Yocto Project Development Manual [ from the Yocto Project Website

Total Page:16

File Type:pdf, Size:1020Kb

Yocto Project Development Manual [ from the Yocto Project Website Scott Rifenbark, Intel Corporation <[email protected]> by Scott Rifenbark Copyright © 2010-2015 Linux Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-Share Alike 2.0 UK: England & Wales [http://creativecommons.org/licenses/by-sa/2.0/uk/] as published by Creative Commons. Note For the latest version of this manual associated with this Yocto Project release, see the Yocto Project Development Manual [http://www.yoctoproject.org/docs/1.7.2/dev-manual/dev-manual.html] from the Yocto Project website. Table of Contents 1. The Yocto Project Development Manual .................................................................................. 1 1.1. Introduction ................................................................................................................. 1 1.2. What This Manual Provides .......................................................................................... 1 1.3. What this Manual Does Not Provide ............................................................................. 1 1.4. Other Information ........................................................................................................ 2 2. Getting Started with the Yocto Project .................................................................................... 4 2.1. Introducing the Yocto Project ....................................................................................... 4 2.2. Getting Set Up ............................................................................................................ 4 2.3. Building Images ........................................................................................................... 7 2.4. Using Pre-Built Binaries and QEMU ............................................................................... 7 3. The Yocto Project Open Source Development Environment ...................................................... 9 3.1. Open Source Philosophy .............................................................................................. 9 3.2. Using the Yocto Project in a Team Environment ............................................................ 9 3.2.1. System Configurations ...................................................................................... 9 3.2.2. Source Control Management (SCM) ................................................................. 10 3.2.3. Autobuilders ................................................................................................... 11 3.2.4. Policies and Change Flow ................................................................................ 11 3.2.5. Summary ........................................................................................................ 12 3.3. Yocto Project Source Repositories ............................................................................... 12 3.4. Yocto Project Terms .................................................................................................... 14 3.5. Licensing ................................................................................................................... 17 3.6. Git ............................................................................................................................. 18 3.6.1. Repositories, Tags, and Branches .................................................................... 18 3.6.2. Basic Commands ............................................................................................ 19 3.7. Workflows .................................................................................................................. 20 3.8. Tracking Bugs ............................................................................................................ 22 3.9. How to Submit a Change ........................................................................................... 23 3.9.1. Using Scripts to Push a Change Upstream and Request a Pull ........................... 25 3.9.2. Using Email to Submit a Patch ........................................................................ 25 4. Common Development Models ............................................................................................. 27 4.1. System Development Workflow .................................................................................. 27 4.1.1. Developing a Board Support Package (BSP) ..................................................... 27 4.1.2. Modifying the Kernel ....................................................................................... 30 4.2. Application Development Workflow ............................................................................ 34 4.2.1. Workflow Using the ADT and Eclipse™ ............................................................ 34 4.2.2. Working Within Eclipse .................................................................................... 37 4.2.3. Workflow Using Stand-Alone Cross-Development Toolchains ............................. 45 4.3. Modifying Temporary Source Code ............................................................................. 46 4.3.1. Finding the Temporary Source Code ................................................................ 46 4.3.2. Using a Quilt Workflow .................................................................................... 47 4.3.3. Using a Git Workflow ...................................................................................... 48 4.4. Image Development Using Hob .................................................................................. 50 4.5. Using a Development Shell ........................................................................................ 50 5. Common Tasks ..................................................................................................................... 52 5.1. Understanding and Creating Layers ........................................................................... 52 5.1.1. Layers ............................................................................................................ 52 5.1.2. Creating Your Own Layer ................................................................................ 52 5.1.3. Best Practices to Follow When Creating Layers ................................................ 54 5.1.4. Enabling Your Layer ........................................................................................ 55 5.1.5. Using .bbappend Files ..................................................................................... 56 5.1.6. Prioritizing Your Layer ..................................................................................... 57 5.1.7. Managing Layers ............................................................................................ 58 5.1.8. Creating a General Layer Using the yocto-layer Script ..................................... 59 5.2. Customizing Images .................................................................................................. 60 5.2.1. Customizing Images Using local.conf ........................................................... 60 5.2.2. Customizing Images Using Custom IMAGE_FEATURES and EXTRA_IMAGE_FEATURES ............................................................................................ 61 5.2.3. Customizing Images Using Custom .bb Files .................................................... 61 5.2.4. Customizing Images Using Custom Package Groups ......................................... 62 5.3. Writing a New Recipe ................................................................................................ 62 5.3.1. Overview ........................................................................................................ 63 iii Yocto Project Development Manual 5.3.2. Locate a Base Recipe ..................................................................................... 63 5.3.3. Storing and Naming the Recipe ....................................................................... 64 5.3.4. Understanding Recipe Syntax .......................................................................... 65 5.3.5. Running a Build on the Recipe ........................................................................ 68 5.3.6. Fetching Code ................................................................................................. 69 5.3.7. Unpacking Code .............................................................................................. 70 5.3.8. Patching Code ................................................................................................ 71 5.3.9. Licensing ........................................................................................................ 71 5.3.10. Configuring the Recipe .................................................................................. 72 5.3.11. Compilation .................................................................................................. 73 5.3.12. Installing ....................................................................................................... 73 5.3.13. Enabling System Services ............................................................................. 74 5.3.14. Packaging ..................................................................................................... 75 5.3.15. Properly Versioning Pre-Release Recipes ........................................................ 76 5.3.16. Post-Installation Scripts ................................................................................
Recommended publications
  • Sendmail Section 10.1
    TCP/IP Network Administration, 3rd Edition By Craig Hunt Publisher: O'Reilly Pub Date: April 2002 ISBN: 0-596-00297-1 Pages: 746 Table of • Slots: 1 Contents • Index • Reviews Reader • This complete hands-on guide to setting up and running a TCP/IP network Reviews starts with the fundamentals: what protocols do and how they work, how • Errata addresses and routing are used, and how to set up your network connection. The book also covers advanced routing protocols and provides tutorials on configuring important network services. The expanded third edition includes sections on Samba, Apache web server, network security, and much more. TCP/IP Network Administration, 3rd Edition By Craig Hunt Publisher: O'Reilly Pub Date: April 2002 ISBN: 0-596-00297-1 Pages: 746 Table of • Slots: 1 Contents • Index • Reviews Reader • Reviews • Errata Copyright Dedication Preface Audience Organization Unix Versions Conventions We'd Like to Hear from You Acknowledgments Chapter 1. Overview of TCP/IP Section 1.1. TCP/IP and the Internet Section 1.2. A Data Communications Model Section 1.3. TCP/IP Protocol Architecture Section 1.4. Network Access Layer Section 1.5. Internet Layer Section 1.6. Transport Layer Section 1.7. Application Layer Section 1.8. Summary Chapter 2. Delivering the Data Section 2.1. Addressing, Routing, and Multiplexing Section 2.2. The IP Address Section 2.3. Internet Routing Architecture Section 2.4. The Routing Table Section 2.5. Address Resolution Section 2.6. Protocols, Ports, and Sockets Section 2.7. Summary Chapter 3. Network Services Section 3.1. Names and Addresses Section 3.2.
    [Show full text]
  • Oreilly Sendmail 4Th Edition.Pdf
    sendmail Other resources from O’Reilly Related titles sendmail 8.13 Companion DNS & Bind Cookbook™ sendmail Cookbook™ DNS and Bind TCP/IP Network Administration oreilly.com oreilly.com is more than a complete catalog of O’Reilly books. You’ll also find links to news, events, articles, weblogs, sample chapters, and code examples. oreillynet.com is the essential portal for developers interested in open and emerging technologies, including new platforms, pro- gramming languages, and operating systems. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in document- ing the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit con- ferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online refer- ence library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or sim- ply flip to the page you need. Try it today for free. FOURTH EDITION sendmail Bryan Costales, George Jansen, and Claus Aßmann with Gregory Neil Shapiro Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo sendmail, Fourth Edition by Bryan Costales, George Jansen, and Claus Aßmann with Gregory Neil Shapiro Copyright © 2008 Bryan Costales, George Jansen, and Claus Aßmann. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use.
    [Show full text]
  • Pdf/Acyclic.1.Pdf
    tldr pages Simplified and community-driven man pages Generated on Sun Sep 26 15:57:34 2021 Android am Android activity manager. More information: https://developer.android.com/studio/command-line/adb#am. • Start a specific activity: am start -n {{com.android.settings/.Settings}} • Start an activity and pass data to it: am start -a {{android.intent.action.VIEW}} -d {{tel:123}} • Start an activity matching a specific action and category: am start -a {{android.intent.action.MAIN}} -c {{android.intent.category.HOME}} • Convert an intent to a URI: am to-uri -a {{android.intent.action.VIEW}} -d {{tel:123}} bugreport Show an Android bug report. This command can only be used through adb shell. More information: https://android.googlesource.com/platform/frameworks/native/+/ master/cmds/bugreport/. • Show a complete bug report of an Android device: bugreport bugreportz Generate a zipped Android bug report. This command can only be used through adb shell. More information: https://android.googlesource.com/platform/frameworks/native/+/ master/cmds/bugreportz/. • Generate a complete zipped bug report of an Android device: bugreportz • Show the progress of a running bugreportz operation: bugreportz -p • Show the version of bugreportz: bugreportz -v • Display help: bugreportz -h cmd Android service manager. More information: https://cs.android.com/android/platform/superproject/+/ master:frameworks/native/cmds/cmd/. • List every running service: cmd -l • Call a specific service: cmd {{alarm}} • Call a service with arguments: cmd {{vibrator}} {{vibrate 300}} dalvikvm Android Java virtual machine. More information: https://source.android.com/devices/tech/dalvik. • Start a Java program: dalvikvm -classpath {{path/to/file.jar}} {{classname}} dumpsys Provide information about Android system services.
    [Show full text]
  • Opengear User Manual
    User Manual ACM5000 & ACM5500 Management Gateways IM4200 Infrastructure Managers CM4100 Console Servers SD4000 Secure Device Servers Rev: 4.8 th April 9 2013 Data Center and Remote Site Management - User Manual 1 Safety Please take care to follow the safety precautions below when installing and operating the console server: - Do not remove the metal covers. There are no operator serviceable components inside. Opening or removing the cover may expose you to dangerous voltage which may cause fire or electric shock. Refer all service to Opengear qualified personnel - To avoid electric shock the power cord protective grounding conductor must be connected through to ground. - Always pull on the plug, not the cable, when disconnecting the power cord from the socket. Do not connect or disconnect the console server during an electrical storm. Also it is recommended you use a surge suppressor or UPS to protect the equipment from transients. FCC Warning Statement This device complies with Part 15 of the FCC rules. Operation of this device is subject to the following conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference that may cause undesired operation. Proper back-up systems and necessary safety devices should be utilized to protect against injury, death or property damage due to system failure. Such protection is the responsibility of the user. This console server device is not approved for use as a life-support or medical system. Any changes or modifications made to this console server device without the explicit approval or consent of Opengear will void Opengear of any liability or responsibility of injury or loss caused by any malfunction.
    [Show full text]
  • Jaro Mail 4.2
    Jaro Mail 4.2 Denis Roio <jaromil @ dyne.org> April 15, 2016 Contents 1 Introduction 3 1.1 Features . 3 1.2 Vision . 4 2 Diagram 5 3 Setup 6 3.1 Build . 6 3.1.1 GNU/Linux . 6 3.1.2 Apple/OSX . 6 3.2 Install . 6 4 Configuration 7 4.1 Send and receive mail . 7 4.2 Filter mail . 7 5 Organization 8 5.1 Folders . 8 5.2 Whitelist . 8 5.3 Blacklist . 9 5.4 Organization In Brief . 9 6 Workflow 9 6.1 Fetch and read your mail at home . 9 6.2 Write a new mail . 10 6.3 Write a new email from the commandline . 10 6.4 Reply messages . 11 6.5 Peek without downloading anything . 11 6.6 Save important emails for later . 11 6.7 Workflow in brief . 12 7 Searching 12 7.1 Combining terms . 13 7.2 Search terms . 13 7.3 Date and time search . 14 7.3.1 The range expression . 14 7.3.2 Relative date and time . 14 7.3.3 Absolute time formats . 15 1 JaroMail manual version 4.2 7.3.4 Absolute date formats . 15 7.3.5 Time zones . 16 8 Compute and visualize statistics 16 8.1 Statistics in brief . 16 9 Addressbook 17 9.1 Address lists . 17 9.2 Export to VCard and other formats . 18 9.3 Addressbook in brief . 18 10 Storage and backup 19 10.1 Merge maildirs . 19 10.2 Backup mails . 19 10.3 Filter a maildir . 20 10.4 Storage in brief .
    [Show full text]
  • Mpop Manual in PDF Format
    mpop A POP3 client version 1.4.14, 26 December 2020 Martin Lambers ([email protected]) This manual was last updated 26 December 2020 for version 1.4.14 of mpop. Copyright (C) 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2018, 2019, 2020 Martin Lambers Copying and distribution of this file, with or without modification, are per- mitted in any medium without royalty provided the copyright notice and this notice are preserved. These files are offered as-is, without any warranty. i Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::: 1 2 Configuration file :::::::::::::::::::::::::::::::: 2 2.1 General commands ::::::::::::::::::::::::::::::::::::::::::::: 2 2.2 Authentication commands :::::::::::::::::::::::::::::::::::::: 3 2.3 TLS commands::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.4 Commands specific to mail retrieval mode::::::::::::::::::::::: 5 3 Invocation:::::::::::::::::::::::::::::::::::::::: 8 3.1 Synopsis:::::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 3.2 Exit code::::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 3.3 Environment / Files :::::::::::::::::::::::::::::::::::::::::::: 8 3.4 Options :::::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 3.4.1 General options :::::::::::::::::::::::::::::::::::::::::::: 8 3.4.2 Changing the mode of operation ::::::::::::::::::::::::::: 9 3.4.3 Configuration options :::::::::::::::::::::::::::::::::::::: 9 3.4.4 Options specific to mail retrieval mode :::::::::::::::::::: 10 4 Transport Layer Security ::::::::::::::::::::::
    [Show full text]
  • System Administration Guide: Resource Management and Network Services
    System Administration Guide: Resource Management and Network Services Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 806–4076–10 May 2002 Copyright 2002 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, docs.sun.com, AnswerBook, AnswerBook2, SunOS, UltraSPARC, WebNFS, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • Secure Content Distribution Using Untrusted Servers Kevin Fu
    Secure content distribution using untrusted servers Kevin Fu MIT Computer Science and Artificial Intelligence Lab in collaboration with M. Frans Kaashoek (MIT), Mahesh Kallahalla (DoCoMo Labs), Seny Kamara (JHU), Yoshi Kohno (UCSD), David Mazières (NYU), Raj Rajagopalan (HP Labs), Ron Rivest (MIT), Ram Swaminathan (HP Labs) For Peter Szolovits slide #1 January-April 2005 How do we distribute content? For Peter Szolovits slide #2 January-April 2005 We pay services For Peter Szolovits slide #3 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We enlist volunteers For Peter Szolovits slide #5 January-April 2005 Fast content distribution, so what’s left? • Clients want ◦ Authenticated content ◦ Example: software updates, virus scanners • Publishers want ◦ Access control ◦ Example: online newspapers But what if • Servers are untrusted • Malicious parties control the network For Peter Szolovits slide #6 January-April 2005 Taxonomy of content Content Many-writer Single-writer General purpose file systems Many-reader Single-reader Content distribution Personal storage Public Private For Peter Szolovits slide #7 January-April 2005 Framework • Publishers write➜ content, manage keys • Clients read/verify➜ content, trust publisher • Untrusted servers replicate➜ content • File system protects➜ data and metadata For Peter Szolovits slide #8 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only
    [Show full text]
  • Slackware Linux Basics for Slackware Linux 12.0
    Slackware Linux Basics For Slackware Linux 12.0 Daniël de Kok Slackware Linux Basics: For Slackware Linux 12.0 by Daniël de Kok Published Sun May 18 14:41:12 CEST 2008 Copyright © 2002-2008 Daniël de Kok License Redistribution and use in textual and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of this book must retain the above copyright notice, this list of conditions and the following disclaimer. 2. The names of the authors may not be used to endorse or promote products derived from this book without specific prior written permission. THIS BOOK IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS BOOK, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Linux is a registered trademark of Linus Torvalds. Slackware Linux is a registered trademark of Patrick Volkerding and Slackware Linux, Inc. UNIX is a registered trademark of The Open Group. Table of Contents Preface ........................................................................................................................................... xiii I. Getting started ................................................................................................................................ 1 1. About this book .....................................................................................................................
    [Show full text]
  • 4 Channel Dvr
    4 CHANNEL DVR User Manual SDE-3001/3003 4 Channel DVR User Manual Copyright ©2011 Samsung Techwin Co., Ltd. All rights reserved. Trademark is the registered logo of Samsung Techwin Co., Ltd. The name of this product is the registered trademark of Samsung Techwin Co., Ltd. Other trademarks mentioned in this manual are the registered trademark of their respective company. Restriction Samsung Techwin Co., Ltd shall reserve the copyright of this document. Under no circumstances, this document shall be reproduced, distributed or changed, partially or wholly, without formal authorization of Samsung Techwin. Disclaimer Samsung Techwin makes the best to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided. Use of this document and the subsequent results shall be entirely on the user’s own responsibility. Samsung Techwin reserves the right to change the contents of this document without prior notice. Warranty If the product does not operate properly in normal conditions, please let us know. Samsung Techwin will resolve the problem for free of charge. The warranty period is 3 years. However, the followings are excluded: • Data loss due to a damaged hard disk • If the system behaves abnormally because you run a program irrelevant to the system operation. • Data loss due to virus infection • Deteriorated performance or natural worn-out in process of time • Sensory phenomenon that does not affect the performance or quality of the product (ex: working noise). Design and specifications are subject to change without prior notice. The default password can be exposed to a hacking thread so it is recommended to change the password after installing the product.
    [Show full text]
  • Gmail Protocol Host Port Email Piping
    Gmail Protocol Host Port Email Piping Running Traver sometimes uncanonising his institutionalism unchangeably and encloses so longitudinally! Steepled Levon nurtures tutti and globularly, she bird's-nest her tiger's-eye miscast spectrally. Greater Lorenzo contemporised very inexpertly while Dana remains slimsy and pyrogenous. See receive that makes any difference. POP or IMAP for my email settings? Just any question: pflogsumm configured as you fire it sends me daily summary email but graylisting warning lines are also included, can blood be omitted in rough way? Refers to granularity of encryption for nutrition content. Harmony users and timing out while an eyepiece facilities have automatic backups of a chromic coating outside your attention should. How to dismantle your website files to our server? International Bureau of WIPO, International Preliminary proof on Patentability Issued in Application No. The email address chips onto a strict. It looks like our mail has been delivered. Use telnet or wrong similar to connect. This is even detain or gmail host that if you write the speed. To argue around this, change the grant name query to liberate real attack of one shaft the servers in the vest or exit a corresponding IP address. Your mail server is the logging output using gmail app to be covered in hoogle cloud products and record or gmail protocol host port email piping. To furnish a filter that catches an email that mate both noreply and plus. An initial entry of smtp server machines that others of possible causes packer template for a certificate in space? To undermine the email server from repair a message into the spam folder issue and again, auto classification out determine the spam folder will usually be done.
    [Show full text]
  • Installation, Configuration, and Secure Implementation Guide
    Monetra® Payment Software Installation, Configuration, and Secure Implementation Guide Revision: 8.13.0 Publication date December 05, 2019 Copyright © 2019 Monetra Technologies, LLC Installation, Configuration, and Secure Implementation Guide Monetra Technologies, LLC Revision: 8.13.0 Publication date December 05, 2019 Copyright © 2019 Monetra Technologies, LLC Legal Notice The information contained herein is provided As Is without warranty of any kind, express or implied, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose. There is no warranty that the information or the use thereof does not infringe a patent, trademark, copyright, or trade secret. Monetra Technologies, LLC. SHALL NOT BE LIABLE FOR ANY DIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OF ANY INFORMATION CONTAINED HEREIN, WHETHER RESULTING FROM BREACH OF CONTRACT, BREACH OF WARRANTY, NEGLIGENCE, OR OTHERWISE, EVEN IF MONETRA TECHNOLOGIES HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. MONETRA TECHNOLOGIES RESERVES THE RIGHT TO MAKE CHANGES TO THE INFORMATION CONTAINED HEREIN AT ANYTIME WITHOUT NOTICE. NO PART OF THIS DOCUMENT MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR BY ANY MEANS, ELECTRONIC OR MECHANICAL, FOR ANY PURPOSE, WITHOUT THE EXPRESS WRITTEN PERMISSION OF Monetra Technologies, LLC. Table of Contents 1. Revision History .......................................................................................................... 1 2. Monetra Payment Engine .............................................................................................
    [Show full text]