BICsuite!focus Process Flow Control With Shell Scripts No Thanks!

Size: px
Start display at page:

Download "BICsuite!focus Process Flow Control With Shell Scripts No Thanks!"

Transcription

1 independit Integrative Technologies GmbH Bergstraße 6 D Schrobenhausen BICsuite!focus Process Flow Control With Shell Scripts No Thanks! Dieter Stubler Ronald Jeninga July 30, 2013

2 Copyright 2013 independit GmbH This work is copyright protected Legal notice Copyright 2013 independit Integrative Technologies GmbH All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronically or mechanically, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner.

3 Process flow control with Shell Scripts - No Thanks! Preliminary remark As the title already implies, this document is a critical examination of the use of the UNIX shell (sh, ksh, bash,...) in the context of process flow control. The occurring and the problems described within this document are of conceptual nature and also apply to the use of other scripting languages (perl, python,...). In no way is it our intention to criticize these languages as a whole. Each of the named languages has its advantages and the author has developed many successful projects with the use of such languages within his career. Process flow control Within every IT department there exist tasks which must be fullled by executing several single processes. Such program flows consist of a few up to several hundred processes. In order to execute such process flows, it must be ascertained that every single process is executed coordinated, synchronized and in the right order. For this a process flow control is needed. In practice UNIX shell or other script languages are used for implementing such tasks. In the beginning everything is easy In the starting phase of a project everything is always quite simple. The number of processes is low, they are of low complexity, the amounts of data are easy manageable and flow control isn t (yet) an issue. With a few lines of shell script about every process is managed, fast, pragmatic and affordable. Exactly this circumstance hides a great risk. As these solutions will bind considerable development resources because of increasing complexity and increased requirements regarding performance and reliability, they will make a reliable and stable operation in the medium-term at reasonable costs impossible. From the management point of view it is disastrous that in the beginning the costs for process flow control and monitoring are so low that they aren t budgeted separately. The continuous and sneaky increase of costs will be invisible for the management for a long time (idle power!). At the time this issue is recognized as a problem, there have been spent enormous amounts for the development of control scripts and the required supporting functions and frameworks. In order to protect this investment and because of the fear for a migration of these process flow control systems to a suitable scheduling system, it is often tried to stick to this mode of operation. The costs will rise further and an increasing amount of employee resources will be bound. Turning away from this inefcient mode of operation will be increasingly expensive. 1

4 In this document we want to sensitise for this kind of problems and reveal that the use of a suitable scheduling system at an early stage will prevent the occurrence of this dilemma and at the same time reduces costs and frees resources for solving the real tasks. A simple example We d like to exemplary present the development of a simple process flow by means of an easy example. We assume that for a simple processing two programs (P1 and P2) have to be executed in succession. This can be implemented by following shell script: #!/bin/sh P1 P2 This is really simple, isn t it? Error handling Errors aren t handled in the above script. In order to prevent P2 processing the wrong data it must be prevented that P2 starts when P1 reports an error. After this has been a recurrent annoyance, we ll have to program some error handling into the script. It will look something like: #!/bin/sh P1 RET=$? if [ $RET -ne 0 ] echo "Fehler $RET in P1!" exit $RET P2 RET=$? if [ $RET -ne 0 ] echo "Fehler $RET in P2!" exit $RET As we can see quite a few lines of code were added. These lines of code need to be tested because a non processed error can have fatal consequences. This kind of error handling will be differently implemented by different developers. The comprehensibility and maintainability decrease and the costs increase. 2

5 Restart In our example P1 has a running time of about three hours and P2 often returns an error because of a resource shortage in temporary storage. Restarting the script would also superfluously execute P1 again, which results in a time to repair of three hours. In many environments some developer would copy the script, comment out the call of P1 and start the copy of this script. This produces a lot of work and holds a high risk of error. Because this isn t an acceptable situation, the script needs some global memory and looks approximately like this: #!/bin/sh # # STEP denotes the last step which has been successfully executed # STEP= cat steple if [ $STEP -eq "0" ] P1 RET=$? if [ $RET -ne 0 ] echo "Fehler $RET in P1!" exit $RET echo "1" > steple if [ $STEP -eq "1" ] P2 RET=$? if [ $RET -ne 0 ] echo "Fehler $RET in P2!" exit $RET echo "2" > steple echo "0" > steple This seems a fast solution which the developer might decide to implement. But this solution isn t in fact a solution at all and holds many problems. The steple has to be initialized before the rst execution and might have to be initialized after the script aborted. Error handling for reading and writing of the steple is entirely missing. Besides that, it is impossible to run two instances of this script concurrently. In order to make this script business proof, a lot of development effort has to be invested. From now on we will forbear from giving more code examples for our mini project because it will easily evolve to a script with several hundred lines of code. And of course, we want to save us this development effort. 3

6 What else? The example above only showed the rst few simple problems of process flow control by scripting. In order to assure a stable and unobstructed operation, among others at least the following functions have to be available: Monitoring and operator action Transfer of control information Possibility of parallel execution Distributed execution Resource control The implementation of the mentioned and other functions into the process control system requires a substantial amount of development and maintenance effort. But if these functions are missing, it will be paid by (largely) increased costs for operation. Monitoring and operator action In order to guarantee a stable operation it has to be possible to monitor all processes. This means that all processes must journalise their progress ( steple in our example). These protocols must be gathered and processed to get an overview of the currently running processes. This requires some repository which stores status information about running processes. To enable a fast error reaction it is necessary to be notied in case of an error. The needed notication system has to be developed and this alone represents a small project which can easily cost two-digit man-days. In case of problems or errors the operator must be able to intervene into running process flows. He must be able to restart, suspend, resume, cancel, skip, etc. processes or entire process flows. This has to be reasonably convenient which also implies a substantial amount of development effort. Transfer of control information It is often necessary to transfer information (timestamps, lenames,...) from one process to some following process. In a script based flow control this is typically implemented with the help of les which are written from one process and read by its successor. This solution again holds a lot of disadvantages. At the latest when one of the involved processes has to be executed at some other machine on the network, quite a lot of development effort has to be spent to implement the transfer of information. 4

7 Possibility of parallel execution The script development obtains an entire new dimension if parts of a process flow can be executed in parallel. Processes must be started as background processes and at certain spots within the process flow waiting for the termination of those parallel running processes has to be implemented. This requires a high technical skill of the developer and is together with error handling, restart, monitoring and operating truly not a trivial task. Distributed execution When some parts of a process flow have to be executed on different computers, the scripts controlling the process will have to start processes on remote computers. This adds another layer of complexity because the pitfalls of remote commands (ssh, rsh, scp,...) regarding monitoring and error recognition have to be circumvented. We re not even talking about potential security risks, e.g. because of storing passwords somewhere, here. Resource control The available systems resources are always limited. Are there at any time too many resources required, it will lead to reduced throughput and accumulated errors because of resource shortage. Therefore it is important to only start new processes when sufcient resources are available. To implement this with reasonable effort in a script based process control is hardly possible. So far we have only highlighted some of the most important aspects of flow control as well as the resulting efforts when using some scripting solution. Without the use of an appropriate scheduling system signicant costs will be generated during operations. Attempting to control these costs by improving the scripting infrastructure means that a huge development and inherent maintenance effort has to be invested. BICsuite as an alternative and escape independit offers with its BICsuite Scheduling system an alternative and an escape from the script trap. The BICsuite Scheduling system offers all required functions to model huge and complex process flows without the need to implement any parts of the flow control within the subprocesses themselves. The effort for development, maintenance and operations will be drastically reduced by the use of the BICsuite Scheduling system. Additionally the operations will get stabler, less error-prone and securer. Recovery times can be noticeably shortened. 5

8 Concluding remark The script based process flow control requires unreasonable high efforts in development, maintenance and operations. An optimal, transparent and efcient operation is an unreachable goal when using a script based flow control. We therefore recommend the use of an appropriate scheduling system at an very early stage. The earlier a migration to such a system is done, the less investment is lost and the smaller the migration efforts are. If you are currently using scripting for process flow control, a prompt switch to the use of a scheduling system is highly recommendable. The independit BICsuite Scheduling system offers all functions for development, monitoring and operations of complex process flows and minimizes the costs for development and maintenance thereof. At a fraction of the costs of a scripting solution the BICsuite Scheduling system supports the development and operation of a permanently stable and reliable IT system. Act now! 6

schedulix!focus The independit schedulix Scheduling System in Data Warehouse Environments

schedulix!focus The independit schedulix Scheduling System in Data Warehouse Environments independit Integrative Technologies GmbH Bergstraße 6 D 86529 Schrobenhausen schedulix!focus The independit schedulix Scheduling System in Data Warehouse Environments Dieter Stubler Ronald Jeninga July

More information

BICsuite!focus What does a scheduling System do?

BICsuite!focus What does a scheduling System do? independit Integrative Technologies GmbH Bergstraße 6 D 86529 Schrobenhausen BICsuite!focus What does a scheduling System do? Dieter Stubler Ronald Jeninga April 2, 2014 Copyright 2014 independit GmbH

More information

Decision Support System to MODEM communications

Decision Support System to MODEM communications Decision Support System to MODEM communications Guy Van Sanden gvsanden@sckcen.be Decision Support System to MODEM communications by Guy Van Sanden This document describes how to set up the dss2modem communications

More information

Scheduling in SAS 9.4 Second Edition

Scheduling in SAS 9.4 Second Edition Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute

More information

CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure

CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure CSE 120 Principles of Operating Systems Fall 2000 Lecture 3: Operating System Modules, Interfaces, and Structure Geoffrey M. Voelker Modules, Interfaces, Structure We roughly defined an OS as the layer

More information

Using sftp in Informatica PowerCenter

Using sftp in Informatica PowerCenter Using sftp in Informatica PowerCenter Applies to: Informatica PowerCenter Summary This article briefs about how to push/pull files using SFTP program in Informatica PowerCenter. Author Bio Author(s): Sukumar

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information

Pragmatic Version Control

Pragmatic Version Control Extracted from: Pragmatic Version Control using Subversion, 2nd Edition This PDF file contains pages extracted from Pragmatic Version Control, one of the Pragmatic Starter Kit series of books for project

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

Nagios in High Availability Environments

Nagios in High Availability Environments Nagios in High Availability Environments Introduction Nagios is a versatile and functional network management tool with a GUI (graphic user interface) comparable to other commercial tools. It s free software,

More information

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture

Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2

More information

Using SVN to Manage Source RTL

Using SVN to Manage Source RTL Using SVN to Manage Source RTL CS250 Tutorial 1 (Version 083010a) August 30, 2010 Yunsup Lee In this tutorial you will gain experience using the Subversion (SVN) to manage your source RTL and code. You

More information

Polycom CMA System Upgrade Guide

Polycom CMA System Upgrade Guide Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or

More information

WHAT ELSE CAN YOUR HOME PHONE DO?

WHAT ELSE CAN YOUR HOME PHONE DO? visit a Telstra store 13 2200 telstra.com/home-phone WHAT ELSE CAN YOUR HOME PHONE DO? Everything you need to know about the features that make your home phone more helpful, flexible and useful C020 FEB16

More information

Project management integrated into Outlook

Project management integrated into Outlook y Project management integrated into Outlook InLoox PM 7.x Help for the configuration for MySQL-Server An InLoox Whitepaper Published: October 2011 Copyright: InLoox GmbH 2011 You find up-to-date information

More information

Introduction to CloudScript

Introduction to CloudScript Introduction to CloudScript A NephoScale Whitepaper Authors: Nick Peterson, Alan Meadows Date: 2012-07-06 CloudScript is a build language for the cloud. It is a simple Domain Specific Language (DSL) that

More information

Desktop Reference Guide

Desktop Reference Guide Desktop Reference Guide 1 Copyright 2005 2009 IPitomy Communications, LLC www.ipitomy.com IP550 Telephone Using Your Telephone Your new telephone is a state of the art IP Telephone instrument. It is manufactured

More information

MFCF Grad Session 2015

MFCF Grad Session 2015 MFCF Grad Session 2015 Agenda Introduction Help Centre and requests Dept. Grad reps Linux clusters using R with MPI Remote applications Future computing direction Technical question and answer period MFCF

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM

Testing New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem

More information

Sync IT. Detailed description of program. Tab: Sync

Sync IT. Detailed description of program. Tab: Sync Sync IT Sync IT is used to automatically synchronize folders between different computers and to make backups of folders. The synchronization is done with already existing networks, like the Internet. You

More information

Log files management. Katarzyna KAPUSTA

Log files management. Katarzyna KAPUSTA Log files management Katarzyna KAPUSTA CERN openlab 07 September 2012 CERN openlab otn-2012-01 openlab Summer Student Report Log files management Katarzyna KAPUSTA Giacomo TENAGLIA 07 September 2012 Version

More information

Scheduling in SAS 9.3

Scheduling in SAS 9.3 Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3

More information

Unbreakable Linux Network An Overview

Unbreakable Linux Network An Overview An Oracle White Paper September 2011 Unbreakable Linux Network An Overview Introduction... 1 The Update Agent (yum)... 2 Channels Descriptions and Usage... 2 Switching from Red Hat Network (RHN) to ULN...

More information

Oracle Database Creation for Perceptive Process Design & Enterprise

Oracle Database Creation for Perceptive Process Design & Enterprise Oracle Database Creation for Perceptive Process Design & Enterprise 2013 Lexmark International Technology S.A. Date: 4/9/2013 Version: 3.0 Perceptive Software is a trademark of Lexmark International Technology

More information

visionapp Remote Desktop 2010 (vrd 2010)

visionapp Remote Desktop 2010 (vrd 2010) visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Association of System Performance Professionals The Computer Measurement Group, commonly called CMG, is a not for profit, worldwide organization of data processing professionals committed to the measurement

More information

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components

More information

Pen Test Tips 2. Shell vs. Terminal

Pen Test Tips 2. Shell vs. Terminal Pen Test Tips 2 Shell vs. Terminal Once you have successfully exploited a target machine you may be faced with a common dilemma that many penetration testers have, do I have shell access or terminal access?

More information

View CPU, Memory, Disk, and Network Usage in Activity Monitor.

View CPU, Memory, Disk, and Network Usage in Activity Monitor. Identify and quit applications that have become nonresponsive. Identify support options customized for your Mac. View CPU, Memory, Disk, and Network Usage in Activity Monitor. 98_9780789753939_ch5online.indd

More information

Huawei OceanStor Backup Software Technical White Paper for NetBackup

Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

Beginners Shell Scripting for Batch Jobs

Beginners Shell Scripting for Batch Jobs Beginners Shell Scripting for Batch Jobs Evan Bollig and Geoffrey Womeldorff Before we begin... Everyone please visit this page for example scripts and grab a crib sheet from the front http://www.scs.fsu.edu/~bollig/techseries

More information

Architecture and Mode of Operation

Architecture and Mode of Operation Open Source Scheduler Architecture and Mode of Operation http://jobscheduler.sourceforge.net Contents Components Platforms & Databases Architecture Configuration Deployment Distributed Processing Security

More information

Performance Optimization Guide

Performance Optimization Guide Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.

More information

SFTP SHELL SCRIPT USER GUIDE

SFTP SHELL SCRIPT USER GUIDE SFTP SHELL SCRIPT USER GUIDE FCA US INFORMATION & COMMUNICATION TECHNOLOGY MANAGEMENT Overview The EBMX SFTP shell scripts provide a parameter driven workflow to place les on the EBMX servers and queue

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book

More information

Configuring MailArchiva with Insight Server

Configuring MailArchiva with Insight Server Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any

More information

Installation and User Guide

Installation and User Guide Installation and User Guide Confio IgniteVM Copyright 2013 Confio Corporation. All rights reserved. The programs (which include both the software and documentation) contain proprietary information of

More information

Continuous Integration for Snabb Switch

Continuous Integration for Snabb Switch Continuous Integration for Snabb Switch Max Rottenkolber Monday, 30 November 2015 For over year now, I have been working on Snabb Switch (https:/ /github.com/snabbco/snabbswitch), an open source

More information

Bash shell programming Part II Control statements

Bash shell programming Part II Control statements Bash shell programming Part II Control statements Deniz Savas and Michael Griffiths 2005-2011 Corporate Information and Computing Services The University of Sheffield Email M.Griffiths@sheffield.ac.uk

More information

Unix Scripts and Job Scheduling

Unix Scripts and Job Scheduling Unix Scripts and Job Scheduling Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview Shell Scripts

More information

DVR GUIDE. Using your DVR/Multi-Room DVR. 1-866-WAVE-123 wavebroadband.com

DVR GUIDE. Using your DVR/Multi-Room DVR. 1-866-WAVE-123 wavebroadband.com DVR GUIDE Using your DVR/Multi-Room DVR 1-866-WAVE-123 wavebroadband.com Table of Contents Control Live TV... 4 Playback Controls... 5 Remote Control Arrow Buttons... 5 Status Bar... 5 Pause... 6 Rewind...

More information

Programming for GCSE Topic H: Operating Systems

Programming for GCSE Topic H: Operating Systems Programming for GCSE Topic H: Operating Systems William Marsh School of Electronic Engineering and Computer Science Queen Mary University of London Aims Introduce Operating Systems Core concepts Processes

More information

Novell ZENworks 10 Configuration Management SP3

Novell ZENworks 10 Configuration Management SP3 AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties

More information

CloudVPS Backup Manual. CloudVPS Backup Manual

CloudVPS Backup Manual. CloudVPS Backup Manual 1 Index Cover Index Preface Software requirements Installation of the backupscript (easy) Installation of the backupscript (advanced) Configuration editor Uninstall the backupscript Show quota usage Quota

More information

Lecture 4: Writing shell scripts

Lecture 4: Writing shell scripts Handout 5 06/03/03 1 Your rst shell script Lecture 4: Writing shell scripts Shell scripts are nothing other than les that contain shell commands that are run when you type the le at the command line. That

More information

File Transfer Examples. Running commands on other computers and transferring files between computers

File Transfer Examples. Running commands on other computers and transferring files between computers Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you

More information

Voice Mail User Guide

Voice Mail User Guide Voice Mail User Guide ROR Xplus100 Flash Voice Mail Mailbox Owner s Guide Record of Revisions Record of Revisions Catalogue Number Release Date Supercedes Comments Initial Release October, 2007 Flash Voice

More information

SAS 9.4 In-Database Products

SAS 9.4 In-Database Products SAS 9.4 In-Database Products Administrator s Guide Fifth Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 In-Database Products:

More information

File Transfer Protocols In Anzio

File Transfer Protocols In Anzio The New File Transfer Protocols in Anzio version 12.6 What s New in Version 12.6 With the release of Anzio Lite and AnzioWin version 12.6 we are introducing a new user interface and support for additional

More information

Automated Inventory System

Automated Inventory System Automated Inventory System User Manual Developed by USDA Food and Nutrition Service June 2009 (Incomplete) Table of Contents Welcome Menu Client Services Report System Inventory System Operations Tailgate

More information

Configuring an OpenNMS Stand-by Server

Configuring an OpenNMS Stand-by Server WHITE PAPER Conguring an OpenNMS Stand-by Server Version 1.2 The OpenNMS Group, Inc. 220 Chatham Business Drive Pittsboro, NC 27312 T +1 (919) 533-0160 F +1 (503) 961-7746 david@opennms.com URL: http://blogs.opennms.org/david

More information

Table of Contents. Troubleshooting Guide... 24 Call Answer Quick Reference Chart... 28 Contacting Us... 29

Table of Contents. Troubleshooting Guide... 24 Call Answer Quick Reference Chart... 28 Contacting Us... 29 Table of Contents Introduction................................ Welcome to MTS Call Answer.................... Call Answer Features at a Glance................ 4 Basic Features.................................

More information

Upgrading to advanced editions of Acronis Backup & Recovery 10. Technical white paper

Upgrading to advanced editions of Acronis Backup & Recovery 10. Technical white paper Upgrading to advanced editions of Acronis Backup & Recovery 10 Technical white paper Table of contents 1 Introduction...3 2 Choosing the way to upgrade...3 2.1 Gradual upgrade... 3 2.2 Importing backup

More information

Equalizer VLB Beta I. Copyright 2008 Equalizer VLB Beta I 1 Coyote Point Systems Inc.

Equalizer VLB Beta I. Copyright 2008 Equalizer VLB Beta I 1 Coyote Point Systems Inc. Equalizer VLB Beta I Please read these instructions completely before you install and configure Equalizer VLB. After installation, see the Help menu for Release Notes and the Installation and Administration

More information

UPS SNMP Watch User manual

UPS SNMP Watch User manual Version: 2010-12-15 UPS SNMP Watch User manual Copyright Statement for Intellectual Property and Confidential Information The information contained in this manual is non-conditional and may be changed

More information

CASHNet Secure File Transfer Instructions

CASHNet Secure File Transfer Instructions CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are

More information

Microsoft IT Deploys and Manages Office 365 ProPlus

Microsoft IT Deploys and Manages Office 365 ProPlus Microsoft IT Deploys and Manages Office 365 ProPlus Technical White Paper Published: June 2013 The following content may no longer reflect Microsoft s current position or infrastructure. This content should

More information

Emerald ICE Digital Key Telephone System

Emerald ICE Digital Key Telephone System This manual is provided to you by ElectSys; a certified dealer that installs and supports Tadiran systems. Call us at 717-665-2141 or visit www.electsys.biz TM Emerald ICE Digital Key Telephone System

More information

ESET REMOTE ADMINISTRATOR. Migration guide

ESET REMOTE ADMINISTRATOR. Migration guide ESET REMOTE ADMINISTRATOR Migration guide ESET REMOTE ADMINISTRATOR migration guide Copyright 2012 by ESET, spol. s r.o. ESET REMOTE ADMINISTRATOR was developed by ESET, spol. s r.o. For more information

More information

integration tools setup guide SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop

integration tools setup guide SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop setup guide integration tools SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop 2010 Meyer Sound. All rights reserved. SIM 3 Remote Setup Guide,

More information

Lesson Objectives. To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization

Lesson Objectives. To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization Lesson Objectives To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization AE3B33OSD Lesson 1 / Page 2 What is an Operating System? A

More information

How to Avoid Learning Expect or Automating Automating Interactive Programs

How to Avoid Learning Expect or Automating Automating Interactive Programs How to Avoid Learning Expect or Automating Automating Interactive Programs Don Libes National Institute of Standards and Technology Abstract: Expect is a tool for automating interactive programs. Expect

More information

How to Use SNMP in Network Problem Resolution

How to Use SNMP in Network Problem Resolution The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...

More information

How do I load balance FTP on NetScaler?

How do I load balance FTP on NetScaler? How do I load balance FTP on NetScaler? Introduction: File transfer protocol is a standard for the exchange of files across a network. It is based on a client/server model with an FTP client on a user

More information

SafeGuard Easy upgrade guide. Product version: 7

SafeGuard Easy upgrade guide. Product version: 7 SafeGuard Easy upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1 Upgrade

More information

Unix Shell Scripts. Contents. 1 Introduction. Norman Matloff. July 30, 2008. 1 Introduction 1. 2 Invoking Shell Scripts 2

Unix Shell Scripts. Contents. 1 Introduction. Norman Matloff. July 30, 2008. 1 Introduction 1. 2 Invoking Shell Scripts 2 Unix Shell Scripts Norman Matloff July 30, 2008 Contents 1 Introduction 1 2 Invoking Shell Scripts 2 2.1 Direct Interpretation....................................... 2 2.2 Indirect Interpretation......................................

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

USB Floppy USB Floppy Disk Emulator

USB Floppy USB Floppy Disk Emulator USB Floppy USB Floppy Disk Emulator Manual ipcas GmbH Phone: +49 (0)9131/ 7677-0 Gundstraße 15 Fax: +49 (0)9131/ 7677-78 D-91056 Erlangen Internet: http://www.ipcas.de Germany Email: info@ipcas.de Contents

More information

Managing Linux Servers with System Center 2012 R2

Managing Linux Servers with System Center 2012 R2 Managing Linux Servers with System Center 2012 R2 System Center 2012 R2 Hands-on lab In this lab, you will use System Center 2012 R2 Operations Manager and System Center 2012 R2 Configuration Manager to

More information

System Migrations Without Business Downtime. An Executive Overview

System Migrations Without Business Downtime. An Executive Overview System Migrations Without Business Downtime An Executive Overview Businesses grow. Technologies evolve. System migrations may be inevitable, but business downtime isn t. All businesses strive for growth.

More information

Install guide for Websphere 7.0

Install guide for Websphere 7.0 DOCUMENTATION Install guide for Websphere 7.0 Jahia EE v6.6.1.0 Jahia s next-generation, open source CMS stems from a widely acknowledged vision of enterprise application convergence web, document, search,

More information

EMERGENCY DISK RESTORE OPTION (AO-70185 REV EA) OPTION EDR

EMERGENCY DISK RESTORE OPTION (AO-70185 REV EA) OPTION EDR EMERGENCY DISK RESTORE OPTION (AO-70185 REV EA) OPTION EDR BURNY SERIES 10 OPTION: EMERGENCY DISK RESTORE AO-70185 REV EA Table Of Contents 1 EMERGENCY DISK RESTORE... 3 1.1 INTRODUCTION...3 1.2 OBTAIN

More information

Chapter 6, The Operating System Machine Level

Chapter 6, The Operating System Machine Level Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General

More information

Shared File Room Field Guide. Version 5.5

Shared File Room Field Guide. Version 5.5 Shared File Room Field Guide Version 5.5 Summer 2008 Copyright: 2008, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means

More information

- An Essential Building Block for Stable and Reliable Compute Clusters

- An Essential Building Block for Stable and Reliable Compute Clusters Ferdinand Geier ParTec Cluster Competence Center GmbH, V. 1.4, March 2005 Cluster Middleware - An Essential Building Block for Stable and Reliable Compute Clusters Contents: Compute Clusters a Real Alternative

More information

Agent vs. Agent-less auditing

Agent vs. Agent-less auditing Centennial Discovery Agent vs. Agent-less auditing Building fast, efficient & dynamic audits As network discovery solutions have evolved over recent years, two distinct approaches have emerged: using client-based

More information

WANPIPE TM. Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L. Author: Nenad Corbic/Alex Feldman

WANPIPE TM. Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L. Author: Nenad Corbic/Alex Feldman WANPIPE TM Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L Author: Nenad Corbic/Alex Feldman Copyright (c) 1995-2002 Sangoma Technologies Inc. Introduction WANPIPE from Sangoma Technologies Inc.

More information

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.

More information

Extending Remote Desktop for Large Installations. Distributed Package Installs

Extending Remote Desktop for Large Installations. Distributed Package Installs Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,

More information

RemoteWare Software Manager

RemoteWare Software Manager RemoteWare Software Manager Client User s Guide Version 2.0 RemoteWare Software Manager Client User s Guide Version 2.0 This document was prepared to assist licensed users of RemoteWare by XcelleNet, Inc.;

More information

Zend Platform TM. White Paper: Zend Download Server. By Zend Technologies, Inc. May 2007. 2007 Zend Technologies, Inc. All rights reserved.

Zend Platform TM. White Paper: Zend Download Server. By Zend Technologies, Inc. May 2007. 2007 Zend Technologies, Inc. All rights reserved. White Paper: Zend Download Server By Zend Technologies, Inc. May 2007 2007 Zend Technologies, Inc. All rights reserved. Introduction You are running a successful web site. You have probably found yourself

More information

Secure Shell Demon setup under Windows XP / Windows Server 2003

Secure Shell Demon setup under Windows XP / Windows Server 2003 Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}

More information

Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS

Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS Lab Manual Expediting WSUS Service for XP Embedded OS Summary In this lab, you will learn how to deploy the security update to your XP Pro or XP embedded images. You will also learn how to prepare the

More information

Shared File Room Field Guide

Shared File Room Field Guide Shared File Room Field Guide September 2013 Copyright: 2013, CCH, a part of Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form or

More information

Studio Visual Steps. Windows Defender. For Windows XP, Vista and 7

Studio Visual Steps. Windows Defender. For Windows XP, Vista and 7 Studio Visual Steps Windows Defender For Windows XP, Vista and 7 This guide has been written using the Visual Steps method. Copyright 2011 by Visual Steps B.V. Second edition: October 2011 All rights reserved.

More information

Zend Server Amazon AMI Quick Start Guide

Zend Server Amazon AMI Quick Start Guide Zend Server Amazon AMI Quick Start Guide By Zend Technologies www.zend.com Disclaimer This is the Quick Start Guide for The Zend Server Zend Server Amazon Machine Image The information in this document

More information

Chapter 46 Terminal Server

Chapter 46 Terminal Server Chapter 46 Terminal Server Introduction... 46-2 TTY Devices... 46-2 Multiple Sessions... 46-4 Accessing Telnet Hosts... 46-5 Command Reference... 46-7 connect... 46-7 disable telnet server... 46-7 disconnect...

More information

Cloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels.

Cloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels. Parallels Cloud Server White Paper An Introduction to Operating System Virtualization and Parallels Cloud Server www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating

More information

File Protection Using Rsync User Guide

File Protection Using Rsync User Guide File Protection Using Rsync User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July

More information

Introduction to AutoMate 6

Introduction to AutoMate 6 Introduction to AutoMate 6 White Paper Published: February 2005 For the latest information, please see http://www.networkautomation.com/automate/. REVISION 3 (updated 5/11/2005) Abstract Businesses today

More information

Side-by-side Migration Guide for Snare Server v7

Side-by-side Migration Guide for Snare Server v7 Side-by-side Migration Guide for Snare Server v7 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for

More information

Using the AVR microcontroller based web server

Using the AVR microcontroller based web server 1 of 7 http://tuxgraphics.org/electronics Using the AVR microcontroller based web server Abstract: There are two related articles which describe how to build the AVR web server discussed here: 1. 2. An

More information

Network DK2 DESkey Installation Guide

Network DK2 DESkey Installation Guide VenturiOne Getting Started Network DK2 DESkey Installation Guide PD-056-306 DESkey Network Server Manual Applied Cytometry CONTENTS 1 DK2 Network Server Overview... 2 2 DK2 Network Server Installation...

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

BASH Scripting. A bash script may consist of nothing but a series of command lines, e.g. The following helloworld.sh script simply does an echo.

BASH Scripting. A bash script may consist of nothing but a series of command lines, e.g. The following helloworld.sh script simply does an echo. BASH Scripting bash is great for simple scripts that automate things you would otherwise by typing on the command line. Your command line skills will carry over to bash scripting and vice versa. bash comments

More information

Distributed Data Management

Distributed Data Management Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

More information