AWK: The Duct Tape of Computer Science Research. Tim Sherwood UC Santa Barbara
|
|
|
- Priscilla Wood
- 10 years ago
- Views:
Transcription
1 AWK: The Duct Tape of Computer Science Research Tim Sherwood UC Santa Barbara
2 Duct Tape Systems Research Environment Lots of simulators, data, and analysis tools Since it is research, nothing works together Unix pipes are the ducts Awk is the duct tape It s not the best way to connect everything Maintaining anything complicated problematic It is a good way of getting it to work quickly In research, most stuff doesn t work anyways Really good at a some common problems AWK - Sherwood 2
3 My Goals for this tutorial Basic introduction to the Awk language Discuss how it has been useful to me Discuss some the limits / pitfalls What this talk is not A promotion of all-awk all-the-time (tools) A perl vs. awk battle Goals AWK - Sherwood 3
4 Background and History When this is a job for AWK Programming in AWK A running example Outline Other tools that play nice Introduction to some of my AWK scripts Summary and Pointers AWK - Sherwood 4
5 Background Developed by Aho, Weinberger, and Kernighan Further extended by Bell Further extended in Gawk Developed to handle simple data-reformatting jobs easily with just a few lines of code. C-like syntax The K in Awk is the K in K&R Easy learning curve AWK - Sherwood 5
6 AWK to the rescue Smart grep All the functionality of grep with added logical and numerical abilities File conversion Quickly write format converters for text files Spreadsheet Easy use of columns and rows Graphing/tables/tex Gluing pipes AWK - Sherwood 6
7 Two easy ways to run gawk Running gawk From the Command line cat file gawk (pattern){action} cat file gawk -f program.awk From a script (recommended) #!/usr/bin/gawk f # This is a comment (pattern) {action} AWK - Sherwood 7
8 Programming Programming is done by building a list of rules The rules are applied sequentially to each record in the input file or stream By default each line in the input is a record The rules have two parts, a pattern and an action If the input record matches the pattern, then the action is applied 5,99073,.9 43 < 5,99073,.9 43 < AWK - Sherwood 8
9 Input Program Output PING dt033n32.san.rr.com ( ): 56 data bytes (/icmp_seq/) {print $0}, bytes from : icmp_seq=0 ttl=48 time=49 ms 64 bytes from : icmp_seq=1 ttl=48 time=94 ms 64 bytes from : icmp_seq=2 ttl=48 time=50 ms 64 bytes from : icmp_seq=3 ttl=48 time=41 ms ----dt033n32.san.rr.com PING Statistics packets transmitted, 1270 packets received, 0% packet loss round-trip (ms) min/avg/max = 37/73/495 ms 64 bytes from : icmp_seq=0 ttl=48 time=49 ms 64 bytes from : icmp_seq=1 ttl=48 time=94 ms 64 bytes from : icmp_seq=2 ttl=48 time=50 ms 64 bytes from : icmp_seq=3 ttl=48 time=41 ms AWK - Sherwood 9
10 Fields Awk divides the file into records and fields Each line is a record (by default) Fields are delimited by a special character Whitespace by default Can be change with F (command line) or FS (special varaible) Fields are accessed with the $ $1 is the first field, $2 is the second $0 is a special field which is the entire line NF is a special variable that is equal to the number of fields in the current record AWK - Sherwood 10
11 Input Program Output PING dt033n32.san.rr.com ( ): 56 data bytes (/icmp_seq/) {print $7} time=49 time=94 time=50 time=41, bytes from : icmp_seq=0 ttl=48 time=49 ms 64 bytes from : icmp_seq=1 ttl=48 time=94 ms 64 bytes from : icmp_seq=2 ttl=48 time=50 ms 64 bytes from : icmp_seq=3 ttl=48 time=41 ms ----dt033n32.san.rr.com PING Statistics packets transmitted, 1270 packets received, 0% packet loss round-trip (ms) min/avg/max = 37/73/495 ms AWK - Sherwood 11
12 Variables Variables uses are naked No need for declaration Implicitly set to 0 AND Empty String There is only one type in awk Combination of a floating-point and string The variable is converted as needed Based on it s use No matter what is in x you can always x = x + 1 length(x) AWK - Sherwood 12
13 Input Program Output PING dt033n32.san.rr.com ( ): 56 data bytes , bytes from : icmp_seq=0 ttl=48 time=49 ms 64 bytes from : icmp_seq=1 ttl=48 time=94 ms 64 bytes from : icmp_seq=2 ttl=48 time=50 ms 64 bytes from : icmp_seq=3 ttl=48 time=41 ms (/icmp_seq/) { n = substr($7,6); printf( "%s\n", n/10 ); #conversion } AWK - Sherwood 13
14 Variables Some built in variables Informative NF = Number of Fields NR = Current Record Number Configuration FS = Field separator Can set them externally From command line use Gawk v var=value AWK - Sherwood 14
15 Patterns Patterns can be Empty: match everything {print $0} will print every line Regular expression: (/regular expression/) Boolean Expression: ($2== foo && $7== bar ) Range: ($2== on, $3== off ) Special: BEGIN and END AWK - Sherwood 15
16 Arrays All arrays in awk are associative A[1] = foo ; B[ awk talk ] = pizza ; To check if there is an element in the array Use in : If ( awk talk in B ) Arrays can be sparse, they automatically resize, auto-initialize, and are fast (unless they get huge) Built in array iterator in For ( x in myarray ) { Not in any order AWK - Sherwood 16
17 Associative Arrays The arrays in awk can be used to implement almost any data structure Set: myset[ a ]=1; myset[ b ]=1; If ( b in myset ) Multi-dimensional array: myarray[1,3] = 2; myarray[1, happy ] = 3; List: mylist[1, data ]=2; mylist[1, next ] = 3; AWK - Sherwood 17
18 Input Program Output PING dt033n32.san.rr.com ( ): 56 data bytes 40: : : 1, bytes from : icmp_seq=0 ttl=48 time=49 ms (/icmp_seq/) { n = int(substr($7,6)/10); hist[n]++; #array } END { for(x in hist) printf( %s: %s, x*10, hist[x]); } AWK - Sherwood 18
19 Numeric: cos, exp, int, log, rand, sqrt String Functions Built-in Functions Gsub( regex, replacement, target ) Index( searchstring, target ) Length( string ) Split( string, array, regex ) Substr( string, start, length=inf) Tolower( string ) AWK - Sherwood 19
20 Writing Functions Functions were not part of the original spec Added in later, and it shows Rule variables are global Function variables are local function MyFunc(a,b, c,d) { Return a+b+c+d } AWK - Sherwood 20
21 Awk is best used with pipes Other tools that work well with pipes Other Tools Fgrep: fgrep mystat *.data ( parse with F: ) Uniq: uniq c my.data Sort Sed/tr: (handy for search and replace) Cut/paste: (manipulating columns in data) Jgraph/Ploticus AWK - Sherwood 21
22 Set of scripts for handling data files A:1:1.0 A:2:1.2 B:1:4.0 B:2:5.0 arrayify Fgrep output My Scripts Name:1:2 Name 1 2 A:1.0:1.2 A B:4.0:5.0 B prettyarray Array of numbers Human readable From the array files, my scripts will generate simple HTML tables or TeX tables, transpose the array, and other things. AWK - Sherwood 22
23 Some Pitfalls White space No whitespace between function and ( Myfunc( $1 ) = Myfunc ( $1 ) = No line break between pattern and action Don t forget the -f on executable scripts This will just die silently very common mistake No built in support for hex On my web page there are scripts for that too AWK - Sherwood 23
24 Summary Awk is a very powerful tool If properly applied It is not for everything (I know) Very handy for pre-processing Data conversion It s incrementally useful Each step of the learning curve is applicable that day. Thank you AWK - Sherwood 24
grep, awk and sed three VERY useful command-line utilities Matt Probert, Uni of York grep = global regular expression print
grep, awk and sed three VERY useful command-line utilities Matt Probert, Uni of York grep = global regular expression print In the simplest terms, grep (global regular expression print) will search input
ESPResSo Summer School 2012
ESPResSo Summer School 2012 Introduction to Tcl Pedro A. Sánchez Institute for Computational Physics Allmandring 3 D-70569 Stuttgart Germany http://www.icp.uni-stuttgart.de 2/26 Outline History, Characteristics,
awk A UNIX tool to manipulate and generate formatted data
awk A UNIX tool to manipulate and generate formatted data Alexander Voigt Technische Universität Dresden Institut für Kern- und Teilchenphysik Version_05_21 /01234/546 78994: IKTP Computing Kaffee 10 January
Jerzy Nawrocki, Introduction to informatics
Jerzy Nawrocki Faculty of Computing & Information Sci. Poznan University of Technology [email protected] File conversion problem FName:John SName:Great Salary 585 Text processing and AWK FName:Ann
Lecture 5. sed and awk
Lecture 5 sed and awk Last week Regular Expressions grep egrep Today Stream manipulation: sed awk Sed: Stream-oriented, Non- Interactive, Text Editor Look for patterns one line at a time, like grep Change
Lecture 18 Regular Expressions
Lecture 18 Regular Expressions Many of today s web applications require matching patterns in a text document to look for specific information. A good example is parsing a html file to extract tags
Visual Basic Programming. An Introduction
Visual Basic Programming An Introduction Why Visual Basic? Programming for the Windows User Interface is extremely complicated. Other Graphical User Interfaces (GUI) are no better. Visual Basic provides
SEO - Access Logs After Excel Fails...
Server Logs After Excel Fails @ohgm Prepare for walls of text. About Me Former Senior Technical Consultant @ builtvisible. Now Freelance Technical SEO Consultant. @ohgm on Twitter. ohgm.co.uk for my webzone.
OLH: Oracle Loader for Hadoop OSCH: Oracle SQL Connector for Hadoop Distributed File System (HDFS)
Use Data from a Hadoop Cluster with Oracle Database Hands-On Lab Lab Structure Acronyms: OLH: Oracle Loader for Hadoop OSCH: Oracle SQL Connector for Hadoop Distributed File System (HDFS) All files are
The C Programming Language course syllabus associate level
TECHNOLOGIES The C Programming Language course syllabus associate level Course description The course fully covers the basics of programming in the C programming language and demonstrates fundamental programming
Perdix: A Query Language for Security Logs
Perdix: A Query Language for Security Logs Orr Bibring [email protected] Justin Prosco [email protected] Angelika Zavou [email protected] Bing Wu [email protected] September 24, 2007 Abstract This
PHP Debugging. Draft: March 19, 2013 2013 Christopher Vickery
PHP Debugging Draft: March 19, 2013 2013 Christopher Vickery Introduction Debugging is the art of locating errors in your code. There are three types of errors to deal with: 1. Syntax errors: When code
PHP Tutorial From beginner to master
PHP Tutorial From beginner to master PHP is a powerful tool for making dynamic and interactive Web pages. PHP is the widely-used, free, and efficient alternative to competitors such as Microsoft's ASP.
Instant SQL Programming
Instant SQL Programming Joe Celko Wrox Press Ltd. INSTANT Table of Contents Introduction 1 What Can SQL Do for Me? 2 Who Should Use This Book? 2 How To Use This Book 3 What You Should Know 3 Conventions
Python Loops and String Manipulation
WEEK TWO Python Loops and String Manipulation Last week, we showed you some basic Python programming and gave you some intriguing problems to solve. But it is hard to do anything really exciting until
FEEG6002 - Applied Programming 5 - Tutorial Session
FEEG6002 - Applied Programming 5 - Tutorial Session Sam Sinayoko 2015-10-30 1 / 38 Outline Objectives Two common bugs General comments on style String formatting Questions? Summary 2 / 38 Objectives Revise
Using Excel As A Database
Using Excel As A Database Access is a great database application, but let s face it sometimes it s just a bit complicated! There are a lot of times when it would be nice to have some of the capabilities
Python Programming: An Introduction to Computer Science
Python Programming: An Introduction to Computer Science Sequences: Strings and Lists Python Programming, 2/e 1 Objectives To understand the string data type and how strings are represented in the computer.
0 Introduction to Data Analysis Using an Excel Spreadsheet
Experiment 0 Introduction to Data Analysis Using an Excel Spreadsheet I. Purpose The purpose of this introductory lab is to teach you a few basic things about how to use an EXCEL 2010 spreadsheet to do
JDK 1.5 Updates for Introduction to Java Programming with SUN ONE Studio 4
JDK 1.5 Updates for Introduction to Java Programming with SUN ONE Studio 4 NOTE: SUN ONE Studio is almost identical with NetBeans. NetBeans is open source and can be downloaded from www.netbeans.org. I
ICS 351: Today's plan
ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:
How to use the UNIX commands for incident handling. June 12, 2013 Koichiro (Sparky) Komiyama Sam Sasaki JPCERT Coordination Center, Japan
How to use the UNIX commands for incident handling June 12, 2013 Koichiro (Sparky) Komiyama Sam Sasaki JPCERT Coordination Center, Japan Agenda Training Environment Commands for incident handling network
1. To start Installation: To install the reporting tool, copy the entire contents of the zip file to a directory of your choice. Run the exe.
CourseWebs Reporting Tool Desktop Application Instructions The CourseWebs Reporting tool is a desktop application that lets a system administrator modify existing reports and create new ones. Changes to
Lecture 4. Regular Expressions grep and sed intro
Lecture 4 Regular Expressions grep and sed intro Previously Basic UNIX Commands Files: rm, cp, mv, ls, ln Processes: ps, kill Unix Filters cat, head, tail, tee, wc cut, paste find sort, uniq comm, diff,
INFORMATION BROCHURE Certificate Course in Web Design Using PHP/MySQL
INFORMATION BROCHURE OF Certificate Course in Web Design Using PHP/MySQL National Institute of Electronics & Information Technology (An Autonomous Scientific Society of Department of Information Technology,
Tutorial 0A Programming on the command line
Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple
Teradata Utilities Class Outline
Teradata Utilities Class Outline CoffingDW education has been customized for every customer for the past 20 years. Our classes can be taught either on site or remotely via the internet. Education Contact:
1/20/2016 INTRODUCTION
INTRODUCTION 1 Programming languages have common concepts that are seen in all languages This course will discuss and illustrate these common concepts: Syntax Names Types Semantics Memory Management We
WhatsApp monitoring for Fun and Stalking. by Flavio Giobergia
WhatsApp monitoring for Fun and Stalking by Flavio Giobergia The idea behind the project If you have used WhatsApp at least once in your life, you know that there is a really lovely/shitty (deping on the
Understand for FORTRAN
Understand Your Software... Understand for FORTRAN User Guide and Reference Manual Version 1.4 Scientific Toolworks, Inc. Scientific Toolworks, Inc. 1579 Broad Brook Road South Royalton, VT 05068 Copyright
7 Why Use Perl for CGI?
7 Why Use Perl for CGI? Perl is the de facto standard for CGI programming for a number of reasons, but perhaps the most important are: Socket Support: Perl makes it easy to create programs that interface
HP-UX Essentials and Shell Programming Course Summary
Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,
Monitoring Android Apps using the logcat and iperf tools. 22 May 2015
Monitoring Android Apps using the logcat and iperf tools Michalis Katsarakis [email protected] Tutorial: HY-439 22 May 2015 http://www.csd.uoc.gr/~hy439/ Outline Introduction Monitoring the Android
Introduction to Python for Text Analysis
Introduction to Python for Text Analysis Jennifer Pan Institute for Quantitative Social Science Harvard University (Political Science Methods Workshop, February 21 2014) *Much credit to Andy Hall and Learning
Introduction to Matlab
Introduction to Matlab Social Science Research Lab American University, Washington, D.C. Web. www.american.edu/provost/ctrl/pclabs.cfm Tel. x3862 Email. [email protected] Course Objective This course provides
Detecting (and even preventing) SQL Injection Using the Percona Toolkit and Noinject!
Detecting (and even preventing) SQL Injection Using the Percona Toolkit and Noinject! Justin Swanhart Percona Live, April 2013 INTRODUCTION 2 Introduction 3 Who am I? What do I do? Why am I here? The tools
Simulation Tools. Python for MATLAB Users I. Claus Führer. Automn 2009. Claus Führer Simulation Tools Automn 2009 1 / 65
Simulation Tools Python for MATLAB Users I Claus Führer Automn 2009 Claus Führer Simulation Tools Automn 2009 1 / 65 1 Preface 2 Python vs Other Languages 3 Examples and Demo 4 Python Basics Basic Operations
Java 7 Recipes. Freddy Guime. vk» (,\['«** g!p#« Carl Dea. Josh Juneau. John O'Conner
1 vk» Java 7 Recipes (,\['«** - < g!p#«josh Juneau Carl Dea Freddy Guime John O'Conner Contents J Contents at a Glance About the Authors About the Technical Reviewers Acknowledgments Introduction iv xvi
The programming language C. sws1 1
The programming language C sws1 1 The programming language C invented by Dennis Ritchie in early 1970s who used it to write the first Hello World program C was used to write UNIX Standardised as K&C (Kernighan
Creating a remote command shell using default windows command line tools
Creating a remote command shell using default windows command line tools Kevin Bong July 2008 GIAC GSE, GCIH, GCIA, GCFW, GCFA, GAWN, GSEC 1 The Goal Provide the functionality of a remote command shell
Eventia Log Parsing Editor 1.0 Administration Guide
Eventia Log Parsing Editor 1.0 Administration Guide Revised: November 28, 2007 In This Document Overview page 2 Installation and Supported Platforms page 4 Menus and Main Window page 5 Creating Parsing
WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math
Textbook Correlation WESTMORELAND COUNTY PUBLIC SCHOOLS 2011 2012 Integrated Instructional Pacing Guide and Checklist Computer Math Following Directions Unit FIRST QUARTER AND SECOND QUARTER Logic Unit
Perl in a nutshell. First CGI Script and Perl. Creating a Link to a Script. print Function. Parsing Data 4/27/2009. First CGI Script and Perl
First CGI Script and Perl Perl in a nutshell Prof. Rasley shebang line tells the operating system where the Perl interpreter is located necessary on UNIX comment line ignored by the Perl interpreter End
Moving from CS 61A Scheme to CS 61B Java
Moving from CS 61A Scheme to CS 61B Java Introduction Java is an object-oriented language. This document describes some of the differences between object-oriented programming in Scheme (which we hope you
Beyond the Mouse A Short Course on Programming
1 / 22 Beyond the Mouse A Short Course on Programming 2. Fundamental Programming Principles I: Variables and Data Types Ronni Grapenthin Geophysical Institute, University of Alaska Fairbanks September
Hadoop Hands-On Exercises
Hadoop Hands-On Exercises Lawrence Berkeley National Lab July 2011 We will Training accounts/user Agreement forms Test access to carver HDFS commands Monitoring Run the word count example Simple streaming
Microsoft Office 2010: Access 2010, Excel 2010, Lync 2010 learning assets
Microsoft Office 2010: Access 2010, Excel 2010, Lync 2010 learning assets Simply type the id# in the search mechanism of ACS Skills Online to access the learning assets outlined below. Titles Microsoft
TUTORIAL FOR INITIALIZING BLUETOOTH COMMUNICATION BETWEEN ANDROID AND ARDUINO
TUTORIAL FOR INITIALIZING BLUETOOTH COMMUNICATION BETWEEN ANDROID AND ARDUINO some pre requirements by :-Lohit Jain *First of all download arduino software from www.arduino.cc *download software serial
Web Programming Step by Step
Web Programming Step by Step Lecture 13 Introduction to JavaScript Reading: 7.1-7.4 Except where otherwise noted, the contents of this presentation are Copyright 2009 Marty Stepp and Jessica Miller. Client-side
HP Service Virtualization
HP Service Virtualization Fixed Length Protocol Virtualization SV Training September 2014 Fixed Length Protocol Virtualization Technology Description Use Cases Supported Message Structures SV Service Description
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
6.170 Tutorial 3 - Ruby Basics
6.170 Tutorial 3 - Ruby Basics Prerequisites 1. Have Ruby installed on your computer a. If you use Mac/Linux, Ruby should already be preinstalled on your machine. b. If you have a Windows Machine, you
INASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Microsoft Windows PowerShell v2 For Administrators
Course 50414B: Microsoft Windows PowerShell v2 For Administrators Course Details Course Outline Module 1: Introduction to PowerShell the Basics This module explains how to install and configure PowerShell.
G563 Quantitative Paleontology. SQL databases. An introduction. Department of Geological Sciences Indiana University. (c) 2012, P.
SQL databases An introduction AMP: Apache, mysql, PHP This installations installs the Apache webserver, the PHP scripting language, and the mysql database on your computer: Apache: runs in the background
COSC 6397 Big Data Analytics. 2 nd homework assignment Pig and Hive. Edgar Gabriel Spring 2015
COSC 6397 Big Data Analytics 2 nd homework assignment Pig and Hive Edgar Gabriel Spring 2015 2 nd Homework Rules Each student should deliver Source code (.java files) Documentation (.pdf,.doc,.tex or.txt
A Crash Course on UNIX
A Crash Course on UNIX UNIX is an "operating system". Interface between user and data stored on computer. A Windows-style interface is not required. Many flavors of UNIX (and windows interfaces). Solaris,
Exercise 4 Learning Python language fundamentals
Exercise 4 Learning Python language fundamentals Work with numbers Python can be used as a powerful calculator. Practicing math calculations in Python will help you not only perform these tasks, but also
PHP Authentication Schemes
7 PHP Authentication Schemes IN THIS CHAPTER Overview Generating Passwords Authenticating User Against Text Files Authenticating Users by IP Address Authenticating Users Using HTTP Authentication Authenticating
Facebook Twitter YouTube Google Plus Website Email
PHP MySQL COURSE WITH OOP COURSE COVERS: PHP MySQL OBJECT ORIENTED PROGRAMMING WITH PHP SYLLABUS PHP 1. Writing PHP scripts- Writing PHP scripts, learn about PHP code structure, how to write and execute
Learn Perl by Example - Perl Handbook for Beginners - Basics of Perl Scripting Language
Learn Perl by Example - Perl Handbook for Beginners - Basics of Perl Scripting Language www.freebsdonline.com Copyright 2006-2008 www.freebsdonline.com 2008/01/29 This course is about Perl Programming
Exploratory Testing in an Agile Context
Exploratory Testing in an Agile Context A guide to using Exploratory Testing on Agile software development teams. Elisabeth Hendrickson 2 Exploratory Testing. So you bang on the keyboard randomly, right?
Java (12 Weeks) Introduction to Java Programming Language
Java (12 Weeks) Topic Lecture No. Introduction to Java Programming Language 1 An Introduction to Java o Java as a Programming Platform, The Java "White Paper" Buzzwords, Java and the Internet, A Short
Forensic Analysis of Internet Explorer Activity Files
Forensic Analysis of Internet Explorer Activity Files by Keith J. Jones [email protected] 3/19/03 Table of Contents 1. Introduction 4 2. The Index.dat File Header 6 3. The HASH Table 10 4. The
File System Management
Lecture 7: Storage Management File System Management Contents Non volatile memory Tape, HDD, SSD Files & File System Interface Directories & their Organization File System Implementation Disk Space Allocation
Storing Measurement Data
Storing Measurement Data File I/O records or reads data in a file. A typical file I/O operation involves the following process. 1. Create or open a file. Indicate where an existing file resides or where
Software documentation systems
Software documentation systems Basic introduction to various user-oriented and developer-oriented software documentation systems. Ondrej Holotnak Ondrej Jombik Software documentation systems: Basic introduction
Chapter 1. Dr. Chris Irwin Davis Email: [email protected] Phone: (972) 883-3574 Office: ECSS 4.705. CS-4337 Organization of Programming Languages
Chapter 1 CS-4337 Organization of Programming Languages Dr. Chris Irwin Davis Email: [email protected] Phone: (972) 883-3574 Office: ECSS 4.705 Chapter 1 Topics Reasons for Studying Concepts of Programming
NiCE Log File Management Pack. for. System Center Operations Manager 2012. Quick Start Guide
NiCE Log File Management Pack for System Center Operations Manager 2012 Version 1.30 March 2015 Quick Start Guide Legal Notices NiCE IT Management Solutions GmbH makes no warranty of any kind with regard
Command Line Crash Course For Unix
Command Line Crash Course For Unix Controlling Your Computer From The Terminal Zed A. Shaw December 2011 Introduction How To Use This Course You cannot learn to do this from videos alone. You can learn
PROBLEM SOLVING SEVENTH EDITION WALTER SAVITCH UNIVERSITY OF CALIFORNIA, SAN DIEGO CONTRIBUTOR KENRICK MOCK UNIVERSITY OF ALASKA, ANCHORAGE PEARSON
PROBLEM SOLVING WITH SEVENTH EDITION WALTER SAVITCH UNIVERSITY OF CALIFORNIA, SAN DIEGO CONTRIBUTOR KENRICK MOCK UNIVERSITY OF ALASKA, ANCHORAGE PEARSON Addison Wesley Boston San Francisco New York London
An Incomplete C++ Primer. University of Wyoming MA 5310
An Incomplete C++ Primer University of Wyoming MA 5310 Professor Craig C. Douglas http://www.mgnet.org/~douglas/classes/na-sc/notes/c++primer.pdf C++ is a legacy programming language, as is other languages
How To Analyze Big Data With Luajit And Luatjit
Ad-hoc Big-Data Analysis with Lua And LuaJIT Alexander Gladysh @agladysh Lua Workshop 2015 Stockholm 1 / 32 Outline Introduction The Problem A Solution Assumptions Examples The Tools
Professional. SlickEdif. John Hurst IC..T...L. i 1 8 О 7» \ WILEY \ Wiley Publishing, Inc.
Professional SlickEdif John Hurst IC..T...L i 1 8 О 7» \ WILEY \! 2 0 0 7 " > Wiley Publishing, Inc. Acknowledgments Introduction xiii xxv Part I: Getting Started with SiickEdit Chapter 1: Introducing
Specifications of Paradox for Windows
Specifications of Paradox for Windows Appendix A 1 Specifications of Paradox for Windows A IN THIS CHAPTER Borland Database Engine (BDE) 000 Paradox Standard Table Specifications 000 Paradox 5 Table Specifications
Computer Programming I
Computer Programming I COP 2210 Syllabus Spring Semester 2012 Instructor: Greg Shaw Office: ECS 313 (Engineering and Computer Science Bldg) Office Hours: Tuesday: 2:50 4:50, 7:45 8:30 Thursday: 2:50 4:50,
Writing a Logical Decoding Plug-In. Christophe Pettus PostgreSQL Experts, Inc. FOSDEM 2015
Writing a Logical Decoding Plug-In. Christophe Pettus PostgreSQL Experts, Inc. FOSDEM 2015 Hello! We re going to talk about logical decoding in PostgreSQL. Christophe Pettus, pleased to meet you. PostgreSQL
Lab 2: Secure Network Administration Principles - Log Analysis
CompTIA Security+ Lab Series Lab 2: Secure Network Administration Principles - Log Analysis CompTIA Security+ Domain 1 - Network Security Objective 1.2: Apply and implement secure network administration
RTI Monitoring Library Getting Started Guide
RTI Monitoring Library Getting Started Guide Version 5.1.0 2011-2013 Real-Time Innovations, Inc. All rights reserved. Printed in U.S.A. First printing. December 2013. Trademarks Real-Time Innovations,
Embedded Systems. Review of ANSI C Topics. A Review of ANSI C and Considerations for Embedded C Programming. Basic features of C
Embedded Systems A Review of ANSI C and Considerations for Embedded C Programming Dr. Jeff Jackson Lecture 2-1 Review of ANSI C Topics Basic features of C C fundamentals Basic data types Expressions Selection
Designing and Implementing Forms 34
C H A P T E R 34 Designing and Implementing Forms 34 You can add forms to your site to collect information from site visitors; for example, to survey potential customers, conduct credit-card transactions,
Lecture 22: C Programming 4 Embedded Systems
Lecture 22: C Programming 4 Embedded Systems Today s Goals Basic C programming process Variables and constants in C Pointers to access addresses Using a High Level Language High-level languages More human
Management Information Systems 260 Web Programming Fall 2006 (CRN: 42459)
Management Information Systems 260 Web Programming Fall 2006 (CRN: 42459) Class Time: 6:00 8:05 p.m. (T,Th) Venue: WSL 5 Web Site: www.pbvusd.net/mis260 Instructor Name: Terrell Tucker Office: BDC 127
Communication Protocol
Analysis of the NXT Bluetooth Communication Protocol By Sivan Toledo September 2006 The NXT supports Bluetooth communication between a program running on the NXT and a program running on some other Bluetooth
13 File Output and Input
SCIENTIFIC PROGRAMMING -1 13 File Output and Input 13.1 Introduction To make programs really useful we have to be able to input and output data in large machinereadable amounts, in particular we have to
EXCEL VBA ( MACRO PROGRAMMING ) LEVEL 1 21-22 SEPTEMBER 2015 9.00AM-5.00PM MENARA PJ@AMCORP PETALING JAYA
EXCEL VBA ( MACRO PROGRAMMING ) LEVEL 1 21-22 SEPTEMBER 2015 9.00AM-5.00PM MENARA PJ@AMCORP PETALING JAYA What is a Macro? While VBA VBA, which stands for Visual Basic for Applications, is a programming
Cobian9 Backup Program - Amanita
The problem with backup software Cobian9 Backup Program - Amanita Due to the quixotic nature of Windows computers, viruses and possibility of hardware failure many programs are available for backing up
Excel Budget Homework
Excel Budget Homework CSE 3, Fall 2009 Due at the BEGINNING of your next lab. A. Annual Budget One of the most common uses of a spreadsheet is to chart financial information. We are going to create an
Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
Essbase Calculations: A Visual Approach
Essbase Calculations: A Visual Approach TABLE OF CONTENTS Essbase Calculations: A Visual Approach... 2 How Essbase Refers To Cells: Intersections and Intersection Names... 2 Global Calculation... 3 Relative
C++ Programming Language
C++ Programming Language Lecturer: Yuri Nefedov 7th and 8th semesters Lectures: 34 hours (7th semester); 32 hours (8th semester). Seminars: 34 hours (7th semester); 32 hours (8th semester). Course abstract
Format string exploitation on windows Using Immunity Debugger / Python. By Abysssec Inc WwW.Abysssec.Com
Format string exploitation on windows Using Immunity Debugger / Python By Abysssec Inc WwW.Abysssec.Com For real beneficiary this post you should have few assembly knowledge and you should know about classic
El Dorado Union High School District Educational Services
El Dorado Union High School District Course of Study Information Page Course Title: ACE Computer Programming II (#495) Rationale: A continuum of courses, including advanced classes in technology is needed.
