NERSP: Saving File Space and Reducing File Storage Charges
|
|
- Maude Bruce
- 8 years ago
- Views:
Transcription
1 NERSP: Saving File Space and Reducing UFIT EI&O Document ID: D0100 Last Updated: 07/03/2002 This document describes methods of managing and conserving file storage space on CNS's NERSP UNIX system. These methods include periodic purging of unneeded files and messages, and compressing infrequently accessed files so that they take up less space NE Waldo Rd, Suite 2100 Gainesville Florida (352) UF Information Technology 1
2 Table of Contents Introduction...3 Housecleaning--Deleting Unnecessary Files and Messages...3 File Compression...4 For More Information...7 2
3 Introduction As with its other systems, CNS charges [ users for files stored on its NERSP system. Although NERSP storage rates are currently considerably less than our other systems, you may still wish to find ways to reduce your storage charges. Even if you have an account for which you do not pay directly, such as a Basic Access account (administered and funded by CIRCA), daily storage charges are billed to your userid (in addition to charges such as CPU time and dial-up server connect time). Even though you do not receive a bill each month for a Basic Access account, the funding for each account is limited to a fixed amount, so you will want to make sure you do not exceed that amount--if you do, you will find yourself unable to log on until the next month's funding is allocated! Note Users considering using the UF/CNS dial-up service should be aware that this service is under review, and may possibly be discontinued at or shortly after the end of calendar year For more information, please see Dr. Hoit's memo to Deans, Directors and Department Heads of 05/02/2006, titled Charging for UF Dialup Services [ NERSP does not currently impose any upper limit on the amount of disk-space a user can occupy. Consequently, without careful file management, storage charges will continue to grow as your disk storage usage increases. Housecleaning--Deleting Unnecessary Files and Messages Cleaning Up Old Files Your first approach should be to delete any files you don't need to keep. Periodic "housecleaning" of your directories and folders is important, to clear out the old, unneeded files (and messages). As with any "housecleaning" chore, putting this task off too long can result in an unmanageable mess which gets more and more difficult to clean up with each additional day of procrastination. And all the while, charges continue to grow, day by day. Determine a good time--perhaps every semester break, when many campus offices have a brief "lull" in business--and make it a habit to use an hour or so to review your files and old messages, to see what you can delete. Use the command: ls -l sort -nrk5 more...to review your files; this command will cause your files to be sorted according to size, with the largest FIRST. Take particular note of the file size column (immediately to the left of the file date column). Use the rm command to delete any files which you no longer need; for example: 3
4 rm filename Use the cd command to change directories: cd directoryname...and then repeat the ls command given above, to check out the contents of those directories, and clean them up, as well. NOTE: do NOT delete files from the "mail" subdirectory, unless you are sure you know what you are doing. The "mail" subdirectory contains your folders. Most users should use Pine to review these, selectively deleting old, unwanted messages. Cleaning Up Old Messages Use Pine to review all your folders and delete unneeded messages: 1. From the Pine Main Menu, select "L Folder List". 2. Select each folder in turn, reviewing the messages stored in it, and delete the ones you no longer need to keep. Pay particular attention to folders named "sent-mail-month-year". These are where Pine automatically stores copies of every piece of you send. Experience has shown that many of these messages are not of long-term significance, and may be deleted. Note State Public Records laws and institutional policy may prescribe specific required retention periods for certain types of messages. If you are uncertain as to the policies governing retention/disposition of your messages, check with the Records Management office at your institution. File Compression Sometimes there may be files--particularly LARGE files--which you don't access often, but still wish to keep on-line, and yet also minimize your storage charges. The way to do this is by compressing those files. File compression techniques use mathematical algorithms to store the exact same data in fewer bytes. Naturally, each compression algorithm has a complementary "decompression" algorithm, which can restore the file exactly, to its original form. The file compression/decompression algorithms available for use on NERSP have been proven safe and reliable through years of use, and the underlying algorithms are well-known to computer scientists as being efficient and robust. Compressed files cannot be directly read or edited by normal means; you must generally "decompress" them first. However, for files which you only access occasionally, the inconvenience of having to decompress them may be more than offset by the savings in storage charges. For a large text file, compression may be quite effective; for example, while 4
5 researching this article, we compressed a byte text file down to bytes--a savings of almost 70%! Compressing a Single File While there are several compression utilities available on NERSP, we recommend that you use the GNUZIP utilities (gzip and gunzip). These are fast, efficient, and effective--that is to say, they achieve a high degree of file compression, relative to some of the other utilities. The command: gzip filename...will compress the individually named filename, creating a new file named filename.gz, and automatically delete the original filename. Reversing the Process: Recovering a Compressed File To restore the file, use the command gunzip filename Compressing Multiple Files into a Single Archive It is also possible to compress multiple files into a single compressed archive file. You might wish to do this for long-term storage of a group of related files, which you will probably wish to access at the same time; for example, a program which you only use occasionally, and its associated data files. This is a 3-step process involving another program called gtar (GNU tape archive). While the classic UNIX tar command, and the more recent gtar were originally developed for the purpose of archiving files to magnetic tape, they are also useful for managing online disk storage. The gtar program integrates the functions of the standard UNIX tar command and the gzip utility into a single command which combines multiple files into a single archive file, and compresses that using the gzip algorithm. 1. Make sure all the files you want to archive as a group are in a directory together, with no other files. If the files you want to archive are already together in a directory, you can skip this step and proceed directly to step 2. a. If necessary, create a new, empty directory (using the mkdir command) to hold the files you want to archive. (e.g. mkdir mystuff). b. Move all the files you want to archive in a group into the newly created directory using the mv command. (e.g. mv myprogram mystuff) 5
6 2. "Tar together" the directory and all files in it using the gtar command, as follows gtar -zcf myarchive.tgz mystuff This command says, "create a file named 'myarchive.tgz' which includes the directory 'mystuff' and all the files in it." The gtar command also compresses the resultant archive, to save storage space. Note: ".tgz" is a combination of the suffixes ".tar" and ".gz". 3. Use the rm -r directoryname command to delete the directory and all the files in it. (e.g. rm -r mystuff) Reversing the Process: Recovering Your Files The following 2-step process will decompress the archive, restore the archived files to a subdirectory under the current working-directory, and remove the archive file. 1. gtar -zxvf myarchive.tgz 2. rm myarchive.tgz Cross-Platform Compatibility: "ZIP" on NERSP Sometimes you may wish to compress files in a way which is compatible with compression utilities commonly available on personal computers. Perhaps the most widely used compression algorithm on microcomputers is the ZIP format, often found as "PKZIP" or "WINZIP," on MS-DOS and MS-Windows computers. The popular "StuffIt" utility for Macintosh also understands the ZIP format. CNS has installed the utilities "zip" and "unzip" on NERSP for the purpose of providing cross-platform compatibility for compressed files. The zip and unzip utilities on NERSP use the standard ZIP compression algorithm, and are fully compatible with the commonly used personal computer ZIP utilities (such as PKZIP v2.04g). To create a ZIP-format compressed file on NERSP, issue the command: zip -r myarchive mystuff...where myarchive.zip is the name you wish to give the newly created archive file, and mystuff is the name of a directory to be "zipped." The "-r" ("recursive") option specifies that the input file is a subdirectory, and you wish the archive to include all files in the subdirectory (as well as all subdirectories and files contained therein, recursively). If you only wish to compress a single file using the ZIP format, you can shorten the command to: zip myarchive mystuff 6
7 Note Unlike the gzip command, the default action of the zip command does NOT automatically delete the "source" files after creating the archive. You will need to do that yourself, using the rm command. To unzip a zip-format file on NERSP (whether created on NERSP, or on a PC), the command is simply: unzip myarchive.zip For More Information For more information on basic UNIX file management (including the ls, cd, and more commands), and on using the Pine mail system, see CNS UNIX 101 (available on the Web at [ or from CNS Information Services, 112 SSRB, <consult@lists.ufl.edu [mailto:consult@lists.ufl.edu]>). For more information on the compression/decompression commands discussed in this document, (including many switches and options available), see the "man" pages for those commands (e.g. "man gzip", "man gunzip", "man gtar", "man zip" and "man unzip"). Your Comments are Welcome We welcome your comments and suggestions on this and all UFIT documentation. Please send your comments to: UFIT 2046 NE Waldo Rd, Suite 2100 Gainesville Florida (352) <editor@cns.ufl.edu> UF Information Technology 7
8 8
File Transfer Protocol. What is Anonymous FTP? What is FTP?
File Transfer Protocol (FTP) File Transfer Protocol Sometimes browsing for information is not sufficient you may want to obtain copies of software programs or data files for your own use and manipulation.
More informationCreating a Complete Backup of Shelby v5 Data
Creating a Complete Backup of Shelby v5 Data Backup the Shelby folder and all its contents Since the Shelby v5 software now stores information in the \Shelby\ssv5.dat folder as well as in the SQL database;
More informationUnix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
More informationBacking up your WebCT Course
Backing up your WebCT Page 1/6 BACKING UP YOUR WEBCT COURSE This document provides WebCT designers with a step-by-step guide to creating archive backups of the WebCT courses for which they have responsibility.
More informationCall Recorder Quick CD Access System
Call Recorder Quick CD Access System V4.0 VC2010 Contents 1 Call Recorder Quick CD Access System... 3 1.1 Install the software...4 1.2 Start...4 1.3 View recordings on CD...5 1.4 Create an archive on Hard
More informationNovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
More informationNSave Table of Contents
NSave Table of Contents Introduction to NSave for Desktops 2 CPP Installation Instructions 3 Backing up your Computer 8 Restoring Files to your Computer 10 Settings 13 History 14 Destinations 15 1 Introduction
More informationUsing Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
More informationAudit TM. The Security Auditing Component of. Out-of-the-Box
Audit TM The Security Auditing Component of Out-of-the-Box This guide is intended to provide a quick reference and tutorial to the principal features of Audit. Please refer to the User Manual for more
More informationBefore You Begin. SharePoint How To s / Access and Storage 1of 7
SharePoint How To s / Access and Storage of 7 Manage access and storage on your SharePoint Server 007 sites. Manage Access Limit access to sensitive business information. Topics in this section: Give Users
More informationGroupWise Archiving. For additional help on setting up an archive, please contact TSC Help Desk at ext. 9149.
GroupWise Archiving GroupWise archiving is a process that will offload your email contents from the main GroupWise server to a local or networked drive. A networked drive I: is allocated to each Netware
More informationIVUE System Administration
IVUE System Administration SysAdmin & ivue Admin Page 3 of 78 Table of Contents INTRODUCTION TO SYSADMIN... 6 SYSTEM ADMINISTRATION MAIN MENU... 7 SYSTEM ADMINISTRATION LOGIN... 10 BACKUP RECOVERY... 11
More information1 Basic commands. 2 Terminology. CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger
CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger 1 Basic commands This section describes a list of commonly used commands that are available on the EECS UNIX systems. Most commands are executed by
More informationCisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
More informationUsing the Local Document Organizer in ProjectWise
Using the Local Document Organizer in ProjectWise ProjectWise stores copies of files on your local computer when you access them to provide the best performance over the state-wide network. The Local Document
More informationLinux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation
Linux+ Guide to Linux Certification, Third Edition Chapter 11 Compression, System Backup, and Software Installation Objectives Outline the features of common compression utilities Compress and decompress
More informationACS Backup and Restore
Table of Contents Implementing a Backup Plan 3 What Should I Back Up? 4 Storing Data Backups 5 Backup Media 5 Off-Site Storage 5 Strategies for Successful Backups 7 Daily Backup Set A and Daily Backup
More informationIntroduction to Mac OS X
Introduction to Mac OS X The Mac OS X operating system both a graphical user interface and a command line interface. We will see how to use both to our advantage. Using DOCK The dock on Mac OS X is the
More informationUSEFUL UNIX COMMANDS
cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append
More informationMacintosh General Help
The Macintosh computers on campus use Mac Operating System 10.6. OS 10.6 differs in many ways from what is now called the classic OS 9. This help sheet will help you to better orient yourself with these
More informationAuto Archiving Folders in Outlook XP
Auto Archiving Folders in Outlook XP Your Outlook email account on the Exchange server is allotted 50 megabytes of storage space on the server. Items in the Inbox, Calendar, Sent Items, Deleted Items,
More informationEVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault
EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...
More informationAdvantages of Amanda over Proprietary Backup
Advantages of Amanda over Proprietary Backup Gregory Grant Revision 02 Abstract This white paper discusses how Amanda compares to other backup products. It will help you understand some key Amanda differences,
More informationTechnical Note. Image Studio Software Work Area Folder Best Practices. Developed for: Image Studio Software
Technical Note Image Studio Software Work Area Folder Best Practices Developed for: Image Studio Software Please refer to your manual to confirm that this protocol is appropriate for the applications compatible
More informationBacking Up TestTrack Native Project Databases
Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later
More informationWorkflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
More informationSpam Filtering: Configuring Microsoft Outlook
Spam Filtering: Configuring Microsoft UFIT EI&O Document ID: D0167 Last Updated: 05/10/2004 CNS provides a "spam-detection" system for e-mail sent to GatorLink userid@ufl.edu addresses. This process gives
More informationSawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices
Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal
More informationA Crash Course in OS X D. Riley and M. Allen
Objectives A Crash Course in OS X D. Riley and M. Allen To learn some of the basics of the OS X operating system - including the use of the login panel, system menus, the file browser, the desktop, and
More informationThe Einstein Depot server
The Einstein Depot server Have you ever needed a way to transfer large files to colleagues? Or allow a colleague to send large files to you? Do you need to transfer files that are too big to be sent as
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More information1. Installation Instructions - Unix & Linux
Planning Your Installation 1. Installation Instructions - Unix & Linux There are two types of Gridgen installations: a First Time Installation and a Maintenance Release Installation. A First Time Installation
More informationUser Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration
User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves
More informationFile Share Service User guide
File Share Service User guide Version: 2.0 Written by: Sriram Rao Last Modified: 03/16/2012 1 Index Index... 2 Overview... 3 Change Log... 4 Login Instructions... 5 Searching files by name or content...
More informationFrequently Asked Questions About WebDrv Online (Remote) Backup
Frequently Asked Questions About WebDrv Online (Remote) Backup GENERAL INFORMATION Why backup? What is online backup? What if we already have a tape backup system? How secure are online backups? What tasks
More informationCS 103 Lab Linux and Virtual Machines
1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation
More informationFred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
More informationUploads from client PC's to mercury are not enabled for security reasons.
Page 1 Oracle via SSH (on line database classes only) The CS2 Oracle Database (Oracle 9i) is located on a Windows 2000 server named mercury. Students enrolled in on line database classes may access this
More informationSaving To Your Network Drive
Saving To Your Network Drive SAVING TO YOUR NETWORK DRIVE FREQUENTLY ASKED QUESTIONS & ANSWERS Q: What is a network drive? A: A network drive is an area of storage that is reserved for the individual faculty
More informationAttix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
More informationTutorial 0A Programming on the command line
Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple
More informationThirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
More informationSecurity Correlation Server Backup and Recovery Guide
orrelog Security Correlation Server Backup and Recovery Guide This guide provides information to assist administrators and operators with backing up the configuration and archive data of the CorreLog server,
More informationKernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems
Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system
More informationBSDI Advanced Fitness & Wellness Software
BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the
More information2003 2006 Pershing LLC. All rights reserved. Pershing, NetExchange Pro and InfoDirect FTP are registered trademarks of Pershing Investments LLC.
Using InfoDirect FTP September 2006 COPYRIGHT AND MARKS Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any
More informationLICENSE4J FLOATING LICENSE SERVER USER GUIDE
LICENSE4J FLOATING LICENSE SERVER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Floating License Usage... 2 Installation... 4 Windows Installation... 4 Linux
More informationNote: Make sure the.pst file is stored in your U: drive, this drive is protected by backups.
Email Management Best Practices I. Introduction: The School Board Network Infrastructure that we use daily is a huge investment involving workstations, servers, storage, software and backup equipment.
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationHow to Setup and Manage LAUSD E-mail in Outlook
LAUSD ITD Service Desk How to Setup and Manage LAUSD E-mail in Outlook (08/11/08) LAUSD ITD Service Desk 333 S. Beaudry Ave. Phone 213.241.5200 Fax 213.241.5224 Table of Contents Acceptable Use Policy...2
More informationBirmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0
Birmingham Environment for Academic Research Introduction to Linux Quick Reference Guide Research Computing Team V1.0 Contents The Basics... 4 Directory / File Permissions... 5 Process Management... 6
More informationMicrosoft Exchange 2007
Microsoft Exchange 2007 On September 14, 2009 the College will convert its employee email system to Exchange 2007. This affects the email that you send and receive via your bucks.edu account. This conversion
More informationTutorial Guide to the IS Unix Service
Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular
More informationBackup and Restore User manual For version 5.0.0.8
Backup and Restore User manual For version 5.0.0.8 All rights reserved 1989 2008 Microware Software - Rev. 1.0.5 October 2, 2008 Page 1 Table of Contents Backup and Restore 1.0 Overview... 3 1.1 Main features...4
More informationWindows Offline Files
Windows Offline Files 1. Description: Windows Offline Files or Client Side Caching (CSC) allows files and folders stored on any Server Message Block (SMB) network share to be available offline. To further
More informationUNICORN 7.0. Administration and Technical Manual
UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...
More informationBackup Tab. User Guide
Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...
More informationMedicare Remit Easy Print (MREP) Software Provider/Supplier MREP Help
Medicare Remit Easy Print (MREP) Software Provider/Supplier MREP Help As of 07/01/2013 If you still need assistance after consulting this FAQ and the MREP User Guide, contact your Medicare Contractor.
More informationDATA CENTER SERVICE CATALOG
DATA CENTER SERVICE CATALOG KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY NAFEZ ALBESHEETI DR.MISHARI ALMISHARI DR.MISHARI
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationRetrieving and Unpacking SDTS Data Tutorial and Users Manual June 23, 1998
Retrieving and Unpacking SDTS Data Tutorial and Users Manual June 23, 1998 Neither the U.S. Government nor any agency thereof nor any of their employees make any warranty, expressed or implied, or assume
More informationArchiving in Microsoft Outlook. This document looks at archiving and saving space in the Microsoft Outlook email program. INFORMATION SYSTEMS SERVICES
INFORMATION SYSTEMS SERVICES Archiving in Microsoft Outlook This document looks at archiving and saving space in the Microsoft Outlook email program. AUTHOR: ISS DATE: December 2005 EDITION: 2.0 TUT 104
More informationWeb File Management with SSH Secure Shell 3.2.3
Web File Management with SSH Secure Shell 3.2.3 June 2003 Information Technologies Copyright 2003 University of Delaware. Permission to copy without fee all or part of this material is granted provided
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationManaging Your Lotus Notes Mail Database Size
Managing Your Lotus Notes Mail Database Size Your Lotus Notes database consists of Mail, Calendar entries and ToDo items. For the purpose of this document, your Notes database will also be referred to
More informationMedicare Remit Easy Print (MREP) Software MAC/ DME MAC MREP Help
Medicare Remit Easy Print (MREP) Software MAC/ DME MAC MREP Help As of 07/01/2013 Technical Information.NET Framework 1. During installation of MREP, I m receiving the message This setup requires the.net
More informationEXACT Network Backups
User's Guide EXACT Network Backups EXACT Network Backups rev 1, 17/02/2014 page 1 of 16 Copyright 2014 Software of Excellence International. All rights reserved The software contains proprietary information
More informationMac OS X Server Migration Guide
Mac OS X Server Migration Guide Includes detailed instructions for upgrading to Mac OS X Server from AppleShare IP, Macintosh Manager, and Mac OS X Server 1.2 K Apple Computer, Inc. 2001 Apple Computer,
More informationFrequently Asked Questions
BACKUPS FAQ Why Backup? Backup Location Net Connections Programs Schedule Procedures Frequently Asked Questions I do a backup once a week and sometimes longer, is this sufficient? In most cases, I would
More informationDISK DEFRAG Professional
auslogics DISK DEFRAG Professional Help Manual www.auslogics.com / Contents Introduction... 5 Installing the Program... 7 System Requirements... 7 Installation... 7 Registering the Program... 9 Uninstalling
More informationDS License Server V6R2013x
DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology
More informationUTILITIES BACKUP. Figure 25-1 Backup & Reindex utilities on the Main Menu
25 UTILITIES PastPerfect provides a variety of utilities to help you manage your data. Two of the most important are accessed from the Main Menu Backup and Reindex. The other utilities are located within
More informationOnline Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
More informationUnix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun
Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2
More informationYou must have at least Editor access to your own mail database to run archiving.
Archiving An archive is a copy of a database you can create to store information no longer in use. Like a replica, an archive contains all documents and design elements in the original database, but unlike
More informationReduce the number of years of general ledger transactions and balances to save
MINIMIZING DISK SPACE USAGE IN VIRTUAL OFFICE CS OR SAAS In General... 1 Creative Solutions Accounting... 1 Engagement CS... 4 FileCabinet CS... 4 Fixed Assets CS... 6 Practice CS... 8 UltraTax CS... 8
More informationWimba Pronto. Version 3.1. Administrator Guide
Wimba Pronto Version 3.1 Administrator Guide Wimba Pronto 3.1 Administrator Guide Overview 1 Accessing the Wimba Pronto Administration Interface 2 Managing Multiple Institutions 3 General Features 4 Configuring
More informationOnline Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationSystem Administration. Backups
System Administration Backups Why Backup? Problems will occur Hardware failure Accidental deletion Unwanted changes Backup Philosophies At mimimum back up what you can not replicate Your documents, important
More informationAn Application of the Internet-based Automated Data Management System (IADMS) for a Multi-Site Public Health Project
An Application of the Internet-based Automated Data Management System (IADMS) for a Multi-Site Public Health Project Michele G. Mandel, National Centers for Disease Control and Prevention, Atlanta, GA
More informationUser Manual. 2 Bay Docking Station
FANTEC MR-CopyDU3 User Manual 2 Bay Docking Station With One Touch Backup (OTB) and Copy Function Hardware: PC and Notebooks, Macintosh USB 1.1, USB 2.0 or USB 3.0 interface Features: 2,5 or 3,5 SATA I,II,III
More informationIMF Tune v7.0 Backup, Restore, Replication
IMF Tune v7.0 Backup, Restore, Replication Contents WinDeveloper IMF Tune v7.0 Backup, Restore, Replication... 3 1. IMFTBak Requirements... 3 2. Using IMFTBak... 3 3. Backing-Up Configuration Settings...
More informationSVN Starter s Guide Compiled by Pearl Guterman June 2005
SVN Starter s Guide Compiled by Pearl Guterman June 2005 SV Table of Contents 1) What is SVN?... 1 2) SVN Architecture... 2 3) Creating a Working Copy... 3 4) Basic Work Cycle... 4 5) Status Symbols...
More informationPerforming Database and File System Backups and Restores Using Oracle Secure Backup
Performing Database and File System Backups and Restores Using Oracle Secure Backup Purpose This lesson introduces you to Oracle Secure Backup which enables you to perform database and file system backups
More informationConfiguring Backup Settings. Copyright 2009, Oracle. All rights reserved.
Configuring Backup Settings Objectives After completing this lesson, you should be able to: Use Enterprise Manager to configure backup settings Enable control file autobackup Configure backup destinations
More informationBacking up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts
WIN1020 November 2003 Backing up Microsoft Outlook Email For the PC Using MS Outlook 2000 Keith Roberts INTRODUCTION... 1 PREPARATION... 1 BACKING UP EMAIL... 2 RESTORING EMAIL FROM A PERSONAL FILE FOLDER...
More informationMARCH 2005. Conversion Software User Guide for Windows. Version 2.0
MARCH 2005 CDS Conversion Software User Guide for Windows Version 2.0 Updated: 2/24/2006 Table of Contents CDS Conversion Software V2 for Windows User Guide... 1 System Requirements... 1 Introduction...
More informationModule 16: Some Other Tools in UNIX
Module 16: Some Other Tools in UNIX We have emphasized throughout that the philosophy of Unix is to provide - (a) a large number of simple tools and (b) methods to combine these tools in flexible ways.
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationDownloading Your Backup:
KVS Remote Backup Service (KVSRBS) Restore Procedures (KVSRBS Clients Only) This document will outline the procedures for restoring your most recent KVSRBS backup. If you need to restore from a prior backup,
More informationHow To Use Exhange On Outlook 2007 2007 On A Pc Or Macintosh Outlook 2007 On Your Pc Or Ipad (For Windows Xp) On Your Ipad Or Ipa (For Your Windows Xp). (For A Macintosh) On A
Configure Microsoft Outlook 2007 to use Exchange Email Setting Important 1. Before configure your Microsoft outlook 2007 to use exhange you MUST log into the Web Exchange page to login and change your
More informationUser Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)
1 Laplink DiskImage 7 Professional Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/contact E-mail: CustomerService@laplink.com Laplink Software, Inc. 600 108th Ave.
More informationManaging Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
More informationMySQL Backups: From strategy to Implementation
MySQL Backups: From strategy to Implementation Mike Frank Senior Product Manager 1 Program Agenda Introduction The 5 Key Steps Advanced Options References 2 Backups are a DBAs Top Priority Be Prepared
More informationAlternate Data Streams in Forensic Investigations of File Systems Backups
Alternate Data Streams in Forensic Investigations of File Systems Backups Derek Bem and Ewa Z. Huebner School of Computing and Mathematics University of Western Sydney d.bem@cit.uws.edu.au and e.huebner@cit.uws.edu.au
More informationPKZIP 6.0. Command Line for Windows Getting Started Manual
PKZIP 6.0 Command Line for Windows Getting Started Manual Copyright 2000-2002 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationInstalling, Uninstalling, and Upgrading Service Monitor
CHAPTER 2 Installing, Uninstalling, and Upgrading Service Monitor This section contains the following topics: Preparing to Install Service Monitor, page 2-1 Installing Cisco Unified Service Monitor, page
More informationEvents Forensic Tools for Microsoft Windows
Events Forensic Tools for Microsoft Windows Professional forensic tools Events Forensic Tools for Windows Easy Events Log Management Events Forensic Tools (EFT) is a fast, easy to use and very effective
More informationAccXES Account Management Tool Administrator s Guide Version 10.0
AccXES Account Management Tool Administrator s Guide Version 10.0 701P41531 May 2004 Trademark Acknowledgments XEROX, AccXES, The Document Company, and the identifying product names and numbers herein
More informationState of Michigan Records Management Services. Guide to E mail Storage Options
State of Michigan Records Management Services Guide to E mail Storage Options E mail is a fast, efficient and cost effective means for communicating and sharing information. However, e mail software is
More information