

NHSmail mobile configuration guide NotifySync V4.7 for Blackberry Only devices running NotifySync version 4.7 support encryption at rest NHSmail mobile configuration guide NotifySync V4.7 for Blackberry Version: V.4 Date: March 2011 THIS INFORMATION IS FOR NHS STAFF

More information

Integration for X-Tools and X32

Integration for X-Tools and X32 Integration for X-Tools and X32 TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents... 3rd Party Tool Integrations... Integration for X-Tools and X32... 1 Overview... 2 Brief Overview

More information

SQL Injection Protection by Variable Normalization of SQL Statement

SQL Injection Protection by Variable Normalization of SQL Statement Page 1 of 9 SQL Injection Protection by Variable Normalization of SQL Statement by: Sam M.S. NG, 0 http://www.securitydocs.com/library/3388 "Make everything as simple as possible, but not simpler." --

More information

DIRECT PAYMENTS (ACH TRANSFER MODULE)

DIRECT PAYMENTS (ACH TRANSFER MODULE) DIRECT PAYMENTS (ACH TRANSFER MODULE) Direct payments is an add on module to utility billing that allows customers to pay their utility bill by a recur ACH payment. Please note that the term ACH (Automatic

More information

Latency Monitoring Tool on Cisco Nexus Switches: Troubleshoot Network Latency

Latency Monitoring Tool on Cisco Nexus Switches: Troubleshoot Network Latency White Paper Latency Monitoring Tool on Cisco Nexus Switches: Troubleshoot Network Latency Introduction Networks often encounter problems related to latency. Troubleshooting such problems can be complicated.

More information

(Refer Slide Time: 01:52)

(Refer Slide Time: 01:52) Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This

More information

Module 3: Functional Requirements

Module 3: Functional Requirements smart BA Distance Learning Programme Module 3: Functional Requirements Hello and welcome to the smart BA distance learning programme Module 3 in this module you are going to analyse the requirements of

More information

OfficeServ Link. User Guide. Version 2.1 June 2005

OfficeServ Link. User Guide. Version 2.1 June 2005 OfficeServ Link User Guide Version 2.1 June 2005 OfficeServ Link Version 2.1 User Guide This manual should be read before the installation and operation of the OfficeServ Link Software. COPYRIGHT This

More information

Volume AGKSOFT. Wayne Nucleus Back Office Software. Nucleus Guide

Volume AGKSOFT. Wayne Nucleus Back Office Software. Nucleus Guide Volume N AGKSOFT Wayne Nucleus Back Office Software Nucleus Guide Configuring Your Back Office PC The Back Office PC requires 2 network cards to connect to the Nucleus & internet at the same time. On some

More information

Lab 3.1.2 Creating a Logical Network Diagram

Lab 3.1.2 Creating a Logical Network Diagram Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing

More information

Comp 255Q - 1M: Computer Organization Lab #3 - Machine Language Programs for the PDP-8

Comp 255Q - 1M: Computer Organization Lab #3 - Machine Language Programs for the PDP-8 Comp 255Q - 1M: Computer Organization Lab #3 - Machine Language Programs for the PDP-8 January 22, 2013 Name: Grade /10 Introduction: In this lab you will write, test, and execute a number of simple PDP-8

More information

ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER

ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER Pierre A. von Kaenel Mathematics and Computer Science Department Skidmore College Saratoga Springs, NY 12866 (518) 580-5292 pvonk@skidmore.edu ABSTRACT This paper

More information

NUM INFORMATION US N 111 1/9

NUM INFORMATION US N 111 1/9 US N 111 1/9 Procedure: 10xx Series CNC Backup/Restore Procedures using NUMCOM Scope: The NUM 10xx Series CNC system has essential application specific files stored in various locations within the system.

More information

OpenTSP Driver Description

OpenTSP Driver Description OfficeServ OpenTSP Driver Description Ed. 00 9. 2003. COPYRIGHT This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright. No information contained herein may be copied,

More information

The New ABAP Debugger - An Introduction. Boris Gebhardt Christoph Stoeck SAP AG

The New ABAP Debugger - An Introduction. Boris Gebhardt Christoph Stoeck SAP AG The New ABAP Debugger - An Introduction Boris Gebhardt Christoph Stoeck SAP AG 1 Content Motivation & Goals Two Process Architecture Starting The New Debugger New Debugger UI Main Parts Customize The New

More information

PCLinq2 Hi-Speed USB Bridge-Network Cable. Quick Network Setup Guide

PCLinq2 Hi-Speed USB Bridge-Network Cable. Quick Network Setup Guide PCLinq2 Hi-Speed USB Bridge-Network Cable Congratulations! Quick Network Setup Guide For Windows 98/ME/2000/XP Congratulations for installing the PCLinq2 Hi-Speed USB Bridge-Network Cable. This Quick Network

More information

Email Configuration Network Management Card-2

Email Configuration Network Management Card-2 Email Configuration Network Management Card-2 AP9630, AP9631 and 2GrPDUs(AP8XXX) Email Overview The NMC can be configured to send email to up to four recipients when it encounters a problem or event selected

More information

Global Monitoring + Support

Global Monitoring + Support Use HyperTerminal to access your Global Monitoring Units View and edit configuration settings View live data Download recorded data for use in Excel and other applications HyperTerminal is one of many

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Monitoring the team s performance

Monitoring the team s performance Monitoring the team s performance Why does your team need to be monitored? How can performance be monitored? You should ensure that you monitor only what is really important. In the two BS2 sessions Making

More information

Setting up the Swann HD IP cameras

Setting up the Swann HD IP cameras Setting up the Swann HD IP cameras Connecting the cameras to the network The Swann IP cameras are connected to the network with Category 5/5E/6 cables. The cameras feature Power over Ethernet for ease

More information

How to Install SMTPSwith Mailer on Centos Server/VPS

How to Install SMTPSwith Mailer on Centos Server/VPS How to Install SMTPSwith Mailer on Centos Server/VPS SMTPSwitch Mailer User Guide V4.0 SMTPSwitch Mailer is a web based email marketing software that runs on a web server or online server. An online server

More information

Running a Program on an AVD

Running a Program on an AVD Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run

More information

PPM Users Manual Signature Software 01-12-00

PPM Users Manual Signature Software 01-12-00 PPM Users Manual Signature Software 0-2-00 PPM User Manual /8/02 Software Versions: 0.0.27 Contents. Introduction 2 2. Parameters 3 2. Overload Limit...4 2.2 Relative Upper Limit...4 2.3 Relative Lower

More information

SerialMailer Manual. For SerialMailer 7.2. Copyright 2010-2011 Falko Axmann. All rights reserved.

SerialMailer Manual. For SerialMailer 7.2. Copyright 2010-2011 Falko Axmann. All rights reserved. 1 SerialMailer Manual For SerialMailer 7.2 Copyright 2010-2011 Falko Axmann. All rights reserved. 2 Contents 1 Getting Started 4 1.1 Configuring SerialMailer 4 1.2 Your First Serial Mail 7 1.2.1 Database

More information

Using Git for Project Management with µvision

Using Git for Project Management with µvision MDK Version 5 Tutorial AN279, Spring 2015, V 1.0 Abstract Teamwork is the basis of many modern microcontroller development projects. Often teams are distributed all over the world and over various time

More information

hp calculators HP 17bII+ Discounting & Discounted Cash Flow Analysis It's About Time The Financial Registers versus Discounted Cash Flow

hp calculators HP 17bII+ Discounting & Discounted Cash Flow Analysis It's About Time The Financial Registers versus Discounted Cash Flow HP 17bII+ Discounting & Discounted Cash Flow Analysis It's About Time The Financial Registers versus Discounted Cash Flow Discounting a Single Sum Discounting and Compounding Discounting a Series of Sums

More information

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.

Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. 23 Concurrency Control Part -4 In the last lecture, we have

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Participant Tracking Functionality

Participant Tracking Functionality Participant Tracking Functionality Opening a visit schedule to enrollment Before you are able to enroll a participant to a trial you must open the visit schedule to enrollment. Click on the visit schedule

More information

How the Dolphin Scanner Works

How the Dolphin Scanner Works The Dolphin Scanner How the Dolphin Scanner Works The Dolphin scanner is a hand held, battery powered computer that has a built in laser scanner that is able to scan most barcodes. It uses an internal

More information

VPN Client User s Guide. 9235966 Issue 2

VPN Client User s Guide. 9235966 Issue 2 VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the

More information

Setting Up a Windows Virtual Machine for SANS FOR526

Setting Up a Windows Virtual Machine for SANS FOR526 Setting Up a Windows Virtual Machine for SANS FOR526 As part of the Windows Memory Forensics course, SANS FOR526, you will need to create a Windows virtual machine to use in class. We recommend using VMware

More information

When you publish data to a SharePoint site, you first

When you publish data to a SharePoint site, you first SharePoint, maintaining the relationships between them and creating links to them within Access. Here s how the wizard works: 1. Click to select the External Data tab. 2. Click the Move to SharePoint button

More information

Mobile MessageBank Standard User Guide

Mobile MessageBank Standard User Guide 1. Now Everyone Gets The Message 2. MessageBank Stard Set Up 3. Using MessageBank 4. Options 5. Pricing 6. Billing 7. Troubleshooting 8. Helpful Hints 9. Tips 10. More Information Mobile MessageBank Stard

More information

Gas Dynamics Prof. T. M. Muruganandam Department of Aerospace Engineering Indian Institute of Technology, Madras. Module No - 12 Lecture No - 25

Gas Dynamics Prof. T. M. Muruganandam Department of Aerospace Engineering Indian Institute of Technology, Madras. Module No - 12 Lecture No - 25 (Refer Slide Time: 00:22) Gas Dynamics Prof. T. M. Muruganandam Department of Aerospace Engineering Indian Institute of Technology, Madras Module No - 12 Lecture No - 25 Prandtl-Meyer Function, Numerical

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Paper FF-014. Tips for Moving to SAS Enterprise Guide on Unix Patricia Hettinger, Consultant, Oak Brook, IL

Paper FF-014. Tips for Moving to SAS Enterprise Guide on Unix Patricia Hettinger, Consultant, Oak Brook, IL Paper FF-014 Tips for Moving to SAS Enterprise Guide on Unix Patricia Hettinger, Consultant, Oak Brook, IL ABSTRACT Many companies are moving to SAS Enterprise Guide, often with just a Unix server. A surprising

More information

Using the CoreSight ITM for debug and testing in RTX applications

Using the CoreSight ITM for debug and testing in RTX applications Using the CoreSight ITM for debug and testing in RTX applications Outline This document outlines a basic scheme for detecting runtime errors during development of an RTX application and an approach to

More information

Understanding MySQL storage and clustering in QueueMetrics. Loway

Understanding MySQL storage and clustering in QueueMetrics. Loway Understanding MySQL storage and clustering in QueueMetrics Loway Understanding MySQL storage and clustering in QueueMetrics Loway Table of Contents 1. Understanding MySQL storage and clustering... 1 2.

More information

PHP Debugging. Draft: March 19, 2013 2013 Christopher Vickery

PHP Debugging. Draft: March 19, 2013 2013 Christopher Vickery PHP Debugging Draft: March 19, 2013 2013 Christopher Vickery Introduction Debugging is the art of locating errors in your code. There are three types of errors to deal with: 1. Syntax errors: When code

More information

VIP Quick Reference Card

VIP Quick Reference Card VIP Quick Reference Card Loading VIP (Based on VIP 3.5 in GNU Emacs 18) Just type M-x vip-mode followed by RET VIP Modes VIP has three modes: emacs mode, vi mode and insert mode. Mode line tells you which

More information

HOW TO... Email Secure PR Payslips to Employees in OA

HOW TO... Email Secure PR Payslips to Employees in OA PR-HT004 HOW TO... Email Secure PR Payslips to Employees in OA Date: Nov 18, 2011, rev. Apr 27, 2012 Document Version: 0.3 Earliest available version of COINS: COINS OA 10.22 These notes are published

More information

A Sample OFBiz application implementing remote access via RMI and SOAP Table of contents

A Sample OFBiz application implementing remote access via RMI and SOAP Table of contents A Sample OFBiz application implementing remote access via RMI and SOAP Table of contents 1 About this document... 2 2 Introduction... 2 3 Defining the data model... 2 4 Populating the database tables with

More information

Drupal + Formulize. A Step-by-Step Guide to Integrating Drupal with XOOPS/ImpressCMS, and installing and using the Formulize module

Drupal + Formulize. A Step-by-Step Guide to Integrating Drupal with XOOPS/ImpressCMS, and installing and using the Formulize module Drupal + Formulize A Step-by-Step Guide to Integrating Drupal with XOOPS/ImpressCMS, and installing and using the Formulize module May 16, 2007 Updated December 23, 2009 This document has been prepared

More information

The Systems Approach to Problem Solving

The Systems Approach to Problem Solving The Systems Approach to Problem Solving I. Introduction This course introduces the methodology systems engineers use to solve problems. You will learn about many concepts and tools that systems engineers

More information

How To Connect To A Ppanasonic Pbx On A Pc Or Mac Or Ipa (For A Pc) With A Usb Or Ipo (For Mac) With Pbq (For Pc) On A Usb (For Pb

How To Connect To A Ppanasonic Pbx On A Pc Or Mac Or Ipa (For A Pc) With A Usb Or Ipo (For Mac) With Pbq (For Pc) On A Usb (For Pb R KX-Series PBX TAPI Service Provider Installation Manual Revision: 4.0.0.1 October 2011 Introduction About TSP Panasonic TAPI Service Provider for TDA/TDE/NCP/NS Series PBX (Panasonic TSP) is a driver

More information

Using the HCS12 Serial Monitor on Wytec Dragon-12 boards. Using Motorola s HCS12 Serial Monitor on Wytec s Dragon-12 boards

Using the HCS12 Serial Monitor on Wytec Dragon-12 boards. Using Motorola s HCS12 Serial Monitor on Wytec s Dragon-12 boards Using Motorola s HCS12 Serial Monitor on Wytec s Dragon-12 boards Wytec s Dragon-12 development boards are pre-installed with DBug-12, a small monitor program which allows a user to interact with the board

More information

The first program: Little Crab

The first program: Little Crab CHAPTER 2 The first program: Little Crab topics: concepts: writing code: movement, turning, reacting to the screen edges source code, method call, parameter, sequence, if-statement In the previous chapter,

More information

M21 Database Backup and Restore

M21 Database Backup and Restore M21 Database Backup and Restore M21 Database Backup and Restore Table of Contents 1. Overview...7 2. dbbkrs - DATABASE BACKUP and RESTORE...9 EXAMPLES...13 3. runbackup - RUN DATABASE BACKUP IN QUIET

More information

YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015

YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015 YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,

More information

AN141 SMBUS COMMUNICATION FOR SMALL FORM FACTOR DEVICE FAMILIES. 1. Introduction. 2. Overview of the SMBus Specification. 2.1.

AN141 SMBUS COMMUNICATION FOR SMALL FORM FACTOR DEVICE FAMILIES. 1. Introduction. 2. Overview of the SMBus Specification. 2.1. SMBUS COMMUNICATION FOR SMALL FORM FACTOR DEVICE FAMILIES 1. Introduction C8051F3xx and C8051F41x devices are equipped with an SMBus serial I/O peripheral that is compliant with both the System Management

More information

Lab 2 - Basic Router Configuration

Lab 2 - Basic Router Configuration CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how

More information

ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series

ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January

More information

Creating Tables ACCESS. Normalisation Techniques

Creating Tables ACCESS. Normalisation Techniques Creating Tables ACCESS Normalisation Techniques Microsoft ACCESS Creating a Table INTRODUCTION A database is a collection of data or information. Access for Windows allow files to be created, each file

More information

RIPE Database User Manual: Getting Started

RIPE Database User Manual: Getting Started RIPE Database User Manual: Getting Started ***IMPORTANT*** Please note that this document is obsolete. A new version will be prepared following a project to restructure the RIPE Database documentation.

More information

How to Configure Windows 8.1 to run ereports on IE11

How to Configure Windows 8.1 to run ereports on IE11 How to Configure Windows 8.1 to run ereports on IE11 Description: Windows 8.1 ships with IE10, but can be updated to IE11. There is a special mode in IE11 called Enterprise Mode that can be used to emulate

More information

EVERYTHING A DBA SHOULD KNOW

EVERYTHING A DBA SHOULD KNOW EVERYTHING A DBA SHOULD KNOW ABOUT TCPIP NETWORKS Chen (Gwen),HP Software-as-a-Service 1. TCP/IP Problems that DBAs Can Face In this paper I ll discuss some of the network problems that I ve encountered

More information

DHCP and DNS Protocols

DHCP and DNS Protocols DHCP and DNS Protocols DHCP (Dynamic Host Configuration Protocol) is an industry standard protocol that lets a DHCP server (Unix/Window/As400 system) allocate temporary IP addresses and other network parameters

More information

SV8100 & UM8000 Voicemail Administration Guide

SV8100 & UM8000 Voicemail Administration Guide Page 1 of 8 SV8100 & UM8000 Voicemail Administration Guide Page 2 of 8 Table of Contents Phone Outline... 3 Phone System Programming... 4 Changing the name of a Phone... 4 Programming One-Touch Keys with

More information

T1 QUICK START GUIDE

T1 QUICK START GUIDE T1 QUICK START GUIDE 1 T1 Quick Start Guide: English Microphones Indicator Light Multi- Function Button (MFB) Charging Port 2 Charge Your T1 Your T1 has been given an initial partial charge to get started,

More information