Installation Guide Version 4.2

Total Page:16

File Type:pdf, Size:1020Kb

Installation Guide Version 4.2 AIX Installation Guide Version 4.2 SC23-1924-00 AIX Installation Guide Version 4.2 First Edition (April 1996) This edition of the AIX Version 4.2 Installation Guide applies to the AIX Version 4.2 Licensed Program and to all subsequent releases of this product until otherwise indicated in new releases or technical newsletters. The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: THIS MANUAL IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you. It is not warranted that the contents of this publication or the accompanying source code examples, whether individually or as one or more groups, will meet your requirements or that the publication or the accompanying source code examples are error-free. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. It is possible that this publication may contain references to, or information about, products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that such products, programming, or services will be offered in your country. Any reference to a licensed program in this publication is not intended to state or imply that you can use only that licensed program. You can use any functionally equivalent program instead. A reader's comment form is provided at the back of this publication. If the form has been removed, address comments to Publications Department, Internal Zip 9561, 11400 Burnet Road, Austin, Texas 78758-3493. To send comments electronically, use this commercial internet address: aix6kpub@austin. ibm. corn. Any information that you supply may be used without incurring any obligation to you. @ Copyright International Business Machines Corporation 1996. All rights reserved. Notice to U.S. Government Users - Documentation Related to Restricted Rights - Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract. Trademarks and Acknowledgements The following trademarks and acknowledgements apply to this information: AIX is a registered trademark of International Business Machines Corporation. AIXwindows is a registered trademark of International Business Machines Corporation. IBM is a registered trademark of International Business Machines Corporation. InfoExplorer is a trademark of International Business Machines Corporation. Motif is a trademark of Open Software Foundation, Inc. NFS is a trademark of Sun Microsystems, Inc. NIS is a trademark of Sun Microsystems, Inc. PEX is a trademark of Massachusetts Institute of Technology. PowerPC is a trademark of International Business Machines Corporation. RISC System/6000 is a registered trademark of International Business Machines Corporation. SNA is a trademark of International Business Machines Corporation. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company Limited. X/Open is a trademark of X/Open Company Limited. Preface iii iv Installation Guide Contents About This Guide ...................................................... ix Chapter 1. Determining Your Starting Point .............................. 1-1 Installing BOS on a New Machine ......................................... 1-1 Upgrading to Version 4.2 from an Earlier Version ............................ 1-1 Installing Optional Software .............................................. 1-1 Customizing the BOS Install Program ..................................... 1-2 Installing BOS from a System Backup ..................................... 1-2 Chapter 2. Installing BOS from GO-ROM or Tape ......................... 2-1 Flowchart for BOS Installation from CD-ROM or Tape ........................ 2-1 Installing the Base Operating System ...................................... 2-1 Prerequisites ......................................................... 2-2 To Start the System ................................................... 2-3 To Install from CD-ROM or Tape ........................................ 2-5 To Verify the Default Instaliation and System Settings ..................... 2-7 To Change the Installation Method (Preservation or Migration Only) ......... 2-8 To Change the Destination Disk ........................................ 2-11 To Change the Primary Language Environment .......................... 2-13 To Change the Trusted Computing Base Setting .......................... 2-15 Chapter 3. Customizing Your Installation ................................ 3-1 Customization Tasks .................................................... 3-2 Flowchart for Installation Assistant Tasks ................................... 3-3 TCP/IP Minimum Configuration and Startup Worksheet ...................... 3-5 Updating the Host List Worksheet ......................................... 3-6 Mounting Remote File Systems Worksheet ................................. 3-7 Chapter 4. Customizing the BOS Install Program ......................... 4-1 Introduction to Customizing the BOS Install Program ........................ 4-1 Using a Customized bosinst.data File ...................................... 4-2 To Create and Use a Backup Tape ....................... , .. , ... '" ..... 4-2 To Create and Use a Client File ........................................ 4-2 To Create and Use a Supplementary Diskette ............................ 4-2 bosinst.data File Stanza Descriptions ...................................... 4-3 control_flow Stanza ................................................... 4-3 targeCdisk_data Stanza ............................................... 4-5 locale Stanza ........................................................ 4-6 Example bosinst.data Files ............................................... 4-6 mksysb Backup Restoration ........................................... 4-7 Nonprompted Installation .............................................. 4-7 Preface v Chapter 5. Installing BOS from a System Backup ......................... 5-1 Introduction to Backup Installations. .. 5-1 Setup Considerations .................................................. 5-1 Flowchart for Backup Installations. 5-2 To Install BOS from a System Backup ...................................... 5-2 Prerequisites. 5-2 To Start the System . 5-3 Nonprompted Installation ............................................... 5-5 Prompted Installation .................................................. 5-6 Chapter 6. Installing Optional Software and Service Updates .............. 6-1 Introduction to Installing Software and Service Updates . 6-1 Installing and Running Hardware Diagnostics ............................. 6-2 Software Licensing .................................................... 6-2 Software Packaging ................................................... 6-2 Migrating Software to AIX Version 4.2 .................................... 6-3 Flowchart for Installing Optional Software and Service Updates. 6-4 To Install Optional Software and Service Updates ............................ 6-4 Determine Your Starting Point . 6-5 Prerequisites. 6-5 To Install Optional Software and Service Updates with SMIT ................ 6-6 To Install Optional Software and Service Updates with a VSM Application . 6-13 Chapter 7. Maintaining Optional Software ................................ 7-1 Introduction to Software Maintenance ...................................... 7-1 Maintaining Optional Software and Service Updates with SMIT ................ 7-2 Maintaining Optional Software and Service Updates with a Visual System Management Application . 7-3 Chapter 8. Backing Up Your System...................................... 8-1 Introduction to Backing Up Your System .................................... 8-1 Configuring before the Backup .......................................... 8-1 Mounting and Unmounting File Systems . 8-2 Restoring a Backup Image. 8-2 To Back Up Your System. 8-3 Complete the Prerequisites ............................................. 8-3 To Back Up the Root Volume Group. 8-3 To Verify a Backup Tape. 8-5 To Back Up a User Volume Group ....................................... 8-6 vi Installation Guide Chapter 9. Troubleshooting ............................................. 9-1 Creating Bootable Tapes ................................................. 9-1 Accessing a System That Will Not Boot .................................... 9-2 Prerequisites ......................................................... 9-2 To Access the System ................................................. 9-2 Troubleshooting an Installation from a System Backup ....................... 9-7 Bootup Failure ....................................................... 9-7 Source and Target Differences ......................................... 9-8 Suggestions for Reported Problems .................................... 9-8 Cleaning Up Optional Software and Service Updates ........................ 9-8 To Clean Up Software with SMIT ....................................... 9-10 To Clean Up Software with a VSM Application ............................ 9-11 Troubleshooting a Full /usr File
Recommended publications
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • 802.11N Support in Freebsd (For the Run(4) Driver)
    802.11n support in FreeBSD (for the run(4) driver) 15412 F’19 1 / 15 Motivation ● “Do something with operating systems” – OS Junkie: Ubuntu → Fedora → Arch Linux → Gentoo → FreeBSD ● Do something for the community – So much free (not free as in free beer) software out there for use – Time to give something back! ● Faster WiFi doesn’t hurt – Makes FreeBSD more usable ● Less angry users: “But this works on Lunix!” 2 / 15 FreeBSD ● Open source, UNIX ● Official webpage: freebsd.org ● Large, helpful community – IRC Channels on Freenode (#freebsd) – Forums (forums.freebsd.org) – Mailing lists (lists.freebsd.org) ● Latest Release: FreeBSD 12 (2018) 3 / 15 802.11 ● IEEE 802.11: Standard for WiFi – 802.11b: 2.4GHz, Max rate 11 Mbps, range 150 ft., Year 1999 – 802.11g: 2.4 GHz, Max rate 54 Mbps, range 150 ft., Year 2003 – 802.11n: 2.4GHz or 5 GHz, Max rate 300 Mbps (single antenna), 450 Mbps (MIMO), range 175 ft., Year 2009 4 / 15 Ralink ● Produces WiFi chips – See https://wikidevi.com/wiki/Ralink for list of chips ● Linux driver: rt2800usb (USB Ralink 802.11n devices) ( https://wiki.debian.org/rt2800usb). ● FreeBSD driver: run (see https://www.freebsd.org/cgi/man.cgi?run(4) ) – Caveats : “The run driver does not support any of the 802.11n capabilities offered by the RT2800, RT3000 and RT3900 chipsets.“ 5 / 15 Existing code base ● The run driver supports several chipsets and adapters (such as ASUS USB N-66) but without support for 802.11n – This means reduced speeds – This means it will misbehave when you turn on your microwave ● run(4) also has annoying ‘device timeout’ errors where the card stops responding.
    [Show full text]
  • Cgatools Install Guide
    cgatools Installation Guide Version 1.2.0 Complete Genomics data is for Research Use Only and not for use in the treatment or diagnosis of any human subject. Information, descriptions and specifications in this publication are subject to change without notice. Copyright © 2010 Complete Genomics Incorporated. All rights reserved. cgatools Installation Guide Table Of Contents Table Of Contents Preface ........................................................................................................................................................................... 3 Conventions ................................................................................................................................................................................ 3 cgatools Documents ................................................................................................................................................................ 3 References ................................................................................................................................................................................... 3 Overview and Requirements ................................................................................................................................. 5 Install Process in a Nutshell ................................................................................................................................................. 5 User Requirements .................................................................................................................................................................
    [Show full text]
  • AD Management Tool Exhaustive Reports on User, Group, Computer, Exchange & GPO
    Stories Firehose All Popular Polls Video Jobs Deals Submit Search Login or Sig2n7 u7p Topics: Devices Build Entertainment Technology Open Source Science YRO Follow us: Follow Slashdot blog updates by subscribing to our blog RSS feed Nickname: Password: 6-20 characters long Public Terminal Log In Forgot your password? Sign in with Google Facebook Twitter LinkedIn Close AD Management Tool Exhaustive Reports on User, Group, Computer, Exchange & GPO GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support (phoronix.com) $0.32/Mbps IP Posted by timothy on Sunday January 31, 2016 @11:22AM from the pretty-soon-big-and-fancy-like-gnu dept. An anonymous reader writes: GNU developer Samuel Thibault presented at this weekend's FOSDEM conference Transit about the current state of GNU Hurd. He shared that over the past year they've started working on experimental IPv6+IPv4 and BGP For Your sound support as their big new feature. They also have x86 64-bit support to the point that the kernel can boot, but not Network in North America and much beyond that stage yet. USB and other functionality remains a work-in-progress. Those curious about this GNU kernel project can find more details via the presentation media. Europe gnu os software → Tiny Pluto Big On Frozen Water Reserves Kentucky Man Arrested After Shooting Down Drone Are We Reaching the Electric Car Tipping Point? Microsoft Is Downloading Windows 10 Without Asking Test Pilot: the F-35 Can't Dogfight Oregon Testing Pay-Per-Mile Driving Fee To Replace Gas Tax Submission: GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support FTDI Driver Breaks Hardware Again GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support 177 More | Reply Login GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support Post Load All Comments S1e5a Fruchll 8257 7A Cbobmremvieantetsd L0o Hg iIdnd/Cenreate an Account C/Soema ments Filter: AScllore: I5nsightful I4nformative I3nteresting F2unny 1The Fine Print: The following comments are owned by whoever posted them.
    [Show full text]
  • Implementation of Tripwire: a File System Integrity Checker
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 1993 The Design and Implementation of Tripwire: A File System Integrity Checker Gene H. Kim Eugene H. Spafford Purdue University, [email protected] Report Number: 93-071 Kim, Gene H. and Spafford, Eugene H., "The Design and Implementation of Tripwire: A File System Integrity Checker" (1993). Department of Computer Science Technical Reports. Paper 1084. https://docs.lib.purdue.edu/cstech/1084 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. THE DESIGN AND IMPLEMENTATION OF TRIPWIRE, A FILE SYSTEM INTEGRITY CHECKER Gene H. Kim Eugene H. SpDlford CSD·TR·93'()7I November 1993 The Design and Implementation of Tripwire: A File System Integrity Checker Purdue Technical Report CSD-TR-93-071 Gene H. Kim and Eugene H. Spafford COAST Laboratory Department of Computer Sciences Purdue University West Lafayette, IN 47907-1398 November 19, 1993 Abstract At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the base exe­ cutable version of the operating system itself. The ability to monitor file systems for unautho­ rized or unexpected changes gives system administrators valuable data for protecting and main­ taining their systems. However, in environments of many networked heterogeneous platforms with different policies and software, the task of monitoring changes becomes quite daunting. Tripwire is tool that aids UNIXl system administrators and users in monitoring a designated set offiles and directories for any changes.
    [Show full text]
  • DNS for Rocket Scientists Section 1 Overview
    DNS for Rocket Scientists This Open Source Guide is about DNS and (mostly) BIND 9.x on Linux (REDHAT Versions 6.x and 7.x) and the BSD's (FreeBSD, OpenBSD and NetBSD). It is meant for newbies, Rocket Scientist wannabees and anyone in between. This Guide was born out of our first attempts a number of years ago at trying to install a much needed DNS service on an early Redhat Linux system. We completed the DNS 'rite of passage' and found it a pretty unedifying and pointless experience. Health Warning: This is still a work-in-progress. If you have expertise in something - contribute some text. If you find errors don't grumble - tell us. Look at our to do list and if you want to contribute something please do so. And for all that hard work we promise only a warm sense of well-being and an acknowledgment of your work in the licence. Section 1 Overview What's new in Guide version 0.1.27 1. Boilerplate and Terminology 1.1 Objectives and Scope 1.2 How to read this Guide 1.3 Terminology and Conventions used 1.4 Acknowledgements 1.5 Copyright and License 2. DNS - Overview 2.1 A brief History of Name Servers 2.2 DNS Concepts & Implementation 2.2.1 DNS Overview 2.2.2 Domains and Delegation 2.2.3 DNS Organization and Structure 2.2.4 DNS System Components 2.2.5 Zones and Zone Files 2.2.6 DNS Queries 2.2.6.1 Recursive Queries 2.2.6.2 Iterative Queries 2.2.6.3 Inverse Queries 2.2.7 Zone Updates 2.2.7.1 Full Zone Transfer (AXFR) 2.2.7.2 Incremental Zone Transfer (IXFR) 2.2.7.3 Notify (NOTIFY) 2.2.7.4 Dynamic Zone Updates 2.2.7.5 Alternative Dynamic DNS Approaches 2.3 DNS Security Overview 2.3.1 Security Threats 2.3.2 Security Types 2.3.3 Local Security 2.3.4 Server-Server (TSIG Transactions) 2.3.5 Server-Client (DNSSEC) 3.
    [Show full text]
  • Geckos – a Unix-Like 6502 Operating System
    GeckOS – a Unix-like 6502 operating system Glenn Holmer VCFMW, 2019-09-14 Speaker Bio ✔ a.k.a. "Cenbe" ✔ retired Java programmer/Linux sysadmin ✔ collector of programming languages and operating systems for the Commodore 64: https://www.lyonlabs.org/commodore/ Happy 50th, Unix! wait... “Unix” on a 6502? ARE YOU CRAZY? wait... “Unix” on a 6502? Multi-tasking on a 6502 faces significant obstacles: ✔ typically no hardware memory management ✔ no hardware process protection (“ring 0”) ✔ limited number of registers ✔ single, fixed-location, 256-byte stack “Unix” on a Commodore 64? ✔ It’s been tried with varying degrees of fidelity, e.g. GeckOS, LUnix, Asterix, ACE... ✔ None of these are still being developed; most developers are no longer active in the Commodore community. ✔ GeckOS seems the most complete, most Unix-like and easiest to work with. GeckOS history ✔ Written by André Fachat, originally for the CS/A65 (a 6502 computer with a MMU that he built in 1989). ✔ Later expanded to run on other architectures (PET, Commodore 64). ✔ 2.0.9 released in 2013. ✔ Source available (GPL V2). André Fachat CS/A65 http://www.6502.org/users/andre/csa/index.html GeckOS features ✔ preemptive multi-tasking with priorities, multi-threading (max. 12 tasks, 12 threads) ✔ signals, semaphores ✔ redirection, piping, environment variables ✔ a standard library (lib6502) ✔ cross-assembler “xa” ✗ use 2.1.4h with GeckOS (not newer versions) ✗ output is o65 relocatable file format ✗ can produce label xref with addresses Cenbe’s Commentary on GeckOS I’ve been working on an analysis of GeckOS for those who would like to follow along at home: https://www.lyonlabs.org/commodore/onrequest/geckos-analysis.html ✔ source layout ✔ system initialization ✔ IRQ service routine ✔ forking new processes ✔ scheduler, task switching ✔ running programs from the shell So how does GeckOS do a task switch? ✔ An interrupt is generated every ~20ms by CIA 1 timer B to run the scheduler.
    [Show full text]
  • Linux Tutorial One -ASP2016- Session 1- 2 August 2016
    Linux Tutorial One -ASP2016- Session 1- 2 August 2016 1.1 Listing files and directories ls (list) When you first login, your current working directory is your home directory. Your home directory has the same name as your user-name, for example, pheneas, and it is where your personal files and subdirectories are saved. To find out what is in your home directory, type % ls (short for list) The ls command lists the contents of your current working directory. There may be no files visible in your home directory, in which case, the LUNIX prompt will be returned. Alternatively, there may already be some files inserted by the System Administrator when your account was created. ls does not, in fact, cause all the files in your home directory to be listed, but only those ones whose name does not begin with a dot (.) Files beginning with a dot (.) are known as hidden files and usually contain important program configuration information. They are hidden because you should not change them unless you are very familiar with LUNIX!!! To list all files in your home directory including those whose names begin with a dot, type % ls -a ls is an example of a command which can take options: -a is an example of an option. The options change the behaviour of the command. There are online manual pages that tell you which options a particular command can take, and how each option modifies the behaviour of the command. (See later in this tutorial) 1.2 Making Directories mkdir (make directory) We will now make a subdirectory in your home directory to hold the files you will be creating and using in the course of this tutorial.
    [Show full text]
  • Distributed File Systems for Unix
    Rochester Institute of Technology RIT Scholar Works Theses 2-28-1986 Distributed file systems for Unix Edward Ford Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Ford, Edward, "Distributed file systems for Unix" (1986). Thesis. Rochester Institute of echnologyT . Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Rochester Institute of Technology School of Computer Science and Technology Distributed File Systems for Unix by Edward Ford A thesis submitted to the Faculty of the School of Computer Science and Technology in partial fulflliment of the the requirements for the degree of Master of Science in Computer Science Approved by: Michael J. Lutz gA~~b, Professor Michael J. Lutz Lawrence A. Coon 2L~ Professor Lawrence A. Coon Margaret M. Reek ~~h>b Professor Margaret M. Reek Title of Thesis: p;s-t-g,. byte) -Fl. Lc; Sys CeA,1$ ~D"_ VNIX I hereby (grant/deny) permissIOn to the Wallace Memorial Library, o~ RIT, to reproduce my thesis in whole or in part. Ar,y reproduction will not be for commercial use or profit. or I Ed war d Ford prefer to be contacted each time a request for reproduction is made. I can be reached at the following address: Date: 3/3 18ft, -----_. -~---------.--..... -.-- .. -- Distributed Pile Systems for DNIX(*) Edward Ford ABSTRACT With the advent of distributed systems, mechanisms that support efficient resource sharing are necessary to exploit a distributed architec ture.
    [Show full text]
  • Unit 1 Operating System
    Operating System UNIT 1 OPERATING SYSTEM Structure Page No. 1.0 Introduction 5 1.1 Objectives 6 1.2 Familiarization (I/O Port, Keyboard, Memory) 6 1.2.1 Computer and Motherboard 6 1.2.2 I/O Ports 8 1.2.3 I/O Devices 9 1.2.4 Memory 14 1.3 Windows Operating System 16 1.3.1 Overviews of Windows 16 1.3.2 Windows Installing Procedure 17 1.3.3 Working with XP 25 1.4 Linux Operating System 31 1.4.1 Overview of LUNIX/LINUX Operating System 31 1.4.2 How to install Linux Operating System 32 1.4.3 Linux utilities and Basic Commands 41 1.5 Summary 53 1.6 Answers to Check Your Progress 53 1.0 INTRODUCTION In this unit, we are going to learn basics of computer. Computer is a machine that performs tasks or calculations according to a set of instructions, or programs. Compared to those early machines, today's computers are amazing. Not only are they thousands of times faster, they can fit on your desk, in your lap, or even in your pocket. Computers work through an interaction of hardware and software. Hardware is physical component of a computer system. It is a tiny rectangular chip inside the computer called the central processing unit (CPU), or microprocessor. It is the "brain" of computer—the part that translate instructions and performs calculations. Hardware items such as monitor, keyboard, mouse, printer, and other items are often called hardware devices. Software refers to the instructions or programs that tell the hardware what to do.
    [Show full text]
  • School Tablets Project for Developing Countries
    School tablets project for developing countries ↑ Source image : A indian tablet at 35 dollars, Thursday 20 october 2011, http://electrosphere.blogspot.fr/2011/10/une-tablette-tactile-indienne-35.html French text translated by Google translator. We apologize for any translation mistakes that may have occurred. Study author : Benjamin LISAN Email : [email protected] Document creation date : 03/07/2014 Document update date : 04/07/2014. Version V1.0 School tablets for poor countries 0. Summary 2 1. Introduction 1a. secondary specifications 2. What is a tablet ? 3. Evaluation of the cost of these tablets. 4. Additional parameters to evaluate. 4.1. Tablet size. 4.1bis. Tablet weight. 4.1ter. Format of the tablet. 4.2. Importance of the existence of a microSD slot. 4.3. Minimum necessary ports or slots. 4.4. What OS? (need for a standard Android updated regularly). 4.5. Presence or absence of an external keyboard? 4.6. The fragility of the tablets => precautions. 4.6bis. The risk of theft/steal 46ter. Parental Control 4.7. What software provide? 4.8. Updating software. 4.9. The screen technology. 4.10. The resolution of the screen. School tablets for poor countries 0. Sommaire 3 4.11. The processor and memory 4.12. The "no name" tablets 4.13. Ecological aspects 4.14. Examples … 5. Conclusion. A1. Appendix: Specifications of Aakash tablets. A2. Appendix: suggestion of free software and applications. A3. Appendix: update the document database. A4. Schedule: For more ... A4. Appendix: Glossary The example of the low cost Akash Indian tablet (~ 45 US $). School tablets for poor countries 1.
    [Show full text]
  • 2019 Embedded Markets Study Integrating Iot and Advanced Technology Designs, Application Development & Processing Environments March 2019
    2019 Embedded Markets Study Integrating IoT and Advanced Technology Designs, Application Development & Processing Environments March 2019 Presented By: © 2019 AspenCore All Rights Reserved 2 Preliminary Comments • Results: Data from this study is highly projectable at 95% confidence with +/-3.15% confidence interval. Other consistencies with data from previous versions of this study also support a high level of confidence that the data reflects accurately the EETimes and Embedded.com audience’s usage of advance technologies, software and hardware development tools, chips, operating systems, FPGA vendors, and the entire ecosystem of their embedded development work environment and projects with which they are engaged. • Historical: The EETimes/Embedded.com Embedded Markets Study was last conducted in 2017. This report often compares results for 2019 to 2017 and in some cases to 2015 and earlier. This study was first fielded over 20 years ago and has seen vast changes in technology evolution over that period of time. • Consistently High Confidence: Remarkable consistency over the years has monitored both fast and slow moving market changes. A few surprises are shown this year as well, but overall trends are largely confirmed. • New Technologies and IoT: Emerging markets and technologies are also tracked in this study. New data regarding IoT and advanced technologies (IIoT, embedded vision, embedded speech, VR, AR, machine learning, AI and other cognitive capabilities) are all included. 3 Purpose and Methodology • Purpose: To profile the findings of the 2019 Embedded Markets Study comprehensive survey of the embedded systems markets worldwide. Findings include technology used, all aspects of the embedded development process, IoT, emerging technologies, tools used, work environment, applications developed for, methods/ processes, operating systems used, reasons for using chips and technology, and brands and specific chips being considered by embedded developers.
    [Show full text]