BICsuite!focus Process Flow Control With Shell Scripts No Thanks!
|
|
- Kristopher Newton
- 7 years ago
- Views:
Transcription
1 independit Integrative Technologies GmbH Bergstraße 6 D Schrobenhausen BICsuite!focus Process Flow Control With Shell Scripts No Thanks! Dieter Stubler Ronald Jeninga July 30, 2013
2 Copyright 2013 independit GmbH This work is copyright protected Legal notice Copyright 2013 independit Integrative Technologies GmbH All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronically or mechanically, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner.
3 Process flow control with Shell Scripts - No Thanks! Preliminary remark As the title already implies, this document is a critical examination of the use of the UNIX shell (sh, ksh, bash,...) in the context of process flow control. The occurring and the problems described within this document are of conceptual nature and also apply to the use of other scripting languages (perl, python,...). In no way is it our intention to criticize these languages as a whole. Each of the named languages has its advantages and the author has developed many successful projects with the use of such languages within his career. Process flow control Within every IT department there exist tasks which must be fullled by executing several single processes. Such program flows consist of a few up to several hundred processes. In order to execute such process flows, it must be ascertained that every single process is executed coordinated, synchronized and in the right order. For this a process flow control is needed. In practice UNIX shell or other script languages are used for implementing such tasks. In the beginning everything is easy In the starting phase of a project everything is always quite simple. The number of processes is low, they are of low complexity, the amounts of data are easy manageable and flow control isn t (yet) an issue. With a few lines of shell script about every process is managed, fast, pragmatic and affordable. Exactly this circumstance hides a great risk. As these solutions will bind considerable development resources because of increasing complexity and increased requirements regarding performance and reliability, they will make a reliable and stable operation in the medium-term at reasonable costs impossible. From the management point of view it is disastrous that in the beginning the costs for process flow control and monitoring are so low that they aren t budgeted separately. The continuous and sneaky increase of costs will be invisible for the management for a long time (idle power!). At the time this issue is recognized as a problem, there have been spent enormous amounts for the development of control scripts and the required supporting functions and frameworks. In order to protect this investment and because of the fear for a migration of these process flow control systems to a suitable scheduling system, it is often tried to stick to this mode of operation. The costs will rise further and an increasing amount of employee resources will be bound. Turning away from this inefcient mode of operation will be increasingly expensive. 1
4 In this document we want to sensitise for this kind of problems and reveal that the use of a suitable scheduling system at an early stage will prevent the occurrence of this dilemma and at the same time reduces costs and frees resources for solving the real tasks. A simple example We d like to exemplary present the development of a simple process flow by means of an easy example. We assume that for a simple processing two programs (P1 and P2) have to be executed in succession. This can be implemented by following shell script: #!/bin/sh P1 P2 This is really simple, isn t it? Error handling Errors aren t handled in the above script. In order to prevent P2 processing the wrong data it must be prevented that P2 starts when P1 reports an error. After this has been a recurrent annoyance, we ll have to program some error handling into the script. It will look something like: #!/bin/sh P1 RET=$? if [ $RET -ne 0 ] echo "Fehler $RET in P1!" exit $RET P2 RET=$? if [ $RET -ne 0 ] echo "Fehler $RET in P2!" exit $RET As we can see quite a few lines of code were added. These lines of code need to be tested because a non processed error can have fatal consequences. This kind of error handling will be differently implemented by different developers. The comprehensibility and maintainability decrease and the costs increase. 2
5 Restart In our example P1 has a running time of about three hours and P2 often returns an error because of a resource shortage in temporary storage. Restarting the script would also superfluously execute P1 again, which results in a time to repair of three hours. In many environments some developer would copy the script, comment out the call of P1 and start the copy of this script. This produces a lot of work and holds a high risk of error. Because this isn t an acceptable situation, the script needs some global memory and looks approximately like this: #!/bin/sh # # STEP denotes the last step which has been successfully executed # STEP= cat steple if [ $STEP -eq "0" ] P1 RET=$? if [ $RET -ne 0 ] echo "Fehler $RET in P1!" exit $RET echo "1" > steple if [ $STEP -eq "1" ] P2 RET=$? if [ $RET -ne 0 ] echo "Fehler $RET in P2!" exit $RET echo "2" > steple echo "0" > steple This seems a fast solution which the developer might decide to implement. But this solution isn t in fact a solution at all and holds many problems. The steple has to be initialized before the rst execution and might have to be initialized after the script aborted. Error handling for reading and writing of the steple is entirely missing. Besides that, it is impossible to run two instances of this script concurrently. In order to make this script business proof, a lot of development effort has to be invested. From now on we will forbear from giving more code examples for our mini project because it will easily evolve to a script with several hundred lines of code. And of course, we want to save us this development effort. 3
6 What else? The example above only showed the rst few simple problems of process flow control by scripting. In order to assure a stable and unobstructed operation, among others at least the following functions have to be available: Monitoring and operator action Transfer of control information Possibility of parallel execution Distributed execution Resource control The implementation of the mentioned and other functions into the process control system requires a substantial amount of development and maintenance effort. But if these functions are missing, it will be paid by (largely) increased costs for operation. Monitoring and operator action In order to guarantee a stable operation it has to be possible to monitor all processes. This means that all processes must journalise their progress ( steple in our example). These protocols must be gathered and processed to get an overview of the currently running processes. This requires some repository which stores status information about running processes. To enable a fast error reaction it is necessary to be notied in case of an error. The needed notication system has to be developed and this alone represents a small project which can easily cost two-digit man-days. In case of problems or errors the operator must be able to intervene into running process flows. He must be able to restart, suspend, resume, cancel, skip, etc. processes or entire process flows. This has to be reasonably convenient which also implies a substantial amount of development effort. Transfer of control information It is often necessary to transfer information (timestamps, lenames,...) from one process to some following process. In a script based flow control this is typically implemented with the help of les which are written from one process and read by its successor. This solution again holds a lot of disadvantages. At the latest when one of the involved processes has to be executed at some other machine on the network, quite a lot of development effort has to be spent to implement the transfer of information. 4
7 Possibility of parallel execution The script development obtains an entire new dimension if parts of a process flow can be executed in parallel. Processes must be started as background processes and at certain spots within the process flow waiting for the termination of those parallel running processes has to be implemented. This requires a high technical skill of the developer and is together with error handling, restart, monitoring and operating truly not a trivial task. Distributed execution When some parts of a process flow have to be executed on different computers, the scripts controlling the process will have to start processes on remote computers. This adds another layer of complexity because the pitfalls of remote commands (ssh, rsh, scp,...) regarding monitoring and error recognition have to be circumvented. We re not even talking about potential security risks, e.g. because of storing passwords somewhere, here. Resource control The available systems resources are always limited. Are there at any time too many resources required, it will lead to reduced throughput and accumulated errors because of resource shortage. Therefore it is important to only start new processes when sufcient resources are available. To implement this with reasonable effort in a script based process control is hardly possible. So far we have only highlighted some of the most important aspects of flow control as well as the resulting efforts when using some scripting solution. Without the use of an appropriate scheduling system signicant costs will be generated during operations. Attempting to control these costs by improving the scripting infrastructure means that a huge development and inherent maintenance effort has to be invested. BICsuite as an alternative and escape independit offers with its BICsuite Scheduling system an alternative and an escape from the script trap. The BICsuite Scheduling system offers all required functions to model huge and complex process flows without the need to implement any parts of the flow control within the subprocesses themselves. The effort for development, maintenance and operations will be drastically reduced by the use of the BICsuite Scheduling system. Additionally the operations will get stabler, less error-prone and securer. Recovery times can be noticeably shortened. 5
8 Concluding remark The script based process flow control requires unreasonable high efforts in development, maintenance and operations. An optimal, transparent and efcient operation is an unreachable goal when using a script based flow control. We therefore recommend the use of an appropriate scheduling system at an very early stage. The earlier a migration to such a system is done, the less investment is lost and the smaller the migration efforts are. If you are currently using scripting for process flow control, a prompt switch to the use of a scheduling system is highly recommendable. The independit BICsuite Scheduling system offers all functions for development, monitoring and operations of complex process flows and minimizes the costs for development and maintenance thereof. At a fraction of the costs of a scripting solution the BICsuite Scheduling system supports the development and operation of a permanently stable and reliable IT system. Act now! 6
schedulix!focus The independit schedulix Scheduling System in Data Warehouse Environments
independit Integrative Technologies GmbH Bergstraße 6 D 86529 Schrobenhausen schedulix!focus The independit schedulix Scheduling System in Data Warehouse Environments Dieter Stubler Ronald Jeninga July
More informationBICsuite!focus What does a scheduling System do?
independit Integrative Technologies GmbH Bergstraße 6 D 86529 Schrobenhausen BICsuite!focus What does a scheduling System do? Dieter Stubler Ronald Jeninga April 2, 2014 Copyright 2014 independit GmbH
More informationDecision Support System to MODEM communications
Decision Support System to MODEM communications Guy Van Sanden gvsanden@sckcen.be Decision Support System to MODEM communications by Guy Van Sanden This document describes how to set up the dss2modem communications
More informationScheduling in SAS 9.4 Second Edition
Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute
More informationCSE 120 Principles of Operating Systems. Modules, Interfaces, Structure
CSE 120 Principles of Operating Systems Fall 2000 Lecture 3: Operating System Modules, Interfaces, and Structure Geoffrey M. Voelker Modules, Interfaces, Structure We roughly defined an OS as the layer
More informationUsing sftp in Informatica PowerCenter
Using sftp in Informatica PowerCenter Applies to: Informatica PowerCenter Summary This article briefs about how to push/pull files using SFTP program in Informatica PowerCenter. Author Bio Author(s): Sukumar
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book
More informationPragmatic Version Control
Extracted from: Pragmatic Version Control using Subversion, 2nd Edition This PDF file contains pages extracted from Pragmatic Version Control, one of the Pragmatic Starter Kit series of books for project
More informationSophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
More informationNagios in High Availability Environments
Nagios in High Availability Environments Introduction Nagios is a versatile and functional network management tool with a GUI (graphic user interface) comparable to other commercial tools. It s free software,
More informationReview from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture
Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2
More informationUsing SVN to Manage Source RTL
Using SVN to Manage Source RTL CS250 Tutorial 1 (Version 083010a) August 30, 2010 Yunsup Lee In this tutorial you will gain experience using the Subversion (SVN) to manage your source RTL and code. You
More informationPolycom CMA System Upgrade Guide
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
More informationWHAT ELSE CAN YOUR HOME PHONE DO?
visit a Telstra store 13 2200 telstra.com/home-phone WHAT ELSE CAN YOUR HOME PHONE DO? Everything you need to know about the features that make your home phone more helpful, flexible and useful C020 FEB16
More informationProject management integrated into Outlook
y Project management integrated into Outlook InLoox PM 7.x Help for the configuration for MySQL-Server An InLoox Whitepaper Published: October 2011 Copyright: InLoox GmbH 2011 You find up-to-date information
More informationIntroduction to CloudScript
Introduction to CloudScript A NephoScale Whitepaper Authors: Nick Peterson, Alan Meadows Date: 2012-07-06 CloudScript is a build language for the cloud. It is a simple Domain Specific Language (DSL) that
More informationDesktop Reference Guide
Desktop Reference Guide 1 Copyright 2005 2009 IPitomy Communications, LLC www.ipitomy.com IP550 Telephone Using Your Telephone Your new telephone is a state of the art IP Telephone instrument. It is manufactured
More informationMFCF Grad Session 2015
MFCF Grad Session 2015 Agenda Introduction Help Centre and requests Dept. Grad reps Linux clusters using R with MPI Remote applications Future computing direction Technical question and answer period MFCF
More informationCHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
More informationTesting New Applications In The DMZ Using VMware ESX. Ivan Dell Era Software Engineer IBM
Testing New Applications In The DMZ Using VMware ESX Ivan Dell Era Software Engineer IBM Agenda Problem definition Traditional solution The solution with VMware VI Remote control through the firewall Problem
More informationSync IT. Detailed description of program. Tab: Sync
Sync IT Sync IT is used to automatically synchronize folders between different computers and to make backups of folders. The synchronization is done with already existing networks, like the Internet. You
More informationLog files management. Katarzyna KAPUSTA
Log files management Katarzyna KAPUSTA CERN openlab 07 September 2012 CERN openlab otn-2012-01 openlab Summer Student Report Log files management Katarzyna KAPUSTA Giacomo TENAGLIA 07 September 2012 Version
More informationScheduling in SAS 9.3
Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3
More informationUnbreakable Linux Network An Overview
An Oracle White Paper September 2011 Unbreakable Linux Network An Overview Introduction... 1 The Update Agent (yum)... 2 Channels Descriptions and Usage... 2 Switching from Red Hat Network (RHN) to ULN...
More informationOracle Database Creation for Perceptive Process Design & Enterprise
Oracle Database Creation for Perceptive Process Design & Enterprise 2013 Lexmark International Technology S.A. Date: 4/9/2013 Version: 3.0 Perceptive Software is a trademark of Lexmark International Technology
More informationvisionapp Remote Desktop 2010 (vrd 2010)
visionapp Remote Desktop 2010 (vrd 2010) Convenient System Management P roduct Information www.vrd2010.com Inhalt 1 Introduction... 1 2 Overview of Administration Tools... 1 2.1 RDP Administration Tools...
More informationThe Association of System Performance Professionals
The Association of System Performance Professionals The Computer Measurement Group, commonly called CMG, is a not for profit, worldwide organization of data processing professionals committed to the measurement
More informationChapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
More informationPen Test Tips 2. Shell vs. Terminal
Pen Test Tips 2 Shell vs. Terminal Once you have successfully exploited a target machine you may be faced with a common dilemma that many penetration testers have, do I have shell access or terminal access?
More informationView CPU, Memory, Disk, and Network Usage in Activity Monitor.
Identify and quit applications that have become nonresponsive. Identify support options customized for your Mac. View CPU, Memory, Disk, and Network Usage in Activity Monitor. 98_9780789753939_ch5online.indd
More informationHuawei OceanStor Backup Software Technical White Paper for NetBackup
Huawei OceanStor Backup Software Technical White Paper for NetBackup Huawei Page 1 of 14 Copyright Huawei. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationBeginners Shell Scripting for Batch Jobs
Beginners Shell Scripting for Batch Jobs Evan Bollig and Geoffrey Womeldorff Before we begin... Everyone please visit this page for example scripts and grab a crib sheet from the front http://www.scs.fsu.edu/~bollig/techseries
More informationArchitecture and Mode of Operation
Open Source Scheduler Architecture and Mode of Operation http://jobscheduler.sourceforge.net Contents Components Platforms & Databases Architecture Configuration Deployment Distributed Processing Security
More informationPerformance Optimization Guide
Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.
More informationSFTP SHELL SCRIPT USER GUIDE
SFTP SHELL SCRIPT USER GUIDE FCA US INFORMATION & COMMUNICATION TECHNOLOGY MANAGEMENT Overview The EBMX SFTP shell scripts provide a parameter driven workflow to place les on the EBMX servers and queue
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010/2013 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2010/2013 Users The software described in this book
More informationConfiguring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
More informationInstallation and User Guide
Installation and User Guide Confio IgniteVM Copyright 2013 Confio Corporation. All rights reserved. The programs (which include both the software and documentation) contain proprietary information of
More informationContinuous Integration for Snabb Switch
Continuous Integration for Snabb Switch Max Rottenkolber Monday, 30 November 2015 For over year now, I have been working on Snabb Switch (https:/ /github.com/snabbco/snabbswitch), an open source
More informationBash shell programming Part II Control statements
Bash shell programming Part II Control statements Deniz Savas and Michael Griffiths 2005-2011 Corporate Information and Computing Services The University of Sheffield Email M.Griffiths@sheffield.ac.uk
More informationUnix Scripts and Job Scheduling
Unix Scripts and Job Scheduling Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview Shell Scripts
More informationDVR GUIDE. Using your DVR/Multi-Room DVR. 1-866-WAVE-123 wavebroadband.com
DVR GUIDE Using your DVR/Multi-Room DVR 1-866-WAVE-123 wavebroadband.com Table of Contents Control Live TV... 4 Playback Controls... 5 Remote Control Arrow Buttons... 5 Status Bar... 5 Pause... 6 Rewind...
More informationProgramming for GCSE Topic H: Operating Systems
Programming for GCSE Topic H: Operating Systems William Marsh School of Electronic Engineering and Computer Science Queen Mary University of London Aims Introduce Operating Systems Core concepts Processes
More informationNovell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
More informationCloudVPS Backup Manual. CloudVPS Backup Manual
1 Index Cover Index Preface Software requirements Installation of the backupscript (easy) Installation of the backupscript (advanced) Configuration editor Uninstall the backupscript Show quota usage Quota
More informationLecture 4: Writing shell scripts
Handout 5 06/03/03 1 Your rst shell script Lecture 4: Writing shell scripts Shell scripts are nothing other than les that contain shell commands that are run when you type the le at the command line. That
More informationFile Transfer Examples. Running commands on other computers and transferring files between computers
Running commands on other computers and transferring files between computers 1 1 Remote Login Login to remote computer and run programs on that computer Once logged in to remote computer, everything you
More informationVoice Mail User Guide
Voice Mail User Guide ROR Xplus100 Flash Voice Mail Mailbox Owner s Guide Record of Revisions Record of Revisions Catalogue Number Release Date Supercedes Comments Initial Release October, 2007 Flash Voice
More informationSAS 9.4 In-Database Products
SAS 9.4 In-Database Products Administrator s Guide Fifth Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 In-Database Products:
More informationFile Transfer Protocols In Anzio
The New File Transfer Protocols in Anzio version 12.6 What s New in Version 12.6 With the release of Anzio Lite and AnzioWin version 12.6 we are introducing a new user interface and support for additional
More informationAutomated Inventory System
Automated Inventory System User Manual Developed by USDA Food and Nutrition Service June 2009 (Incomplete) Table of Contents Welcome Menu Client Services Report System Inventory System Operations Tailgate
More informationConfiguring an OpenNMS Stand-by Server
WHITE PAPER Conguring an OpenNMS Stand-by Server Version 1.2 The OpenNMS Group, Inc. 220 Chatham Business Drive Pittsboro, NC 27312 T +1 (919) 533-0160 F +1 (503) 961-7746 david@opennms.com URL: http://blogs.opennms.org/david
More informationTable of Contents. Troubleshooting Guide... 24 Call Answer Quick Reference Chart... 28 Contacting Us... 29
Table of Contents Introduction................................ Welcome to MTS Call Answer.................... Call Answer Features at a Glance................ 4 Basic Features.................................
More informationUpgrading to advanced editions of Acronis Backup & Recovery 10. Technical white paper
Upgrading to advanced editions of Acronis Backup & Recovery 10 Technical white paper Table of contents 1 Introduction...3 2 Choosing the way to upgrade...3 2.1 Gradual upgrade... 3 2.2 Importing backup
More informationEqualizer VLB Beta I. Copyright 2008 Equalizer VLB Beta I 1 Coyote Point Systems Inc.
Equalizer VLB Beta I Please read these instructions completely before you install and configure Equalizer VLB. After installation, see the Help menu for Release Notes and the Installation and Administration
More informationUPS SNMP Watch User manual
Version: 2010-12-15 UPS SNMP Watch User manual Copyright Statement for Intellectual Property and Confidential Information The information contained in this manual is non-conditional and may be changed
More informationCASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
More informationMicrosoft IT Deploys and Manages Office 365 ProPlus
Microsoft IT Deploys and Manages Office 365 ProPlus Technical White Paper Published: June 2013 The following content may no longer reflect Microsoft s current position or infrastructure. This content should
More informationEmerald ICE Digital Key Telephone System
This manual is provided to you by ElectSys; a certified dealer that installs and supports Tadiran systems. Call us at 717-665-2141 or visit www.electsys.biz TM Emerald ICE Digital Key Telephone System
More informationESET REMOTE ADMINISTRATOR. Migration guide
ESET REMOTE ADMINISTRATOR Migration guide ESET REMOTE ADMINISTRATOR migration guide Copyright 2012 by ESET, spol. s r.o. ESET REMOTE ADMINISTRATOR was developed by ESET, spol. s r.o. For more information
More informationintegration tools setup guide SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop
setup guide integration tools SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop 2010 Meyer Sound. All rights reserved. SIM 3 Remote Setup Guide,
More informationLesson Objectives. To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization
Lesson Objectives To provide a grand tour of the major operating systems components To provide coverage of basic computer system organization AE3B33OSD Lesson 1 / Page 2 What is an Operating System? A
More informationHow to Avoid Learning Expect or Automating Automating Interactive Programs
How to Avoid Learning Expect or Automating Automating Interactive Programs Don Libes National Institute of Standards and Technology Abstract: Expect is a tool for automating interactive programs. Expect
More informationHow to Use SNMP in Network Problem Resolution
The Essentials Series: Solving Network Problems Before They Occur How to Use SNMP in Network Problem Resolution sponsored by KNOW YOUR NETWORK by Greg Shields Ho w to Use SNMP in Network Problem Resolution...
More informationHow do I load balance FTP on NetScaler?
How do I load balance FTP on NetScaler? Introduction: File transfer protocol is a standard for the exchange of files across a network. It is based on a client/server model with an FTP client on a user
More informationSafeGuard Easy upgrade guide. Product version: 7
SafeGuard Easy upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1 Upgrade
More informationUnix Shell Scripts. Contents. 1 Introduction. Norman Matloff. July 30, 2008. 1 Introduction 1. 2 Invoking Shell Scripts 2
Unix Shell Scripts Norman Matloff July 30, 2008 Contents 1 Introduction 1 2 Invoking Shell Scripts 2 2.1 Direct Interpretation....................................... 2 2.2 Indirect Interpretation......................................
More information4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
More informationUSB Floppy USB Floppy Disk Emulator
USB Floppy USB Floppy Disk Emulator Manual ipcas GmbH Phone: +49 (0)9131/ 7677-0 Gundstraße 15 Fax: +49 (0)9131/ 7677-78 D-91056 Erlangen Internet: http://www.ipcas.de Germany Email: info@ipcas.de Contents
More informationManaging Linux Servers with System Center 2012 R2
Managing Linux Servers with System Center 2012 R2 System Center 2012 R2 Hands-on lab In this lab, you will use System Center 2012 R2 Operations Manager and System Center 2012 R2 Configuration Manager to
More informationSystem Migrations Without Business Downtime. An Executive Overview
System Migrations Without Business Downtime An Executive Overview Businesses grow. Technologies evolve. System migrations may be inevitable, but business downtime isn t. All businesses strive for growth.
More informationInstall guide for Websphere 7.0
DOCUMENTATION Install guide for Websphere 7.0 Jahia EE v6.6.1.0 Jahia s next-generation, open source CMS stems from a widely acknowledged vision of enterprise application convergence web, document, search,
More informationEMERGENCY DISK RESTORE OPTION (AO-70185 REV EA) OPTION EDR
EMERGENCY DISK RESTORE OPTION (AO-70185 REV EA) OPTION EDR BURNY SERIES 10 OPTION: EMERGENCY DISK RESTORE AO-70185 REV EA Table Of Contents 1 EMERGENCY DISK RESTORE... 3 1.1 INTRODUCTION...3 1.2 OBTAIN
More informationChapter 6, The Operating System Machine Level
Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General
More informationShared File Room Field Guide. Version 5.5
Shared File Room Field Guide Version 5.5 Summer 2008 Copyright: 2008, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
More informationUsing Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
More information- An Essential Building Block for Stable and Reliable Compute Clusters
Ferdinand Geier ParTec Cluster Competence Center GmbH, V. 1.4, March 2005 Cluster Middleware - An Essential Building Block for Stable and Reliable Compute Clusters Contents: Compute Clusters a Real Alternative
More informationAgent vs. Agent-less auditing
Centennial Discovery Agent vs. Agent-less auditing Building fast, efficient & dynamic audits As network discovery solutions have evolved over recent years, two distinct approaches have emerged: using client-based
More informationWANPIPE TM. Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L. Author: Nenad Corbic/Alex Feldman
WANPIPE TM Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L Author: Nenad Corbic/Alex Feldman Copyright (c) 1995-2002 Sangoma Technologies Inc. Introduction WANPIPE from Sangoma Technologies Inc.
More informationFile Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
More informationExtending Remote Desktop for Large Installations. Distributed Package Installs
Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,
More informationRemoteWare Software Manager
RemoteWare Software Manager Client User s Guide Version 2.0 RemoteWare Software Manager Client User s Guide Version 2.0 This document was prepared to assist licensed users of RemoteWare by XcelleNet, Inc.;
More informationZend Platform TM. White Paper: Zend Download Server. By Zend Technologies, Inc. May 2007. 2007 Zend Technologies, Inc. All rights reserved.
White Paper: Zend Download Server By Zend Technologies, Inc. May 2007 2007 Zend Technologies, Inc. All rights reserved. Introduction You are running a successful web site. You have probably found yourself
More informationSecure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
More informationHands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS
Lab Manual Expediting WSUS Service for XP Embedded OS Summary In this lab, you will learn how to deploy the security update to your XP Pro or XP embedded images. You will also learn how to prepare the
More informationShared File Room Field Guide
Shared File Room Field Guide September 2013 Copyright: 2013, CCH, a part of Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form or
More informationStudio Visual Steps. Windows Defender. For Windows XP, Vista and 7
Studio Visual Steps Windows Defender For Windows XP, Vista and 7 This guide has been written using the Visual Steps method. Copyright 2011 by Visual Steps B.V. Second edition: October 2011 All rights reserved.
More informationZend Server Amazon AMI Quick Start Guide
Zend Server Amazon AMI Quick Start Guide By Zend Technologies www.zend.com Disclaimer This is the Quick Start Guide for The Zend Server Zend Server Amazon Machine Image The information in this document
More informationChapter 46 Terminal Server
Chapter 46 Terminal Server Introduction... 46-2 TTY Devices... 46-2 Multiple Sessions... 46-4 Accessing Telnet Hosts... 46-5 Command Reference... 46-7 connect... 46-7 disable telnet server... 46-7 disconnect...
More informationCloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels.
Parallels Cloud Server White Paper An Introduction to Operating System Virtualization and Parallels Cloud Server www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating
More informationFile Protection Using Rsync User Guide
File Protection Using Rsync User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July
More informationIntroduction to AutoMate 6
Introduction to AutoMate 6 White Paper Published: February 2005 For the latest information, please see http://www.networkautomation.com/automate/. REVISION 3 (updated 5/11/2005) Abstract Businesses today
More informationSide-by-side Migration Guide for Snare Server v7
Side-by-side Migration Guide for Snare Server v7 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for
More informationUsing the AVR microcontroller based web server
1 of 7 http://tuxgraphics.org/electronics Using the AVR microcontroller based web server Abstract: There are two related articles which describe how to build the AVR web server discussed here: 1. 2. An
More informationNetwork DK2 DESkey Installation Guide
VenturiOne Getting Started Network DK2 DESkey Installation Guide PD-056-306 DESkey Network Server Manual Applied Cytometry CONTENTS 1 DK2 Network Server Overview... 2 2 DK2 Network Server Installation...
More informationAvaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
More informationBASH Scripting. A bash script may consist of nothing but a series of command lines, e.g. The following helloworld.sh script simply does an echo.
BASH Scripting bash is great for simple scripts that automate things you would otherwise by typing on the command line. Your command line skills will carry over to bash scripting and vice versa. bash comments
More informationDistributed Data Management
Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that
More information