Software License Agreements 485 B Tekmarnet® Internet Gateway 485 12/14 Accessories Replaces: New the Tekmarnet Internet Gateway 485 Includes Open Source Software

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Software License Agreements 485_B tekmarNet® Internet Gateway 485 12/14 Accessories Replaces: New The tekmarNet Internet Gateway 485 includes open source software. The software licenses are documented below and are also in- cluded with the source fi les. RAILS 3.2.14 Copyright (c) 2003-2014 David Heinemeier Hansson Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation fi les (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, dis- tribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Ruby 2.0.0 Ruby is copyrighted free software by Yukihiro Matsumoto <[email protected]>. You can redistribute it and/or modify it under either the terms of the 2-clause BSDL (see the fi le BSDL), or the conditions below: 1. You may make and give away verbatim copies of the source form of the software without restriction, provided that you duplicate all of the original copyright notices and associated disclaimers. 2. You may modify your copy of the software in any way, provided that you do at least ONE of the following: a) place your modifications in the Public Domain or otherwise make them Freely Available, such as by posting said modifications to Usenet or an equivalent medium, or by allowing the author to include your modifications in the software. b) use the modified software only within your corporation or organization. c) give non-standard binaries non-standard names, with instructions on where to get the original software distribution. d) make other distribution arrangements with the author. 3. You may distribute the software in object code or binary form, provided that you do at least ONE of the following: a) distribute the binaries and library files of the software, together with instructions (in the manual page or equivalent) on where to get the original distribution. b) accompany the distribution with the machine-readable source of the software. c) give non-standard binaries non-standard names, with instructions on where to get the original software distribution. d) make other distribution arrangements with the author. 4. You may modify and include the part of the software into any other software (possibly commercial). But some files in the distribution are not written by the author, so that they are not under these terms. For the list of those files and their copying conditions, see the file LEGAL. 5. The scripts and library files supplied as input to or produced as output from the software do not automatically fall under the copyright of the software, but belong to whomever generated them, and may be sold commercially, and may be aggregated with this software. 6. THIS SOFTWARE IS PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. RubyGems Copyright (c) 2009-2013, Nick Quaranto Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation fi les (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, dis- tribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. A Watts Water Technologies Company 1 of 10 © 2014 485_B - 12/14 PostgreSQL Copyright (c) 1996 -2014, The PostgreSQL Global Development Group Permission to use, copy, modify, and distribute this software and its documentation for any purpose, without fee, and without a written agreement is hereby granted, provided that the above copyright notice and this paragraph and the following two paragraphs appear in all copies. IN NO EVENT SHALL THE POSTGRESQL GLOBAL DEVELOPMENT GROUP BE LIABLE TO ANY PARTY FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS, ARISING OUT OF THE USE OF THIS SOFT- WARE AND ITS DOCUMENTATION, EVEN IF $ORGANISATION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. POSTGRESQL GLOBAL DEVELOPMENT GROUP SPECIFICALLY DISCLAIMS ANY WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PRO- VIDED HEREUNDER IS ON AN “AS IS” BASIS, AND POSTGRESQL GLOBAL DEVELOPMENT GROUP HAS NO OBLIGATIONS TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS. Prototype 1.7 Copyright (c) 2005-2010 Sam Stephenson Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation fi les (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, dis- tribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Protochart Copyright (c) 2008 [email protected] Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation fi les (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, dis- tribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Excanvas Copyright (c) 2006 Google Inc. Licensed under the Apache License, Version 2.0 (the “License”); you may not use this fi le except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specifi c language gov- erning permissions and limitations under the License. Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. “License” shall mean the terms and conditions for use, reproduction, and distribution as defi ned by Sections 1 through 9 of this document. “Licensor” shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. “Legal Entity” shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this defi nition, “control” means (i) the power, direct or indirect, to cause the direction or manage- ment of such entity, whether by contract or otherwise, or (ii) ownership of fi fty percent (50%) or more of the outstanding shares, or (iii) benefi cial ownership of such entity. “You” (or “Your”) shall mean an individual or Legal Entity exercising permissions granted by this License. A Watts Water Technologies Company 2 of 10 © 2014 485_B - 12/14 “Source” form shall mean the preferred form for making modifi cations, including but not limited to software source code, documentation source, and confi guration fi les. “Object” form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. “Work” shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copy- right notice that is included in or attached to the work (an example is provided in the Appendix below).
Recommended publications
  • Darktable 1.2 Darktable 1.2 Copyright © 2010-2012 P.H

    Darktable 1.2 Darktable 1.2 Copyright © 2010-2012 P.H

    darktable 1.2 darktable 1.2 Copyright © 2010-2012 P.H. Andersson Copyright © 2010-2011 Olivier Tribout Copyright © 2012-2013 Ulrich Pegelow The owner of the darktable project is Johannes Hanika. Main developers are Johannes Hanika, Henrik Andersson, Tobias Ellinghaus, Pascal de Bruijn and Ulrich Pegelow. darktable is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. darktable is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with darktable. If not, see http://www.gnu.org/ licenses/. The present user manual is under license cc by-sa , meaning Attribution Share Alike . You can visit http://creativecommons.org/ about/licenses/ to get more information. Table of Contents Preface to this manual ............................................................................................... v 1. Overview ............................................................................................................... 1 1.1. User interface ............................................................................................. 3 1.1.1. Views ..............................................................................................
  • Fortran Reference Guide

    Fortran Reference Guide

    FORTRAN REFERENCE GUIDE Version 2018 TABLE OF CONTENTS Preface............................................................................................................ xv Audience Description......................................................................................... xv Compatibility and Conformance to Standards............................................................ xv Organization................................................................................................... xvi Hardware and Software Constraints...................................................................... xvii Conventions................................................................................................... xvii Related Publications........................................................................................ xviii Chapter 1. Language Overview............................................................................... 1 1.1. Elements of a Fortran Program Unit.................................................................. 1 1.1.1. Fortran Statements................................................................................. 1 1.1.2. Free and Fixed Source............................................................................. 2 1.1.3. Statement Ordering................................................................................. 2 1.2. The Fortran Character Set.............................................................................. 3 1.3. Free Form Formatting..................................................................................
  • Introduction to Linux on System Z

    Introduction to Linux on System Z

    IBM Linux and Technology Center Introduction to Linux on System z Mario Held IBM Lab Boeblingen, Germany © 2009 IBM Corporation IBM Linux and Technology Center Trademarks The following are trademarks of the International Business Machines Corporation in the United States, other countries, or both. Not all common law marks used by IBM are listed on this page. Failure of a mark to appear does not mean that IBM does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant market. Those trademarks followed by ® are registered trademarks of IBM in the United States; all others are trademarks or common law marks of IBM in the United States. For a complete list of IBM Trademarks, see www.ibm.com/legal/copytrade.shtml: *, AS/400®, e business(logo)®, DBE, ESCO, eServer, FICON, IBM®, IBM (logo)®, iSeries®, MVS, OS/390®, pSeries®, RS/6000®, S/30, VM/ESA®, VSE/ESA, WebSphere®, xSeries®, z/OS®, zSeries®, z/VM®, System i, System i5, System p, System p5, System x, System z, System z9®, BladeCenter® The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
  • AIX Migration to Cloud with IBM Power Virtual Server

    AIX Migration to Cloud with IBM Power Virtual Server

    AIX Migration to Cloud with IBM Power Virtual Server An IBM Systems Lab Services Tutorial Aaron Bolding Berjis Patel Vess Natchev [email protected] TABLE OF CONTENTS CHAPTER 1: SOLUTION OVERVIEW............................. 1 Introduction ................................................................................ 1 Use Cases .................................................................................. 1 Migration via PowerVC OVA ..................................................... 1 Transfer System Backup Using the Public Internet ..................... 2 Transfer System Backup Using Cloud Object Storage ................. 2 Solution Components and Requirements ........................................ 2 Components .......................................................................... 2 Migration via PowerVC OVA ..................................................... 2 Transfer System Backup Using the Public Internet ..................... 2 Transfer System Backup Using Cloud Object Storage ................. 2 Requirements ........................................................................ 3 Solution Diagrams ....................................................................... 3 Transfer System Backup Using the Public Internet ..................... 3 Transfer System Backup Using Cloud Object Storage ................. 4 CHAPTER 2: IMPLEMENTATION .................................. 5 Migration via PowerVC OVA .......................................................... 5 Procedure to Configure IBM Cloud Object Storage .....................
  • RACF Command Tips

    RACF Command Tips

    RACF Command Tips SHARE ‐ March 2015 Session 18875 RSH Consulting ‐ Robert S. Hansel RSH Consulting, Inc. is an IT security professional services firm established in 1992 and dedicated to helping clients strengthen their IBM z/OS mainframe access controls by fully exploiting all the capabilities and latest innovations in RACF. RSH's services include RACF security reviews and audits, initial implementation of new controls, enhancement and remediation of existing controls, and training. • www.rshconsulting.com • 617‐969‐9050 Robert S. Hansel is Lead RACF Specialist and founder of RSH Consulting, Inc. He began working with RACF in 1986 and has been a RACF administrator, manager, auditor, instructor, developer, and consultant. Mr. Hansel is especially skilled at redesigning and refining large‐scale implementations of RACF using role‐based access control concepts. He is a leading expert in securing z/OS Unix using RACF. Mr. Hansel has created elaborate automated tools to assist clients with RACF administration, database merging, identity management, and quality assurance. • 617‐969‐8211 • [email protected] • www.linkedin.com/in/roberthansel • http://twitter.com/RSH_RACF RACF Command Tips SHARE 2 © 2016 RSH Consulting, Inc. All Rights Reserved. March 2016 Topics . User Commands . Group Commands . Dataset Command . General Resource Commands . PERMIT Command . Generic Profile Refresh . List Commands . SEARCH Command . Console Command Entry . Building Commands with Microsoft Excel RACF and z/OS are Trademarks of the International Business Machines Corporation RACF Command Tips SHARE 3 © 2016 RSH Consulting, Inc. All Rights Reserved. March 2016 User Commands . ADDUSER Defaults: • OWNER ‐ Creator's ID • DFLTGRP ‐ Creator's Current Connect Group • PASSWORD ‐ Pre‐z/OS 2.2: Default Group z/OS 2.2: NOPASSWORD • Always specify when creating new ID .
  • Iq-Analyzer Manual

    Iq-Analyzer Manual

    iQ-ANALYZER User Manual 6.2.4 June, 2020 Image Engineering GmbH & Co. KG . Im Gleisdreieck 5 . 50169 Kerpen . Germany T +49 2273 99 99 1-0 . F +49 2273 99 99 1-10 . www.image-engineering.de Content 1 INTRODUCTION ........................................................................................................... 5 2 INSTALLING IQ-ANALYZER ........................................................................................ 6 2.1. SYSTEM REQUIREMENTS ................................................................................... 6 2.2. SOFTWARE PROTECTION................................................................................... 6 2.3. INSTALLATION ..................................................................................................... 6 2.4. ANTIVIRUS ISSUES .............................................................................................. 7 2.5. SOFTWARE BY THIRD PARTIES.......................................................................... 8 2.6. NETWORK SITE LICENSE (FOR WINDOWS ONLY) ..............................................10 2.6.1. Overview .......................................................................................................10 2.6.2. Installation of MxNet ......................................................................................10 2.6.3. Matrix-Net .....................................................................................................11 2.6.4. iQ-Analyzer ...................................................................................................12
  • Implementing Nfsv4 in the Enterprise: Planning and Migration Strategies

    Implementing Nfsv4 in the Enterprise: Planning and Migration Strategies

    Front cover Implementing NFSv4 in the Enterprise: Planning and Migration Strategies Planning and implementation examples for AFS and DFS migrations NFSv3 to NFSv4 migration examples NFSv4 updates in AIX 5L Version 5.3 with 5300-03 Recommended Maintenance Package Gene Curylo Richard Joltes Trishali Nayar Bob Oesterlin Aniket Patel ibm.com/redbooks International Technical Support Organization Implementing NFSv4 in the Enterprise: Planning and Migration Strategies December 2005 SG24-6657-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. First Edition (December 2005) This edition applies to Version 5, Release 3, of IBM AIX 5L (product number 5765-G03). © Copyright International Business Machines Corporation 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii The team that wrote this redbook. xiv Acknowledgments . xv Become a published author . xvi Comments welcome. xvii Part 1. Introduction . 1 Chapter 1. Introduction. 3 1.1 Overview of enterprise file systems. 4 1.2 The migration landscape today . 5 1.3 Strategic and business context . 6 1.4 Why NFSv4? . 7 1.5 The rest of this book . 8 Chapter 2. Shared file system concepts and history. 11 2.1 Characteristics of enterprise file systems . 12 2.1.1 Replication . 12 2.1.2 Migration . 12 2.1.3 Federated namespace . 13 2.1.4 Caching . 13 2.2 Enterprise file system technologies. 13 2.2.1 Sun Network File System (NFS) . 13 2.2.2 Andrew File System (AFS) .
  • CODE by R.Mutt

    CODE by R.Mutt

    CODE by R.Mutt dcraw.c 1. /* 2. dcraw.c -- Dave Coffin's raw photo decoder 3. Copyright 1997-2018 by Dave Coffin, dcoffin a cybercom o net 4. 5. This is a command-line ANSI C program to convert raw photos from 6. any digital camera on any computer running any operating system. 7. 8. No license is required to download and use dcraw.c. However, 9. to lawfully redistribute dcraw, you must either (a) offer, at 10. no extra charge, full source code* for all executable files 11. containing RESTRICTED functions, (b) distribute this code under 12. the GPL Version 2 or later, (c) remove all RESTRICTED functions, 13. re-implement them, or copy them from an earlier, unrestricted 14. Revision of dcraw.c, or (d) purchase a license from the author. 15. 16. The functions that process Foveon images have been RESTRICTED 17. since Revision 1.237. All other code remains free for all uses. 18. 19. *If you have not modified dcraw.c in any way, a link to my 20. homepage qualifies as "full source code". 21. 22. $Revision: 1.478 $ 23. $Date: 2018/06/01 20:36:25 $ 24. */ 25. 26. #define DCRAW_VERSION "9.28" 27. 28. #ifndef _GNU_SOURCE 29. #define _GNU_SOURCE 30. #endif 31. #define _USE_MATH_DEFINES 32. #include <ctype.h> 33. #include <errno.h> 34. #include <fcntl.h> 35. #include <float.h> 36. #include <limits.h> 37. #include <math.h> 38. #include <setjmp.h> 39. #include <stdio.h> 40. #include <stdlib.h> 41. #include <string.h> 42. #include <time.h> 43. #include <sys/types.h> 44.
  • IBM SPSS Decision Trees Business Analytics

    IBM SPSS Decision Trees Business Analytics

    IBM Software IBM SPSS Decision Trees Business Analytics IBM SPSS Decision Trees Easily identify groups and predict outcomes IBM® SPSS® Decision Trees creates classification and decision trees to Highlights help you better identify groups, discover relationships between groups and predict future events. • Identify groups, segments, and patterns in a highly visual manner with classification trees. You can use classification and decision trees for: • Choose from CHAID, Exhaustive • Segmentation CHAID, C&RT and QUEST to find the • Stratification best fit for your data. • Prediction • Present results in an intuitive manner— • Data reduction and variable screening perfect for non-technical audiences. • Interaction identification • Save information from trees as new • Category merging variables in data (information such as • Discretizing continuous variables terminal node number, predicted value and predicted probabilities). Highly visual diagrams enable you to present categorical results in an intuitive manner—so you can more clearly explain the results to non-technical audiences. These trees enable you to explore your results and visually determine how your model flows. Visual results can help you find specific subgroups and relationships that you might not uncover using more traditional statistics. Because classification trees break the data down into branches and nodes, you can easily see where a group splits and terminates. IBM Software IBM SPSS Decision Trees Business Analytics Use SPSS Decision Trees in a variety of applications, • Marketing
  • Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — Pocs Poised to Enter Full-Blown Production

    Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — Pocs Poised to Enter Full-Blown Production

    Market Share Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — POCs Poised to Enter Full-Blown Production Ritu Jyoti Peter Rutten Natalya Yezhkova Ali Zaidi THIS IDC MARKET SHARE EXCERPT FEATURES IBM IDC MARKET SHARE FIGURE FIGURE 1 Worldwide Artificial Intelligence 2018 Share Snapshot Note: 2018 Share (%), Revenue ($M), and Growth (%) Source: IDC, 2019 July 2019, IDC #US45334719e IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market Share: Worldwide Artificial Intelligence Market Shares, 2018: Steady Growth — POCs Poised to Enter Full-Blown Production (Doc # US45334719). All or parts of the following sections are included in this excerpt: Executive Summary, Market Share, Who Shaped the Year, Market Context, Appendix and Learn More. Also included is Figure 1, Table 1 and 2. EXECUTIVE SUMMARY The artificial intelligence (AI) market experienced steady growth in 2018, growing 35.6% to $28.1 billion. As per IDC's Artificial Intelligence Global Adoption Trends and Strategies Survey of 2,473 organizations of various sizes across industries worldwide by those that are using artificial intelligence (AI) solutions, either developing them in-house, using COTS, or a combination of both: 18% had AI models in production, 16% were in the proof-of-concept (POC) stage, and 15% were experimenting with AI. While automation, business agility, and customer satisfaction are the primary drivers for AI initiatives, cost of the solution, lack of skilled personnel, and bias in data have held organizations from implementing AI broadly. In the past 12 months, organizations worldwide have used AI in IT operations, customer service and support, finance and accounting, and ecommerce with major redesign to their business processes to maximize the ROI of AI.
  • CIFS SMB2 SMB3 Meets Linux a Year in Review

    CIFS SMB2 SMB3 Meets Linux a Year in Review

    The Future of File Protocols: CIFS SMB2 SMB3 Meets Linux A Year in Review Steve French Senior Engineer – File System Architect IBM Linux Technology Center 1 IBM, Linux, and Building a Smarter Planet © 2012 IBM Corporation Legal Statement – This work represents the views of the author(s) and does not necessarily reflect the views of IBM Corporation – A full list of U.S. trademarks owned by IBM may be found at http://www.ibm.com/legal/copytrade.shtml. – Linux is a registered trademark of Linus Torvalds. – Other company, product, and service names may be trademarks or service marks of others. 2 © 2012 IBM Corporation Who am I? – Steve French ([email protected] or [email protected]) – Author and maintainer of Linux cifs vfs (for accessing Samba, Windows and various SMB/CIFS based NAS appliances) – Wrote initial SMB2 kernel client prototype – Member of the Samba team, coauthor of SNIA CIFS Technical Reference and former SNIA CIFS Working Group chair – Architect: File Systems/NFS/Samba for IBM Linux Technology Center © 2012 IBM Corporation SMB3: Great Feature Set, Broad Deployment, Amazing Performance ● Introduction of new storage features in Windows 8 causing one of most dramatic shifts in storage industry as companies rapidly move to support “SMB3” (aka SMB2.2) ● “SMB2.2 (CIFS) screams over InfiniBand” (Storage CH Blog) • Is (traditional) SAN use going to die? – “Market trends show virtualization workloads moving to NAS” (Dennis Chapman, Technical Director NetApp, SNIA SDC 2011) – “Unstructured data (file-based) storage is growing faster than structured data” (Thomas Pfenning, Microsoft GM, SNIA SDC 2011) – Customers prefer “file” • SMB2/CIFS market share is MUCH larger than NFS.
  • Parallel Programming in Fortran 95 Using Openmp

    Parallel Programming in Fortran 95 Using Openmp

    Parallel Programming in Fortran 95 using OpenMP Miguel Hermanns School of Aeronautical Engineering Departamento de Motopropulsi´on y Termofluidodin´amica Universidad Polit´ecnica de Madrid Spain email: [email protected] 19th of April 2002 Contents 1 OpenMP Fortran Application Program Interface 1 1.1Introduction................................... 1 1.1.1 Historicalremarks........................... 2 1.1.2 Whoisparticipating.......................... 2 1.1.3 Aboutthisdocument.......................... 3 1.2Thebasics.................................... 4 1.2.1 The sentinels for OpenMP directives and conditional compilation . 4 1.2.2 Theparallelregionconstructor.................... 5 2 OpenMP constructs 9 2.1Work-sharingconstructs............................ 9 2.1.1 !$OMP DO/!$OMP END DO ........................ 10 2.1.2 !$OMP SECTIONS/!$OMP END SECTIONS ................ 15 2.1.3 !$OMP SINGLE/!$OMP END SINGLE .................. 16 2.1.4 !$OMP WORKSHARE/!$OMP END WORKSHARE .............. 17 2.2Combinedparallelwork-sharingconstructs.................. 20 2.2.1 !$OMP PARALLEL DO/!$OMP END PARALLEL DO ............ 21 2.2.2 !$OMP PARALLEL SECTIONS/!$OMP END PARALLEL SECTIONS .... 21 2.2.3 !$OMP PARALLEL WORKSHARE/!$OMP END PARALLEL WORKSHARE .. 21 2.3Synchronizationconstructs........................... 22 2.3.1 !$OMP MASTER/!$OMP END MASTER .................. 22 2.3.2 !$OMP CRITICAL/!$OMP END CRITICAL ................ 22 2.3.3 !$OMP BARRIER ............................. 24 2.3.4 !$OMP ATOMIC .............................. 26 2.3.5 !$OMP FLUSH .............................. 27 2.3.6 !$OMP ORDERED/!$OMP END ORDERED ................. 30 2.4Dataenvironmentconstructs.......................... 32 2.4.1 !$OMP THREADPRIVATE (list) .................... 32 3 PRIVATE, SHARED & Co. 37 3.1 Data scope attribute clauses . 37 3.1.1 PRIVATE(list) ............................. 37 3.1.2 SHARED(list) .............................. 38 3.1.3 DEFAULT( PRIVATE | SHARED | NONE ) ............... 39 i ii CONTENTS 3.1.4 FIRSTPRIVATE(list) .........................