This document provides an overview of Digital UNIX system administration and managing disks and file systems. It describes the responsibilities of a system manager, the UNIX software environment including the kernel and features of Digital UNIX. It discusses system internals such as process creation, scheduling, and memory management. It also covers superuser privileges, the root login procedure, and using the Common Desktop Environment for administration tasks. Regarding disk and file system management, it details disk drive structure, logical volumes, partitions, file systems, and using tools like disktab to derive disk parameters.
This document provides an overview and instructions for installing and using Hitachi Storage Navigator Modular 2 (Navigator 2). It includes information on:
- Key features of Navigator 2 and how it integrates with Hitachi storage systems
- System requirements and pre-installation steps
- Installing Navigator 2 on Windows, Solaris, and Linux operating systems
- Performing initial configuration steps like adding arrays, creating volumes, and mapping volumes to hosts
- Using basic Navigator 2 interface elements and functions
- Managing users, permissions, and passwords
- Providing a quick tour of common Navigator 2 activities
Learn about the Program Directory For CBPDO Installation and ServerPac Reference z/OS.This Program Directory addresses the installation of z/OS Version 1 release 13, which is also referred to as z/OS V1.13.0. This Program Directory is intended for the system programmer who is responsible for installing the z/OS Version 1 Release 13 elements using the CBPDO delivery option. If you are installing z/OS V1.13.0 with ServerPac, use the book ServerPac: Installing Your Order, which is shipped with your ServerPac to install z/OS. That book might refer to specific sections of this Program Directory for information that applies to the ServerPac installation path. For more information on IBM System z, visit http://ibm.co/PNo9Cb.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
ADSM is backup and recovery software that provides centralized management of backups. It includes components like backup clients, an administrative client, servers, and application clients. ADSM can back up and restore Windows NT systems and applications. It also enables disaster recovery through features like backing up to remote sites. Some common customer scenarios using ADSM include single server backup/recovery, adding additional NT servers, and separate onsite or remote ADSM servers with server-to-server communications.
This document provides information about planning and deploying IBM TotalStorage Productivity Center for Data, including:
- An overview of the product, its features, architecture and supported levels
- Planning considerations for hardware, software, databases, user IDs and security
- Steps for installing the Agent Manager and other components on Windows and Linux
This document provides guidance on using the Hitachi Performance Monitor tool to monitor the performance of the Hitachi Virtual Storage Platform G1000 storage system. It describes the types of performance data collected, how to start and configure monitoring, and how to interpret various performance metrics and graphs. Key steps include setting the monitoring period, selecting targets to monitor like ports and volumes, and viewing graphs of metrics over time to analyze system performance and utilization.
This document is the user manual for HDClone, a software program for copying, backing up, migrating, and rescuing hard disks. It provides instructions on installing HDClone, supported hardware, and using the program. Key features covered include copying disks while the system is running, creating disk images, and duplicating master system installations.
This document is a user guide for WebHost Manager 7 that provides instructions on how to use the software. It includes sections on installation, server setup and configuration, support functions, managing languages, backups, account functions, and more. Each section contains multiple subsections that describe how to complete specific tasks within the WebHost Manager interface.
This document discusses implementing a reporting environment using Tivoli Decision Support for Storage Management Analysis (TDSfSMA). TDSfSMA allows users to solve real-world TSM performance problems by providing concise summaries and answering questions about system health and resource requirements. It provides an out-of-the-box reporting solution by loading TSM data into a relational database for analysis using OLAP tools. The document covers architectural considerations, configuration and installation, operational procedures, and reporting procedures for using TDSfSMA.
This document provides an overview and instructions for installing and using Hitachi Storage Navigator Modular 2 (Navigator 2). It includes information on:
- Key features of Navigator 2 and how it integrates with Hitachi storage systems
- System requirements and pre-installation steps
- Installing Navigator 2 on Windows, Solaris, and Linux operating systems
- Performing initial configuration steps like adding arrays, creating volumes, and mapping volumes to hosts
- Using basic Navigator 2 interface elements and functions
- Managing users, permissions, and passwords
- Providing a quick tour of common Navigator 2 activities
Learn about the Program Directory For CBPDO Installation and ServerPac Reference z/OS.This Program Directory addresses the installation of z/OS Version 1 release 13, which is also referred to as z/OS V1.13.0. This Program Directory is intended for the system programmer who is responsible for installing the z/OS Version 1 Release 13 elements using the CBPDO delivery option. If you are installing z/OS V1.13.0 with ServerPac, use the book ServerPac: Installing Your Order, which is shipped with your ServerPac to install z/OS. That book might refer to specific sections of this Program Directory for information that applies to the ServerPac installation path. For more information on IBM System z, visit http://ibm.co/PNo9Cb.
Visit http://on.fb.me/LT4gdu to 'Like' the official Facebook page of IBM India Smarter Computing.
ADSM is backup and recovery software that provides centralized management of backups. It includes components like backup clients, an administrative client, servers, and application clients. ADSM can back up and restore Windows NT systems and applications. It also enables disaster recovery through features like backing up to remote sites. Some common customer scenarios using ADSM include single server backup/recovery, adding additional NT servers, and separate onsite or remote ADSM servers with server-to-server communications.
This document provides information about planning and deploying IBM TotalStorage Productivity Center for Data, including:
- An overview of the product, its features, architecture and supported levels
- Planning considerations for hardware, software, databases, user IDs and security
- Steps for installing the Agent Manager and other components on Windows and Linux
This document provides guidance on using the Hitachi Performance Monitor tool to monitor the performance of the Hitachi Virtual Storage Platform G1000 storage system. It describes the types of performance data collected, how to start and configure monitoring, and how to interpret various performance metrics and graphs. Key steps include setting the monitoring period, selecting targets to monitor like ports and volumes, and viewing graphs of metrics over time to analyze system performance and utilization.
This document is the user manual for HDClone, a software program for copying, backing up, migrating, and rescuing hard disks. It provides instructions on installing HDClone, supported hardware, and using the program. Key features covered include copying disks while the system is running, creating disk images, and duplicating master system installations.
This document is a user guide for WebHost Manager 7 that provides instructions on how to use the software. It includes sections on installation, server setup and configuration, support functions, managing languages, backups, account functions, and more. Each section contains multiple subsections that describe how to complete specific tasks within the WebHost Manager interface.
This document discusses implementing a reporting environment using Tivoli Decision Support for Storage Management Analysis (TDSfSMA). TDSfSMA allows users to solve real-world TSM performance problems by providing concise summaries and answering questions about system health and resource requirements. It provides an out-of-the-box reporting solution by loading TSM data into a relational database for analysis using OLAP tools. The document covers architectural considerations, configuration and installation, operational procedures, and reporting procedures for using TDSfSMA.
This document provides a user's guide for the BACKTRACK software. It covers the basics of the application including an overview of its databases, report designer, label designer, and mobile device support. It then details how to perform various administrative and maintenance tasks like creating and editing applications, customizing screens and settings, and adding or modifying item, transaction, user, and location data. The guide is intended to help users understand and utilize all of BACKTRACK's key functions.
This document discusses using IBM Tivoli Storage Manager (TSM) to back up DB2 databases on multiple platforms. It covers all aspects of protecting DB2 databases, including backup, restore, and disaster recovery. The document provides practical scenarios and step-by-step instructions. It is intended for database administrators who need to back up DB2 databases.
This document provides an overview of accounting and chargeback concepts and describes how to set up and use the Resource Accounting Feature (RAF) of Tivoli Decision Support for OS/390 to capture system resource usage data and generate bills. It covers RAF components, host considerations, installing the accounting console, exploring the demo database, and processes for customizing and running the monthly billing cycle. The goal is to help customers quickly establish host and workstation accounting environments to use financial databases for multiple analyses and planning.
cynapspro endpoint data protection - user guidecynapspro GmbH
Cynapspro Endpoint Data Protection provides tools to manage data protection on endpoints. It includes modules for device control, encryption, application control and secure deletion. The user guide describes the management console, administration tools, directory synchronization, rights management features of each module, and solution scenarios for common implementation tasks. It provides information on logging, reporting, troubleshooting and other administrative functions.
This document provides an overview of using IBM Tivoli Storage Manager (ITSM) to perform bare metal recovery (BMR) of Microsoft Windows 2003 and XP systems. It describes setting up ITSM and customizing the client for backups. The document outlines the backup process for the Automated System Recovery (ASR) components and other files and shows how to copy backups to removable media. It then demonstrates how to use ASR and the ITSM backups to recover Windows 2003 and XP systems.
This document is a user guide for AirDefense Mobile 6.1. It provides an overview of the system and instructions for using its live monitoring and frame capture analysis features. The guide describes the interface and functionality of the common area, data, connections, devices, frames, and survey tabs. It also covers topics like conducting site surveys, creating floor plans, and visualizing survey data.
RF card terminal user manual in which we have mentioned how to register and delete the people from device and other fnctions too, this will be a great help for our end users.
openSUSE 12.3 provides instructions for installing the operating system using the installation DVD. The quick start guide outlines the installation process, which involves booting from the DVD, selecting language and keyboard settings, agreeing to the license, choosing to perform a new installation, setting the time zone, selecting a desktop environment, partitioning the disk, and providing user account details. The document recommends system requirements for running openSUSE and provides pointers to more in-depth installation documentation on the openSUSE website.
This document provides an overview and instructions for installing and configuring the Tivoli Management Environment (TME) platform. It discusses planning the installation, installing TME software on UNIX and PC nodes, configuring the TME management regions and resources, creating administrators and policy regions, and diagnosing common installation issues. It also provides guidance on setting up backups and describes capabilities of the Tivoli/Courier deployment application for managing file packages.
This document provides information about planning for and administering DB2 data sharing. It discusses the advantages of data sharing such as improved availability and scalability. It also describes how DB2 uses coupling facilities to coordinate updates across members and ensure consistency. The document covers topics like consolidating members, removing members, communication options, database administration, and recovery in data sharing environments.
This document provides an overview and agenda for a training course on integrating Linux with Windows using Samba. The course covers Samba installation, network browsing, authentication, file and printer sharing, and Windows domain support. Key topics include configuring Samba via the smb.conf file, NetBIOS and domain browsing, username mapping and encrypted passwords, configuring shared folders and printers, and integrating Samba with an existing Windows domain. The goal is to teach students how to set up Samba servers to interoperate with Windows networks.
This document provides instructions for setting up the PROFILER 2 system, which includes a detector unit, cables, power/data interface, and software. It describes connecting the hardware components, installing the software, performing initial calibration of the detector array and dose calibration, and taking basic radiation measurements. The document also provides specifications for the PROFILER 2 detector array and operating instructions for the graphical user interface.
This document provides specifications for the A8N-E motherboard, including support for Socket 939 AMD Athlon 64 FX/Athlon 64 processors using the NVIDIA nForce 4 Ultra chipset. It has 4 DIMM slots supporting up to 4GB of DDR memory and dual-channel memory architecture. The motherboard utilizes 1600/2000 MT/s system bus and includes onboard audio and network features.
1. The document describes an exercise to familiarize students with AIX interfaces including CDE, ASCII, and X-Window. Students will log into each interface and use SMIT to navigate menus and manage users.
This document provides copyright information and instructions for correctly citing the SAS 9.1.3 Foundation Configuration Guide for z/OS. It notes that no part of the publication may be reproduced without permission and lists the copyright owner. The document also contains a table of contents that outlines what is covered in each chapter of the Configuration Guide.
This document is an IBM System Storage Solutions Handbook that provides an overview of IBM storage products and solutions. It discusses IBM's dynamic infrastructure strategy and key technologies like cloud computing, virtualization, security and energy efficiency. It also provides details about IBM's portfolio of disk systems, tape systems, storage area networks, network attached storage, and storage software solutions. The document is intended to help readers learn about and find IBM storage products that meet their business needs.
This document provides specifications for the M3N78 motherboard, including support for AMD Socket AM2+ and AM2 CPUs up to 5200 MT/s, the Nvidia GeForce 8200 chipset, up to 8GB of DDR2 memory in dual-channel configuration across four DIMM slots, onboard graphics, and various rear panel and internal connectors. It also details contents, copyright information, product warranty, and a table of contents for the user guide.
Aix student guide system administrations part 2 problem determinationYogesh Sharma
This document provides an overview of the AIX 5L System Administration II: Problem Determination course. It covers topics like problem determination techniques, the IBM pSeries product family, the Object Data Manager (ODM), system initialization, and solving boot problems. The document contains course objectives, descriptions of course content, and references to additional documentation. It is intended as a student notebook for an IBM Certified training course on advanced AIX system administration and problem determination skills.
This document provides an overview of Linux performance and tuning guidelines. It discusses Linux processes, memory, file systems, I/O subsystems, networking, and performance monitoring tools. The document is intended to help readers understand how Linux works and how to optimize system performance.
This document provides an introduction and overview to the Landmark OpenWells software. It outlines the objectives of the OpenWells Basics training course, describes key concepts and terminology used in OpenWells such as the Engineer's Desktop, EDM database, and data migration. It also provides an overview of the system's capabilities including customization, integration, value of data, security, modernization, and ease of use. Finally, it begins describing how to get started with OpenWells, including logging in and entering different types of data.
Erpi admin 11123510[1] by иссам неязын issam hejazinIssam Hejazin
This document is the Administrator's Guide for Oracle Hyperion Financial Data Quality Management, Enterprise Edition (FDMEE) release 11.1.2.3.510 from April 2014. It provides instructions on how to configure and use FDMEE to integrate source systems like ERP with Oracle Hyperion Planning and other EPM target applications. Key sections include installing and upgrading FDMEE, setting up source systems and mappings, loading metadata, and extracting and transforming data.
This document provides a user's guide for the BACKTRACK software. It covers the basics of the application including an overview of its databases, report designer, label designer, and mobile device support. It then details how to perform various administrative and maintenance tasks like creating and editing applications, customizing screens and settings, and adding or modifying item, transaction, user, and location data. The guide is intended to help users understand and utilize all of BACKTRACK's key functions.
This document discusses using IBM Tivoli Storage Manager (TSM) to back up DB2 databases on multiple platforms. It covers all aspects of protecting DB2 databases, including backup, restore, and disaster recovery. The document provides practical scenarios and step-by-step instructions. It is intended for database administrators who need to back up DB2 databases.
This document provides an overview of accounting and chargeback concepts and describes how to set up and use the Resource Accounting Feature (RAF) of Tivoli Decision Support for OS/390 to capture system resource usage data and generate bills. It covers RAF components, host considerations, installing the accounting console, exploring the demo database, and processes for customizing and running the monthly billing cycle. The goal is to help customers quickly establish host and workstation accounting environments to use financial databases for multiple analyses and planning.
cynapspro endpoint data protection - user guidecynapspro GmbH
Cynapspro Endpoint Data Protection provides tools to manage data protection on endpoints. It includes modules for device control, encryption, application control and secure deletion. The user guide describes the management console, administration tools, directory synchronization, rights management features of each module, and solution scenarios for common implementation tasks. It provides information on logging, reporting, troubleshooting and other administrative functions.
This document provides an overview of using IBM Tivoli Storage Manager (ITSM) to perform bare metal recovery (BMR) of Microsoft Windows 2003 and XP systems. It describes setting up ITSM and customizing the client for backups. The document outlines the backup process for the Automated System Recovery (ASR) components and other files and shows how to copy backups to removable media. It then demonstrates how to use ASR and the ITSM backups to recover Windows 2003 and XP systems.
This document is a user guide for AirDefense Mobile 6.1. It provides an overview of the system and instructions for using its live monitoring and frame capture analysis features. The guide describes the interface and functionality of the common area, data, connections, devices, frames, and survey tabs. It also covers topics like conducting site surveys, creating floor plans, and visualizing survey data.
RF card terminal user manual in which we have mentioned how to register and delete the people from device and other fnctions too, this will be a great help for our end users.
openSUSE 12.3 provides instructions for installing the operating system using the installation DVD. The quick start guide outlines the installation process, which involves booting from the DVD, selecting language and keyboard settings, agreeing to the license, choosing to perform a new installation, setting the time zone, selecting a desktop environment, partitioning the disk, and providing user account details. The document recommends system requirements for running openSUSE and provides pointers to more in-depth installation documentation on the openSUSE website.
This document provides an overview and instructions for installing and configuring the Tivoli Management Environment (TME) platform. It discusses planning the installation, installing TME software on UNIX and PC nodes, configuring the TME management regions and resources, creating administrators and policy regions, and diagnosing common installation issues. It also provides guidance on setting up backups and describes capabilities of the Tivoli/Courier deployment application for managing file packages.
This document provides information about planning for and administering DB2 data sharing. It discusses the advantages of data sharing such as improved availability and scalability. It also describes how DB2 uses coupling facilities to coordinate updates across members and ensure consistency. The document covers topics like consolidating members, removing members, communication options, database administration, and recovery in data sharing environments.
This document provides an overview and agenda for a training course on integrating Linux with Windows using Samba. The course covers Samba installation, network browsing, authentication, file and printer sharing, and Windows domain support. Key topics include configuring Samba via the smb.conf file, NetBIOS and domain browsing, username mapping and encrypted passwords, configuring shared folders and printers, and integrating Samba with an existing Windows domain. The goal is to teach students how to set up Samba servers to interoperate with Windows networks.
This document provides instructions for setting up the PROFILER 2 system, which includes a detector unit, cables, power/data interface, and software. It describes connecting the hardware components, installing the software, performing initial calibration of the detector array and dose calibration, and taking basic radiation measurements. The document also provides specifications for the PROFILER 2 detector array and operating instructions for the graphical user interface.
This document provides specifications for the A8N-E motherboard, including support for Socket 939 AMD Athlon 64 FX/Athlon 64 processors using the NVIDIA nForce 4 Ultra chipset. It has 4 DIMM slots supporting up to 4GB of DDR memory and dual-channel memory architecture. The motherboard utilizes 1600/2000 MT/s system bus and includes onboard audio and network features.
1. The document describes an exercise to familiarize students with AIX interfaces including CDE, ASCII, and X-Window. Students will log into each interface and use SMIT to navigate menus and manage users.
This document provides copyright information and instructions for correctly citing the SAS 9.1.3 Foundation Configuration Guide for z/OS. It notes that no part of the publication may be reproduced without permission and lists the copyright owner. The document also contains a table of contents that outlines what is covered in each chapter of the Configuration Guide.
This document is an IBM System Storage Solutions Handbook that provides an overview of IBM storage products and solutions. It discusses IBM's dynamic infrastructure strategy and key technologies like cloud computing, virtualization, security and energy efficiency. It also provides details about IBM's portfolio of disk systems, tape systems, storage area networks, network attached storage, and storage software solutions. The document is intended to help readers learn about and find IBM storage products that meet their business needs.
This document provides specifications for the M3N78 motherboard, including support for AMD Socket AM2+ and AM2 CPUs up to 5200 MT/s, the Nvidia GeForce 8200 chipset, up to 8GB of DDR2 memory in dual-channel configuration across four DIMM slots, onboard graphics, and various rear panel and internal connectors. It also details contents, copyright information, product warranty, and a table of contents for the user guide.
Aix student guide system administrations part 2 problem determinationYogesh Sharma
This document provides an overview of the AIX 5L System Administration II: Problem Determination course. It covers topics like problem determination techniques, the IBM pSeries product family, the Object Data Manager (ODM), system initialization, and solving boot problems. The document contains course objectives, descriptions of course content, and references to additional documentation. It is intended as a student notebook for an IBM Certified training course on advanced AIX system administration and problem determination skills.
This document provides an overview of Linux performance and tuning guidelines. It discusses Linux processes, memory, file systems, I/O subsystems, networking, and performance monitoring tools. The document is intended to help readers understand how Linux works and how to optimize system performance.
This document provides an introduction and overview to the Landmark OpenWells software. It outlines the objectives of the OpenWells Basics training course, describes key concepts and terminology used in OpenWells such as the Engineer's Desktop, EDM database, and data migration. It also provides an overview of the system's capabilities including customization, integration, value of data, security, modernization, and ease of use. Finally, it begins describing how to get started with OpenWells, including logging in and entering different types of data.
Erpi admin 11123510[1] by иссам неязын issam hejazinIssam Hejazin
This document is the Administrator's Guide for Oracle Hyperion Financial Data Quality Management, Enterprise Edition (FDMEE) release 11.1.2.3.510 from April 2014. It provides instructions on how to configure and use FDMEE to integrate source systems like ERP with Oracle Hyperion Planning and other EPM target applications. Key sections include installing and upgrading FDMEE, setting up source systems and mappings, loading metadata, and extracting and transforming data.
This document provides information about the Hitachi Replication Manager Software User Guide, including its intended audience, product version, document organization, and how to get help. It outlines the document contents and chapters, which cover topics such as getting started with Replication Manager, using the Replication Manager console, setting up information sources, discovering volumes, creating copy groups, and managing replication. The document also provides licensing information and describes the architecture and features of Replication Manager.
G:\Mcse 70 290 Managing And Maintaining Windows Server 2003 Environmentedalatpishe
This document provides copyright information and publishing details for a book about administering Microsoft Windows Server 2003. It lists the authors Dan Holme and Orin Thomas, along with biographical information about each. It also contains details about the product planner, content development manager, technologist, and project managers involved in the book's production. The document is copyright 2006 by Microsoft Corporation.
This document provides a product reference guide for the AP-51xx Access Point. It includes:
- An introduction to new features of the access point such as mesh networking, additional LAN subnets, on-board radius server authentication, and more.
- An overview of the access point's key features including radio options, security options, management accessibility, and more.
- Details on hardware installation including available product configurations, requirements, and step-by-step installation instructions.
- A theory of operations section explaining the access point's cellular coverage, MAC layer bridging, media types, operating modes, and more.
This document provides a product reference guide for the AP-51xx Access Point. It includes:
- An introduction describing new features of the access point such as mesh networking, additional LAN subnets, on-board radius server authentication, and more.
- An overview of the access point's key features including radio options, security options, management accessibility, and more.
- A chapter on hardware installation covering available configurations, requirements, and installation steps.
- Details on theory of operations including cellular coverage, MAC layer bridging, operating modes, and more.
The document provides comprehensive information on the capabilities and configuration of the AP-51xx Access Point.
This document provides a service reference guide for the HP Compaq dc5750 Business PC. It contains information on troubleshooting, setup utilities, diagnostic tools, and procedures for removing and replacing parts. The guide includes sections on installing operating systems, setup utilities, desktop management features, SATA drives, safety procedures, and more.
This document provides an overview of the development tools for modifying Infor ERP SyteLine and guidelines for customizing and modifying the system. It describes the toolset used to work with the database, business objects, user interface, and other tiers. It also covers architectural best practices for extensions and changes to ensure compatibility with future upgrades. Additionally, it includes a chapter on external touch points for integrating with external systems and applications.
This document provides guidance on updating SAP ABAP systems on UNIX and Linux using Software Update Manager 2.0 SP11. It describes the basic concepts of upgrades and updates in SAP systems, planning activities like determining the upgrade schedule and scope, preparing for the update including checking software and hardware requirements, and performing the update using the Software Update Manager user interface. The document contains detailed sections on planning, preparation, and using SUM for both upgrades and updates.
This document provides an overview of DFSMS/MVS and related IBM data storage products and systems software. It describes data set concepts, the volume table of contents (VTOC), DASD and tape storage, the ICKDSF utility, RAID and ESS storage systems, access methods including VSAM, utilities like IEBCOPY and IEHLIST, and other DFSMS/MVS components like GDG, DFSORT, and the Network File System. The document is intended to introduce readers to fundamental DFSMS/MVS concepts.
This document provides an introduction to the IBM GDPS family of offerings. It discusses business resilience requirements and how GDPS supports IT resilience through technologies like disk replication and automation. The document covers GDPS/PPRC, which uses IBM's Peer-to-Peer Remote Copy (PPRC) technology for continuous availability and disaster recovery. It also addresses infrastructure planning considerations for GDPS implementations.
This document provides an introduction to Maptek Vulcan software, including hardware and system requirements, installing Vulcan, licensing information, starting Vulcan, an overview of design data structure, and descriptions of the Vulcan user interface. Key points covered include minimum recommended system specifications, types of Vulcan licenses, how to set up a corporate standards folder, an overview of the main Vulcan windows and menus, and how to customize Vulcan preferences and toolbars.
Ap 51xx access point product reference guide (part no. 72 e-113664-01 rev. b)Advantec Distribution
This document is a product reference guide for the MAP-51xx Access Point. It describes the key features of the access point, which include support for dual-band 802.11n wireless connectivity, separate LAN and WAN ports, multiple security features like WPA/WPA2 encryption, firewalls and VPN support, and management features like firmware updates and configuration import/export. The guide provides an overview of the access point's hardware and software capabilities.
Progress OpenEdge database administration guide and referenceVinh Nguyen
The document is a guide and reference for Progress Database Administration. It discusses Progress database architecture, storage design, configuration variables, limits, and procedures for creating and deleting databases. The guide contains information to help plan, administer, and optimize Progress databases.
This document is a user's manual that provides instructions and specifications for Toshiba Satellite laptop models L700, L740, L745, L700D, L740D and L745D. It includes sections on getting started, an overview of hardware features and components, operating instructions, keyboard functions, power management settings, hardware setup options, and troubleshooting. The manual provides guidance on set up, use and maintenance of the laptops to help users get the most from their Toshiba device.
This document provides a quickstart guide for installing and configuring the IBM Virtual Disk System, which integrates the IBM SAN Volume Controller (SVC) with IBM midrange disk systems. It includes an introduction to the hardware components, such as the SVC node, UPS, IBM System Storage Productivity Center, DS3400 storage subsystem, EXP3000 expansion unit, and Brocade SAN switches. It also covers planning the physical layout and SAN configuration, installing and setting up the SVC cluster, DS3400, zoning the SAN switch, and creating virtual disks on the SVC. Sample configurations are presented to demonstrate typical implementations.
This document provides a quickstart guide for installing and configuring the IBM Virtual Disk System, which integrates the IBM SAN Volume Controller (SVC) with IBM midrange disk storage systems. It includes an introduction to the hardware components, such as the SVC nodes, UPS, IBM DS3400 storage, and Brocade SAN switches. It also covers planning the physical layout and SAN configuration, installing and setting up the SVC cluster, configuring the IBM DS3400, and creating virtual disks using the SVC. Sample configurations are presented to demonstrate common implementation scenarios.
The IBM zEnterprise 114 is the second member in the zEnterprise family. Similarly to the
z196, it was designed to help overcome problems in today's IT infrastructure and provide a
foundation for the future. The zEnterprise System represents both a revolution and an
evolution of mainframe technology. IBM is taking a bold step by integrating heterogeneous
platforms under the well-proven System z hardware management capabilities, while
extending System z qualities of service to those platforms.
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeAftab Hussain
Understanding variable roles in code has been found to be helpful by students
in learning programming -- could variable roles help deep neural models in
performing coding tasks? We do an exploratory study.
- These are slides of the talk given at InteNSE'23: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, co-located with the 45th International Conference on Software Engineering, ICSE 2023, Melbourne Australia
Software Engineering, Software Consulting, Tech Lead, Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Transaction, Spring MVC, OpenShift Cloud Platform, Kafka, REST, SOAP, LLD & HLD.
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemPeter Muessig
Learn about the latest innovations in and around OpenUI5/SAPUI5: UI5 Tooling, UI5 linter, UI5 Web Components, Web Components Integration, UI5 2.x, UI5 GenAI.
Recording:
https://www.youtube.com/live/MSdGLG2zLy8?si=INxBHTqkwHhxV5Ta&t=0
Unveiling the Advantages of Agile Software Development.pdfbrainerhub1
Learn about Agile Software Development's advantages. Simplify your workflow to spur quicker innovation. Jump right in! We have also discussed the advantages.
Do you want Software for your Business? Visit Deuglo
Deuglo has top Software Developers in India. They are experts in software development and help design and create custom Software solutions.
Deuglo follows seven steps methods for delivering their services to their customers. They called it the Software development life cycle process (SDLC).
Requirement — Collecting the Requirements is the first Phase in the SSLC process.
Feasibility Study — after completing the requirement process they move to the design phase.
Design — in this phase, they start designing the software.
Coding — when designing is completed, the developers start coding for the software.
Testing — in this phase when the coding of the software is done the testing team will start testing.
Installation — after completion of testing, the application opens to the live server and launches!
Maintenance — after completing the software development, customers start using the software.
8 Best Automated Android App Testing Tool and Framework in 2024.pdfkalichargn70th171
Regarding mobile operating systems, two major players dominate our thoughts: Android and iPhone. With Android leading the market, software development companies are focused on delivering apps compatible with this OS. Ensuring an app's functionality across various Android devices, OS versions, and hardware specifications is critical, making Android app testing essential.
Measures in SQL (SIGMOD 2024, Santiago, Chile)Julian Hyde
SQL has attained widespread adoption, but Business Intelligence tools still use their own higher level languages based upon a multidimensional paradigm. Composable calculations are what is missing from SQL, and we propose a new kind of column, called a measure, that attaches a calculation to a table. Like regular tables, tables with measures are composable and closed when used in queries.
SQL-with-measures has the power, conciseness and reusability of multidimensional languages but retains SQL semantics. Measure invocations can be expanded in place to simple, clear SQL.
To define the evaluation semantics for measures, we introduce context-sensitive expressions (a way to evaluate multidimensional expressions that is consistent with existing SQL semantics), a concept called evaluation context, and several operations for setting and modifying the evaluation context.
A talk at SIGMOD, June 9–15, 2024, Santiago, Chile
Authors: Julian Hyde (Google) and John Fremlin (Google)
https://doi.org/10.1145/3626246.3653374
What is Augmented Reality Image Trackingpavan998932
Augmented Reality (AR) Image Tracking is a technology that enables AR applications to recognize and track images in the real world, overlaying digital content onto them. This enhances the user's interaction with their environment by providing additional information and interactive elements directly tied to physical images.
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j
Dr. Jesús Barrasa, Head of Solutions Architecture for EMEA, Neo4j
Découvrez les dernières innovations de Neo4j, et notamment les dernières intégrations cloud et les améliorations produits qui font de Neo4j un choix essentiel pour les développeurs qui créent des applications avec des données interconnectées et de l’IA générative.
Most important New features of Oracle 23c for DBAs and Developers. You can get more idea from my youtube channel video from https://youtu.be/XvL5WtaC20A
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfUndress Baby
The quest for the best AI face swap solution is marked by an amalgamation of technological prowess and artistic finesse, where cutting-edge algorithms seamlessly replace faces in images or videos with striking realism. Leveraging advanced deep learning techniques, the best AI face swap tools meticulously analyze facial features, lighting conditions, and expressions to execute flawless transformations, ensuring natural-looking results that blur the line between reality and illusion, captivating users with their ingenuity and sophistication.
Web:- https://undressbaby.com/
Microservice Teams - How the cloud changes the way we workSven Peters
A lot of technical challenges and complexity come with building a cloud-native and distributed architecture. The way we develop backend software has fundamentally changed in the last ten years. Managing a microservices architecture demands a lot of us to ensure observability and operational resiliency. But did you also change the way you run your development teams?
Sven will talk about Atlassian’s journey from a monolith to a multi-tenanted architecture and how it affected the way the engineering teams work. You will learn how we shifted to service ownership, moved to more autonomous teams (and its challenges), and established platform and enablement teams.
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesQuickdice ERP
Explore the seamless transition to e-invoicing with this comprehensive guide tailored for Saudi Arabian businesses. Navigate the process effortlessly with step-by-step instructions designed to streamline implementation and enhance efficiency.
18. About This Course
About This Course
Introduction The Digital UNIX System Administration course is designed for
those individuals who will be managing and operating a Digital
UNIX system.
Your Course Guide presents a number of topics on system
administration, and provides pointers to documentation and
additional references. Textual information is interspersed with
lab activities to allow you to practice what you have learned.
The Course Guide is divided into chapters designed to cover a
single topic or group of related topics. The chapters are divided
into smaller units that cover a more limited topic or subtopic.
Examples are provided to demonstrate concepts.
This preface describes the contents of the course, suggests ways in
which you can most effectively use the materials, and sets up the
conventions for the use of terms in the course. It includes:
• Course description — a brief overview of the course contents
• Target audience — who should take this course
• Prerequisites — the skills and knowledge needed to ensure
your success in this course
• Course goals and nongoals — what skills or knowledge the
course will and will not provide
• Chapter organization — the structure of each chapter
• Course map — the sequence in which you should cover each
chapter
• Chapter descriptions — brief descriptions of each chapter
• Course conventions — explanation of symbols and signs used
throughout this course
• Resources — documentation and books to help you successfully
complete this course
Course
Description
This course describes the tasks that a system manager needs to
perform to get a UNIX operating system installed and ready for
users, including such responsibilities as:
• Installing operating system software
• Managing and maintaining file systems
• Customizing the system kernel
• Configuring peripheral devices
• Managing user accounts
• Performing system backups
• Monitoring system activity
xviii
19. About This Course
• Troubleshooting system problems
This course is designed to lead you through the tasks you must
perform as the manager of a Digital UNIX system. The format
of presenting information followed by exercises gives you the
practice you need to understand the course material.
Target
Audience
This course is designed for individuals with some experience in
a UNIX® environment, who will be managing a Digital UNIX
system.
Prerequisites To get the most from this course, students should be able to:
• Log in to a UNIX system
• Use an editor on the system
• Manage files and directories
• Use the Common Desktop Environment to manage files and
programs
• Move within the UNIX File System
• Use nonprivileged commands
• Write and debug simple shell programs
These prerequisites can be satisfied by taking the following
course:
• UNIX Utilities and Commands lecture/lab or self-paced course
® UNIX is a registered trademark in the United States and other countries
licensed exclusively through X/Open Company Ltd.
xix
20. About This Course
Course Goals To set up and manage a Digital UNIX system, you should be able
to:
• Identify system management responsibilities
• Identify components of UNIX systems
• Install the operating system
• Shut down and boot the system
• Create and manage file systems
• Configure devices: terminals, disk drives, tape drives, printers
• Add and remove users on the system
• Back up and restore files and file systems
• Load and license optional software
• Monitor system performance
• Join and maintain membership in a local area network
• Describe some popular network services
This course introduces UNIX networking services and
demonstrates how to configure a system on a TCP/IP network.
It does not cover network design, troubleshooting, or network
services installation. Students needing these skills should take
the Network Management course.
Nongoals This course does not cover the following topics:
• UNIX basic utilities and commands
• Hardware installation and configuration
• Network services setup
• Network design, internals, or troubleshooting
• Programming
• Multisystem security
• Core dump analysis
• Cluster software
UNIX System
Administration
Curriculum
This course is the first course in the UNIX system administration
curriculum. It has the prerequisite of experience using a
UNIX system. This course is the prerequisite for several other
administration courses:
• Digital UNIX Network Administration
This course is designed for students who will be managing
a UNIX network (which includes a Digital UNIX system),
who want to increase their knowledge of Digital UNIX
networking. This includes configuration and management
of TCP/IP networking, NFS, NIS, BIND, Bootp, DHCP,
dataless configurations, LAT, remote installation, SNMP,
xx
21. About This Course
and SLIP/PPP. The course demonstrates how to set up and
manage Digital UNIX networks using the Common Desktop
Environment (CDE), the new standard graphical user interface
for UNIX systems.
• Digital UNIX Security Management
This course is designed for individuals with experience
managing a Digital UNIX operating system, who are
interested in learning how to recognize and address security
threats in the base security level of the Digital UNIX
environment. Course topics include security terms, threats,
security holes, installing and configuring a secure base level
Digital UNIX system, managing a secure system, and base
level and enhanced security auditing.
• Digital UNIX Performance Management
This course is designed for individuals with experience
managing a Digital UNIX operating system, who are
interested in maximizing the performance on their systems.
Course topics include factors that affect system performance,
monitoring and identifying system bottlenecks, and system
tuning.
• Managing Digital UNIX Using the Advanced File System
(AdvFS), Logical Storage Manager (LSM), and Redundant
Arrays of Inexpensive Disks (RAID)
This courses describes advanced Digital UNIX system
management tasks that system administrators need to
perform to fully utilize the more sophisticated Digital UNIX
functionality, particularly, the Advanced File System (AdvFS),
Logical Storage Manager (LSM), and Redundant Arrays of
Inexpensive Disks (RAID).
• DECsafe Available Server Environment Configuration and
Management
This course describes in detail how to plan, install,
configure, test and troubleshoot a DECsafe Available Server
Environment (ASE).
• TruCluster Software Configuration and Management
This course describes in detail how to install the hardware and
software components and how to set up TruCluster Software
highly available services.
xxi
22. About This Course
Chapter
Organization
This course is divided into 16 chapters. Each chapter covers a
skill or related group of skills required to fulfill the course goals.
In this course, each chapter consists of:
• An introduction to the subject matter of the chapter.
• One or more objectives that describe the goals of the chapter.
• A list of resources, or materials for further reference. Some
of these manuals are included with your course materials.
Others may be available for reference in your classroom or lab.
• The text of each chapter, which includes outlines, tables,
figures, and examples.
• The summary includes a brief review of the topics presented
in the chapter.
• Lab Exercises enable you to practice your skills and to
measure your mastery of the information in the chapter.
A test is provided for student self-assessment. It allows you to
measure whether or not the learning objectives were achieved.
Course Map The course map shows how each chapter is related to other
chapters and to the course as a whole. Before studying a chapter,
you should master all of its prerequisite chapters. The course map
shows the current chapters and the order in which they should
be presented. The direction of the arrows determine the order in
which the chapters should be studied, from bottom to top.
xxii
24. About This Course
Chapter
Descriptions
The following list summarizes the contents of each chapter.
• Introducing UNIX System Management — provides an
overview to system hardware and operating system software,
their components and functions; describes the responsibilities
of a system manager and the privileges of the superuser or
root account.
• Managing Disks and File Systems — discusses disk drives
and their physical and logical structure, the different file
systems, reviews file types and major directories in an OSF/1
system; discusses the steps to add a file system: create, check,
and mount, using standard tools.
• System Shutdown and Startup — demonstrates the UNIX
shutdown, halt and reboot commands, provides instructions on
how to boot a Digital UNIX system, and provides background
on what happens on the system as it boots.
• Updating System Firmware — discusses the underlying
principles of the firmware operating system, as well as the
consoles required to support multiple operating systems.
• Installing the System — describes the planning and
procedures necessary to install a Digital UNIX operating
system.
• Connecting to the Network — discusses UNIX, or Internet
networking, including Internet addressing and the files needed
to configure the network; demonstrates netconfig to perform
the configuration.
• Loading and Licensing Software — demonstrates use
of the Digital UNIX software loading utility, setld, to
manage the software subset inventory, and load and unload
software subsets; demonstrates the use of the Digital License
Management Facility to control access to software.
• Configuring the Kernel — describes the system
configuration file, how to modify the system configuration,
when to build a new kernel, use of the doconfig shell script
to build a kernel automatically, and how to use the make
command to build a kernel manually.
• Configuring Peripherals — describes how to add terminals,
add pseudoterminals, disk and tape drives, and set up and test
printers.
• Archiving — addresses the issue of protecting user data from
accidental loss by backing up the data. A new NetWorker
SingleServer Save and Restore application is presented which
backs up and recovers files and file systems.
• Managing the User Environment — discusses the user
account files passwd and group and demonstrates how to create,
modify, and remove user accounts on the system; shows how
xxiv
25. About This Course
to manage processes running on the system and manage user
disk space.
• Monitoring the System — discusses useful tools and utilities
to monitor the system and diagnose system problems.
• Using DECevent — describes the replacement utility for
UERF on Alpha systems. This new utility has interfaces for
command line, online display and a GUI.
• Introducing SMP, LSM and Clusters — presents an
overview of symmetric multiprocessing, Digital UNIX cluster
products and the Logical Storage Manager.
• Introducing Network Services — describes network
services: DECnet network, NFS service, NIS (YP), the Domain
Name Service, and Remote Installation Service.
xxv
26. About This Course
Course
Conventions
Table 1 gives an explanation of the conventions used in this
course.
Table 1 Conventions Used in This Course
Convention Meaning
keyword Keywords and new concepts are displayed in this
type.
examples Examples, commands, options and pathnames
appear in this type.
command(x) Cross-references to command documentation
include the section number in the reference
pages. For example, fstab(5) means fstab is
referenced in Section 5.
$ A dollar sign represents the user prompt.
# A number sign represents the superuser prompt.
bold Within interactive examples, boldface type
indicates user input.
key The box symbol indicates that the named key on
the keyboard is pressed.
.
.
.
In examples, a vertical ellipsis indicates that not
all of the lines of the example are shown.
[ ] In syntax descriptions, brackets indicate items
that are optional.
variable In syntax descriptions, this type indicates items
that are variable.
.
.
.
In syntax descriptions, an ellipsis indicates the
item may be repeated.
xxvi
27. About This Course
Resources Students should use the following manuals and books as
references for this course:
• Your Digital UNIX system management documentation
Digital UNIX Operating System, Version 4.0 Software
Product Description
Release Notes
Technical Overview
System Administration
Digital UNIX Installation Guide
Network Administration
DEC Verifier and Exerciser Tool User’s Guide
• Maurice Bach, (c) 1986, The Design of the UNIX Operating
System, Prentice-Hall, ISBN 0-13-201799-7
• Douglas Comer, (c) 1991, Internetworking with TCP/IP,
Volume I, Prentice-Hall, ISBN 0-13-468505-9
• Leffler, McKusick, Karels, and Quarterman, (c) 1989, The
Design and Implementation of the 4.3BSD UNIX Operating
System, Addison-Wesley, ISBN 0-201-06196-1
• Nemeth, Snyder, & Seebass, (c) 1989, UNIX System
Administration Handbook, Prentice-Hall, ISBN 0-13-933441-6
• (c) 1991, Guide to OSF/1: A Technical Synopsis, O’Reilly &
Associates
xxvii
30. About This Chapter
About This Chapter
Introduction The system manager is the person behind-the-scenes of any
computer site. Few users are aware of exactly how much
the system manager does to make their login sessions easier.
This chapter discusses the responsibilities of the system
manager, which, though sometimes complicated, are really not so
mysterious.
Overall, a system manager is responsible for creating a smooth
system environment. This includes providing the system tools
users need to do their jobs, and keeping system performance at a
high level. To accomplish these goals, a system manager must be
knowledgeable about the system from both software and hardware
aspects. Only in this way can you match the responsiveness of
your current system to the needs of the people using it.
This chapter is an introduction to managing a UNIX system.
It provides an overview to operating system software — their
components and functions. It describes the responsibilities of a
system manager and the privileges of the superuser or root
account. Finally, it demonstrates how to become the root user.
Major topics discussed in this chapter are:
• System manager responsibilities
• Hardware that makes up this system
• Software environment of the operating system
• Internal functioning of the operating system
• Use of the Common Desktop Environment (CDE)
Objectives To describe the role of the system administrator and the UNIX
system, you should be able to:
• Identify system manager responsibilities
• Describe the role of the UNIX operating system and its
components
• Describe the Digital UNIX features
• Describe internal operating system functions related to system
management
• Describe the superuser and the root login procedure
• Describe the Common Desktop Environment (CDE) interface
1–2 Introducing UNIX System Management
31. About This Chapter
Resources For more information on the topics in this chapter, see the
following:
• Nemeth, Snyder, & Seebass, (c) 1989, UNIX System
Administration Handbook, Prentice-Hall, ISBN 0-13-933441-6,
Chapters 1 and 3 describe system manager duties and
privileges
• Leffler, McKusick, Karels, and Quarterman, (c) 1989, The
Design and Implementation of the 4.3BSD UNIX Operating
System, Addison-Wesley, ISBN 0-201-06196-1, Describes the
internal functions of the BSD based UNIX operating system
• Maurice Bach, (c) 1986, The Design of the UNIX Operating
System, Prentice-Hall, ISBN 0-13-201799-7, Describes the
internal functions of the System V based UNIX operating
system
• Digital UNIX Operating System, Version 4.0 Software Product
Description
• Guide to OSF/1: A Technical Synopsis, (c) 1991, O’Reilly &
Associates
• The Design of the OSF/1 Operating System, Open Software
Foundation, Prentice-Hall
Introducing UNIX System Management 1–3
32. System Manager Responsibilities
System Manager Responsibilities
Overview Every computer site designates a person to be responsible for
the day-to-day operation of the computer system, including both
software and hardware. This person is known as the system
manager or system administrator.
A site following the security guidelines of the US Department
of Defense (DoD) Orange Book will divide these responsibilities
between a system administrator and a security administrator.
A large site may have a number of system operators to assist the
system manager with the tasks.
Some of these tasks are visible to users and, in fact, directly
benefit them, such as creating user logins. Others are less obvious
but no less important, such as storing copies of user files on tape
for future use.
Figure 1–1 System Manager Responsibilities
Install and Configure
the System
Assist Users
Shut Down and
Start Up System
Manage Disk Space
Maintain Archives Control User Access
Monitor the System
Troubleshoot
System Manager
ZKOX−055000111−02−RGS
The system manager needs special privileges to perform
specialized tasks that affect the running of a system.
The tasks of the system manager are described briefly in the
following table.
1–4 Introducing UNIX System Management
33. System Manager Responsibilities
Table 1–1 System Manager Tasks
Task Description
Install and configure
the system
Installs distribution kit containing new software or software
updates
Configures the kernel or devices
Shut down and start up
the system
Shuts down and starts up a system to perform maintenance
Control user access Adds new users to the system’s user login and group files;
modifies or deletes changed accounts
Maintains an appropriate level of security on the system
Manage disk space Maintains the file systems, checks disk usage and, if
necessary, establishes disk quotas
Maintain archives Provides an archive of user files and a continuity of
information through the use of system backup and restore
facilities
Monitor the system Tracks system activity through online accounting procedures
to determine how effectively system resources are being used
Troubleshoot the system Identifies and resolves routine system problems involving
hardware and software; repairs damaged file systems
Assist users Much of a system manager’s day can be filled with user
application problems and answering user’s questions
Introducing UNIX System Management 1–5
34. UNIX Software Environment
UNIX Software Environment
Overview An operating system can be viewed as a resource management
program. Its primary purpose is to manage hardware and
software resources in a way to maximize work capacity and
productivity of the system.
The UNIX operating system is often depicted as a series of layers,
as shown in Figure 1–2.
Figure 1–2 UNIX Layers
Hardware
Device Drivers
Kernel
Shell
Application Programs
ZKO−060000135−50−RGS
The hardware is at the center. The operating system is the
interface between the user process and the hardware.
The UNIX kernel is minimized to provide those features that
can only be performed within the operating system. If special
system privileges are not needed, those operations will be done by
auxiliary programs external to the kernel.
The Digital UNIX operating system takes this one step further by
breaking the kernel into two layers. The inner layer is the Mach
operating system kernel; the outer layer adds UNIX services.
Theoretically, this outer layer could be replaced by a layer
providing some other operating system services.
1–6 Introducing UNIX System Management
35. UNIX Software Environment
When the system is running, the kernel is in main memory. The
kernel is responsible for:
• Process control and scheduling
• Memory management
• Device I/O
• System error handling
The shell surrounds the kernel and acts as a user interface. It
handles:
• Foreground and background execution
• Pipes and filters
• Configurable environment
• Flexible command language
• I/O redirection
The Kernel The UNIX kernel is the central controlling program that provides
basic system facilities.
• The Digital UNIX kernel is the executable file /vmunix.
• It is compiled from source files, object files and configurable
parameters.
• It is loaded into memory when the system boots.
• It runs programs and manages resources.
Once kernel initialization is complete and the various system
daemons have been created and made runnable, the kernel waits
for requests:
• User programs requesting services from the kernel through
system calls
• Hardware devices getting kernel response through interrupts
The kernel manages system resources, such as memory, the CPU,
and devices for user processes. When you run a program, the
UNIX operating system creates a process to handle it.
Introducing UNIX System Management 1–7
36. Digital UNIX Features
Digital UNIX Features
Digital UNIX
Components
The Digital UNIX operating system is a 64-bit advanced kernel
architecture based on Carnegie Mellon University’s Mach V2.5
operating system kernel. It includes components from Berkeley
Software Distribution (BSD) 4.3 and 4.4, System V, and other
sources. The result is a simple, extensible kernel that was
designed for parallel and distributed environments.
The STREAMS facility makes it possible to write flexible, modular
device drivers and is compatible with SVR4 STREAMS.
The extensible run-time loader provides shared library support,
support for memory mapped files, and dynamic module loading.
Dynamically loading modules into an already running program
enables device drivers and other system code to be loaded into a
kernel without rebuilding or rebooting the system. The loader can
also be extended to support multiple object module formats.
The command set comes from the AIX operating system and is
based on commands from BSD and System V operating systems.
Digital UNIX
Features
Digital UNIX is based on OSF/1 R1.0, R1.1, and R1.2 technology,
and the Motif R1.2.3 graphical user interface and programming
environment. It provides numerous features to assist application
programmers, including:
• Symmetric Multiprocessing (SMP)
Enables systems containing two or more processors to execute
the same copy of the operating system and access common
memory.
• Multithread Support
DECthreads provides a pthreads interface that complies with
both the POSIX and DCE semantics.
• Realtime Support
Provides a kernel option to enhance the performance of
realtime applications conforming to the POSIX standard.
• Shared Libraries
Provides a full complement of dynamic shared libraries based
on System V semantics.
• Memory Mapped Files
Supports the Berkeley mmap function that allows an application
to access data files with memory operations rather than file
input and output operations.
• Full features of the X Window System, Version 11, Release
6(X11R6). Provides X Window Display, X Window System
Application Interface and Terminal Interfaces.
1–8 Introducing UNIX System Management
37. Digital UNIX Features
• Supports terminal servers using the LAT protocol.
• Provides a number of scripts and GUI tools for system
management tasks.
Digital UNIX complies with numerous standards and industry
specifications including:
• The X/Open XPG4 and XTI
• POSIX, FIPS and System V Interface Definition (SVID)
Digital UNIX is compatible with Berkeley 4.3 and System V
programming interfaces. It conforms with the OSF Application
Environment Specification (ASE) that specifies an interface for
developing portable applications that will run on a variety of
hardware platforms.
File System
Support
Digital UNIX supports the following file system types:
• POLYCENTER Advanced File System (AdvFS)
A journaled local file system that provides higher availability
and greater flexibility that traditional UNIX file systems.
• UNIX File System (UFS)
Compatible with Berkeley 4.3 Tahoe release.
• Network File System (NFS)
Allows transparent file access over TCP/IP networks
• Memory File System (MFS)
Provides the same file system structure as UFS, but resides in
virtual memory.
• ISO 9660 Compact Disk File System (CDFS)
A standard for volume and file structure for the interchange of
information using CD–ROM.
• File-on-File Mounting File System (FFM)
Allows regular, character, or block-special files to be mounted
over regular files (used primarily by SVR4).
• /proc File System
Allows running processes to be accessed and manipulated as
files by ordinary system calls (compatible with SVR4).
• /dev/fd File System (FDFS)
A pseudo-file system layered beneath the virtual file system
(UFS).
Introducing UNIX System Management 1–9
38. Digital UNIX System Internals
Digital UNIX System Internals
Overview To ensure the smooth operation of your Digital UNIX system,
you should have some knowledge of the internal workings of
UNIX. The following topics will help you to better understand the
functions of your system.
• User process creation
• Daemons
• Scheduling and priority
• Paging and swapping
• Block versus character I/O
User Process
Creation
A program is an executable file, and a process is an instance
of the program in execution. The kernel (/vmunix), the C shell
csh and the vi editor are all programs. Two users can run the
vi editor simultaneously (that is, two independent processes
using one program). A process can create another process using
the fork(2) system call. The process that invokes the fork is
the parent process and the newly created process is the child
process.
When the system starts up (boots), the kernel is copied into
memory and initialized. The kernel creates the init process. init
is the ancestor of all user shells. It creates a process for each
terminal port, and calls /etc/getty(8) to put a login message on
the terminal. /etc/getty reads in the username and calls login to
log in, or verify the user and execute the user shell.
Unlike traditional single-threaded UNIX processes, Digital
UNIX processes can be multithreaded. Multithreading and other
parallelization are integral to the Mach kernel of the Digital
UNIX operating system. Multiple threads can share an address
space, file descriptors, and so forth. Therefore, threads require
very little system overhead and provide improved performance.
Note
Further information on threads can be found in the Guide
to DECthreads.
When a user responds to the login prompt by entering his or her
user name:
1. getty reads the user name and invokes /bin/login(1), passing
the user name.
2. login prompts for the password, verifies the user, and invokes
the shell listed in /etc/passwd.
1–10 Introducing UNIX System Management
39. Digital UNIX System Internals
3. The shell interprets all user commands.
When the user logs out, init updates the login history file
/var/adm/wtmp and creates a new getty process listening on that
port.
The following figure illustrates the sequence of events for a user
logging in to the Digital UNIX system from a terminal.
Figure 1–3 Logging In to a Terminal
"program"
init
init getty login ksh
ksh
pid 2345pid 2345
exit()
exec()
wait() => 2345
exit()
exec()
fork()=2345
fork()=1234
pid 1 wait()=>1234
Terminal Login
ZKO−060000135−43−RGS
exit()exit()exit()
exec() exec()pid 1234pid 1234 pid 1234
Daemon
Processes
Another type of process is the daemon; daemon processes are not
associated with any users but perform system functions, such as
printer spooling, network control and time-dependent activities.
Many daemons are started when the system boots.
Process
Environment:
Scheduling and
Priority
UNIX is a timesharing system; it allows many processes to run
at the same time.
The kernel identifies each process by a process number, or
process ID (PID). Process 0 is a special process created when
the system boots. init has process ID 1. Executing the ps -f
command shows the user processes, their PIDs and their parents’
PIDs, or PPIDs. You can see that each process has a parent, for
example tty4 (Korn shell process) is the parent of the telnet
process. You can also see by following backwards the PPIDs that
tty3 (Korn shell process) is the ancestor of the ftp process.
Introducing UNIX System Management 1–11
40. Digital UNIX System Internals
Figure 1–4 PID/PPID Numbers
On a time-sharing system, the kernel allocates the CPU to
a process for a period of time, called a time slice, and then
switches to another process. The switch is called a context
switch. The kernel, which is executing in the context or the
environment of a process, saves the state of the process and
enough information about the process and what it was doing to
resume later where it left off.
Every process has a scheduling priority. All processes start with
some base priority (in the range 0 to 63); lower numbers represent
higher priority. System processes have higher priority than user
processes. The kernel picks the process with the highest priority
to run next.
Users can lower the priority of their own processes. The
superuser can lower or raise the priority of processes. The system
also adjusts priorities internally on a timesharing policy; a process
that is using CPU time has its priority lowered, while a process
that is waiting to run has its priority raised. This ensures that all
waiting processes will get their turn to run. The ps lax command
shows the user-adjusted priority (NICE column) and the system
priority (PRI column). The timesharing policy has the goal of
equitably sharing the processors among the various processes.
Digital UNIX also supports a fixed-priority policy, where the goal
is to provide preferential treatment to particular processes. For
fixed-priority processes, the scheduler priority is equal to the base
priority.
1–12 Introducing UNIX System Management
41. Digital UNIX System Internals
Real Time
Processing
A real-time process reacts to external events within a specified
time limit, and reacts in a predictable way. Real-time tasks can
vary from process control for manufacturing to simulators for
flight training.
Digital UNIX provides preemption and fixed-priority scheduling
to support real-time processes. Preemption allows a high
priority process to take control of the CPU if it becomes runnable
while a lower priority process is currently executing.
The real-time scheduling interface supports three policies that
give the programmer the ability to select which class a process
should belong to:
• Timesharing - Standard Digital UNIX scheduling policy.
Process priority is adjusted periodically by the kernel based on
CPU usage and system load average.
• FIFO - Fixed priority first-in first-out policy. If no higher
priority process preempts, the process runs until it
relinquishes the CPU through a blocking call; there is no
quantum time limit.
• Round-robin - Fixed-priority policy similar to FIFO, but adds
a time quantum. A process must relinquish control of the
CPU if it has used its quantum and another process of equal
priority is ready to run.
Memory
Management:
Paging and
Swapping
The kernel is in main memory along with the currently executing
process. However, physical memory is a limited resource;
generally not all active processes can fit into memory. Disk space
is used as a secondary memory managed by paging and swapping.
The paging/swapping area is set up during system installation
and can be resident on a local disk or in the case of diskless
workstations, on a disk available over the network.
Programs can be written larger than physical memory up to some
maximum size virtual memory. The hardware manipulates
programs and data in lengths called pages. Special code
translates the virtual memory page addresses to physical
addresses. When the process tries to access data on a page not
in physical memory, the kernel retrieves it from paging space on
disk and overwrites a page in memory.
The kernel keeps as many processes in physical memory as it can
and lets each one execute during its time slice. (UNIX) swapping
occurs when a process needs to be loaded into memory to be
executed, but there is no room for it. Another process is swapped
out, or saved to the swap area on disk to free up memory.
Digital UNIX uses a slightly different notion of swapping. A
process may consist of multiple threads sharing an address space.
Swapping out a thread’s address space would make the other
threads in the same process unrunnable. The swapout daemon
scans the list of all threads to identify those that have been idle
Introducing UNIX System Management 1–13
42. Digital UNIX System Internals
for more than 10 seconds. The pageout daemon can then free the
memory pages associated with the thread’s kernel stack. The goal
is still to free memory. And a thread must still be swapped in
when it is made runnable.
Block versus
Character I/O
When a process wants to access data from a file on a disk drive,
the kernel brings the data into memory where the process can
examine it, alter it and ask to store or rewrite it.
Device drivers, or special code in the kernel controls the
operation of peripheral devices.
Mass storage devices such as disk drives are treated as block or
character devices. A block device is a random-access storage
device. A memory buffer, called the buffer cache, is used to read
a block of bytes to the device at one time. This technique can
reduce the amount of disk traffic and improve response time if
processes tend to manipulate data within the same block. One
disadvantage is that if the system halts suddenly, the updated
buffer cache may not be written out to disk.
A character device, also called a raw device, does not use the
buffer.
A disk device can be treated as both a block and a raw device and
has a separate logical name for each.
1–14 Introducing UNIX System Management
43. Superuser and the Root Login
Superuser and the Root Login
Superuser
Privileges
A UNIX system manager has special system privileges that
exceed those of ordinary users. For this reason, the system
manager is called the superuser. UNIX systems reserve the
login name root (user ID 0) for the superuser. Root owns and
controls many important system files and directories.
As root, the superuser’s special system privileges include complete
access to any file or directory as well as privilege to:
• Override all file mode permissions
• Bypass all normal security checks
• Kill any existing process
• Shut down the system
Root Security Root is a very powerful user, so powerful that a system manager
who carelessly uses its privileges can accidentally destroy
an entire file system. Consequently, you should keep the
root password a secret, known only to you and one (or more)
experienced backup person at your site. This person should have
the knowledge to perform system management responsibilities.
To protect against potential superuser abuse, you should change
the root password regularly with the passwd command.
• Always log in as root using su because the system logs every
set user to root attempt in /var/adm/sialog.
• Perform nonprivileged commands as a nonprivileged user to
prevent accidental system damage.
• You can log in directly as root only on terminals set up as
secure in /etc/securettys.
Network terminals or LAT terminals should not be set up as
secure for security reasons.
Root Login
Procedure
While you can log in directly as root, the following is the
suggested login procedure:
1. Log in under your personal login name.
2. Use the su command to set user ID to root.
3. When you have successfully entered the root password, the
system returns the superuser prompt (#).
4. Change to the root or other directory.
Press Ctrl/D to exit the root shell and return to your original shell.
Introducing UNIX System Management 1–15