EMC VMAX Enas CLI Reference Guide

Total Page:16

File Type:pdf, Size:1020Kb

EMC VMAX Enas CLI Reference Guide EMC® VMAX® eNAS CLI Reference Guide Version 8.1.12.27 For: VMAX3™ Family: VMAX 100K, 200K, 400K VMAX All Flash: 250F, 450F, 850F, 950F REVISION 01 Copyright © 2016-2017 EMC Corporation All rights reserved. Published May 2017 Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA. EMC Corporation Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.EMC.com 2 eNAS CLI Reference Guide 8.1.12.27 For: VMAX3 Family: VMAX 100K, 200K, 400K VMAX All Flash: 250F, 450F, 850F, 950F PREFACE As part of an effort to improve its product lines, EMC periodically releases revisions of its software and hardware. Therefore, some functions described in this document might not be supported by all versions of the software or hardware currently in use. The product release notes provide the most up-to-date information on product features. Contact your EMC representative if a product does not function properly or does not function as described in this document. Note This document was accurate at publication time. New versions of this document might be released on EMC Online Support (https://support.emc.com). Check to ensure that you are using the latest version of this document. Purpose This reference guide provides man pages for all the eNAS CLI commands. Audience This manual provides reference information for command-line users and script programmers that focus on configuring and managing eNAS on VMAX arrays. Related documentation The following documents provide additional eNAS information: l VMAX eNAS Release Notes Describes new features and identifies any known functionality restrictions and performance issues that may exist with the current version and your specific storage environment. l VMAX eNAS File Auto Recovery with SRDF/S Describes how to install and use File Auto Recovery to failover/move eNAS Virtual Data Movers from source eNAS systems to destination eNAS systems using SRDF/S. l Using SRDF/S with VNX for Disaster Recovery Explains how to configure and manage SRDF/S. l EMC VNX Command Line Interface Reference for File Explains the command used to configure and manage an EMC file storage system. l Managing Volumes and File Systems on VNX Manually Explains how to create and aggregate different volume types into usable file system storage. l UsingVNX SnapSure Explains how to use EMC SnapSure to create and manage checkpoints. l Configuring Virtual Data Movers on VNX Explains how to configure and manage VDMs on a file storage system. l Configuring CIFS on VNX Explains how to configure and manage NFS. l Parameters Guide for VNX for File Explains how to view and modify parameters and system settings. PREFACE 3 PREFACE Where to get help EMC support, product, and licensing information can be obtained as follows: To open a service request through EMC Online Support (https://support.emc.com), you must have a valid support agreement. Contact your EMC sales representative for details about obtaining a valid support agreement or to answer any questions about your account. Product information For documentation, release notes, software updates, or information about EMC products, go to EMC Online Support at https://support.emc.com. NoteTechnical support EMC offers a variety of support options. l Support by Product — EMC offers consolidated, product-specific information on the Web at: https://support.EMC.com/products The Support by Product web pages offer quick links to Documentation, White Papers, Advisories (such as frequently used Knowledgebase articles), and Downloads, as well as more dynamic content, such as presentations, discussion, relevant Customer Support Forum entries, and a link to EMC Live Chat. l EMC Live Chat — Open a Chat or instant message session with an EMC Support Engineer. eLicensing support To activate your entitlements and obtain your VMAX license files, visit the Service Center on https://support.EMC.com, as directed on your License Authorization Code (LAC) letter emailed to you. l For help with missing or incorrect entitlements after activation (that is, expected functionality remains unavailable because it is not licensed), contact your EMC Account Representative or Authorized Reseller. l For help with any errors applying license files through Solutions Enabler, contact the EMC Customer Support Center. l If you are missing a LAC letter, or require further instructions on activating your licenses through the Online Support site, contact EMC's worldwide Licensing team at [email protected] or call: n North America, Latin America, APJK, Australia, New Zealand: SVC4EMC (800-782-4362) and follow the voice prompts. n EMEA: +353 (0) 21 4879862 and follow the voice prompts. Your comments Your suggestions help us improve the accuracy, organization, and overall quality of the documentation. Send your comments and feedback to: [email protected] 4 eNAS CLI Reference Guide 8.1.12.27 For: VMAX3 Family: VMAX 100K, 200K, 400K VMAX All Flash: 250F, 450F, 850F, 950F eNAS components The following terminology is used throughout this document: l Management Module Control Station (MMCS): Used by EMC Customer Support to configure eNAS, if necessary. l Network Address Translation (NAT) Gateway: Used to configure the external IP address of the Control Station. l Control Station (CS): Provides management functions to the file-side components referred to as Data Movers. l Data Mover (DM): Clients communicate with a Data Mover using either/both NFS and CIFS/SMB protocols. Clients are physically connected to the Data Mover through I/O modules on the storage array that are assigned to the Data Mover. The Data Mover accesses the client data by way of an internal interface to the storage array on which the Data Mover resides eNAS components 5 eNAS components 6 eNAS CLI Reference Guide 8.1.12.27 For: VMAX3 Family: VMAX 100K, 200K, 400K VMAX All Flash: 250F, 450F, 850F, 950F Control station The Control Station provides utilities for managing, configuring, and monitoring of the Data Movers in the eNAS system. As the system administrator, you may type commands through the Control Station to perform tasks that include the following: l Managing and Configuring the database and Data Movers l Monitoring statistics of the eNAS components NoteAccessing the Control Station You may use either local or remote access to the Control Station. To access locally a connection to serial port have to be established. l Local access to the command line interface is available directly at the Control Station console. l Remote access to the command line interface by using a secure, encrypted login application allows the use of the eNAS command set. Accessing the command line interface A description of how to gain local or remote access to the command line interface for the eNAS follows. For a local connection, connect a client to the Control Station serial port. l For local access to the command line interface, at the prompt, log in with your administrative username and password. Establish the connection to the Control Station with the following settings: Table 1 Control Station serial port connection settings Setting Value Bits per second 19200 Data bits 8 Parity None Stop bits 1 Flow control None Emulation Auto Detect Telnet terminal ID ANSI l For remote access to the command line interface: Control station 7 Control station 1. Use a secure, encrypted, remote login application capable of SSH. Type the IP address of the Control Station. 2. Log in with your administrative username and password. 8 eNAS CLI Reference Guide 8.1.12.27 For: VMAX3 Family: VMAX 100K, 200K, 400K VMAX All Flash: 250F, 450F, 850F, 950F Role-Based access The administrative user account you use to access the command line interface is associated with specific privileges, also referred to as roles. A role defines the privileges (operations) a user can perform on a particular eNAS object. The ability to select a predefined role or define a custom role that gives a user certain privileges is supported for users who access eNAS through the CLI, EMC Unisphere™, and the XML API. The Security Configuration Guide for VNX provides detailed information about how role- based access is used to determine the commands a particular user can execute. You create and manage user accounts and roles in Unisphere by using Settings > User Management. Role-Based access 9 Role-Based access 10 eNAS CLI Reference Guide 8.1.12.27 For: VMAX3 Family: VMAX 100K, 200K, 400K VMAX All Flash: 250F, 450F, 850F, 950F Command set conventions This manual uses commonly known command set conventions for the eNAS for file man pages. Each man page presents the command name at the top of the man page followed by a brief overview of what the command does. The synopsis contains the actual command usage. The description contains a more detailed breakdown of the features of the command, and the options describe what each switch or option does specifically. The ’See Also’ section refers to the technical modules that support the feature, in addition to any other commands that interact with the command. The examples are at the end of the command. The naming convention for the Data Mover variable in the command line interface is <movername> (default = server_2 to server_9).
Recommended publications
  • Using the EMC SRDF Adapter for Vmware Site Recovery Manager
    Using the EMC SRDF Adapter for VMware Site Recovery Manager Version 5.0 • SRDF Overview • Installing and Configuring the SRDF SRA • Initiating Test Site Failover Operations • Performing Site Failover/Failback Operations Drew Tonnesen September 2017 VMAX Engineering Copyright © 2017 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on support.emc.com. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. EMC is now part of the Dell group of companies. Part number H10553.8 2 Using EMC SRDF Adapter for VMware vCenter Site Recovery Manager Contents Preface Chapter 1 Symmetrix Remote Data Facility Introduction ....................................................................................... 14 SRDF overview.................................................................................
    [Show full text]
  • Powershell Scripting Language Course Proposal for Tallinn University of Technology
    TALLINN UNIVERSITY OF TECHNOLOGY School of Information Technologies Riivo Kiljak 178071IABM POWERSHELL SCRIPTING LANGUAGE COURSE PROPOSAL FOR TALLINN UNIVERSITY OF TECHNOLOGY Master’s thesis Supervisor: Siim Vene MSc Tallinn 2019 TALLINNA TEHNIKAULIKOOL¨ Infotehnoloogia teaduskond Riivo Kiljak 178071IABM POWERSHELLI SKRIPTIMISKEELE KURSUSE ETTEPANEK TALLINNA TEHNIKAULIKOOLILE¨ Magistrito¨o¨ Juhendaja: Siim Vene MSc Tallinn 2019 Author’s Declaration of Originality I hereby certify that I am the sole author of this thesis. All the used materials, references to the literature and the work of others have been referred to. This thesis has not been presented for examination anywhere else. Author: Riivo Kiljak 07.05.2019 3 Abstract In the thesis, a recommendation is made to establish a new course at TalTech. The course is intended to teach the PowerShell scripting language to students, most importantly in the IT Systems Administration programme. Course material is proposed in the form of lecture slides, home assignments and knowledge tests. All three of which are available in the appendices of the paper. Design science is used to pass iterations of improving the content prior the the paper publishing. Academic literature is analysed to determine the included and excluded topics and the teaching methodology. More- over, input is acquired from scrutinising public information on Microsoft’s official PowerShell courses and interviewing subject matter experts who use PowerShell at local companies. The course material is provided written in LATEX which means that it can be conveniently modified, version controlled and distributed in the PDF format. Although the proposed course is seen as an online course hosted on Moodle, argumentation is made suggesting a combination with classroom seminars is likely to result in better learning outcomes at the cost of scalability.
    [Show full text]
  • NOAA Technical Report NOS NGS 60
    NOAA Technical Report NOS NGS 60 NAD83 (NSR2007) National Readjustment Final Report Dale G. Pursell Mike Potterfield Rockville, MD August 2008 NOAA Technical Report NOS NGS 60 NAD 83(NSRS2007) National Readjustment Final Report Dale G. Pursell Mike Potterfield Silver Spring, MD August 2008 U.S. DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration National Ocean Service Contents Overview ........................................................................................................................ 1 Part I. Background .................................................................................................... 5 1. North American Datum of 1983 (1986) .......................................................................... 5 2. High Accuracy Reference Networks (HARNs) .............................................................. 5 3. Continuously Operating Reference Stations (CORS) .................................................... 7 4. Federal Base Networks (FBNs) ...................................................................................... 8 5. National Readjustment .................................................................................................... 9 Part II. Data Inventory, Assessment and Input ....................................... 11 6. Preliminary GPS Project Analysis ................................................................................11 7. Master File .....................................................................................................................11
    [Show full text]
  • A Brief History of UNIX File Systems
    A Brief History of UNIX File Systems Val Henson IBM, Inc. [email protected] Summary • Review of UNIX file system concepts • File system formats, 1974-2004 • File system comparisons and recommendations • Fun trivia • Questions and answers (corrections ONLY during talk) 1 VFS/vnode architecture • VFS: Virtual File System: common object-oriented interface to fs's • vnode: virtual node: abstract file object, includes vnode ops • All operations to fs's and files done through VFS/vnode in- terface • S.R. Kleiman, \Vnodes: An Architecture for Multiple File System Types in Sun UNIX," Summer USENIX 1986 2 Some Definitions superblock: fs summary, pointers to other information inode: on-disk structure containing information about a file indirect block: block containing pointers to other blocks metadata: everything that is not user data, including directory entries 3 Disk characteristics • Track - contiguous region, can be read at maximum speed • Seek time - time to move the head between different tracks • Rotational delay - time for part of track to move under head • Fixed per I/O overhead means bigger I/Os are better 4 In the beginning: System V FS (S5FS) (c. 1974) • First UNIX file system, referred to as \FS" • Disk layout: superblock, inodes, followed by everything else • 512-1024 byte block size, no fragments • Super simple - and super slow! 2-5% of raw disk bandwidth 5 Berkeley Fast File System (FFS or UFS) (c. 1984) • Metadata spread throughout the disk in \cylinder groups" • Block size 4KB minimum, frag size 1KB (to avoid 45% wasted space) • Physical
    [Show full text]
  • A Longitudinal and Cross-Dataset Study of Internet Latency and Path Stability
    A Longitudinal and Cross-Dataset Study of Internet Latency and Path Stability Mosharaf Chowdhury Rachit Agarwal Vyas Sekar Ion Stoica Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2014-172 http://www.eecs.berkeley.edu/Pubs/TechRpts/2014/EECS-2014-172.html October 11, 2014 Copyright © 2014, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. A Longitudinal and Cross-Dataset Study of Internet Latency and Path Stability Mosharaf Chowdhury Rachit Agarwal Vyas Sekar Ion Stoica UC Berkeley UC Berkeley Carnegie Mellon University UC Berkeley ABSTRACT Even though our work does not provide new active mea- We present a retrospective and longitudinal study of Internet surement techniques or new datasets, we believe that there is value in this retrospective analysis on several fronts. First, it latency and path stability using three large-scale traceroute provides a historical and longitudinal perspective of Internet datasets collected over several years: Ark and iPlane from path properties that are surprisingly lacking in the measure- 2008 to 2013 and a proprietary CDN’s traceroute dataset spanning 2012 and 2013. Using these different “lenses”, we ment community today. Second, it can help us revisit and revisit classical properties of Internet paths such as end-to- reappraise classical assumptions about path latency and sta- end latency, stability, and of routing graph structure.
    [Show full text]
  • CONESTOGA CABINET ASSEMBLY INFORMATION What Is Included with Your Cabinets: What Is Not Included with Your Cabinets
    CONESTOGA CABINET ASSEMBLY INFORMATION We suggest you view the 4 minute assembly demonstration video on our web site to see how easily our high end custom cabinets are assembled. Before continuing, it is important to realize that Conestoga’s RTA cabinet is targeted at cabinet shops who would rather use this system than build their own custom cabinets from scratch. On one hand, this indicates that it’s a VERY high quality cabinet. On the other hand, it means Conestoga has made some assumptions that its user has certain level of cabinet making skills and knowledge which most homeowners may not possess. As a result, we feel the assembly instructions Conestoga details in their guide are incomplete. Therefore, we have compiled the following assembly information from our years of assembly experience with this product. Remember, as opposed to other Conestoga Re-sellers or sales agents, we actually use the product every day. So, if you have a question that is not answered here, just give us a call and we can talk you through it, send you images from our shop floor, diagrams or even helpful hardware items to assist you. If it gets frustrating, take some time away and give us a call or shoot us an email. Rest assured, we’ll get you through it! What is Included with Your Cabinets: Everything necessary to build the cabinet box. Drawer glides and necessary hardware/screws. Hinges and necessary hardware/screws. Doors, drawer fronts and drawer boxes. What is not included with Your Cabinets: Screws required to mount drawer fronts to the drawer boxes (we use self tapping wood screws 1-1/4” long, available at local home centers or hardware stores.
    [Show full text]
  • Solve Errors Caused by Corrupt System Files
    System File Corruption Errors Solved S 12/1 Repair Errors Caused by Missing or Corrupt System Files With the information in this article you can: • Find out whether corrupt system files could be causing all your PC problems • Manually replace missing system files using your Windows installation CD • Use System File Checker to repair broken Windows system files • Boost the memory available to Windows File Protection for complete system file protection Missing or corrupt system files can cause many problems when using your PC, from cryptic error messages to mysterious system crashes. If one of the key files needed by Windows has gone missing or become corrupt, you may think that the only way to rectify the situation is to re-install Windows. Fortunately, nothing that drastic is required, as Microsoft have included several tools with Windows that allow you to replace corrupt or missing files with new, fresh copies directly from your Windows installation CD. Now, whenever you find that an important .DLL file has been deleted or copied over, you won’t have to go to the trouble of completely re-installing your system – simply replace the offending file with a new copy. Stefan Johnson: “One missing file can lead to your system becoming unstable and frequently crashing. You may think that the only way to fix the problem is to re-install Windows, but you can easily replace the offending file with a fresh copy from your Windows installation CD.” • Solve errors caused by corrupt system files ................... S 12/2 • How to repair your missing system file errors ..............
    [Show full text]
  • Information Technology Security Policy
    BRAIN UK UK Brain Archive Information Network INFORMATION TECHNOLOGY SECURITY POLICY SOP Reference BUK SOP 3 Version number 1.31 Date created 15 April 2015 Date of last review 15 April 2015 Date of next review 15 April 2017 Author: Name Dr Clare Mitchell Signature Authorised by: Name Prof. James A R Nicoll Signature Ref: 14/SC/0098 UK Brain Archive Information Network (BRAIN UK) SOP 3 v1.31 Date: 15 April 2015 - 1 - THIS PAGE IS BLANK Table of Contents Ref: 14/SC/0098 UK Brain Archive Information Network (BRAIN UK) SOP 3 v1.31 Date: 15 April 2015 - 2 - 1. Purpose 5 2. Policy Declaration 2.1 Data Storage 5 2.2 Backup and Recovery Plan 6 2.3 System access and Passwords 6 2.4 Encryption 6 2.5 Data Transfer 7 2.6 Physical Security 7 2.7 Data Quality and Accuracy 2.7.1 Data Entry 7 2.7.2 Data Modification and Deletion 7 2.8 System Specification 8 3. References 8 4. Supporting Documentation 8 Ref: 14/SC/0098 UK Brain Archive Information Network (BRAIN UK) SOP 3 v1.31 Date: 15 April 2015 - 3 - THIS PAGE IS BLANK Ref: 14/SC/0098 UK Brain Archive Information Network (BRAIN UK) SOP 3 v1.31 Date: 15 April 2015 - 4 - 1. Purpose BRAIN UK processes and maintains a large amount of valuable data. This policy aims to protect such data against loss, unauthorised access and modification, inadvertent destruction and to ensure that the integrity and quality of stored data is maintained. The data processed by BRAIN UK falls into one of two distinct categories: 1.
    [Show full text]
  • Misleading Stars: What Cannot Be Measured in the Internet?
    Noname manuscript No. (will be inserted by the editor) Misleading Stars: What Cannot Be Measured in the Internet? Yvonne-Anne Pignolet · Stefan Schmid · Gilles Tredan Abstract Traceroute measurements are one of the main in- set can help to determine global properties such as the con- struments to shed light onto the structure and properties of nectivity. today’s complex networks such as the Internet. This arti- cle studies the feasibility and infeasibility of inferring the network topology given traceroute data from a worst-case 1 Introduction perspective, i.e., without any probabilistic assumptions on, e.g., the nodes’ degree distribution. We attend to a scenario Surprisingly little is known about the structure of many im- where some of the routers are anonymous, and propose two portant complex networks such as the Internet. One reason fundamental axioms that model two basic assumptions on is the inherent difficulty of performing accurate, large-scale the traceroute data: (1) each trace corresponds to a real path and preferably synchronous measurements from a large in the network, and (2) the routing paths are at most a factor number of different vantage points. Another reason are pri- 1/α off the shortest paths, for some parameter α 2 (0; 1]. vacy and information hiding issues: for example, network In contrast to existing literature that focuses on the cardi- providers may seek to hide the details of their infrastructure nality of the set of (often only minimal) inferrable topolo- to avoid tailored attacks. gies, we argue that a large number of possible topologies Knowledge of the network characteristics is crucial for alone is often unproblematic, as long as the networks have many applications as well as for an efficient operation of the a similar structure.
    [Show full text]
  • PAX A920 Mobile Smart Terminal Quick Setup Guide
    PAX A920 QUICK SETUP GUIDE PAX A920 Mobile Smart Terminal Quick Setup Guide 2018000702 v1.8 1 PAX Technology® Customer Support [email protected] (877) 859-0099 www.pax.us PAX A920 QUICK SETUP GUIDE PAX A920 Mobile Terminal Intelligence of an ECR in a handheld point of sale. The PAX A920 is an elegantly designed compact secure portable payment terminal powered by an Android operating system. The A920 comes with a large high definition color display. A thermal printer and includes NFC contactless and electronic signature capture. Great battery life for portable use. 2018000702 v1.8 2 PAX Technology® Customer Support [email protected] (877) 859-0099 www.pax.us PAX A920 QUICK SETUP GUIDE 1 What’s in The Box The PAX A920 includes the following items in the box. 2018000702 v1.8 3 PAX Technology® Customer Support [email protected] (877) 859-0099 www.pax.us PAX A920 QUICK SETUP GUIDE 2 A920 Charging Instructions Before starting the A920 battery should be fully charged by plugging the USB to micro USB cord to a PC or an AC power supply and then plug the other end with the micro USB connector into the micro USB port on the left side of the terminal. Charge the battery until full. Note: There is a protective cover on the new battery terminals that must be removed before charging the battery. See Remove and Replace Battery section. 2018000702 v1.8 4 PAX Technology® Customer Support [email protected] (877) 859-0099 www.pax.us PAX A920 QUICK SETUP GUIDE 3 A920 Buttons and Functions Front Description 6 1 2 7 3 8 9 4 5 2018000702 v1.8 5 PAX Technology® Customer Support [email protected] (877) 859-0099 www.pax.us PAX A920 QUICK SETUP GUIDE 3.1 A920 Buttons and Functions Front Description 1.
    [Show full text]
  • Installation Tips
    Installation Tips Important Please Read Before Going Further! Installation of Kitchen Cabinets is NOT a Do-It-Yourself project for those without extensive experience in finish carpentry. If you are not a professional carpenter please seek help from a trained professional. This guide is meant to be used as a supplement to carpenters who are trained and familiar with cabinetry installa- tion techniques, it is not meant to be a stand alone installation guide. Version 1.0 - 2009 CABINET INSTALLATION TABLE OF CONTENTS Cabinet installation requires special skills and tools. If you are COMMON INSTALLATION TOOLS uncertain of any part of these basic instructions, terms or lack the minimum listed tools, consult with your cabinet supplier For professional results have the tools you need at hand and for recommended professional cabinet installation mechanics. ready. Here’s a tip: save changeover time by having two An error during installation can result in costly repairs and cordless screwguns – one with a drill bit for predrilling screw delays. holes and another with a screw tip. TERMS TO KNOW • Power Drill • Sand Paper • Drill Bits • Block Plane • Terms and Tools Level: A horizontal plane at right angles to the plumb. • Carpenter’s Levels (2’ & 4’) • Clamps • Carpenter’s Square • Caulking Plumb: A true vertical line. If something is “out of plumb” it •Tape Measure (1”x25’) • Chalk Line is not exactly straight up and down. • Step ladder • Mitre Box • Common Construction Details • Nail Set • Marking Tools Square: All lines parallel and at 90° to each other. • Extension Cord(s) • Stud Finder Rail: A horizontal framing member of a cabinet door.
    [Show full text]
  • PAX-It! TM Applications the Paxcam Digital USB 2.0 Camera System
    Digital Imaging Workflow for Industrial From the Makers of PAX-it! TM Applications The PAXcam Digital USB 2.0 Camera System l Affordable camera for microscopy, with an easy-to-use interface l Beautiful, high-resolution images; true color rendition l Fully integrated package with camera and software l USB 2.0 interface for the fastest live digital color preview on the market l Easy-to-use interface for color balance, exposure & contrast control, including focus indicator tool l Adjustable capture resolution settings (true optical resolution -- no interpolation) l Auto exposure, auto white balance and manual color adjustment are supported l Create and apply templates and transparencies over the live image l Acquire images directly into the PAX-it archive for easy workflow l Easy one-cable connection to computer; can also be used on a laptop l Adjustable region of interest means smaller file sizes when capturing images l PAXcam interface can control multiple cameras from the same computer l Stored presets may be used to save all camera settings for repeat conditions Capture Images Directly to PAX-it Image Database Software Includes PAXcam Video Agent for motion video capture l Time lapse image capture l Combine still images to create movie files l Extract individual frames of video clips as bitmap images Live preview up to 40 fps PAX-it! l File & retrieve images in easy-to-use cabinet/folder structure l Store images, video clips, documents, and other standard digital file types l Images and other files are in a searchable database that you
    [Show full text]