NERSP: Saving File Space and Reducing File Storage Charges

Size: px
Start display at page:

Download "NERSP: Saving File Space and Reducing File Storage Charges"

Transcription

1 NERSP: Saving File Space and Reducing UFIT EI&O Document ID: D0100 Last Updated: 07/03/2002 This document describes methods of managing and conserving file storage space on CNS's NERSP UNIX system. These methods include periodic purging of unneeded files and messages, and compressing infrequently accessed files so that they take up less space NE Waldo Rd, Suite 2100 Gainesville Florida (352) UF Information Technology 1

2 Table of Contents Introduction...3 Housecleaning--Deleting Unnecessary Files and Messages...3 File Compression...4 For More Information...7 2

3 Introduction As with its other systems, CNS charges [ users for files stored on its NERSP system. Although NERSP storage rates are currently considerably less than our other systems, you may still wish to find ways to reduce your storage charges. Even if you have an account for which you do not pay directly, such as a Basic Access account (administered and funded by CIRCA), daily storage charges are billed to your userid (in addition to charges such as CPU time and dial-up server connect time). Even though you do not receive a bill each month for a Basic Access account, the funding for each account is limited to a fixed amount, so you will want to make sure you do not exceed that amount--if you do, you will find yourself unable to log on until the next month's funding is allocated! Note Users considering using the UF/CNS dial-up service should be aware that this service is under review, and may possibly be discontinued at or shortly after the end of calendar year For more information, please see Dr. Hoit's memo to Deans, Directors and Department Heads of 05/02/2006, titled Charging for UF Dialup Services [ NERSP does not currently impose any upper limit on the amount of disk-space a user can occupy. Consequently, without careful file management, storage charges will continue to grow as your disk storage usage increases. Housecleaning--Deleting Unnecessary Files and Messages Cleaning Up Old Files Your first approach should be to delete any files you don't need to keep. Periodic "housecleaning" of your directories and folders is important, to clear out the old, unneeded files (and messages). As with any "housecleaning" chore, putting this task off too long can result in an unmanageable mess which gets more and more difficult to clean up with each additional day of procrastination. And all the while, charges continue to grow, day by day. Determine a good time--perhaps every semester break, when many campus offices have a brief "lull" in business--and make it a habit to use an hour or so to review your files and old messages, to see what you can delete. Use the command: ls -l sort -nrk5 more...to review your files; this command will cause your files to be sorted according to size, with the largest FIRST. Take particular note of the file size column (immediately to the left of the file date column). Use the rm command to delete any files which you no longer need; for example: 3

4 rm filename Use the cd command to change directories: cd directoryname...and then repeat the ls command given above, to check out the contents of those directories, and clean them up, as well. NOTE: do NOT delete files from the "mail" subdirectory, unless you are sure you know what you are doing. The "mail" subdirectory contains your folders. Most users should use Pine to review these, selectively deleting old, unwanted messages. Cleaning Up Old Messages Use Pine to review all your folders and delete unneeded messages: 1. From the Pine Main Menu, select "L Folder List". 2. Select each folder in turn, reviewing the messages stored in it, and delete the ones you no longer need to keep. Pay particular attention to folders named "sent-mail-month-year". These are where Pine automatically stores copies of every piece of you send. Experience has shown that many of these messages are not of long-term significance, and may be deleted. Note State Public Records laws and institutional policy may prescribe specific required retention periods for certain types of messages. If you are uncertain as to the policies governing retention/disposition of your messages, check with the Records Management office at your institution. File Compression Sometimes there may be files--particularly LARGE files--which you don't access often, but still wish to keep on-line, and yet also minimize your storage charges. The way to do this is by compressing those files. File compression techniques use mathematical algorithms to store the exact same data in fewer bytes. Naturally, each compression algorithm has a complementary "decompression" algorithm, which can restore the file exactly, to its original form. The file compression/decompression algorithms available for use on NERSP have been proven safe and reliable through years of use, and the underlying algorithms are well-known to computer scientists as being efficient and robust. Compressed files cannot be directly read or edited by normal means; you must generally "decompress" them first. However, for files which you only access occasionally, the inconvenience of having to decompress them may be more than offset by the savings in storage charges. For a large text file, compression may be quite effective; for example, while 4

5 researching this article, we compressed a byte text file down to bytes--a savings of almost 70%! Compressing a Single File While there are several compression utilities available on NERSP, we recommend that you use the GNUZIP utilities (gzip and gunzip). These are fast, efficient, and effective--that is to say, they achieve a high degree of file compression, relative to some of the other utilities. The command: gzip filename...will compress the individually named filename, creating a new file named filename.gz, and automatically delete the original filename. Reversing the Process: Recovering a Compressed File To restore the file, use the command gunzip filename Compressing Multiple Files into a Single Archive It is also possible to compress multiple files into a single compressed archive file. You might wish to do this for long-term storage of a group of related files, which you will probably wish to access at the same time; for example, a program which you only use occasionally, and its associated data files. This is a 3-step process involving another program called gtar (GNU tape archive). While the classic UNIX tar command, and the more recent gtar were originally developed for the purpose of archiving files to magnetic tape, they are also useful for managing online disk storage. The gtar program integrates the functions of the standard UNIX tar command and the gzip utility into a single command which combines multiple files into a single archive file, and compresses that using the gzip algorithm. 1. Make sure all the files you want to archive as a group are in a directory together, with no other files. If the files you want to archive are already together in a directory, you can skip this step and proceed directly to step 2. a. If necessary, create a new, empty directory (using the mkdir command) to hold the files you want to archive. (e.g. mkdir mystuff). b. Move all the files you want to archive in a group into the newly created directory using the mv command. (e.g. mv myprogram mystuff) 5

6 2. "Tar together" the directory and all files in it using the gtar command, as follows gtar -zcf myarchive.tgz mystuff This command says, "create a file named 'myarchive.tgz' which includes the directory 'mystuff' and all the files in it." The gtar command also compresses the resultant archive, to save storage space. Note: ".tgz" is a combination of the suffixes ".tar" and ".gz". 3. Use the rm -r directoryname command to delete the directory and all the files in it. (e.g. rm -r mystuff) Reversing the Process: Recovering Your Files The following 2-step process will decompress the archive, restore the archived files to a subdirectory under the current working-directory, and remove the archive file. 1. gtar -zxvf myarchive.tgz 2. rm myarchive.tgz Cross-Platform Compatibility: "ZIP" on NERSP Sometimes you may wish to compress files in a way which is compatible with compression utilities commonly available on personal computers. Perhaps the most widely used compression algorithm on microcomputers is the ZIP format, often found as "PKZIP" or "WINZIP," on MS-DOS and MS-Windows computers. The popular "StuffIt" utility for Macintosh also understands the ZIP format. CNS has installed the utilities "zip" and "unzip" on NERSP for the purpose of providing cross-platform compatibility for compressed files. The zip and unzip utilities on NERSP use the standard ZIP compression algorithm, and are fully compatible with the commonly used personal computer ZIP utilities (such as PKZIP v2.04g). To create a ZIP-format compressed file on NERSP, issue the command: zip -r myarchive mystuff...where myarchive.zip is the name you wish to give the newly created archive file, and mystuff is the name of a directory to be "zipped." The "-r" ("recursive") option specifies that the input file is a subdirectory, and you wish the archive to include all files in the subdirectory (as well as all subdirectories and files contained therein, recursively). If you only wish to compress a single file using the ZIP format, you can shorten the command to: zip myarchive mystuff 6

7 Note Unlike the gzip command, the default action of the zip command does NOT automatically delete the "source" files after creating the archive. You will need to do that yourself, using the rm command. To unzip a zip-format file on NERSP (whether created on NERSP, or on a PC), the command is simply: unzip myarchive.zip For More Information For more information on basic UNIX file management (including the ls, cd, and more commands), and on using the Pine mail system, see CNS UNIX 101 (available on the Web at [ or from CNS Information Services, 112 SSRB, <consult@lists.ufl.edu [mailto:consult@lists.ufl.edu]>). For more information on the compression/decompression commands discussed in this document, (including many switches and options available), see the "man" pages for those commands (e.g. "man gzip", "man gunzip", "man gtar", "man zip" and "man unzip"). Your Comments are Welcome We welcome your comments and suggestions on this and all UFIT documentation. Please send your comments to: UFIT 2046 NE Waldo Rd, Suite 2100 Gainesville Florida (352) <editor@cns.ufl.edu> UF Information Technology 7

8 8

File Transfer Protocol. What is Anonymous FTP? What is FTP?

File Transfer Protocol. What is Anonymous FTP? What is FTP? File Transfer Protocol (FTP) File Transfer Protocol Sometimes browsing for information is not sufficient you may want to obtain copies of software programs or data files for your own use and manipulation.

More information

Creating a Complete Backup of Shelby v5 Data

Creating a Complete Backup of Shelby v5 Data Creating a Complete Backup of Shelby v5 Data Backup the Shelby folder and all its contents Since the Shelby v5 software now stores information in the \Shelby\ssv5.dat folder as well as in the SQL database;

More information

Unix Sampler. PEOPLE whoami id who

Unix Sampler. PEOPLE whoami id who Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host

More information

Backing up your WebCT Course

Backing up your WebCT Course Backing up your WebCT Page 1/6 BACKING UP YOUR WEBCT COURSE This document provides WebCT designers with a step-by-step guide to creating archive backups of the WebCT courses for which they have responsibility.

More information

Call Recorder Quick CD Access System

Call Recorder Quick CD Access System Call Recorder Quick CD Access System V4.0 VC2010 Contents 1 Call Recorder Quick CD Access System... 3 1.1 Install the software...4 1.2 Start...4 1.3 View recordings on CD...5 1.4 Create an archive on Hard

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

NSave Table of Contents

NSave Table of Contents NSave Table of Contents Introduction to NSave for Desktops 2 CPP Installation Instructions 3 Backing up your Computer 8 Restoring Files to your Computer 10 Settings 13 History 14 Destinations 15 1 Introduction

More information

Using Symantec NetBackup with Symantec Security Information Manager 4.5

Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights

More information

Audit TM. The Security Auditing Component of. Out-of-the-Box

Audit TM. The Security Auditing Component of. Out-of-the-Box Audit TM The Security Auditing Component of Out-of-the-Box This guide is intended to provide a quick reference and tutorial to the principal features of Audit. Please refer to the User Manual for more

More information

Before You Begin. SharePoint How To s / Access and Storage 1of 7

Before You Begin. SharePoint How To s / Access and Storage 1of 7 SharePoint How To s / Access and Storage of 7 Manage access and storage on your SharePoint Server 007 sites. Manage Access Limit access to sensitive business information. Topics in this section: Give Users

More information

GroupWise Archiving. For additional help on setting up an archive, please contact TSC Help Desk at ext. 9149.

GroupWise Archiving. For additional help on setting up an archive, please contact TSC Help Desk at ext. 9149. GroupWise Archiving GroupWise archiving is a process that will offload your email contents from the main GroupWise server to a local or networked drive. A networked drive I: is allocated to each Netware

More information

IVUE System Administration

IVUE System Administration IVUE System Administration SysAdmin & ivue Admin Page 3 of 78 Table of Contents INTRODUCTION TO SYSADMIN... 6 SYSTEM ADMINISTRATION MAIN MENU... 7 SYSTEM ADMINISTRATION LOGIN... 10 BACKUP RECOVERY... 11

More information

1 Basic commands. 2 Terminology. CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger

1 Basic commands. 2 Terminology. CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger 1 Basic commands This section describes a list of commonly used commands that are available on the EECS UNIX systems. Most commands are executed by

More information

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002) Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and

More information

Using the Local Document Organizer in ProjectWise

Using the Local Document Organizer in ProjectWise Using the Local Document Organizer in ProjectWise ProjectWise stores copies of files on your local computer when you access them to provide the best performance over the state-wide network. The Local Document

More information

Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation

Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation Linux+ Guide to Linux Certification, Third Edition Chapter 11 Compression, System Backup, and Software Installation Objectives Outline the features of common compression utilities Compress and decompress

More information

ACS Backup and Restore

ACS Backup and Restore Table of Contents Implementing a Backup Plan 3 What Should I Back Up? 4 Storing Data Backups 5 Backup Media 5 Off-Site Storage 5 Strategies for Successful Backups 7 Daily Backup Set A and Daily Backup

More information

Introduction to Mac OS X

Introduction to Mac OS X Introduction to Mac OS X The Mac OS X operating system both a graphical user interface and a command line interface. We will see how to use both to our advantage. Using DOCK The dock on Mac OS X is the

More information

USEFUL UNIX COMMANDS

USEFUL UNIX COMMANDS cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append

More information

Macintosh General Help

Macintosh General Help The Macintosh computers on campus use Mac Operating System 10.6. OS 10.6 differs in many ways from what is now called the classic OS 9. This help sheet will help you to better orient yourself with these

More information

Auto Archiving Folders in Outlook XP

Auto Archiving Folders in Outlook XP Auto Archiving Folders in Outlook XP Your Outlook email account on the Exchange server is allotted 50 megabytes of storage space on the server. Items in the Inbox, Calendar, Sent Items, Deleted Items,

More information

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

Advantages of Amanda over Proprietary Backup

Advantages of Amanda over Proprietary Backup Advantages of Amanda over Proprietary Backup Gregory Grant Revision 02 Abstract This white paper discusses how Amanda compares to other backup products. It will help you understand some key Amanda differences,

More information

Technical Note. Image Studio Software Work Area Folder Best Practices. Developed for: Image Studio Software

Technical Note. Image Studio Software Work Area Folder Best Practices. Developed for: Image Studio Software Technical Note Image Studio Software Work Area Folder Best Practices Developed for: Image Studio Software Please refer to your manual to confirm that this protocol is appropriate for the applications compatible

More information

Backing Up TestTrack Native Project Databases

Backing Up TestTrack Native Project Databases Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Spam Filtering: Configuring Microsoft Outlook

Spam Filtering: Configuring Microsoft Outlook Spam Filtering: Configuring Microsoft UFIT EI&O Document ID: D0167 Last Updated: 05/10/2004 CNS provides a "spam-detection" system for e-mail sent to GatorLink userid@ufl.edu addresses. This process gives

More information

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal

More information

A Crash Course in OS X D. Riley and M. Allen

A Crash Course in OS X D. Riley and M. Allen Objectives A Crash Course in OS X D. Riley and M. Allen To learn some of the basics of the OS X operating system - including the use of the login panel, system menus, the file browser, the desktop, and

More information

The Einstein Depot server

The Einstein Depot server The Einstein Depot server Have you ever needed a way to transfer large files to colleagues? Or allow a colleague to send large files to you? Do you need to transfer files that are too big to be sent as

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

1. Installation Instructions - Unix & Linux

1. Installation Instructions - Unix & Linux Planning Your Installation 1. Installation Instructions - Unix & Linux There are two types of Gridgen installations: a First Time Installation and a Maintenance Release Installation. A First Time Installation

More information

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves

More information

File Share Service User guide

File Share Service User guide File Share Service User guide Version: 2.0 Written by: Sriram Rao Last Modified: 03/16/2012 1 Index Index... 2 Overview... 3 Change Log... 4 Login Instructions... 5 Searching files by name or content...

More information

Frequently Asked Questions About WebDrv Online (Remote) Backup

Frequently Asked Questions About WebDrv Online (Remote) Backup Frequently Asked Questions About WebDrv Online (Remote) Backup GENERAL INFORMATION Why backup? What is online backup? What if we already have a tape backup system? How secure are online backups? What tasks

More information

CS 103 Lab Linux and Virtual Machines

CS 103 Lab Linux and Virtual Machines 1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation

More information

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical

More information

Uploads from client PC's to mercury are not enabled for security reasons.

Uploads from client PC's to mercury are not enabled for security reasons. Page 1 Oracle via SSH (on line database classes only) The CS2 Oracle Database (Oracle 9i) is located on a Windows 2000 server named mercury. Students enrolled in on line database classes may access this

More information

Saving To Your Network Drive

Saving To Your Network Drive Saving To Your Network Drive SAVING TO YOUR NETWORK DRIVE FREQUENTLY ASKED QUESTIONS & ANSWERS Q: What is a network drive? A: A network drive is an area of storage that is reserved for the individual faculty

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

Tutorial 0A Programming on the command line

Tutorial 0A Programming on the command line Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple

More information

Thirty Useful Unix Commands

Thirty Useful Unix Commands Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a

More information

Security Correlation Server Backup and Recovery Guide

Security Correlation Server Backup and Recovery Guide orrelog Security Correlation Server Backup and Recovery Guide This guide provides information to assist administrators and operators with backing up the configuration and archive data of the CorreLog server,

More information

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the

More information

2003 2006 Pershing LLC. All rights reserved. Pershing, NetExchange Pro and InfoDirect FTP are registered trademarks of Pershing Investments LLC.

2003 2006 Pershing LLC. All rights reserved. Pershing, NetExchange Pro and InfoDirect FTP are registered trademarks of Pershing Investments LLC. Using InfoDirect FTP September 2006 COPYRIGHT AND MARKS Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any

More information

LICENSE4J FLOATING LICENSE SERVER USER GUIDE

LICENSE4J FLOATING LICENSE SERVER USER GUIDE LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux

More information

Note: Make sure the.pst file is stored in your U: drive, this drive is protected by backups.

Note: Make sure the.pst file is stored in your U: drive, this drive is protected by backups. Email Management Best Practices I. Introduction: The School Board Network Infrastructure that we use daily is a huge investment involving workstations, servers, storage, software and backup equipment.

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

How to Setup and Manage LAUSD E-mail in Outlook

How to Setup and Manage LAUSD E-mail in Outlook LAUSD ITD Service Desk How to Setup and Manage LAUSD E-mail in Outlook (08/11/08) LAUSD ITD Service Desk 333 S. Beaudry Ave. Phone 213.241.5200 Fax 213.241.5224 Table of Contents Acceptable Use Policy...2

More information

Birmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0

Birmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0 Birmingham Environment for Academic Research Introduction to Linux Quick Reference Guide Research Computing Team V1.0 Contents The Basics... 4 Directory / File Permissions... 5 Process Management... 6

More information

Microsoft Exchange 2007

Microsoft Exchange 2007 Microsoft Exchange 2007 On September 14, 2009 the College will convert its employee email system to Exchange 2007. This affects the email that you send and receive via your bucks.edu account. This conversion

More information

Tutorial Guide to the IS Unix Service

Tutorial Guide to the IS Unix Service Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular

More information

Backup and Restore User manual For version 5.0.0.8

Backup and Restore User manual For version 5.0.0.8 Backup and Restore User manual For version 5.0.0.8 All rights reserved 1989 2008 Microware Software - Rev. 1.0.5 October 2, 2008 Page 1 Table of Contents Backup and Restore 1.0 Overview... 3 1.1 Main features...4

More information

Windows Offline Files

Windows Offline Files Windows Offline Files 1. Description: Windows Offline Files or Client Side Caching (CSC) allows files and folders stored on any Server Message Block (SMB) network share to be available offline. To further

More information

UNICORN 7.0. Administration and Technical Manual

UNICORN 7.0. Administration and Technical Manual UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...

More information

Backup Tab. User Guide

Backup Tab. User Guide Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...

More information

Medicare Remit Easy Print (MREP) Software Provider/Supplier MREP Help

Medicare Remit Easy Print (MREP) Software Provider/Supplier MREP Help Medicare Remit Easy Print (MREP) Software Provider/Supplier MREP Help As of 07/01/2013 If you still need assistance after consulting this FAQ and the MREP User Guide, contact your Medicare Contractor.

More information

DATA CENTER SERVICE CATALOG

DATA CENTER SERVICE CATALOG DATA CENTER SERVICE CATALOG KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY NAFEZ ALBESHEETI DR.MISHARI ALMISHARI DR.MISHARI

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Retrieving and Unpacking SDTS Data Tutorial and Users Manual June 23, 1998

Retrieving and Unpacking SDTS Data Tutorial and Users Manual June 23, 1998 Retrieving and Unpacking SDTS Data Tutorial and Users Manual June 23, 1998 Neither the U.S. Government nor any agency thereof nor any of their employees make any warranty, expressed or implied, or assume

More information

Archiving in Microsoft Outlook. This document looks at archiving and saving space in the Microsoft Outlook email program. INFORMATION SYSTEMS SERVICES

Archiving in Microsoft Outlook. This document looks at archiving and saving space in the Microsoft Outlook email program. INFORMATION SYSTEMS SERVICES INFORMATION SYSTEMS SERVICES Archiving in Microsoft Outlook This document looks at archiving and saving space in the Microsoft Outlook email program. AUTHOR: ISS DATE: December 2005 EDITION: 2.0 TUT 104

More information

Web File Management with SSH Secure Shell 3.2.3

Web File Management with SSH Secure Shell 3.2.3 Web File Management with SSH Secure Shell 3.2.3 June 2003 Information Technologies Copyright 2003 University of Delaware. Permission to copy without fee all or part of this material is granted provided

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

Managing Your Lotus Notes Mail Database Size

Managing Your Lotus Notes Mail Database Size Managing Your Lotus Notes Mail Database Size Your Lotus Notes database consists of Mail, Calendar entries and ToDo items. For the purpose of this document, your Notes database will also be referred to

More information

Medicare Remit Easy Print (MREP) Software MAC/ DME MAC MREP Help

Medicare Remit Easy Print (MREP) Software MAC/ DME MAC MREP Help Medicare Remit Easy Print (MREP) Software MAC/ DME MAC MREP Help As of 07/01/2013 Technical Information.NET Framework 1. During installation of MREP, I m receiving the message This setup requires the.net

More information

EXACT Network Backups

EXACT Network Backups User's Guide EXACT Network Backups EXACT Network Backups rev 1, 17/02/2014 page 1 of 16 Copyright 2014 Software of Excellence International. All rights reserved The software contains proprietary information

More information

Mac OS X Server Migration Guide

Mac OS X Server Migration Guide Mac OS X Server Migration Guide Includes detailed instructions for upgrading to Mac OS X Server from AppleShare IP, Macintosh Manager, and Mac OS X Server 1.2 K Apple Computer, Inc. 2001 Apple Computer,

More information

Frequently Asked Questions

Frequently Asked Questions BACKUPS FAQ Why Backup? Backup Location Net Connections Programs Schedule Procedures Frequently Asked Questions I do a backup once a week and sometimes longer, is this sufficient? In most cases, I would

More information

DISK DEFRAG Professional

DISK DEFRAG Professional auslogics DISK DEFRAG Professional Help Manual www.auslogics.com / Contents Introduction... 5 Installing the Program... 7 System Requirements... 7 Installation... 7 Registering the Program... 9 Uninstalling

More information

DS License Server V6R2013x

DS License Server V6R2013x DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology

More information

UTILITIES BACKUP. Figure 25-1 Backup & Reindex utilities on the Main Menu

UTILITIES BACKUP. Figure 25-1 Backup & Reindex utilities on the Main Menu 25 UTILITIES PastPerfect provides a variety of utilities to help you manage your data. Two of the most important are accessed from the Main Menu Backup and Reindex. The other utilities are located within

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun

Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2

More information

You must have at least Editor access to your own mail database to run archiving.

You must have at least Editor access to your own mail database to run archiving. Archiving An archive is a copy of a database you can create to store information no longer in use. Like a replica, an archive contains all documents and design elements in the original database, but unlike

More information

Reduce the number of years of general ledger transactions and balances to save

Reduce the number of years of general ledger transactions and balances to save MINIMIZING DISK SPACE USAGE IN VIRTUAL OFFICE CS OR SAAS In General... 1 Creative Solutions Accounting... 1 Engagement CS... 4 FileCabinet CS... 4 Fixed Assets CS... 6 Practice CS... 8 UltraTax CS... 8

More information

Wimba Pronto. Version 3.1. Administrator Guide

Wimba Pronto. Version 3.1. Administrator Guide Wimba Pronto Version 3.1 Administrator Guide Wimba Pronto 3.1 Administrator Guide Overview 1 Accessing the Wimba Pronto Administration Interface 2 Managing Multiple Institutions 3 General Features 4 Configuring

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

System Administration. Backups

System Administration. Backups System Administration Backups Why Backup? Problems will occur Hardware failure Accidental deletion Unwanted changes Backup Philosophies At mimimum back up what you can not replicate Your documents, important

More information

An Application of the Internet-based Automated Data Management System (IADMS) for a Multi-Site Public Health Project

An Application of the Internet-based Automated Data Management System (IADMS) for a Multi-Site Public Health Project An Application of the Internet-based Automated Data Management System (IADMS) for a Multi-Site Public Health Project Michele G. Mandel, National Centers for Disease Control and Prevention, Atlanta, GA

More information

User Manual. 2 Bay Docking Station

User Manual. 2 Bay Docking Station FANTEC MR-CopyDU3 User Manual 2 Bay Docking Station With One Touch Backup (OTB) and Copy Function Hardware: PC and Notebooks, Macintosh USB 1.1, USB 2.0 or USB 3.0 interface Features: 2,5 or 3,5 SATA I,II,III

More information

IMF Tune v7.0 Backup, Restore, Replication

IMF Tune v7.0 Backup, Restore, Replication IMF Tune v7.0 Backup, Restore, Replication Contents WinDeveloper IMF Tune v7.0 Backup, Restore, Replication... 3 1. IMFTBak Requirements... 3 2. Using IMFTBak... 3 3. Backing-Up Configuration Settings...

More information

SVN Starter s Guide Compiled by Pearl Guterman June 2005

SVN Starter s Guide Compiled by Pearl Guterman June 2005 SVN Starter s Guide Compiled by Pearl Guterman June 2005 SV Table of Contents 1) What is SVN?... 1 2) SVN Architecture... 2 3) Creating a Working Copy... 3 4) Basic Work Cycle... 4 5) Status Symbols...

More information

Performing Database and File System Backups and Restores Using Oracle Secure Backup

Performing Database and File System Backups and Restores Using Oracle Secure Backup Performing Database and File System Backups and Restores Using Oracle Secure Backup Purpose This lesson introduces you to Oracle Secure Backup which enables you to perform database and file system backups

More information

Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved.

Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved. Configuring Backup Settings Objectives After completing this lesson, you should be able to: Use Enterprise Manager to configure backup settings Enable control file autobackup Configure backup destinations

More information

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts

Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...

More information

MARCH 2005. Conversion Software User Guide for Windows. Version 2.0

MARCH 2005. Conversion Software User Guide for Windows. Version 2.0 MARCH 2005 CDS Conversion Software User Guide for Windows Version 2.0 Updated: 2/24/2006 Table of Contents CDS Conversion Software V2 for Windows User Guide... 1 System Requirements... 1 Introduction...

More information

Module 16: Some Other Tools in UNIX

Module 16: Some Other Tools in UNIX Module 16: Some Other Tools in UNIX We have emphasized throughout that the philosophy of Unix is to provide - (a) a large number of simple tools and (b) methods to combine these tools in flexible ways.

More information

Online Backup Client User Manual

Online Backup Client User Manual Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have

More information

Downloading Your Backup:

Downloading Your Backup: KVS Remote Backup Service (KVSRBS) Restore Procedures (KVSRBS Clients Only) This document will outline the procedures for restoring your most recent KVSRBS backup. If you need to restore from a prior backup,

More information

How To Use Exhange On Outlook 2007 2007 On A Pc Or Macintosh Outlook 2007 On Your Pc Or Ipad (For Windows Xp) On Your Ipad Or Ipa (For Your Windows Xp). (For A Macintosh) On A

How To Use Exhange On Outlook 2007 2007 On A Pc Or Macintosh Outlook 2007 On Your Pc Or Ipad (For Windows Xp) On Your Ipad Or Ipa (For Your Windows Xp). (For A Macintosh) On A Configure Microsoft Outlook 2007 to use Exchange Email Setting Important 1. Before configure your Microsoft outlook 2007 to use exhange you MUST log into the Web Exchange page to login and change your

More information

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013) 1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: CustomerService@laplink.com Laplink Software, Inc. 600 108th Ave.

More information

Managing Software and Configurations

Managing Software and Configurations 55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page

More information

MySQL Backups: From strategy to Implementation

MySQL Backups: From strategy to Implementation MySQL Backups: From strategy to Implementation Mike Frank Senior Product Manager 1 Program Agenda Introduction The 5 Key Steps Advanced Options References 2 Backups are a DBAs Top Priority Be Prepared

More information

Alternate Data Streams in Forensic Investigations of File Systems Backups

Alternate Data Streams in Forensic Investigations of File Systems Backups Alternate Data Streams in Forensic Investigations of File Systems Backups Derek Bem and Ewa Z. Huebner School of Computing and Mathematics University of Western Sydney d.bem@cit.uws.edu.au and e.huebner@cit.uws.edu.au

More information

PKZIP 6.0. Command Line for Windows Getting Started Manual

PKZIP 6.0. Command Line for Windows Getting Started Manual PKZIP 6.0 Command Line for Windows Getting Started Manual Copyright 2000-2002 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Installing, Uninstalling, and Upgrading Service Monitor

Installing, Uninstalling, and Upgrading Service Monitor CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page

More information

Events Forensic Tools for Microsoft Windows

Events Forensic Tools for Microsoft Windows Events Forensic Tools for Microsoft Windows Professional forensic tools Events Forensic Tools for Windows Easy Events Log Management Events Forensic Tools (EFT) is a fast, easy to use and very effective

More information

AccXES Account Management Tool Administrator s Guide Version 10.0

AccXES Account Management Tool Administrator s Guide Version 10.0 AccXES Account Management Tool Administrator s Guide Version 10.0 701P41531 May 2004 Trademark Acknowledgments XEROX, AccXES, The Document Company, and the identifying product names and numbers herein

More information

State of Michigan Records Management Services. Guide to E mail Storage Options

State of Michigan Records Management Services. Guide to E mail Storage Options State of Michigan Records Management Services Guide to E mail Storage Options E mail is a fast, efficient and cost effective means for communicating and sharing information. However, e mail software is

More information