Configuration Guide--SAS 9.4 Foundation for Microsoft Windows For

Total Page:16

File Type:pdf, Size:1020Kb

Configuration Guide--SAS 9.4 Foundation for Microsoft Windows For Configuration Guide for SAS® 9.4 Foundation for Microsoft Windows for x64 Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2. 0 Guide for SAS® 9.4 Foundation for Microsoft Windows for x64, Cary, NC: SAS Institute Inc. Configuration Guide for SAS® 9.4 Foundation for Microsoft Windows for x64 Copyright © 2020, SAS Institute Inc., Cary, NC, USA All rights reserved. Produced in the United States of America. For a hard-copy book: No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, or otherwise, without the prior written permission of the publisher, SAS Institute Inc. For a web download or e-book: Your use of this publication shall be governed by the terms established by the vendor at the time you acquire this publication. The scanning, uploading, and distribution of this book via the Internet or any other means without the permission of the publisher is illegal and punishable by law. Please purchase only authorized electronic editions and do not participate in or encourage electronic piracy of copyrighted materials. Your support of others’ rights is appreciated. U.S. Government Restricted Rights Notice: Use, duplication, or disclosure of this software and related documentation by the U.S. government is subject to the Agreement with SAS Institute and the restrictions set forth in FAR 52.227-19, Commercial Computer Software-Restricted Rights (June 1987). SAS Institute Inc., SAS Campus Drive, Cary, North Carolina 27513. August 2020 SAS® Publishing provides a complete selection of books and electronic products to help customers use SAS software to its fullest potential. For more information about our e-books, e-learning products, CDs, and hard-copy books, visit the SAS Publishing web site at support.sas.com/bookstore or call 1-800-727-3228. SAS® and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration. Other brand and product names are registered trademarks or trademarks of their respective companies. Table of Contents Post-Installation Setup for SAS 9.4 Foundation ................................................... iv About this Guide ............................................................................................. iv Running SAS 9.4 from a Command Console in any Folder ............................... iv Additional Resources ...................................................................................... iv Configuring Hadoop-related Software ............................................................................. iv Troubleshooting System Performance Problems ............................................................... iv Chapter 1: Post-Installation Setup for the Metabase Facility ............................... 1 Setting Up the System Repository Manager Files............................................ 1 Registering the SASHELP Repository in the Repository Manager .................... 1 Converting Version 6 SAS/EIS Metabases to Version 8 Repositories .............. 2 Chapter 2: Post-Installation Instructions for National Language Support (NLS) ......................................................................................................................... 3 Introduction ................................................................................................... 3 Selecting the LOCALE during SAS Foundation Deployment ............................. 4 Chinese, Japanese, and Korean DBCS Support................................................ 4 Asian Font Catalogs ...................................................................................................... 4 Installing Traditional Chinese Fonts ................................................................................ 4 Chapter 3: Restricted Options ................................................................................ 7 Global Restrictions ......................................................................................... 7 User Restrictions ............................................................................................ 7 Additional information .................................................................................... 7 Chapter 4: Configuring SAS Analytics Accelerator for Teradata ........................ 9 Prerequisites .................................................................................................. 9 Database Permissions for Registering the UDFs ................................................................ 9 UDF Installation Session Encoding .................................................................................. 9 Registering the UDFs ...................................................................................... 9 Alternative to PROC FedSQL ........................................................................................ 11 Re-enable the Default HTML ODS Destination............................................... 11 Documentation for Using the UDFs ............................................................... 11 Chapter 5: SAS/ACCESS Interfaces ..................................................................... 13 SAS/ACCESS Interface to Amazon Redshift .................................................. 13 SAS/ACCESS Interface to Aster .................................................................... 13 Installing and Configuring the ODBC Driver and Bulk Loader ............................................ 13 SAS/ACCESS Interface to Greenplum ........................................................... 14 Bulk Load .................................................................................................................. 15 SAS/ACCESS Interface to Hadoop ................................................................ 15 SAS/ACCESS Interface to HAWQ .................................................................. 15 Bulk Load .................................................................................................................. 16 SAS/ACCESS Interface to Impala ................................................................. 16 SAS/ACCESS Interface to Microsoft SQL Server ........................................... 16 SAS/ACCESS Interface to MySQL .................................................................. 17 i 17 August 2020 Configuration Guide for SAS 9.4 Foundation for Microsoft Windows for x64 SAS/ACCESS Interface to ODBC ................................................................... 18 SAS/ACCESS Interface to Oracle .................................................................. 19 SAS/ACCESS Interface to PC Files ................................................................ 19 SAS/ACCESS Interface to the PI System ...................................................... 20 Multi-byte Character Sets ............................................................................................ 21 SAS/ACCESS Interface to R/3 ...................................................................... 21 SAS/ACCESS Interface to Salesforce ............................................................ 21 SAS/ACCESS Interface to SAP ASE ............................................................... 21 SAS/ACCESS Interface to SAP HANA ............................................................ 22 Create a Data Source.................................................................................................. 22 Bulk Load .................................................................................................................. 23 SAS/ACCESS Interface to SAP IQ ................................................................. 23 SAS/ACCESS Interface to Snowflake ............................................................ 23 SAS/ACCESS Interface to Teradata .............................................................. 23 Teradata Parallel Transporter ....................................................................................... 23 TPT or Legacy Teradata Utility (FastExport and Multiload) ............................................... 25 Legacy Teradata Utility Configuration ............................................................................ 25 SAS/ACCESS Interface to Vertica ................................................................. 26 SAS Code Examples ................................................................................................... 26 SAS/ACCESS Interface to Yellowbrick .......................................................... 26 Chapter 6: Configuring and Administering SAS In-Database Products............ 28 Configuring and Administering SAS Data Loader for Hadoop ........................ 28 SAS Data Loader for Hadoop vApp ............................................................................... 29 Chapter 7: Post-Installation Setup for SAS/ASSIST Software ........................... 30 Adding a Master Profile ................................................................................ 30 Chapter 8: SAS/CONNECT Configuration ............................................................ 32 Storing and Locating SAS/CONNECT Script Files .......................................... 32 TCP/IP ......................................................................................................... 32 Configuring the SAS Windows Spawner Program ........................................
Recommended publications
  • IBM System/360 Operating System Sequential Access Methods Program Logic Manual
    Y28-6604-1 Program Logic IBM System/360 Operating System Sequential Access Methods Program Number 3S0S-DM-50B This publication describes the internal logic of the routines of the queued sequen­ tial access method, the basic sequential access method, and the basic partitioned access method of IBM System/360 Operating System. Program Logic Manuals are intended for use by IBM customer engineers involved in program maintenance, and by system pro­ grammers involved in altering the program design. Program logic information is not necessary for program operation and use; therefore, distribution of this manual is limited to persons with program maintenance or modification responsibilities. Restricted Distribution PREFACE This publication describes the sequen­ • Buffer pool management routines that tial access method facilities in IBM Oper­ furnish buffer space in main storage. ating System/360. It describes routines in five categories: PREREQUISITE PUBLICATIONS • Queued sequential access method rou­ tines that cause storage and retrieval Knowledge of the information in the of data records arranged in sequential following publications is required for an order .• understanding of this publication: • Basic sequential access method routines IBM system/360 Operating System: Data that cause storage and retrieval of Management, Form C28-6537 data blocks arranged in sequential order. IB,M Systerol360 Operating System: Intro­ duction to Control Program Logic. Pro­ • Basic partitioned access method rou­ gram Logic Manual, Form Y28-6605 tines that cause storage and retrieval of data blocks in a member of a parti­ tioned data set, and construct entries and search for entries in the directory RECOMMENDED READING of a partitioned data set. The publication IBM System/360 Operating • Executors that operate with System: Control Program SerVices, Form input/output supp~rt routines.
    [Show full text]
  • PKZIP MVS User's Guide
    PKZIP for MVS MVS/ESA, OS/390, & z/OS User’s Guide PKMU-V5R5000 PKWARE, Inc. PKWARE, Inc. 9009 Springboro Pike Miamisburg, Ohio 45342 Sales: 937-847-2374 Support: 937-847-2687 Fax: 937-847-2375 Web Site: http://www.pkzip.com Sales - E-Mail: [email protected] Support - http://www.pkzip.com/support 5.5 Edition (2003) PKZIP for MVS™, PKZIP for OS/400™, PKZIP for VSE™, PKZIP for UNIX™, and PKZIP for Windows™ are just a few of the many members in the PKZIP® family. PKWARE, Inc. would like to thank all the individuals and companies -- including our customers, resellers, distributors, and technology partners -- who have helped make PKZIP® the industry standard for Trusted ZIP solutions. PKZIP® enables our customers to efficiently and securely transmit and store information across systems of all sizes, ranging from desktops to mainframes. This edition applies to the following PKWARE of Ohio, Inc. licensed program: PKZIP for MVS™ (Version 5, Release 5, 2003) PKZIP(R) is a registered trademark of PKWARE(R) Inc. Other product names mentioned in this manual may be a trademark or registered trademarks of their respective companies and are hereby acknowledged. Any reference to licensed programs or other material, belonging to any company, is not intended to state or imply that such programs or material are available or may be used. The copyright in this work is owned by PKWARE of Ohio, Inc., and the document is issued in confidence for the purpose only for which it is supplied. It must not be reproduced in whole or in part or used for tendering purposes except under an agreement or with the consent in writing of PKWARE of Ohio, Inc., and then only on condition that this notice is included in any such reproduction.
    [Show full text]
  • PCLTA-21 PCI Network Adapter Models 74501, 74502, 74503, and 74504
    PCLTA-21 PCI Network Adapter Models 74501, 74502, 74503, and 74504 ▼ Universal 32-bit PCI adapter card for LONWORKS® networks for PCs with 3.3V or 5V PCI ▼ Plug-and-play network driver compatible with MicrosoftWindows® 98/2000 and Windows XP ▼ Downloadable firmware allows updates without accessing or changing hardware ▼ Integral FT 3150® Free Topology Smart Transceiver, RS-485, TPT/XF-78, or TPT/XF-1250 transceiver ▼ LNS® Network Services Interface (NSI) supports LNS applications ▼ Layer 5 MIP for use with OpenLDV™ driver Description ▼ CE Mark, U.L. Listed, cU.L. Listed The PCLTA-21 Network Adapter is a high-perform- ance LONWORKS interface for personal computers equipped with a 3.3V or 5V 32-bit Peripheral The NSI mode of the PCLTA-21 adapter is used Component Interconnect (PCI) interface and a compati- with applications based on the LNS network operating system such as the LonMaker Tool, or the LNS DDE ble operating system. Designed for use in LONWORKS control networks that require a PC for monitoring, Server. managing, or diagnosing the network, the PCLTA-21 The MIP mode of the PCLTA-21 adapter is used with adapter is ideal for industrial control, building automa- applications based on OpenLDV. tion, and process control applications. The PCLTA-21 In both NSI and MIP modes, the adapter permits the adapter features an integral twisted pair transceiver, host PC to act as a LONWORKS application device, such downloadable memory, a network management inter- that the PC is running application-specific programs face, and plug-and-play capability with Microsoft while the adapter handles lower layer functions such as Windows 98/2000 and Windows XP.
    [Show full text]
  • Systematic Testing of the Continuous Behavior of Automotive Systems
    Systematic Testing of the Continuous Behavior of Automotive Systems Eckard Bringmann Andreas Krämer DaimlerChrysler DaimlerChrysler Alt-Moabit 96a Alt-Moabit 96a 10559 Berlin, Germany 10559 Berlin, Germany +49 30 39982 242 +49 30 39982 336 [email protected] [email protected] ABSTRACT gap, the testing of automotive systems in practice focuses on In this paper, we introduce a new test method that enables the simple data tables to describe input signals or on script languages, systematic definition of executable test cases for testing the such as Visual Basic, Python or Perl, to automate tests. continuous behavior of automotive embedded systems. This Nevertheless, signals are still very difficult to handle in these method is based on a graphical notation for test cases that is not languages. Even worse, there is no systematic procedure to help only easy to understand but also powerful enough to express very testers reveal redundancies and missing, test relevant, aspects complex, fully automated tests as well as reactive tests. This new within their test cases. In other words, the selection of test data approach is already in use in several production-vehicle occurs ad hoc and is based on some use cases and typical extreme development projects at DaimlerChrysler and at some suppliers. scenarios but often does not cover all functional requirements of the system under test (SUT). Categories and Subject Descriptors Our new approach – which is called Time Partition Testing D2.5 [Software Engineering]: Testing
    [Show full text]
  • IBM Mainframe Utility Programs ­ Wikipedia, the Free Encyclopedia IBM Mainframe Utility Programs from Wikipedia, the Free Encyclopedia
    9/11/2015 IBM mainframe utility programs ­ Wikipedia, the free encyclopedia IBM mainframe utility programs From Wikipedia, the free encyclopedia IBM mainframe utility programs are Utility software supplied with IBM mainframe operating systems such as MVS to carry out various tasks associated with datasets, etc. The following list describes utilities distributed with OS/360 and successors. No VSE or VM utilities are included. Contents 1 History/Common JCL 2 Dataset utilities 2.1 IDCAMS 2.2 IEBCOMPR 2.3 IEBCOPY 2.4 IEBDG 2.5 IEBEDIT 2.6 IEBGENER 2.7 IEBIMAGE 2.8 IEBISAM 2.9 IEBPTPCH 2.10 IEBUPDTE 3 Scheduler utilities 3.1 IEFBR14 4 System utilities 4.1 ICKDSF 4.2 IEHDASDR 4.3 IEHINITT 4.4 IEHLIST 4.5 IEHMOVE 4.6 IEHPROGM 5 Supporting programs 5.1 SORT 5.2 Compilers/Linker 5.3 DFSMS 6 References 7 See also 8 External links History/Common JCL Many of these utilities were designed by IBM users, through the group SHARE, and then modified or extended by IBM from versions originally written by a user. https://en.wikipedia.org/wiki/IBM_mainframe_utility_programs 1/14 9/11/2015 IBM mainframe utility programs ­ Wikipedia, the free encyclopedia These utilities are usually invoked via Job Control Language (JCL). They tend to use common JCL DD identifiers for their data sets: DDNAME Usual function input file for the 'commands' for the utility. Often set to DUMMY if the default action is SYSIN desired SYSUT1 input file SYSUT2 output file SYSUT3 work (spill) file for input (SYSUT1) (often not used) SYSUT4 work (spill) file for output (SYSUT2) (often not used) SYSPRINT output file for printed output from the utility SYSOUT output file for messages from the utility SYSUDUMP output file for a system 'dump' if the program fails Dataset utilities IDCAMS IDCAMS ("Access Method Services") generates and modifies Virtual Storage Access Method (VSAM) and Non­VSAM datasets.
    [Show full text]
  • Automated Unit Testing in Model-Based Embedded Software Development
    Automated Unit Testing in Model-based Embedded Software Development Christoph Luckeneder1, Hermann Kaindl1 and Martin Korinek2 1Institute of Computer Technology, TU Wien, Vienna, Austria 2Robert Bosch AG, Gollnergasse¨ 15-17, Vienna, Austria Keywords: Automated Testing, Unit Tests, Model-based Development, Embedded Software, Safety-critical Systems, Automotive. Abstract: Automating software tests is generally desirable, and especially for the software of safety-critical real-time systems such as automotive control systems. For such systems, also conforming with the ISO 26262 standard for functional safety of road vehicles is absolutely necessary. These are embedded systems, however, which pose additional challenges with regard to test automation. In particular, the questions arise on which hardware platform the tests should be performed and by use of which workflow and tools. This is especially relevant in terms of cost, while still ensuring conformance with ISO 26262. In this paper, we present a practical approach for automated unit testing in model-based embedded software development for a safety-critical automotive application. Our approach includes both a workflow and sup- porting tools for performing automated unit tests. In particular, we analyze an as-is workflow and propose changes to the workflow for reducing costs and time needed for performing such tests. In addition, we present an improved tool chain for supporting the test workflow. In effect, without manually implementing each test case twice unit tests can be performed both in a simulation environment and on an open-loop test environment including the embedded platform target hardware. 1 INTRODUCTION The following support through a tool chain was planned: modeling and simulation of the resulting Automotive systems have more and more become software models, as well as model-based test automa- software-intensive systems, which include large-scale tion.
    [Show full text]
  • Systems Introduction to OS/VS2 Release 2 First Edition (March, 1973)
    GC28-0661-1 File No. S370-34 Systems Introduction to OS/VS2 Release 2 First Edition (March, 1973) This edition is a reprint of GC28-0661{) incorporating some editorial changes. It does not obsolete GC28-0661-O. This edition applies to Release 2 of OS/VS2 and to all subsequent releases until otherwise indicated in new editions or Technical Newsletters. Changes are continually made to the information herein; before using this publication in connection with the operation of IBM systems, consult the latest IBM System/360 and System/370 Bibliography, Order No. GA22-6822, and the current SRL Newsletter. Order No. GN20-0360, for the editions that are applicable and current. Requests for copies of IBM publications should be made to your IBM representative or to the IBM branch office serving your locality. A form for readers' comments is provided at the back of this pUblication. If the form has been removed, comments may be addressed to IBM Corporation, Publications Development, iJepartment 058, Building 706-2, PO Box 390, Poughkeepsie, N.Y. 12602. Comments and suggestions become the property of IBM. © Copyright International Business Machines Corporation 1973 Preface This publication contains introductory information Design Concepts -- shows sequence of operation and about OS/VS2 Release 2, a system control other highlights of system design. program (SCP) that features virtual storage, System Requirements -- lists the basic hardware multiprogramming, multiprocessing, time sharing, requirements. and job entry subsystems. It is assumed that readers have a basic knowledge of programming Compatibility -- points out the major differences systems such as OS/MVT or OS/VS2 Release 1.
    [Show full text]
  • State of Florida Department of Children and Families Access Florida System Technical Architecture Overview Itn
    STATE OF FLORIDA DEPARTMENT OF CHILDREN AND FAMILIES ACCESS FLORIDA SYSTEM TECHNICAL ARCHITECTURE OVERVIEW ITN# - 03F12GC1 JUNE 1, 2012 STATE OF FLORIDA – DEPARTMENT OF CHILDREN AND FAMILIES June 1, 2012 Table of Contents 1.0 Background and Organization Overview .......................................................................................... 1 1.1 Background ................................................................................................................................... 1 1.2 Program of Service Specific Terms ................................................................................................ 3 1.3 ACCESS Florida IT Organization and Activity Overview................................................................. 6 1.4 Northwood Shared Resource Center ............................................................................................ 7 2.0 Technical Overview ........................................................................................................................... 8 2.1 Application Frameworks ............................................................................................................... 8 2.2 Databases Types ........................................................................................................................... 9 2.3 Data Access Technologies ........................................................................................................... 10 2.4 Data Security ..............................................................................................................................
    [Show full text]
  • VSAM Demystified
    Front cover VSAM Demystified Learn the latest VSAM functions and manage VSAM data Understand, evaluate, and use VSAM properly Learn problem determination and recommendations Mary Lovelace Jose Dovidauskas Alvaro Salla Valeria Sokal ibm.com/redbooks International Technical Support Organization VSAM Demystified March 2013 SG24-6105-02 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Third Edition (March 2013) This edition applies to z/OS Version 1 Release 13 DFSMS (product number 5694-A01). © Copyright International Business Machines Corporation 2001, 2012, 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii The team who wrote this book . xiii Now you can become a published author, too! . xiv Comments welcome. xiv Stay connected to IBM Redbooks . xiv Summary of changes. xvii March 2013, Third Edition . xvii Chapter 1. VSAM basics . 1 1.1 VSAM functions by release level. 2 1.2 What is VSAM? . 4 1.2.1 What is an access method? . 4 1.2.2 VSAM access types . 4 1.3 VSAM functions. 5 1.3.1 Catalog management . 5 1.3.2 Record management . 5 1.4 VSAM terminology and concepts . 5 1.4.1 Logical record . 5 1.4.2 Physical record . 8 1.4.3 Control interval . 10 1.4.4 Spanned records. 11 1.4.5 Control area . 12 1.4.6 Components . 13 1.4.7 Clusters. 15 1.4.8 Alternate indexes .
    [Show full text]
  • Software Guide the Computer with Growth Potential
    February 1980 Volume 3 Issue 2 NEW: Professional software guide The computer with growth potential The System Three is Cromemco's best selling small business computer. It's easy to see why. Not only is it ideal for the first time computer user. But perhaps more important, it can be expanded into a comprehensive business facility servicing many varied company requirements. Single -user system You can start small. A 64K computer with a megabyte of floppy disc storage costs under £4,000.* Perhaps your initial reason for choosing Cromemco was its flexible database management system-ideal for client records, order processing, sales analysis, inventory control, and many more business uses; or you might have required the full screen word processing system, capable of printing up to 20 original letters an hour; possibly you needed Cobol, Basic or Fortran to develop your own customised packages. Single -user System Three, with 64K memory, 2 discs, terminal and printer. Easy to use Ideal for small businesses. Whatever the reason, you were highly impressed with the ease with which your Will it expand? Multi-user system very first computer application got off the It was then you discovered that the Fortunately, we can readily expand your ground. So you added another. And terminal is the limiting factor, because ofCromemco. Unlike other makers' systems, another. And pretty soon quite a lot of the time taken to input data. If only you all we need to do is add some memory and a company business was running on your could connect a second terminal you ®TU-ART interface, and the multi-user Cromemco.
    [Show full text]
  • TPT Tutorial
    Time Partition Testing Systematic automated testing of embedded systems PikeTec GmbH, http://www.piketec.com There are only a few tools for testing embedded systems in the automotive domain. Their function usually lies in the test-management or automation of tests by means of test scripts. Time Partition Testing (TPT) noticeably exceeds this. It combines a systematic and very graphic modelling technique for test cases with a fully automatic test execution in different environments and automatic test evaluation in a unique way. In doing so, TPT even supports testing of control systems. Time Partition Testing (TPT) was developed to graphically and compactly model tests of embedded systems – especially those with continuous behaviour –, to automate those tests and to offer a systematic that supports the tester in selecting an ideal amount of test cases. The intuitive graphic modelling technique for test cases, the mechanisms for the structuring of complex test problems, the simple integration in any test- bench and a number of additional interesting features makes TPT a unique test solution. All this has contributed to TPT becoming the central testing tool in a large number of development projects at car manufacturers and suppliers and has become an integral part of the process chain. Embedded systems TPT is specialized on testing embedded systems whose inputs and outputs can be represented as signals. Most control systems belong to this system class. The implementation language of the embedded system (e.g. ‘C’ code, C++, MATLAB/Simulink/Stateflow, Statemate or a combination of multiple languages) is irrelevant for TPT. TPT does not require a particular implementation language.
    [Show full text]
  • Testwell CTC++ Test Coverage Analyser
    Testwell CTC++ Test Coverage Analyser What is Testwell CTC++? Testwell CTC++ is the leading Code Coverage Tool for measuring Code Coverage on host and on all embedded targets (even very small ones). The tool can be used to fulfill the code coverage requirements of safety standards like DO-178C, ISO 26262, EN 50128, and IEC 60880. Hundreds of companies in more than 30 countries all over the world use Testwell CTC++ in order to insure the quality of their softwares. Testwell CTC++ is the first choice for companies which have to achieve and to proof high code coverage in aerospace, automotive, transportation, healthcare, nuclear power and other industries. Why Code Coverage? Code coverage is a measure, which describes the degree to which the source code of a program is tested. This can be considered as an indirect measure of quality of the software. Code coverage finds areas of a program which have not yet exercised by a set of test cases. This way it supports you by creating additional test cases to increase the code coverage and prevents you from writing redundant test cases. Code coverage is most useful during the module testing phase, though it also has benefit during integration testing and at other times, depending on how and what you are testing. Code coverage is « highly recommanded » (which means de facto mandatory) for safety critical software. Safety standards like DO-178C (Software Considerations in Airborne Systems and Equipment Certification), IEC/EN 61508 (functional safety of electrical/electronic, programmable electronic safety-related systems), EN 50128 (Railway applications - Communication, signalling and processing systems - Software for railway control and protection systems), IEC 60880 (nuclear power), and ISO 26262 (functional safety of road vehicles) request different levels of code coverage according to the safety level of the application.
    [Show full text]