Secret Debian Internals
|
|
|
- Mervyn Briggs
- 10 years ago
- Views:
Transcription
1 Enrico Zini 25 February 2007
2 BTS Where to find it Source code: bzr branch Data on merkel at /org/bugs.debian.org/spool/ Data rsyncable at merkel.debian.org::bts-spool-db/ Directory structure: / various data files (which I haven t explored) archive/nn archived bugs (nn is last 2 digits of bug no.) db-h/nn active bugs (nn is last 2 digits of bug no.) user/ usertags data Files: *.log all raw bug activity, including the archived messages *.report the mail that opened the bug *.summary some summary bug information *.status obsolete, superseded by summary
3 BTS Other access methods LDAP query ldapsearch -p h bts2ldap.debian.net -x -b \ dc=current,dc=bugs,dc=debian,dc=org \ "(&(debbugssourcepackage=$srcpkg)(debbugsstate=open))" \ debbugsid grep ˆdebbugsID sed s/ˆdebbugsid: // SOAP interface (see ask dondelelcaro for more info)
4 BTS Example code #!/usr/bin/perl -w # Prints the of the sender of the last message for the given bug use Debbugs::Log; use...; my $CACHEDIR =./cache ; my $MERKELPATH = /org/bugs.debian.org/spool/db-h/ ; my $RSYNCPATH = merkel.debian.org::bts-spool-db/ ; my $bug = shift(@argv); die " $bug is not a bug number" if ($bug!~ /^\d+$/); my $log = substr($bug, -2)."/".$bug.".log"; if ( -d $MERKELPATH ) { # We are on merkel $log = $MERKELPATH.$log; } else { # We are elsewhere: rsync the bug log from merkel my $cmd = "rsync -q $RSYNCPATH$log $CACHEDIR/"; system($cmd) and die "Cannot fetch bug log from merkel: $cmd failed with status $?"; $log = "$CACHEDIR/$bug.log"; } my $in = IO::File->new($log); my $reader = Debbugs::Log->new($in); my $lastrec = undef; while (my $rec = $reader->read_record()) { $lastrec = $rec if $rec->{type} eq incoming-recv ; } die "No incoming-recv records found" if not defined $lastrec; $in->close(); open (IN, "<", \$lastrec->{text}); my $h = Mail::Header->new(\*IN); my $from = $h->get("from"); close(in); die "No From address in the last mail" if not defined $from; for my $f (Mail::Address->parse($from)) { print $f->address(), "\n"; } exit 0;
5 Mole Big index of data periodically mined from the archive, by Jeroen van Wolffelaar. Info: Source: merkel:/org/qa.debian.org/mole/db/ Public source: Databases I used: desktopfiles: all.desktop files in the archive dscfiles-control: all debian/control files More databases: dscfiles-watch, lintian-version, packages-debian-suite-bin packages-debian-suite-src
6 Mole Example code #!/usr/bin/python import bsddb import re DB = /org/qa.debian.org/data/mole/db/dscfiles-control.moledb db = bsddb.btopen(db, "r") re_pkg = re.compile(r"^package:\s+(\s+)\s*$", re.m) re_tag = re.compile(r"^tag: +([^\n]+?)(?:, \s)*$", re.m) for k, v in db.iteritems(): m_pkg = re_pkg.search(v) if not m_pkg: continue m_tag = re_tag.search(v) if not m_tag: continue print "%s: %s" % (m_pkg.groups()[0], m_tag.groups()[0])
7 db.debian.org LDAP interface To access it, from any Debian machine: ldapsearch -x -h db.debian.org -b dc=debian,dc=org Example code: # Count developers: ldapsearch -x -h db.debian.org -b dc=debian,dc=org \ (&(keyfingerprint=*)(gidnumber=800)) grep ˆuid: wc # Stats by nationality: ldapsearch -x -h db.debian.org -b ou=users,dc=debian,dc=org c \ grep ˆc: sort uniq -c sort -n tail
8 Debian Developer s Packages Overview Besides developer.php there is a repository with raw data at How to read maintainer / comaintainer information: Location: passwd-like format, one maintainer per line. Comaintained packages are marked with a #: ;[email protected];noid;enrico Zini;buffy cnf dballe debtags debtags-edit festival-it# guessnet launchtool libapt-front# libbuffy libdebtags-perl libept# libwibble# openoffice.org-thesaurus-it polygen python-debian# tagcoll tagcoll2 tagcolledit thescoder;;;;;
9 Aggregated package descriptions All package descriptions of all architectures of sid and experimental: enrico/allpackages.gz Same, but sid only: enrico/allpackages-nonexperimental.gz In your system only: grep-aptavail -spackage,description.
10 Indexing and searching package descriptions #!/usr/bin/python "Create the package description index" import xapian, re, gzip, deb822 #!/usr/bin/python "Search the package description index" tokenizer = re.compile("[^a-za-z0-9_-]+") # How we normalize tokens before indexing stemmer = xapian.stem("english") def normalise(word): return stemmer.stem_word(word.lower()) # Index all packages # ( wget -c ) database = xapian.writabledatabase( \ "descindex", xapian.db_create_or_open) input = gzip.gzipfile("allpackages.gz") for p in deb822.packages.iter_paragraphs(input): idx = 1 doc = xapian.document() doc.set_data(p["package"]); doc.add_posting(normalise(p["package"]), idx); idx += 1 for tok in tokenizer.split(p["description"]): if len(tok) == 0: continue doc.add_posting(normalise(tok), idx); idx += 1 database.add_document(doc); database.flush() import xapian, sys # Open the database database = xapian.database("descindex") # We need to stem search terms as well stemmer = xapian.stem("english") def normalise(word): return stemmer.stem_word(word.lower()) # Perform the query enquire = xapian.enquire(database) query = xapian.query(xapian.query.op_or, \ map(normalise, sys.argv[1:])) enquire.set_query(query) # Show the matching packages matches = enquire.get_mset(0, 30) for match in matches: print "%3d%%: %s" % ( \ match[xapian.mset_percent], \ match[xapian.mset_document].get_data())
11 Aggregated popcon frequencies enrico/popcon-frequencies.gz #!/usr/bin/python "Print the most representative packages in the system" import gzip, math freqs, local = {}, {} # Read global frequency data for line in gzip.gzipfile("popcon-frequencies.gz"): key, val = line[:-1].split( ) freqs[key] = float(val) doccount = freqs.pop( NDOCS ) # Read local popcon data for line in open("/var/log/popularity-contest"): if line.startswith("popularity"): continue if line.startswith("end-popularity"): continue data = line[:-1].split(" ") if len(data) < 4: continue if data[3] == <NOFILES> : # Empty/virtual local[data[2]] = 0.1 elif len(data) == 4: # In use local[data[2]] = 1. elif data[4] == <OLD> : # Unused local[data[2]] = 0.3 elif data[4] == <RECENT-CTIME> : local[data[2]] = 0.8 # Recently installed # TFIDF package scoring function def score(pkg): if not pkg in freqs: return 0 return local[pkg] * math.log(doccount / freqs[pkg]) # Sort the package list by TFIDF score packages = local.keys() packages.sort(key=score, reverse=true) # Output the sorted package list for idx, pkg in enumerate(packages): print "%2d) %s" % (idx+1, pkg) if idx > 30: break
12 Popcon-based suggestions 1 Submit /var/log/popularity-contest as a file form field called scan to enrico/anapop 2 Get a text/plain answer with a token 3 Get statistics with enrico/anapop/stats/token 4 Get package suggestions with enrico/anapop/xposquery/token
13 debtags data Locally installed data sources: Package tag mapping in /var/lib/debtags/package-tags (merges all configured tag sources) Facet and tag descriptions in /var/lib/debtags/vocabulary (merges all configured tag sources) Tags in the packages file: grep-aptavail -spackage,tag. On the internet: Other tag sources can be available (e.g. tagcoll grep - tagcoll reverse - debtags search - debtags tagsearch - debtags dumpavail - debtags tag [add,rm,ls] - debtags smartsearch -...
14 debtags web queries Suite of CGIs at fts/key1[/key2...] Full text search stags/key1[/key2...] Smart tag search sugg/pkg Suggests tags for the package unt[/num] Packages with no tags, or no more than num tags maint/ Package list for a given maintainer pkgs/tag1[/tag2...] Packages with at least all these tags pkg/pkgname Package tags and description qstats Quick tag database statistics patch Submit an unreviewed patch Functions to easily interface to all these CGIs Javascript-accessible facet and tag descriptions
15 In need of more documentation What else do you know?
16 Conclusion There is no conclusion. Add more examples in the wiki. Post more examples in debian-devel-announce. Blog more examples. This can only be fun.
Search and Information Retrieval
Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search
Rocoto. HWRF Python Scripts Training Miami, FL November 19, 2015
Rocoto HWRF Python Scripts Training Miami, FL November 19, 2015 Outline Introduction to Rocoto How it works Overview and description of XML Effectively using Rocoto (run, boot, stat, check, rewind, logs)
How to use the UNIX commands for incident handling. June 12, 2013 Koichiro (Sparky) Komiyama Sam Sasaki JPCERT Coordination Center, Japan
How to use the UNIX commands for incident handling June 12, 2013 Koichiro (Sparky) Komiyama Sam Sasaki JPCERT Coordination Center, Japan Agenda Training Environment Commands for incident handling network
USING MAGENTO TRANSLATION TOOLS
Magento Translation Tools 1 USING MAGENTO TRANSLATION TOOLS Magento translation tools make the implementation of multi-language Magento stores significantly easier. They allow you to fetch all translatable
Tor Exit Node Block Scripts
1 Ryan MacNeille [ [email protected] ] Tor Exit Node Block Scripts The Tor Browser is an Open Source project that allows its users to browse the internet using highly encrypted connections with
Open Source Monitoring
Open Source Monitoring Icinga Team Munich Monitoring Workshop 06/13/2012 WWW.ICINGA.ORG Agenda! Introduction! Tools and Platform! Icinga vs. Nagios! Architecture! New in Icinga! Current Development! Live
Hadoop Streaming. Table of contents
Table of contents 1 Hadoop Streaming...3 2 How Streaming Works... 3 3 Streaming Command Options...4 3.1 Specifying a Java Class as the Mapper/Reducer... 5 3.2 Packaging Files With Job Submissions... 5
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
Version Control with. Ben Morgan
Version Control with Ben Morgan Developer Workflow Log what we did: Add foo support Edit Sources Add Files Compile and Test Logbook ======= 1. Initial version Logbook ======= 1. Initial version 2. Remove
General principles and architecture of Adlib and Adlib API. Petra Otten Manager Customer Support
General principles and architecture of Adlib and Adlib API Petra Otten Manager Customer Support Adlib Database management program, mainly for libraries, museums and archives 1600 customers in app. 30 countries
escan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
Introduction to Shell Scripting
Introduction to Shell Scripting Lecture 1. Shell scripts are small programs. They let you automate multi-step processes, and give you the capability to use decision-making logic and repetitive loops. 2.
Linux Syslog Messages in IBM Director
Ever want those pesky little Linux syslog messages (/var/log/messages) to forward to IBM Director? Well, it s not built in, but it s pretty easy to setup. You can forward syslog messages from an IBM Director
IceWarp Server. Log Analyzer. Version 10
IceWarp Server Log Analyzer Version 10 Printed on 23 June, 2009 i Contents Log Analyzer 1 Quick Start... 2 Required Steps... 2 Optional Steps... 2 Advanced Configuration... 5 Log Importer... 6 General...
How to use Certificate in Outlook Express
How to use Certificate in Outlook Express Macau Post esigntrust Version. 2006-01.01p Agenda Configure Outlook Express for using esigntrust Certificate Use certificate to sign email Use Outlook Express
A Tutorial Introduc/on to Big Data. Hands On Data Analy/cs over EMR. Robert Grossman University of Chicago Open Data Group
A Tutorial Introduc/on to Big Data Hands On Data Analy/cs over EMR Robert Grossman University of Chicago Open Data Group Collin BenneE Open Data Group November 12, 2012 1 Amazon AWS Elas/c MapReduce allows
SQL Server Replication Guide
SQL Server Replication Guide Rev: 2013-08-08 Sitecore CMS 6.3 and Later SQL Server Replication Guide Table of Contents Chapter 1 SQL Server Replication Guide... 3 1.1 SQL Server Replication Overview...
SEO - Access Logs After Excel Fails...
Server Logs After Excel Fails @ohgm Prepare for walls of text. About Me Former Senior Technical Consultant @ builtvisible. Now Freelance Technical SEO Consultant. @ohgm on Twitter. ohgm.co.uk for my webzone.
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
Cabot Consulting Oracle Solutions. The Benefits of this Approach. Infrastructure Requirements
Scheduling Workbooks through the Application Concurrent Manager By Rod West, Cabot Oracle Application users will be very familiar with the Applications concurrent manager and how to use it to schedule
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24. Data Federation Administration Tool Guide
SAP Business Objects Business Intelligence platform Document Version: 4.1 Support Package 7 2015-11-24 Data Federation Administration Tool Guide Content 1 What's new in the.... 5 2 Introduction to administration
Hadoop and Map-Reduce. Swati Gore
Hadoop and Map-Reduce Swati Gore Contents Why Hadoop? Hadoop Overview Hadoop Architecture Working Description Fault Tolerance Limitations Why Map-Reduce not MPI Distributed sort Why Hadoop? Existing Data
MapReduce Jeffrey Dean and Sanjay Ghemawat. Background context
MapReduce Jeffrey Dean and Sanjay Ghemawat Background context BIG DATA!! o Large-scale services generate huge volumes of data: logs, crawls, user databases, web site content, etc. o Very useful to be able
XpoLog Center Suite Log Management & Analysis platform
XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -
CTIS486 Midterm I 20/11/2012 - Akgül
Surname, Name: Section: Student No: Closed Book, closed note exam. You are required to write down commands with necessary arguments and options; and make sure that they work. Your script and output should
Amazon-style shopping cart analysis using MapReduce on a Hadoop cluster. Dan Şerban
Amazon-style shopping cart analysis using MapReduce on a Hadoop cluster Dan Şerban Agenda :: Introduction - Real-world uses of MapReduce - The origins of Hadoop - Hadoop facts and architecture :: Part
shodan-python Documentation
shodan-python Documentation Release 1.0 achillean June 24, 2016 Contents 1 Introduction 3 1.1 Getting Started.............................................. 3 2 Examples 5 2.1 Basic Shodan Search...........................................
Symom Documentation. Symom Agent MRTG. Linux. Windows. Agent. Agent. Windows Agent. Linux Agent
Symom Documentation Symom & MRTG Windows Linux Windows Linux MRTG O mrtg the most know program for bandwidth monitoring. It is simple and can also be used for monitoring other units as cpu, memory, disk.
Presented by: CSIR-KNOWGATE. KNOWGATE Email: [email protected] KNOWGATE Website: knowgate.niscair.res.in
Presented by: CSIR-KNOWGATE KNOWGATE Email: [email protected] KNOWGATE Website: knowgate.niscair.res.in Backup of Database Restore of Database Backing up the Koha File System Backup of Local
Introduction to Git. Markus Kötter [email protected]. Notes. Leinelab Workshop July 28, 2015
Introduction to Git Markus Kötter [email protected] Leinelab Workshop July 28, 2015 Motivation - Why use version control? Versions in file names: does this look familiar? $ ls file file.2 file.
Scaling up = getting a better machine. Scaling out = use another server and add it to your cluster.
MongoDB 1. Introduction MongoDB is a document-oriented database, not a relation one. It replaces the concept of a row with a document. This makes it possible to represent complex hierarchical relationships
Using New Relic to Monitor Your Servers
TUTORIAL Using New Relic to Monitor Your Servers by Alan Skorkin Contents Introduction 3 Why Do I Need a Service to Monitor Boxes at All? 4 It Works in Real Life 4 Installing the New Relic Server Monitoring
Iotivity Programmer s Guide Soft Sensor Manager for Android
Iotivity Programmer s Guide Soft Sensor Manager for Android 1 CONTENTS 2 Introduction... 3 3 Terminology... 3 3.1 Physical Sensor Application... 3 3.2 Soft Sensor (= Logical Sensor, Virtual Sensor)...
An Eprints Apache Log Filter for Non-Redundant Document Downloads by Browser Agents
An Eprints Apache Log Filter for Non-Redundant Document Downloads by Browser Agents Ed Sponsler Caltech Library System http://resolver.caltech.edu/caltechlib:spoeal04 December, 2004 Contents 1 Abstract
Chapter 5. Learning Objectives. DW Development and ETL
Chapter 5 DW Development and ETL Learning Objectives Explain data integration and the extraction, transformation, and load (ETL) processes Basic DW development methodologies Describe real-time (active)
Archiving File Data with Snap Enterprise Data Replicator (Snap EDR): Technical Overview
Archiving File Data with Snap Enterprise Data Replicator (Snap EDR): Technical Overview Contents 1. Abstract...1 2. Introduction to Snap EDR...1 2.1. Product Architecture...2 3. System Setup and Software
Software Testing. Theory and Practicalities
Software Testing Theory and Practicalities Purpose To find bugs To enable and respond to change To understand and monitor performance To verify conformance with specifications To understand the functionality
A Time Efficient Algorithm for Web Log Analysis
A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,
CSCI 5417 Information Retrieval Systems Jim Martin!
CSCI 5417 Information Retrieval Systems Jim Martin! Lecture 9 9/20/2011 Today 9/20 Where we are MapReduce/Hadoop Probabilistic IR Language models LM for ad hoc retrieval 1 Where we are... Basics of ad
The Pentester s Guide to Akamai
An NCC Group Publication The Pentester s Guide to Akamai Prepared by: Darren McDonald 8 th March 2013 Contents 1 Introduction... 3 2 Caveats... 3 3 Basic Akamai Setup... 4 4 Bypassing Akamai by Attacking
Using the MetaMap Java API
Using the MetaMap Java API Willie Rogers June 2, 2014 Contents 1 Purpose 2 2 MetaMap API s Underlying Architecture 2 3 Pre-requisites 2 4 Downloading, Extracting and Installing the API distribution 2 5
SAP BusinessObjects Query as a Web Service Designer SAP BusinessObjects Business Intelligence platform 4.0
SAP BusinessObjects Query as a Web Service Designer SAP BusinessObjects Business Intelligence platform 4.0 Copyright 2011 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign,
UVOS WEB REGISTRATION EXTENSION MANUAL
UVOS Web Registration Extension Manual UVOS WEB REGISTRATION EXTENSION MANUAL UNICORE Team Document Version: 1.5.1 Component Version: 1.5.0-p6 Date: 13 04 2012 This work is co-funded by the EC EMI project
Here, we will discuss step-by-step procedure for enabling LDAP Authentication.
LDAP Authenticated Web Administration : MailScan 5.x is powered with LDAP Authenticated Web Administration. This gives security enhancement to authenticate users, to check their quarantined and ham emails.
Oracle EBS Interface Connector User Guide V1.4
Oracle EBS Interface Connector User Guide V1.4 Contents Oracle EBS Interface Connector User Guide V1.4... 1 1. Introduction... 3 2. Technologies... 4 3. High level Architectural Diagram... 4 4. About Oracle
Automating Document Creation with eforms and Mail Merge
Automating Document Creation with eforms and Mail Merge Mike Binns, Software Engineer Biran Patel, Sales Engineer Nolij Corporation What is an eform? A Nolij eform is a web page that provides the ability
Installation Guide. Copyright (c) 2015 The OpenNMS Group, Inc. OpenNMS 17.0.0-SNAPSHOT Last updated 2015-09-22 05:19:20 EDT
Installation Guide Copyright (c) 2015 The OpenNMS Group, Inc. OpenNMS 17.0.0-SNAPSHOT Last updated 2015-09-22 05:19:20 EDT Table of Contents 1. Basic Installation of OpenNMS... 1 1.1. Repositories for
CSE 344 Introduction to Data Management. Section 9: AWS, Hadoop, Pig Latin TA: Yi-Shu Wei
CSE 344 Introduction to Data Management Section 9: AWS, Hadoop, Pig Latin TA: Yi-Shu Wei Homework 8 Big Data analysis on billion triple dataset using Amazon Web Service (AWS) Billion Triple Set: contains
AXIS 7000 FAX Server Integration
AXIS 7000 FAX Server Integration Introduction... 1 FAX Servers... 1 AXIS 7000 Network Document Server1 Benefits with this combination... 1 Overview...2 System Requirements... 2 How to do the integration...
Recovering and Analyzing Deleted Registry Files
Recovering and Analyzing Deleted Registry Files Andrew Case Digital Forensics Solutions [email protected] / @attrc I had a case recently where I was asked to investigate any signs of data exfiltration
Troubleshooting Mac OS X Server Tips and tricks
Troubleshooting Mac OS X Server Tips and tricks Zack Smith Consulting Engineer - 318 @acidprime January 28th, 2011 A few words on the future of Mac OS X Server... Troubleshooting a Service tail -f
Log Correlation Engine Backup Strategy
Log Correlation Engine Backup Strategy August 10, 2012 (Revision 1) Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered trademarks of
Shiny Server Pro: Regulatory Compliance and Validation Issues
Shiny Server Pro: Regulatory Compliance and Validation Issues A Guidance Document for the Use of Shiny Server Pro in Regulated Clinical Trial Environments June 19, 2014 RStudio, Inc. 250 Northern Ave.
EMC Documentum Webtop
EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights
Benchmarking Citrix XenDesktop using Login Consultants VSI
WHITE PAPER Citrix XenDesktop and Login VSI Benchmarking Citrix XenDesktop using Login Consultants VSI Configuration Guide www.citrix.com Contents Overview... 3 Login VSI Installation... 3 Login VSI 3
Introduction to Python for Text Analysis
Introduction to Python for Text Analysis Jennifer Pan Institute for Quantitative Social Science Harvard University (Political Science Methods Workshop, February 21 2014) *Much credit to Andy Hall and Learning
Hadoop Distributed File System. Dhruba Borthakur Apache Hadoop Project Management Committee [email protected] [email protected]
Hadoop Distributed File System Dhruba Borthakur Apache Hadoop Project Management Committee [email protected] [email protected] Hadoop, Why? Need to process huge datasets on large clusters of computers
Recommended Solutions for Installing Symantec Endpoint Protection 12.1.x in Shared and PvD Virtual Machines
Recommended Solutions for Installing Symantec Endpoint Protection 12.1.x in Shared and PvD Virtual Machines Applicability When Symantec Endpoint Protection (SEP 12.1.x is installed in a virtual machine
EFFECTIVE STRATEGIES FOR SEARCHING ORACLE UCM. Alan Mackenthun Senior Software Consultant 4/23/2010. F i s h b o w l S o l u t I o n s
EFFECTIVE STRATEGIES FOR SEARCHING ORACLE UCM Alan Mackenthun Senior Software Consultant 4/23/2010 F i s h b o w l S o l u t I o n s EFFECTIVE STRATEGIES FOR SEARCHING ORACLE UCM Contents INTRODUCTION...
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Replicating File Data with Snap Enterprise Data Replicator (Snap EDR)
TECHNICAL OVERVIEW Replicating File Data with Snap Enterprise Data Replicator (Snap ) 1. Abstract...1 2. Introduction to Snap...1 3. Product Architecture...1 4. Replicate Data Management Tool...2 4.1.
Central Administration QuickStart Guide
Central Administration QuickStart Guide Contents 1. Overview... 2 Licensing... 2 Documentation... 2 2. Configuring Central Administration... 3 3. Using the Central Administration web console... 4 Managing
Data Intensive Computing Handout 5 Hadoop
Data Intensive Computing Handout 5 Hadoop Hadoop 1.2.1 is installed in /HADOOP directory. The JobTracker web interface is available at http://dlrc:50030, the NameNode web interface is available at http://dlrc:50070.
Continuous Integration @ Inria https://ci.inria.fr
Continuous Integration @ Inria https://ci.inria.fr Damien Martin-Guillerez Outline 1. Introduction 2. CI@Inria service description 3. CI@Inria usage example 4. Summary Damien Martin-Guillerez Mardi du
How to Build an RPM OVERVIEW UNDERSTANDING THE PROCESS OF BUILDING RPMS. Author: Chris Negus Editor: Allison Pranger 09/16/2011
How to Build an RPM Author: Chris Negus Editor: Allison Pranger 09/16/2011 OVERVIEW You have created some software that you want to install on Red Hat Enterprise Linux systems. Now that it is done, the
From 1000/day to 1000/sec
From 1000/day to 1000/sec The evolution of our big data system Yoav Cohen VP Engineering This Talk A walk-through of how we built our big-data system 2 About Incapsula Vendor of a cloud-based Application
Sorting. Lists have a sort method Strings are sorted alphabetically, except... Uppercase is sorted before lowercase (yes, strange)
Sorting and Modules Sorting Lists have a sort method Strings are sorted alphabetically, except... L1 = ["this", "is", "a", "list", "of", "words"] print L1 ['this', 'is', 'a', 'list', 'of', 'words'] L1.sort()
White Paper. Fabasoft app.test Load Testing. Fabasoft app.test 2015 Update Rollup 2. Fabasoft app.test Load Testing 1
White Paper Fabasoft app.test Load Testing Fabasoft app.test 2015 Update Rollup 2 Fabasoft app.test Load Testing 1 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, 7 janvier 2011
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, 7 janvier 2011 Roadmap Multiple protocoles : RADIUS, EAP... An Open-Source
MAX_RMAN_08137_IGNORE=5 DISK_RETENTION_POLICY='RECOVERY WINDOW OF 7 DAYS'
!/bin/sh Example shell script to perform a nightly full backup of the database and scan for errors Copyright (c) 2008, 2014 Caleb.com All Rights Reserved This script is provided as an EXAMPLE ONLY and
Secure Web. Hardware Sizing Guide
Secure Web Hardware Sizing Guide Table of Contents 1. Introduction... 1 2. Sizing Guide... 2 3. CPU... 3 3.1. Measurement... 3 4. RAM... 5 4.1. Measurement... 6 5. Harddisk... 7 5.1. Mesurement of disk
Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website
Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website April 16 2012 The following instructions are to show you how to map your Home drive using ITS s Network in order to publish a website
Log Analyzer Reference
IceWarp Unified Communications Log Analyzer Reference Version 10.4 Printed on 27 February, 2012 Contents Log Analyzer 1 Quick Start... 2 Required Steps... 2 Optional Steps... 3 Advanced Configuration...
TheIMSCorpusWorkbench CorpusAdministrator'sManual InstitutfurmaschinelleSprachverarbeitung UniversitatStuttgart OliverChrist [email protected] {Computerlinguistik{ D70174Stuttgart1 Azenbergstr.12
Birmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0
Birmingham Environment for Academic Research Introduction to Linux Quick Reference Guide Research Computing Team V1.0 Contents The Basics... 4 Directory / File Permissions... 5 Process Management... 6
Intro to djbdns. A DNS server besides BIND. Nathan Straz. [email protected]. Intro to djbdns p.1/21
Intro to djbdns A DNS server besides BIND Nathan Straz [email protected] Intro to djbdns p.1/21 Today s Topics Overview of DNS Overview of djbdns djbdns by example local cache network cache private domain
Active Directory Manager Pro 5.0.0.0 New Features
Active Directory Manager Pro 5.0.0.0 New Features General Information: [email protected] Online Support: [email protected] CionSystems Inc. 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
HP INTEGRATED ARCHIVE PLATFORM
You can read the recommendations in the user guide, the technical guide or the installation guide for HP INTEGRATED ARCHIVE PLATFORM. You'll find the answers to all your questions on the HP INTEGRATED
Version Control! Scenarios, Working with Git!
Version Control! Scenarios, Working with Git!! Scenario 1! You finished the assignment at home! VC 2 Scenario 1b! You finished the assignment at home! You get to York to submit and realize you did not
StreamServe Persuasion SP5 Document Broker Plus
StreamServe Persuasion SP5 Document Broker Plus User Guide Rev A StreamServe Persuasion SP5 Document Broker Plus User Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520
Addressing Risk Data Aggregation and Risk Reporting Ben Sharma, CEO. Big Data Everywhere Conference, NYC November 2015
Addressing Risk Data Aggregation and Risk Reporting Ben Sharma, CEO Big Data Everywhere Conference, NYC November 2015 Agenda 1. Challenges with Risk Data Aggregation and Risk Reporting (RDARR) 2. How a
Thirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
Networks. Inter-process Communication. Pipes. Inter-process Communication
Networks Mechanism by which two processes exchange information and coordinate activities Inter-process Communication process CS 217 process Network 1 2 Inter-process Communication Sockets o Processes can
Client-Server Creation of Complex PDF Documents
- Creation of Complex Documents Gregory Milman National Institute of Allergy and Infectious Diseases [email protected] http(s)://grants.niaid.nih.gov Reasons to Choose at Over HTML Incremental change
