EMC® Avamar® 7.4 and Service Packs for IBM DB2

Total Page:16

File Type:pdf, Size:1020Kb

EMC® Avamar® 7.4 and Service Packs for IBM DB2 EMC® Avamar® 7.4 and Service Packs for IBM DB2 User Guide 302-003-182 REV 02 Copyright © 2001-2017 EMC Corporation All rights reserved. Published March 2017 Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA. EMC Corporation Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.EMC.com 2 EMC Avamar 7.4 and Service Packs for IBM DB2 User Guide CONTENTS Figures 7 Tables 9 Preface 11 Chapter 1 Introduction 15 Architecture................................................................................................16 Data Domain system support..........................................................16 Multiple DB2 versions on a single host............................................17 DPF support................................................................................... 17 Log files..........................................................................................17 Backup........................................................................................................ 17 Backup types..................................................................................17 Data deduplication optimization..................................................... 18 Restore and recovery..................................................................................18 Redirected restores........................................................................19 Table space restore and recovery from Avamar Administrator....... 19 Concurrent backups and restores...............................................................20 DB2 CLP support........................................................................................20 Database Partition Feature (DPF) backup and restore............................... 20 DPF backup................................................................................... 20 DPF restore and recovery.............................................................. 21 DB2 HADR backup and restore................................................................... 21 Archived log backup and restore.................................................................22 Multi-streaming.......................................................................................... 22 Chapter 2 Installation 23 Preparing to install the Avamar Plug-in for DB2......................................... 24 System requirements.....................................................................24 DB2 server requirements............................................................... 24 Downloading the software............................................................. 24 Installing the Avamar file system client..........................................25 Installing, upgrading, and uninstalling on HP-UX........................................ 25 Installing the Avamar Plug-in for DB2 on HP-UX........................... 25 Upgrading the Avamar Plug-in for DB2 on HP-UX......................... 26 Uninstalling the Avamar Plug-in for DB2 on HP-UX....................... 26 Installing, upgrading, and uninstalling on IBM AIX....................................... 27 Installing the Avamar Plug-in for DB2 on IBM AIX..........................27 Upgrading the Avamar Plug-in for DB2 on IBM AIX....................... 27 Uninstalling the Avamar Plug-in for DB2 on IBM AIX..................... 28 Installing, upgrading, and uninstalling on Linux........................................... 29 Installing the Avamar Plug-in for DB2 on Linux.............................. 29 Upgrading the Avamar Plug-in for DB2 on Linux............................30 Uninstalling the Avamar Plug-in for DB2 on Linux.......................... 31 Installing, upgrading, and uninstalling on Solaris..........................................31 EMC Avamar 7.4 and Service Packs for IBM DB2 User Guide 3 CONTENTS Installing the Avamar Plug-in for DB2 on Solaris............................ 32 Upgrading the Avamar Plug-in for DB2 on Solaris..........................33 Uninstalling the Avamar Plug-in for DB2 on Solaris........................33 Installing, upgrading, and uninstalling on Windows..................................... 34 Installing the Avamar Plug-in for DB2 on Windows........................ 34 Upgrading the Avamar Plug-in for DB2 on Windows......................35 Uninstalling the Avamar Plug-in for DB2 on Windows....................36 Chapter 3 Backup 37 Preparing the database for backup.............................................................38 Configuring automatic backups for DB2 transaction logs.............. 38 Creating the Avamar Plug-in for DB2 flag file................................ 38 Performing offline backups............................................................39 Performing online backups............................................................ 39 Performing on-demand backups.................................................................40 Scheduling backups....................................................................................42 Creating a dataset......................................................................... 42 Creating a group............................................................................45 Enabling scheduled backups.......................................................... 46 Monitoring backups.................................................................................... 47 Canceling backups......................................................................................47 Chapter 4 Restore and Recovery 49 Backup naming conventions....................................................................... 50 Backup labels and image names for a database backup................. 50 Backup labels and image names for log backups............................ 51 Restoring DB2 databases to the original location........................................ 51 Restoring offline backups...............................................................51 Restoring online backups that include archive logs........................54 Restoring online backups that do not include archive logs............. 57 Restoring only the archive logs......................................................59 Recovering a database................................................................... 61 Restoring DB2 databases to a different client............................................ 63 Setting flags for automatic storage databases...............................63 Rollforward after a redirected restore to a different host..............63 Restoring the database to a different client...................................64 Rolling the database forward......................................................... 68 Restoring table spaces in a stand-alone DB2 environment......................... 68 Recovering retired clients...........................................................................72 Disaster recovery........................................................................................74 Recovering the DB2 application..................................................... 74 Recovering the DB2 server............................................................ 75 Monitoring restores.................................................................................... 75 Canceling restores......................................................................................75 Chapter 5 High Availability and Clustering Solutions 77 Database Partition Feature (DPF) backup and restore............................... 78 Preparing for DPF backups............................................................ 78 Restoring and recovering DPF....................................................... 79 DB2 High Availability Disaster Recovery (HADR) backup and recovery......89 Preparing for HADR backups.........................................................89 Starting and stopping the Avamar client for DB2 HADR and changing HADR roles..................................................................... 91 HADR backups...............................................................................92 4 EMC Avamar 7.4 and Service Packs for IBM DB2 User Guide CONTENTS HADR restore and recovery...........................................................93 Removing the DB2 HADR client from Microsoft Windows............. 94 Removing the DB2 HADR client from UNIX and Linux................... 95 Chapter 6 Backup and Restore with DB2 CLP 97 Using DB2 CLP for backups and restores................................................... 98 Backup label and image names...................................................... 99 Avamar Plug-in for DB2 flag file configuration...............................99 Specifying DB2 vendor parameters............................................... 99 Using the Load command with the Copy Yes option.....................100 Backing up databases
Recommended publications
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • 802.11N Support in Freebsd (For the Run(4) Driver)
    802.11n support in FreeBSD (for the run(4) driver) 15412 F’19 1 / 15 Motivation ● “Do something with operating systems” – OS Junkie: Ubuntu → Fedora → Arch Linux → Gentoo → FreeBSD ● Do something for the community – So much free (not free as in free beer) software out there for use – Time to give something back! ● Faster WiFi doesn’t hurt – Makes FreeBSD more usable ● Less angry users: “But this works on Lunix!” 2 / 15 FreeBSD ● Open source, UNIX ● Official webpage: freebsd.org ● Large, helpful community – IRC Channels on Freenode (#freebsd) – Forums (forums.freebsd.org) – Mailing lists (lists.freebsd.org) ● Latest Release: FreeBSD 12 (2018) 3 / 15 802.11 ● IEEE 802.11: Standard for WiFi – 802.11b: 2.4GHz, Max rate 11 Mbps, range 150 ft., Year 1999 – 802.11g: 2.4 GHz, Max rate 54 Mbps, range 150 ft., Year 2003 – 802.11n: 2.4GHz or 5 GHz, Max rate 300 Mbps (single antenna), 450 Mbps (MIMO), range 175 ft., Year 2009 4 / 15 Ralink ● Produces WiFi chips – See https://wikidevi.com/wiki/Ralink for list of chips ● Linux driver: rt2800usb (USB Ralink 802.11n devices) ( https://wiki.debian.org/rt2800usb). ● FreeBSD driver: run (see https://www.freebsd.org/cgi/man.cgi?run(4) ) – Caveats : “The run driver does not support any of the 802.11n capabilities offered by the RT2800, RT3000 and RT3900 chipsets.“ 5 / 15 Existing code base ● The run driver supports several chipsets and adapters (such as ASUS USB N-66) but without support for 802.11n – This means reduced speeds – This means it will misbehave when you turn on your microwave ● run(4) also has annoying ‘device timeout’ errors where the card stops responding.
    [Show full text]
  • Cgatools Install Guide
    cgatools Installation Guide Version 1.2.0 Complete Genomics data is for Research Use Only and not for use in the treatment or diagnosis of any human subject. Information, descriptions and specifications in this publication are subject to change without notice. Copyright © 2010 Complete Genomics Incorporated. All rights reserved. cgatools Installation Guide Table Of Contents Table Of Contents Preface ........................................................................................................................................................................... 3 Conventions ................................................................................................................................................................................ 3 cgatools Documents ................................................................................................................................................................ 3 References ................................................................................................................................................................................... 3 Overview and Requirements ................................................................................................................................. 5 Install Process in a Nutshell ................................................................................................................................................. 5 User Requirements .................................................................................................................................................................
    [Show full text]
  • AD Management Tool Exhaustive Reports on User, Group, Computer, Exchange & GPO
    Stories Firehose All Popular Polls Video Jobs Deals Submit Search Login or Sig2n7 u7p Topics: Devices Build Entertainment Technology Open Source Science YRO Follow us: Follow Slashdot blog updates by subscribing to our blog RSS feed Nickname: Password: 6-20 characters long Public Terminal Log In Forgot your password? Sign in with Google Facebook Twitter LinkedIn Close AD Management Tool Exhaustive Reports on User, Group, Computer, Exchange & GPO GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support (phoronix.com) $0.32/Mbps IP Posted by timothy on Sunday January 31, 2016 @11:22AM from the pretty-soon-big-and-fancy-like-gnu dept. An anonymous reader writes: GNU developer Samuel Thibault presented at this weekend's FOSDEM conference Transit about the current state of GNU Hurd. He shared that over the past year they've started working on experimental IPv6+IPv4 and BGP For Your sound support as their big new feature. They also have x86 64-bit support to the point that the kernel can boot, but not Network in North America and much beyond that stage yet. USB and other functionality remains a work-in-progress. Those curious about this GNU kernel project can find more details via the presentation media. Europe gnu os software → Tiny Pluto Big On Frozen Water Reserves Kentucky Man Arrested After Shooting Down Drone Are We Reaching the Electric Car Tipping Point? Microsoft Is Downloading Windows 10 Without Asking Test Pilot: the F-35 Can't Dogfight Oregon Testing Pay-Per-Mile Driving Fee To Replace Gas Tax Submission: GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support FTDI Driver Breaks Hardware Again GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support 177 More | Reply Login GNU Hurd Begins Supporting Sound, Still Working On 64-bit & USB Support Post Load All Comments S1e5a Fruchll 8257 7A Cbobmremvieantetsd L0o Hg iIdnd/Cenreate an Account C/Soema ments Filter: AScllore: I5nsightful I4nformative I3nteresting F2unny 1The Fine Print: The following comments are owned by whoever posted them.
    [Show full text]
  • Installation Guide Version 4.2
    AIX Installation Guide Version 4.2 SC23-1924-00 AIX Installation Guide Version 4.2 First Edition (April 1996) This edition of the AIX Version 4.2 Installation Guide applies to the AIX Version 4.2 Licensed Program and to all subsequent releases of this product until otherwise indicated in new releases or technical newsletters. The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: THIS MANUAL IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you. It is not warranted that the contents of this publication or the accompanying source code examples, whether individually or as one or more groups, will meet your requirements or that the publication or the accompanying source code examples are error-free. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. It is possible that this publication may contain references to, or information about, products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that such products, programming, or services will be offered in your country. Any reference to a licensed program in this publication is not intended to state or imply that you can use only that licensed program.
    [Show full text]
  • Implementation of Tripwire: a File System Integrity Checker
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 1993 The Design and Implementation of Tripwire: A File System Integrity Checker Gene H. Kim Eugene H. Spafford Purdue University, [email protected] Report Number: 93-071 Kim, Gene H. and Spafford, Eugene H., "The Design and Implementation of Tripwire: A File System Integrity Checker" (1993). Department of Computer Science Technical Reports. Paper 1084. https://docs.lib.purdue.edu/cstech/1084 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. THE DESIGN AND IMPLEMENTATION OF TRIPWIRE, A FILE SYSTEM INTEGRITY CHECKER Gene H. Kim Eugene H. SpDlford CSD·TR·93'()7I November 1993 The Design and Implementation of Tripwire: A File System Integrity Checker Purdue Technical Report CSD-TR-93-071 Gene H. Kim and Eugene H. Spafford COAST Laboratory Department of Computer Sciences Purdue University West Lafayette, IN 47907-1398 November 19, 1993 Abstract At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the base exe­ cutable version of the operating system itself. The ability to monitor file systems for unautho­ rized or unexpected changes gives system administrators valuable data for protecting and main­ taining their systems. However, in environments of many networked heterogeneous platforms with different policies and software, the task of monitoring changes becomes quite daunting. Tripwire is tool that aids UNIXl system administrators and users in monitoring a designated set offiles and directories for any changes.
    [Show full text]
  • DNS for Rocket Scientists Section 1 Overview
    DNS for Rocket Scientists This Open Source Guide is about DNS and (mostly) BIND 9.x on Linux (REDHAT Versions 6.x and 7.x) and the BSD's (FreeBSD, OpenBSD and NetBSD). It is meant for newbies, Rocket Scientist wannabees and anyone in between. This Guide was born out of our first attempts a number of years ago at trying to install a much needed DNS service on an early Redhat Linux system. We completed the DNS 'rite of passage' and found it a pretty unedifying and pointless experience. Health Warning: This is still a work-in-progress. If you have expertise in something - contribute some text. If you find errors don't grumble - tell us. Look at our to do list and if you want to contribute something please do so. And for all that hard work we promise only a warm sense of well-being and an acknowledgment of your work in the licence. Section 1 Overview What's new in Guide version 0.1.27 1. Boilerplate and Terminology 1.1 Objectives and Scope 1.2 How to read this Guide 1.3 Terminology and Conventions used 1.4 Acknowledgements 1.5 Copyright and License 2. DNS - Overview 2.1 A brief History of Name Servers 2.2 DNS Concepts & Implementation 2.2.1 DNS Overview 2.2.2 Domains and Delegation 2.2.3 DNS Organization and Structure 2.2.4 DNS System Components 2.2.5 Zones and Zone Files 2.2.6 DNS Queries 2.2.6.1 Recursive Queries 2.2.6.2 Iterative Queries 2.2.6.3 Inverse Queries 2.2.7 Zone Updates 2.2.7.1 Full Zone Transfer (AXFR) 2.2.7.2 Incremental Zone Transfer (IXFR) 2.2.7.3 Notify (NOTIFY) 2.2.7.4 Dynamic Zone Updates 2.2.7.5 Alternative Dynamic DNS Approaches 2.3 DNS Security Overview 2.3.1 Security Threats 2.3.2 Security Types 2.3.3 Local Security 2.3.4 Server-Server (TSIG Transactions) 2.3.5 Server-Client (DNSSEC) 3.
    [Show full text]
  • Geckos – a Unix-Like 6502 Operating System
    GeckOS – a Unix-like 6502 operating system Glenn Holmer VCFMW, 2019-09-14 Speaker Bio ✔ a.k.a. "Cenbe" ✔ retired Java programmer/Linux sysadmin ✔ collector of programming languages and operating systems for the Commodore 64: https://www.lyonlabs.org/commodore/ Happy 50th, Unix! wait... “Unix” on a 6502? ARE YOU CRAZY? wait... “Unix” on a 6502? Multi-tasking on a 6502 faces significant obstacles: ✔ typically no hardware memory management ✔ no hardware process protection (“ring 0”) ✔ limited number of registers ✔ single, fixed-location, 256-byte stack “Unix” on a Commodore 64? ✔ It’s been tried with varying degrees of fidelity, e.g. GeckOS, LUnix, Asterix, ACE... ✔ None of these are still being developed; most developers are no longer active in the Commodore community. ✔ GeckOS seems the most complete, most Unix-like and easiest to work with. GeckOS history ✔ Written by André Fachat, originally for the CS/A65 (a 6502 computer with a MMU that he built in 1989). ✔ Later expanded to run on other architectures (PET, Commodore 64). ✔ 2.0.9 released in 2013. ✔ Source available (GPL V2). André Fachat CS/A65 http://www.6502.org/users/andre/csa/index.html GeckOS features ✔ preemptive multi-tasking with priorities, multi-threading (max. 12 tasks, 12 threads) ✔ signals, semaphores ✔ redirection, piping, environment variables ✔ a standard library (lib6502) ✔ cross-assembler “xa” ✗ use 2.1.4h with GeckOS (not newer versions) ✗ output is o65 relocatable file format ✗ can produce label xref with addresses Cenbe’s Commentary on GeckOS I’ve been working on an analysis of GeckOS for those who would like to follow along at home: https://www.lyonlabs.org/commodore/onrequest/geckos-analysis.html ✔ source layout ✔ system initialization ✔ IRQ service routine ✔ forking new processes ✔ scheduler, task switching ✔ running programs from the shell So how does GeckOS do a task switch? ✔ An interrupt is generated every ~20ms by CIA 1 timer B to run the scheduler.
    [Show full text]
  • Linux Tutorial One -ASP2016- Session 1- 2 August 2016
    Linux Tutorial One -ASP2016- Session 1- 2 August 2016 1.1 Listing files and directories ls (list) When you first login, your current working directory is your home directory. Your home directory has the same name as your user-name, for example, pheneas, and it is where your personal files and subdirectories are saved. To find out what is in your home directory, type % ls (short for list) The ls command lists the contents of your current working directory. There may be no files visible in your home directory, in which case, the LUNIX prompt will be returned. Alternatively, there may already be some files inserted by the System Administrator when your account was created. ls does not, in fact, cause all the files in your home directory to be listed, but only those ones whose name does not begin with a dot (.) Files beginning with a dot (.) are known as hidden files and usually contain important program configuration information. They are hidden because you should not change them unless you are very familiar with LUNIX!!! To list all files in your home directory including those whose names begin with a dot, type % ls -a ls is an example of a command which can take options: -a is an example of an option. The options change the behaviour of the command. There are online manual pages that tell you which options a particular command can take, and how each option modifies the behaviour of the command. (See later in this tutorial) 1.2 Making Directories mkdir (make directory) We will now make a subdirectory in your home directory to hold the files you will be creating and using in the course of this tutorial.
    [Show full text]
  • Distributed File Systems for Unix
    Rochester Institute of Technology RIT Scholar Works Theses 2-28-1986 Distributed file systems for Unix Edward Ford Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Ford, Edward, "Distributed file systems for Unix" (1986). Thesis. Rochester Institute of echnologyT . Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Rochester Institute of Technology School of Computer Science and Technology Distributed File Systems for Unix by Edward Ford A thesis submitted to the Faculty of the School of Computer Science and Technology in partial fulflliment of the the requirements for the degree of Master of Science in Computer Science Approved by: Michael J. Lutz gA~~b, Professor Michael J. Lutz Lawrence A. Coon 2L~ Professor Lawrence A. Coon Margaret M. Reek ~~h>b Professor Margaret M. Reek Title of Thesis: p;s-t-g,. byte) -Fl. Lc; Sys CeA,1$ ~D"_ VNIX I hereby (grant/deny) permissIOn to the Wallace Memorial Library, o~ RIT, to reproduce my thesis in whole or in part. Ar,y reproduction will not be for commercial use or profit. or I Ed war d Ford prefer to be contacted each time a request for reproduction is made. I can be reached at the following address: Date: 3/3 18ft, -----_. -~---------.--..... -.-- .. -- Distributed Pile Systems for DNIX(*) Edward Ford ABSTRACT With the advent of distributed systems, mechanisms that support efficient resource sharing are necessary to exploit a distributed architec ture.
    [Show full text]
  • Unit 1 Operating System
    Operating System UNIT 1 OPERATING SYSTEM Structure Page No. 1.0 Introduction 5 1.1 Objectives 6 1.2 Familiarization (I/O Port, Keyboard, Memory) 6 1.2.1 Computer and Motherboard 6 1.2.2 I/O Ports 8 1.2.3 I/O Devices 9 1.2.4 Memory 14 1.3 Windows Operating System 16 1.3.1 Overviews of Windows 16 1.3.2 Windows Installing Procedure 17 1.3.3 Working with XP 25 1.4 Linux Operating System 31 1.4.1 Overview of LUNIX/LINUX Operating System 31 1.4.2 How to install Linux Operating System 32 1.4.3 Linux utilities and Basic Commands 41 1.5 Summary 53 1.6 Answers to Check Your Progress 53 1.0 INTRODUCTION In this unit, we are going to learn basics of computer. Computer is a machine that performs tasks or calculations according to a set of instructions, or programs. Compared to those early machines, today's computers are amazing. Not only are they thousands of times faster, they can fit on your desk, in your lap, or even in your pocket. Computers work through an interaction of hardware and software. Hardware is physical component of a computer system. It is a tiny rectangular chip inside the computer called the central processing unit (CPU), or microprocessor. It is the "brain" of computer—the part that translate instructions and performs calculations. Hardware items such as monitor, keyboard, mouse, printer, and other items are often called hardware devices. Software refers to the instructions or programs that tell the hardware what to do.
    [Show full text]
  • School Tablets Project for Developing Countries
    School tablets project for developing countries ↑ Source image : A indian tablet at 35 dollars, Thursday 20 october 2011, http://electrosphere.blogspot.fr/2011/10/une-tablette-tactile-indienne-35.html French text translated by Google translator. We apologize for any translation mistakes that may have occurred. Study author : Benjamin LISAN Email : [email protected] Document creation date : 03/07/2014 Document update date : 04/07/2014. Version V1.0 School tablets for poor countries 0. Summary 2 1. Introduction 1a. secondary specifications 2. What is a tablet ? 3. Evaluation of the cost of these tablets. 4. Additional parameters to evaluate. 4.1. Tablet size. 4.1bis. Tablet weight. 4.1ter. Format of the tablet. 4.2. Importance of the existence of a microSD slot. 4.3. Minimum necessary ports or slots. 4.4. What OS? (need for a standard Android updated regularly). 4.5. Presence or absence of an external keyboard? 4.6. The fragility of the tablets => precautions. 4.6bis. The risk of theft/steal 46ter. Parental Control 4.7. What software provide? 4.8. Updating software. 4.9. The screen technology. 4.10. The resolution of the screen. School tablets for poor countries 0. Sommaire 3 4.11. The processor and memory 4.12. The "no name" tablets 4.13. Ecological aspects 4.14. Examples … 5. Conclusion. A1. Appendix: Specifications of Aakash tablets. A2. Appendix: suggestion of free software and applications. A3. Appendix: update the document database. A4. Schedule: For more ... A4. Appendix: Glossary The example of the low cost Akash Indian tablet (~ 45 US $). School tablets for poor countries 1.
    [Show full text]