Attachment B Portsmouth Naval Shipyard Utility Locating Procedures

Total Page:16

File Type:pdf, Size:1020Kb

Attachment B Portsmouth Naval Shipyard Utility Locating Procedures SECTION 01 35 26 – ATTACHMENT B PORTSMOUTH NAVAL SHIPYARD UTILITY LOCATING PROCEDURES LOCATION OF UNDERGROUND FACILITIES B1.1 General Excavation or ground penetrating work is defined as any operation in which earth, rock or other material below ground is moved or otherwise displaced, by means of power and hand tools, power equipment which includes grading, trenching, digging, boring, auguring, tunneling, scraping and cable or pipe driving except tilling of soil, gardening or displacement of earth, rock or other material for agricultural purposes. Removal of bituminous concrete pavement or concrete is not considered excavation Ground penetrating work may include but is not limited to installing fence posts, probes, borings, piles, sign posts, stakes or anchor rods of any kind that penetrates the soil more than 3”. The “Excavator” is defined as the person directly responsible for performing the excavation or ground penetrating work. B1.2 Underground Utilities Location The Contractor/Excavator shall fully comply with the State of Maine “DIG SAFE “law (Title 23, MRSA 3360-A). Existing underground utilities shown on the plans are based on PNS Yard Plates and are shown in their approximate locations only. The Excavator shall pre-mark the excavation area in “White Paint Only”. (Field notes may be done in Pink paint). The Excavator shall notify “DIG SAFE” (1-888-344-7233) at least within 14calendar days, but no more than 30 calendar days prior to the commencement of the excavation or ground penetrating activity. The Excavator shall prepare a PWD ME Dig Safe Utility Locate Request Format least within 14 calendar days prior to the commencement of the excavation or ground penetrating activity and submit the Form to the Contracting Officer. (The PDW ME Dig Safe Form is attached at the end of this Section.) The Government will locate and mark the underground utilities within 14 calendar days of receiving the Dig Safe Notification. Excavation or ground penetrating activities cannot commence until the utilities have been marked in the field and the PWD ME Dig Safe Utility Locate Form has been returned indicating the PWD ME Dig Safe review process has been completed and excavation has been approved by the Contracting Officer. If the excavation or ground penetrating activities do not commence within27 days of Dig Safe notification or the excavation work is expanded outside the location originally specified in the notification, the Excavator shall re- notify Dig Safe, the Contracting Officer and the PWD ME Dig Safe Coordinator. PORTSMOUTH NAVAL SHIPYARD UTILITY LOCATING PROCEDURES The Contractor shall maintain the utility markings though out the contract period. If additional markings are required, the Excavator shall re-notify Dig Safe, the Contracting Officer and the PWD ME Dig Safe Coordinator. Re-markings will be completed at the Contractor’s expense. The Contractor shall contact the PWD ME Dig Safe Coordinator (DSC) if there are any questions regarding the underground utilities or the Dig Safe notification. B1.3 Third Party Utility Locate The contractor must provide the services of a Third Party, qualified independent utility locating company/person(s) (Cannot be the Government’s Utility Locating Firm) to positively identify underground utilities in the work area. The third party independent locating firm is in addition to the PWD ME Dig Safe Process. The Third Party review must be completed after the PWD ME Dig Safe marking have been completed. Once the Third Party Locate Company has completed their review of the excavation area and the Government markings are confirmed, the Third Party Locate Company & Contractor must sign the Third Party Utility Locate Certification Form (See Attachment) and submit the form to the Contracting Officer prior to commencing excavation. If the Third Party Locate Company finds any discrepancies with the Government's utility markings, the Contractor must notify the Contracting Officer immediately. B1.3 a Utility Location Verification Physically verify underground utility locations, including utility depth, by hand digging using wood or fiberglass handled tools when any adjacent construction work is expected to come within one meter 3 feet of the underground system. B1.3.b Utilities Within and Under Concrete, Bituminous Asphalt, and Other Impervious Surfaces Utilities located within and under concrete slabs or pier structures, bridges, parking areas, and the like, are extremely difficult to identify. Whenever Contract work involves chipping, saw cutting, or core drilling through concrete, bituminous asphalt or other impervious surfaces, the existing utility location must be coordinated with station utility departments in addition to location and depth verification by a third party, independent, private locating company. The third party, independent, private locating company must locate utility depth by use of Ground Penetrating Radar (GPR), X-ray, bore scope, or ultrasound prior to the start of demolition and construction. Outages to isolate utility systems must be used in circumstances where utilities are unable to be positively identified. The use of historical drawings does not alleviate the Contractor from meeting this requirement. B1.3.c Excavating with Hazardous or Mission Critical Utilities within the excavation area i. The Contractor must employ supplement daily Dig Safe procedures to include an additional checkoff on Contractor Daily Activity Plan asking if all utilities have been clearly marked and reviewed with the SSHO. ii. Require a Dig Safe laminated utility color coding system posted in or near all heavy digging equipment for easy reference to type of utility. iii. SSHO to do a pre-excavation walk as part of the morning procedure to help ensure all known utilities are identified and markings are refreshed with the appropriate color-coded paint. iv. Contractor to provide additional danger signage, to mark areas of known live underground utilities. v. Contractor to ensure a ‘spotter’ accompanies the equipment operator during excavation work. vi. Contractor to provide Construction CM/ET notification No later than 3 working days prior to the preparatory and initial pre-excavation/demo safety review meeting will be held. The CM/ET, as well as the PWD ME DSC, will attend this meeting to ensure safety and preservation of Critical Utilities is discussed with adequate focus. Form Reset Revision Date 3/21/21 PWD-ME DIG SAFE UTILITY LOCATE REQUEST FORM A Utility Locate Form shall be submitted to PWD-ME DSC at least fourteen (14) calendar days prior to excavation, ground penetrating or concrete slab cutting, coring or drilling activity either inside or outside of a building which will penetrate more than 3". A Utility Locate Form is required for ANY excavation, ground penetrating or concrete slab cutting, coring or drilling on the Shipyard by Shipyard Employees, Contractors or other personnel. Part I – To be completed by Contractor or Shipyard Personnel performing the Excavation Today’s Date: / / DIGSAFE Ticket #: (1-888-344-7233) Requested by: Phone #: Code # / Company: E-mail: Contract #: Project Title: PWD ME/PNS POC Phone # Excavation Location: Area Pre-Marked: YES NO Type of work: Depth: (ft) Anticipated Excavation Date: / / Time: (military) Attach a map or the contract drawings showing the excavation/ground penetrating area. PWD ME Construction Contractors: Complete Part 1 and Submit Form to PWD ME CM/ET PWD ME AE Firms/Subconsultants: Complete Part 1 and Submit Form to PWD ME DM Shipyard Personnel: Complete Parts 1 & 2 and Submit Form to PWD-ME DSC Part 2 – To be completed by the PWD ME CM/ET/DM (If Shipyard work, Part 2 must be completed by Requestor) Date: / / Name: Phone # Locate Priority: Routine(> 14 days) ; Urgent(< 14 days) ; Emergency(<2 days) (PWD ME DSC Approval Req.) Part 1 Reviewed and Complete: YES NO Initial: Submit Completed Form to PWD ME DSC. The PWD ME DSC will review the Request and forward to the PWD ME FSC Utility Locate Contract Rep who will review and forward to the Utility Locating Company for action. Part 3 – To be completed by FSC Utility Locating Company Approved by FSC Utility Locate Contractor: Initials _________ Date Utilities marked in the field: / / Name: Comments: Utility Plan Discrepancies Noted: YES NO PWD ME FSC PAR & DSC Notified: YES NO Comments: Submit to PWD ME FSC Contract Rep who will forward to the PWD ME DSC. If Plan Discrepancies are noted, provide a scaled markup plan showing the correct utility locations. Part 4 – To be completed by PWD ME DSC Date / / Logged Into Database: YES NO # Any Hazardous/Mission Critical Utilities in the Excavation Area: YES NO Comments: PWD ME DSC to return a copy of the completed Form to PWD ME CM/ET/DM or Shipyard Personnel Requesting the Utility Locate. PWD ME CM/ET/DM/Requestor to ensure the Excavator is aware if a Plan Discrepancy were found and to use extreme caution when excavating. If Plan Discrepancies are noted, the PWD DSC shall coordinate any Utility Plan Updates with PWD DC CADD Rep. INFORMATION THE EXCAVATOR WILL NEED TO PROVIDE THE DIG SAFE OPERATOR DIG SAFE System, Inc. Locate Request Form 888-DIG-SAFE Digsafe.com Today’s Date _____/_____/_____ DIG SAFE Number____________________ Caller Details: Contr I.D. ___________ Caller Name __________________Title____________________ Phone #___________________ Fax #__________________ Alt # _________________ Email address _____________________________ Business Hours _______ to ________ Company Name___________________________________________________________ Address_________________________________________________________________
Recommended publications
  • Motor Vehicle Division Prestige License Plate Application
    For State or County use only: Denied Refund Form MV-9B (Rev. 08-2017) Web and MV Manual Georgia Department of Revenue - Motor Vehicle Division Prestige License Plate Application ______________________________________________________________________________________ Purpose of this Form: This form is to be used by a vehicle owner to request the manufacture of a Special Prestige (Personalized) License Plate. This form should not be used to record a change of ownership, change of address, or change of license plate classification. How to submit this form: After reviewing the MV-9B form instructions, this fully completed form must be submitted to your local County tag office. Please refer to our website at https://mvd.dor.ga.gov/motor/tagoffices/SelectTagOffice.aspx to locate the address(es) for your specific County. OWNER INFORMATION First Name Middle Initial Last Name Suffix Owners’ Full Legal Name: Mailing Address: City: State: Zip: Telephone Number: Owner(s)’ Full Legal Name: First Name Middle Initial Last Name Suffix If secondary Owner(s) are listed Mailing Address: City: State: Zip: Telephone Number: VEHICLE INFORMATION Vehicle Identification Number (VIN): Year: Make: Model: LICENSE PLATE COMBINATION Private Passenger Vehicle (Includes Motor Home and Non-Commercial Trailer) Note: Private passenger vehicles cannot exceed seven (7) letters and/or numbers including spaces. Meaning: ___________________________ Meaning: ___________________________ Meaning: ___________________________ (Required) (Required) (Required) Motorcycle Note: Motorcycles cannot exceed six (6) letters and/or numbers including spaces. Meaning: ___________________________ Meaning: ___________________________ Meaning: ___________________________ (Required) (Required) (Required) Note: No punctuation or symbols are allowed on a license plate. Only letters, numbers, and spaces are allowed. I request that a personal prestige license plate be manufactured.
    [Show full text]
  • Unix/Linux Command Reference
    Unix/Linux Command Reference .com File Commands System Info ls – directory listing date – show the current date and time ls -al – formatted listing with hidden files cal – show this month's calendar cd dir - change directory to dir uptime – show current uptime cd – change to home w – display who is online pwd – show current directory whoami – who you are logged in as mkdir dir – create a directory dir finger user – display information about user rm file – delete file uname -a – show kernel information rm -r dir – delete directory dir cat /proc/cpuinfo – cpu information rm -f file – force remove file cat /proc/meminfo – memory information rm -rf dir – force remove directory dir * man command – show the manual for command cp file1 file2 – copy file1 to file2 df – show disk usage cp -r dir1 dir2 – copy dir1 to dir2; create dir2 if it du – show directory space usage doesn't exist free – show memory and swap usage mv file1 file2 – rename or move file1 to file2 whereis app – show possible locations of app if file2 is an existing directory, moves file1 into which app – show which app will be run by default directory file2 ln -s file link – create symbolic link link to file Compression touch file – create or update file tar cf file.tar files – create a tar named cat > file – places standard input into file file.tar containing files more file – output the contents of file tar xf file.tar – extract the files from file.tar head file – output the first 10 lines of file tar czf file.tar.gz files – create a tar with tail file – output the last 10 lines
    [Show full text]
  • Dig, a DNS Query Tool for Windows and Replacement for Nslookup 2008-04-15 15:29
    dig, a DNS query tool for Windows and replacement for nslookup 2008-04-15 15:29 Disclaimer dig (dig for Windows ) (dig is a powerful tool to investigate [digging into] the DNS system) Source of the binary is from ftp.isc.org Manual Page of dig, in the cryptic Unix style, for reference only. (1) Download: Windows 2000 or Windows XP or Windows Vista ( dig version 9.3.2) Create a folder c:\dig Download this dig-files.zip and save it to c:\dig Use winzip or equivalent to extract the files in dig-files.zip to c:\dig Note: If msvcr70.dll already exists in %systemroot%\system32\ , then you can delete c:\dig\msvcr70.dll Note: Included in dig-files.zip is a command line whois, version 4.7.11: The canonical site of the whois source code is http://ftp.debian.org/debian/pool/main/w/whois/ The whois.exe file inside dig-files.zip is compiled using cygwin c++ compiler. (2) Do a file integrity check (why ? Because some virus checkers destroy dll files) Click Start.. Run ... type CMD (a black screen pops up) cd c:\dig sha1 * You should see some SHA1 hashes (in here, SHA1 hash is used as an integrity check, similar to checksums). Compare your hashes with the following table. SHA1 v1.0 [GPLed] by Stephan T. Lavavej, http://stl.caltech.edu 6CA70A2B 11026203 EABD7D65 4ADEFE3D 6C933EDA cygwin1.dll 57487BAE AA0EB284 8557B7CA 54ED9183 EAFC73FA dig.exe 97DBD755 D67A5829 C138A470 8BE7A4F2 6ED0894C host.exe D22E4B89 56E1831F F0F9D076 20EC19BF 171F0C29 libbind9.dll 81588F0B E7D3C6B3 20EDC314 532D9F2D 0A105594 libdns.dll E0BD7187 BBC01003 ABFE7472 E64B68CD 1BDB6BAB libeay32.dll F445362E 728A9027 96EC6871 A79C6307 054974E4 libisc.dll B3255C0E 4808A703 F95C217A 91FFCD69 40E680C9 libisccfg.dll DFBDE4F9 E25FD49A 0846E97F D813D687 6DC94067 liblwres.dll 61B8F573 DB448AE6 351AE347 5C2E7C48 2D81533C msvcr70.dll BDA14B28 7987E168 F359F0C9 DD96866D 04AB189B resolv.conf 1112343A 319C3EEE E44BF261 AE196C96 289C70E2 sha1.exe 21D20035 2A5B64E2 69FEA407 4D78053F 3C7A2738 whois.exe If your hashes are the same as the above table, then your files pass the integrity check.
    [Show full text]
  • Streamlining Integrated Infrastructure Implementation “Dig Once” Strategy Development Workshop June 9, 2016
    Streamlining Integrated Infrastructure Implementation “Dig Once” Strategy Development Workshop June 9, 2016 Workshop Report February 2017 Sponsored By: Alliance for the Chesapeake Bay Local Government Advisory Committee (LGAC) Funding: National Fish & Wildlife Foundation (NFWF) Prepared By: Alliance for the Chesapeake Bay Hirschman Water & Environment, LLC 1. Workshop Overview and Focus The focus of this workshop was to explore better ways to integrate green infrastructure (GI) into other infrastructure projects, such as roads, school and park improvements, and other capital projects. The workshop was hosted by the Alliance for the Chesapeake Bay (ACB) in conjunction with the Local Government Advisory Committee to the Chesapeake Executive Council (LGAC), with funding from the National Fish & Wildlife Foundation (NFWF). Mary Gattis, Director of Local Government Programs for ACB, was the lead facilitator for the workshop. The workshop was held on June 9, 2016 at the Eisenhower Hotel in Gettysburg, Pennsylvania. The organizers targeted certain sector representatives for attendance in order to achieve the necessary cross-section of experiences and points of view. Figure 1 shows the breakdown of attendees by type of organization. A total of 58 individuals attended the 1-day workshop, 52 participants and six staff representatives. See Appendix A for a list of workshop participants. Prior to the workshop, the following problem statement and workshop goal Figure 1. Representation of 52 Workshop Attendees were sent to attendees as part of the agenda. This was done in order to maintain a clear focus for the workshop, as the topic of green infrastructure has many facets, each of which could fill the entire agenda for a one-day event.
    [Show full text]
  • Unix/Linux Command Reference
    Unix/Linux Command Reference .com File Commands System Info ls – directory listing date – show the current date and time ls -al – formatted listing with hidden files cal – show this month's calendar cd dir - change directory to dir uptime – show current uptime cd – change to home w – display who is online pwd – show current directory whoami – who you are logged in as mkdir dir – create a directory dir finger user – display information about user rm file – delete file uname -a – show kernel information rm -r dir – delete directory dir cat /proc/cpuinfo – cpu information rm -f file – force remove file cat /proc/meminfo – memory information rm -rf dir – force remove directory dir * man command – show the manual for command cp file1 file2 – copy file1 to file2 df – show disk usage cp -r dir1 dir2 – copy dir1 to dir2; create dir2 if it du – show directory space usage doesn't exist free – show memory and swap usage mv file1 file2 – rename or move file1 to file2 whereis app – show possible locations of app if file2 is an existing directory, moves file1 into which app – show which app will be run by default directory file2 ln -s file link – create symbolic link link to file Compression touch file – create or update file tar cf file.tar files – create a tar named cat > file – places standard input into file file.tar containing files more file – output the contents of file tar xf file.tar – extract the files from file.tar head file – output the first 10 lines of file tar czf file.tar.gz files – create a tar with tail file – output the last 10 lines
    [Show full text]
  • What Is UNIX? the Directory Structure Basic Commands Find
    What is UNIX? UNIX is an operating system like Windows on our computers. By operating system, we mean the suite of programs which make the computer work. It is a stable, multi-user, multi-tasking system for servers, desktops and laptops. The Directory Structure All the files are grouped together in the directory structure. The file-system is arranged in a hierarchical structure, like an inverted tree. The top of the hierarchy is traditionally called root (written as a slash / ) Basic commands When you first login, your current working directory is your home directory. In UNIX (.) means the current directory and (..) means the parent of the current directory. find command The find command is used to locate files on a Unix or Linux system. find will search any set of directories you specify for files that match the supplied search criteria. The syntax looks like this: find where-to-look criteria what-to-do All arguments to find are optional, and there are defaults for all parts. where-to-look defaults to . (that is, the current working directory), criteria defaults to none (that is, select all files), and what-to-do (known as the find action) defaults to ‑print (that is, display the names of found files to standard output). Examples: find . –name *.txt (finds all the files ending with txt in current directory and subdirectories) find . -mtime 1 (find all the files modified exact 1 day) find . -mtime -1 (find all the files modified less than 1 day) find . -mtime +1 (find all the files modified more than 1 day) find .
    [Show full text]
  • CMSC 331 Midterm Exam, Fall 2010 a 5 30
    1 40/ 2 30/ 3 45/ 331Midterm Exam 01 November 2010 4 30/ CMSC 331 Midterm Exam, Fall 2010 a 5 30/ 6 30/ 7 20/ Name: _________________________________ -------------- UMBC username:_____________________________ 225/ You will have seventy-five (75) minutes to complete this closed book/notes exam. Use the backs of these pages if you need more room for your answers. Describe any assumptions you make in solv- ing a problem. We reserve the right to assign partial credit, and to deduct points for answers that are needlessly wordy. 1. True/False [40] For each of the following questions, circle T (true) or F (false). T F 1.1 COBOL was designed as a programming language for scientific and engineering applica- tions. FALSE T F 1.2 The procedural programming paradigm treats procedures as first class objects. FALSE T F 1.3 The “Von Neumann” computer architecture is still used as the basis for most computers today. TRUE T F 1.4 One of the advantages of interpreted over compiled languages is that they tend to offer more run time debugging support. TRUE T F 1.5 Any finite language can be defined by a regular expression. TRUE T F 1.6 Attribute grammars can specify languages that can not be specified using a context free grammar. TRUE T F 1.7 A recursive descent parser can not directly use a grammar that has right recursive rules. FALSE T F 1.8 The lexical structure of complex programming languages like Java can not be defined using regular expressions. FALSE T F 1.9 A non-deterministic finite automaton for a regular language is generally easier to write than a deterministic one, but harder to apply to a string to see if it matches.
    [Show full text]
  • Data Transformation Language (DTL)
    DTL Data Transformation Language Phillip H. Sherrod Copyright © 2005-2006 All rights reserved www.dtreg.com DTL is a full programming language built into the DTREG program. DTL makes it easy to generate new variables, transform and combine input variables and select records to be used in the analysis. Contents Contents...................................................................................................................................................3 Introduction .............................................................................................................................................6 Introduction to the DTL Language......................................................................................................6 Using DTL For Data Transformations ....................................................................................................7 The main() function.............................................................................................................................7 Global Variables..................................................................................................................................8 Implicit Global Variables ................................................................................................................8 Explicit Global Variables ................................................................................................................9 Static Global Variables..................................................................................................................11
    [Show full text]
  • PS TEXT EDIT Reference Manual Is Designed to Give You a Complete Is About Overview of TEDIT
    Information Management Technology Library PS TEXT EDIT™ Reference Manual Abstract This manual describes PS TEXT EDIT, a multi-screen block mode text editor. It provides a complete overview of the product and instructions for using each command. Part Number 058059 Tandem Computers Incorporated Document History Edition Part Number Product Version OS Version Date First Edition 82550 A00 TEDIT B20 GUARDIAN 90 B20 October 1985 (Preliminary) Second Edition 82550 B00 TEDIT B30 GUARDIAN 90 B30 April 1986 Update 1 82242 TEDIT C00 GUARDIAN 90 C00 November 1987 Third Edition 058059 TEDIT C00 GUARDIAN 90 C00 July 1991 Note The second edition of this manual was reformatted in July 1991; no changes were made to the manual’s content at that time. New editions incorporate any updates issued since the previous edition. Copyright All rights reserved. No part of this document may be reproduced in any form, including photocopying or translation to another language, without the prior written consent of Tandem Computers Incorporated. Copyright 1991 Tandem Computers Incorporated. Contents What This Book Is About xvii Who Should Use This Book xvii How to Use This Book xvii Where to Go for More Information xix What’s New in This Update xx Section 1 Introduction to TEDIT What Is PS TEXT EDIT? 1-1 TEDIT Features 1-1 TEDIT Commands 1-2 Using TEDIT Commands 1-3 Terminals and TEDIT 1-3 Starting TEDIT 1-4 Section 2 TEDIT Topics Overview 2-1 Understanding Syntax 2-2 Note About the Examples in This Book 2-3 BALANCED-EXPRESSION 2-5 CHARACTER 2-9 058059 Tandem Computers
    [Show full text]
  • Manipulating Files and Directories
    MANIPULATING FILES AND DIRECTORIES At this point, we are ready for some real work! This chapter will introduce the following commands: z cp—Copy files and directories. z mv—Move/rename files and directories. z mkdir—Create directories. z rm—Remove files and directories. z ln—Create hard and symbolic links. These five commands are among the most frequently used Linux com- mands. They are used for manipulating both files and directories. Now, to be frank, some of the tasks performed by these commands are more easily done with a graphical file manager. With a file manager, we can drag and drop a file from one directory to another, cut and paste files, delete files, and so on. So why use these old command-line programs? www.it-ebooks.info The answer is power and flexibility. While it is easy to perform simple file manipulations with a graphical file manager, complicated tasks can be easier with the command-line programs. For example, how could we copy all the HTML files from one directory to another—but only those that do not exist in the destination directory or are newer than the versions in the destination directory? Pretty hard with a file manager. Pretty easy with the command line: cp -u *.html destination Wildcards Before we begin using our commands, we need to talk about the shell fea- ture that makes these commands so powerful. Because the shell uses file- names so much, it provides special characters to help you rapidly specify groups of filenames. These special characters are called wildcards.
    [Show full text]
  • Linux Cheat Sheet
    1 of 4 ########################################### # 1.1. File Commands. # Name: Bash CheatSheet # # # # A little overlook of the Bash basics # ls # lists your files # # ls -l # lists your files in 'long format' # Usage: A Helpful Guide # ls -a # lists all files, including hidden files # # ln -s <filename> <link> # creates symbolic link to file # Author: J. Le Coupanec # touch <filename> # creates or updates your file # Date: 2014/11/04 # cat > <filename> # places standard input into file # Edited: 2015/8/18 – Michael Stobb # more <filename> # shows the first part of a file (q to quit) ########################################### head <filename> # outputs the first 10 lines of file tail <filename> # outputs the last 10 lines of file (-f too) # 0. Shortcuts. emacs <filename> # lets you create and edit a file mv <filename1> <filename2> # moves a file cp <filename1> <filename2> # copies a file CTRL+A # move to beginning of line rm <filename> # removes a file CTRL+B # moves backward one character diff <filename1> <filename2> # compares files, and shows where differ CTRL+C # halts the current command wc <filename> # tells you how many lines, words there are CTRL+D # deletes one character backward or logs out of current session chmod -options <filename> # lets you change the permissions on files CTRL+E # moves to end of line gzip <filename> # compresses files CTRL+F # moves forward one character gunzip <filename> # uncompresses files compressed by gzip CTRL+G # aborts the current editing command and ring the terminal bell gzcat <filename> #
    [Show full text]
  • Configuration and Administration of Networking for Fedora 23
    Fedora 23 Networking Guide Configuration and Administration of Networking for Fedora 23 Stephen Wadeley Networking Guide Draft Fedora 23 Networking Guide Configuration and Administration of Networking for Fedora 23 Edition 1.0 Author Stephen Wadeley [email protected] Copyright © 2015 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
    [Show full text]