IBM Workload Automation: Scheduling Applications with IBM Workload Automation Chapter 26

Total Page:16

File Type:pdf, Size:1020Kb

IBM Workload Automation: Scheduling Applications with IBM Workload Automation Chapter 26 IBM Workload Automation IBM Scheduling Applications with IBM Workload Automation Version 9 Release 4 IBM Workload Automation IBM Scheduling Applications with IBM Workload Automation Version 9 Release 4 Note Before using this information and the product it supports, read the information in “Notices” on page 363. This edition applies to version 9, release 4, modification level 0 of IBM Workload Scheduler (program number 5698-WSH) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2001, 2016. © Copyright HCL Technologies Limited 2016, 2018 Contents Figures .............. vii Job log output ............. 37 Tables ............... ix Chapter 9. IBM InfoSphere DataStage jobs ................ 41 About this Publication ........ xi Business scenario ............ 41 What is new in this release ......... xi Defining an IBM Workload Scheduler job to run an Who should read this publication ....... xii InfoSphere DataStage job .......... 41 Accessibility .............. xii Job definition for IBM InfoSphere DataStage jobs 42 Technical training ............ xii Defining IBM Workload Scheduler jobs to run Support information ........... xii IBM InfoSphere DataStage jobs by using the How to read syntax diagrams ........ xiii Dynamic Workload Console ........ 45 Scheduling and submitting job streams for IBM InfoSphere DataStage jobs ......... 47 Part 1. Overview .......... 1 Customizing IBM Workload Scheduler to run IBM InfoSphere DataStage jobs ......... 47 Chapter 1. Supported agent Mapping between IBM Workload Scheduler and workstations............. 3 IBM InfoSphere DataStage job statuses ..... 48 Job log output ............. 49 Analyzing the InfoSphere DataStage job properties 50 Part 2. Job plug-ins to extend workload scheduling capabilities .. 5 | Chapter 10. IBM Sterling | Connect:Direct jobs ......... 53 Chapter 2. Defining a job ....... 7 | Business scenario ............ 61 | Scenario goal ............. 61 Chapter 3. Scheduling and submitting jobs and job streams ......... 9 | Chapter 11. IBM WebSphere MQ jobs 63 | Business scenario ............ 67 Chapter 4. Monitoring IBM Workload | Scenario goal ............. 67 Scheduler jobs ........... 11 | Chapter 12. Hadoop Distributed File Chapter 5. Analyzing the job log.... 13 | System jobs ............ 69 | Chapter 6. IBM BigInsights jobs .... 15 | Chapter 13. Hadoop Map Reduce jobs 73 | Chapter 7. IBM Cloudant jobs ..... 19 Chapter 14. Apache Oozie jobs .... 77 Chapter 8. IBM Cognos jobs ..... 23 * Chapter 15. Apache Spark jobs .... 81 Business scenario ............ 23 Defining an IBM Workload Scheduler job to run an * Chapter 16. Amazon EC2 jobs..... 85 IBM Cognos report ............ 23 Defining jobs by using the Dynamic Workload * Chapter 17. IBM SoftLayer jobs .... 89 Console............... 24 Job definition for IBM Cognos reports .... 25 * Chapter 18. Microsoft Azure jobs ... 93 Specifying the parameter format for date, time, and time stamp ............ 31 Specifying parameterized filters ...... 31 Chapter 19. Informatica PowerCenter Scheduling and submitting job streams for IBM jobs ................ 97 Cognos reports ............. 33 Defining an IBM Workload Scheduler Informatica Customizing IBM Workload Scheduler to run IBM PowerCenter job to schedule workflows ..... 98 Cognos reports ............. 33 PowerCenter job definition ........ 98 Configuring the agent to use Cognos in SSL ... 34 Defining IBM Workload Scheduler jobs to Mapping between job statuses and IBM Cognos schedule Informatica PowerCenter workflows report statuses ............. 36 with the Dynamic Workload Console .... 100 iii Customizing IBM Workload Scheduler to run Chapter 23. Access method for Informatica PowerCenter jobs ........ 103 PeopleSoft ............ 143 Configuring the agent for SSL ........ 104 Features ............... 143 Scheduling and submitting job streams for Roles and responsibilities ......... 143 PowerCenter jobs ............ 105 Scheduling process for the PeopleSoft supported Monitoring IBM Workload Scheduler jobs that run agents ................ 144 Informatica PowerCenter workflows...... 105 PeopleSoft job tracking in IBM Workload Scheduler 144 Procedure for restarting an Informatica Security ............... 144 PowerCenter workflow from the failed task .. 107 Configuring the PeopleSoft access method.... 144 Mapping PowerCenter workflow status to job Defining the configuration options ..... 144 status ............... 108 Creating a batch processing ID in PeopleSoft 147 Known problems and workarounds ...... 108 Configuring the ITWS_PSXA PeopleSoft project 148 Incorrect worklet status displayed in the job log 108 Uploading the PeopleSoft project ...... 149 Cannot submit jobs after a Web Services Hub Defining PeopleSoft jobs.......... 151 restart ............... 109 Defining PeopleSoft jobs in IBM Workload Scheduler.............. 151 Chapter 20. Oracle E-Business Suite Configuring the job status mapping policy .. 153 jobs ............... 111 Business scenario ............ 111 Chapter 24. Access method for z/OS 155 Defining an IBM Workload Scheduler job to Features ............... 155 schedule Oracle E-Business Suite applications .. 112 Roles and responsibilities ......... 155 Job definition for Oracle E-Business Suite jobs 112 Installing, configuring, and uninstalling the z/OS Defining IBM Workload Scheduler jobs to run gateway ............... 156 Oracle E-Business Suite jobs by using the Installing .............. 156 Dynamic Workload Console ....... 114 Configuring ............. 158 Scheduling and submitting job streams for Uninstalling ............. 159 Oracle E-Business Suite jobs ....... 115 Additional information .......... 159 Customizing IBM Workload Scheduler to run Gateway software components ...... 160 Oracle E-Business Suite jobs ....... 116 IEFU84 Exit ............. 160 Mapping between IBM Workload Scheduler job Security .............. 160 statuses and Oracle E-Business Suite application Startup .............. 160 statuses .............. 117 SYSTSIN variables........... 161 Job log output ............ 117 z/OS gateway version ......... 163 Analyzing the Oracle E-Business Suite job Downloading z/OS gateway fixes from FTP ... 163 properties ............. 118 Locating product support ......... 166 Configuring the z/OS access method ..... 166 | Chapter 21. Salesforce jobs ..... 119 Defining the configuration options ..... 166 Defining jobs in z/OS ......... 167 Part 3. Access methods ...... 125 Defining z/OS jobs in IBM Workload Scheduler 168 Reference information .......... 171 Technical overview .......... 171 Chapter 22. Installing and configuring Diagnostic information ......... 175 the access methods ........ 127 Troubleshooting ........... 176 Setting options for the access methods ..... 127 Option value inheritance ........ 130 Chapter 25. Common serviceability for Editing the options files from the Dynamic the access methods ........ 179 Workload Console ........... 130 The return code mapping feature....... 179 Using the Option Editor ......... 131 Parameters ............. 179 Defining supported agent workstations..... 134 Creating a return code mapping file ..... 179 Creating a workstation using the Dynamic Return code mapping for psagent ..... 181 Workload Console ........... 134 Return code mapping for r3batch...... 181 Creating a workstation using the command line 135 Configuring the tracing utility ........ 184 Defining workstations for end-to-end scheduling 136 Customizing the .properties file ...... 185 Defining jobs for supported agents ...... 138 Configuration file example for the SAP access Defining jobs with the Dynamic Workload method .............. 186 Console .............. 139 Defining jobs using the command line .... 139 Defining jobs for end-to-end scheduling ... 140 Part 4. Integration with SAP .... 187 Submitting jobs............. 141 iv IBM Workload Automation: Scheduling Applications with IBM Workload Automation Chapter 26. Introducing IBM Workload Using Business Information Warehouse..... 278 Scheduler for SAP ......... 189 Business Warehouse components ...... 278 Features ............... 190 Defining user authorizations to manage SAP R/3 Business Warehouse InfoPackages and Chapter 27. Access method for SAP 193 process chains ............ 278 Managing SAP R/3 Business Warehouse Scheduling process for the agent workstation InfoPackages and process chains ...... 279 hosting the r3batch access method ...... 193 Job throttling feature ........... 292 Roles and responsibilities ......... 194 Business scenario ........... 292 Configuring user authorization (Security file)... 195 Software prerequisites ......... 293 Configuring the SAP R/3 environment ..... 196 Setting and using job throttling ...... 293 Overview.............. 196 Sending data from job throttling to the CCMS Creating the IBM Workload Scheduler RFC user 197 Monitoring Architecture ......... 296 Creating the authorization profile for the IBM Exporting SAP R/3 factory calendars ..... 297 Workload Scheduler user ........ 197 Business scenario ........... 298 Copying the correction and transport files ... 200 Exporting and importing SAP R/3 factory Importing ABAP/4 function modules into SAP calendars .............. 298 R/3 ............... 200 Defining internetwork dependencies and event Changing the IBM Workload Scheduler RFC rules based on SAP R/3 background events ... 301 user ID password ........... 203 Defining internetwork dependencies based on Securing data communication ....... 204 SAP background events ......... 301 Print
Recommended publications
  • Computer Science & Information Technology 33
    Computer Science & Information Technology 33 Dhinaharan Nagamalai Sundarapandian Vaidyanathan (Eds) Computer Science & Information Technology Fifth International Conference on Computer Science, Engineering and Applications (CCSEA-2015) Dubai, UAE, January 23 ~ 24 - 2015 AIRCC Volume Editors Dhinaharan Nagamalai, Wireilla Net Solutions PTY LTD, Sydney, Australia E-mail: [email protected] Sundarapandian Vaidyanathan, R & D Centre, Vel Tech University, India E-mail: [email protected] ISSN: 2231 - 5403 ISBN: 978-1-921987-26-7 DOI : 10.5121/csit.2015.50201 - 10.5121/csit.2015.50218 This work is subject to copyright. All rights are reserved, whether whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the International Copyright Law and permission for use must always be obtained from Academy & Industry Research Collaboration Center. Violations are liable to prosecution under the International Copyright Law. Typesetting: Camera-ready by author, data conversion by NnN Net Solutions Private Ltd., Chennai, India Preface Fifth International Conference on Computer Science, Engineering and Applications (CCSEA-2015) was held in Dubai, UAE, during January 23 ~ 24, 2015. Third International Conference on Data Mining & Knowledge Management Process (DKMP 2015), International Conference on Artificial Intelligence and Applications (AIFU-2015) and Fourth International Conference on Software Engineering and Applications (SEA-2015) were collocated with the CCSEA-2015. The conferences attracted many local and international delegates, presenting a balanced mixture of intellect from the East and from the West.
    [Show full text]
  • The Elinks Manual the Elinks Manual Table of Contents Preface
    The ELinks Manual The ELinks Manual Table of Contents Preface.......................................................................................................................................................ix 1. Getting ELinks up and running...........................................................................................................1 1.1. Building and Installing ELinks...................................................................................................1 1.2. Requirements..............................................................................................................................1 1.3. Recommended Libraries and Programs......................................................................................1 1.4. Further reading............................................................................................................................2 1.5. Tips to obtain a very small static elinks binary...........................................................................2 1.6. ECMAScript support?!...............................................................................................................4 1.6.1. Ok, so how to get the ECMAScript support working?...................................................4 1.6.2. The ECMAScript support is buggy! Shall I blame Mozilla people?..............................6 1.6.3. Now, I would still like NJS or a new JS engine from scratch. .....................................6 1.7. Feature configuration file (features.conf).............................................................................7
    [Show full text]
  • Openoffice Spreadsheet Override Auto Capatilization
    Openoffice Spreadsheet Override Auto Capatilization Selfsame Randie thraws her anesthesia so debauchedly that Merwin spiles very raspingly. Mitral Gerrard condones synchronically, he catches his pitchstone very unpreparedly. Is Lon Muhammadan or associate when rematches some requisition tile war? For my monobook skin is a list of As arch Capital will change percentage setting in gorgeous Voice Settings dialog. What rate the 4 basic layout types? Class WriteExcel Documentation for writeexcel 104. OpenOfficeorg 3 Getting Started Calamo. Saving Report Output native Excel XLSX Format. Installed tax product to another precious you should attend Office Manager and. Sep 2015 How to boast Off Automatic Capitalization in Excel 2013 middot Click. ExportMode Defaults to 'xlsx' and uses the tow Office XML standards. HttpwwwopenofficeorglicensesPDLhtml with the additional caveat that anyone. The Source Documents window up the Change Summary window but easily be. Usually if you change this option it affects all components. Excel Export allows exporting ag-Grid data create Excel using Open XML format xlsx or its's own XML format. Lionel Elie Mamane fdo57640 Auto capitalization for letters wrong. Associating a document with somewhat different template 75. The Advantages of Apache OpenOffice Apache OpenOffice Wiki. Note We always prompt response keywords in first capital letters for clarity but the. It is based on code from Apache OpenOffice made available getting the. Citations that sort been inserted with automatic citation updates disabled would be inserted. Getting Started with LibreOffice 60 Dash. Ranges in A1 notation must restore in uppercase like outlook Excel. Open up office vs closed plan office advantages and. OpenDocument applications such as OpenOfficeorg let this change the format of.
    [Show full text]
  • U.S. Government Printing Office Style Manual, 2008
    U.S. Government Printing Offi ce Style Manual An official guide to the form and style of Federal Government printing 2008 PPreliminary-CD.inddreliminary-CD.indd i 33/4/09/4/09 110:18:040:18:04 AAMM Production and Distribution Notes Th is publication was typeset electronically using Helvetica and Minion Pro typefaces. It was printed using vegetable oil-based ink on recycled paper containing 30% post consumer waste. Th e GPO Style Manual will be distributed to libraries in the Federal Depository Library Program. To fi nd a depository library near you, please go to the Federal depository library directory at http://catalog.gpo.gov/fdlpdir/public.jsp. Th e electronic text of this publication is available for public use free of charge at http://www.gpoaccess.gov/stylemanual/index.html. Use of ISBN Prefi x Th is is the offi cial U.S. Government edition of this publication and is herein identifi ed to certify its authenticity. ISBN 978–0–16–081813–4 is for U.S. Government Printing Offi ce offi cial editions only. Th e Superintendent of Documents of the U.S. Government Printing Offi ce requests that any re- printed edition be labeled clearly as a copy of the authentic work, and that a new ISBN be assigned. For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 ISBN 978-0-16-081813-4 (CD) II PPreliminary-CD.inddreliminary-CD.indd iiii 33/4/09/4/09 110:18:050:18:05 AAMM THE UNITED STATES GOVERNMENT PRINTING OFFICE STYLE MANUAL IS PUBLISHED UNDER THE DIRECTION AND AUTHORITY OF THE PUBLIC PRINTER OF THE UNITED STATES Robert C.
    [Show full text]
  • View the Index
    INDEX Symbols creating the fleet, 258–264 dropping the fleet, 267 + (addition), 26 reaching bottom of * (asterisk) operator, 147 screen, 276 {} (braces), 92, 105 rebuilding the fleet, 270 / (division), 26 bullets, 246–252 ** (double asterisk) operator, 149 collisions, with aliens, == (equality operator), 72–73 268–269, 291–292 ** (exponent), 26 deleting old, 250 // (floor division), 260 firing, 249 > (greater than), 75 limiting number of, 251 >= (greater than or equal to), 75 making larger, 270 # (hash mark), for comments, 29 settings, 247 != (inequality operator), 74 speeding up, 271 < (less than), 75 classes <= (less than or equal to), 75 Alien, 256–258 % (modulo operator), 116–117, 122 Bullet, 247–248 * (multiplication), 26 Button, 280–281 \n (newline), 22 GameStats, 273 ! (not), 74 Scoreboard, 288–289 += operator, 115 Settings, 231 [] (square brackets), 34 Ship, 233–235 - (subtraction), 26 ending the game, 276 \t (tab), 22 files alien_invasion.py, 229 A bullet.py, 247 addition (+), 26 button.py, 280 aliases, 152 game_stats.py, 273 alice.py, 197–199 scoreboard.py, 288 Alien Invasion project. See also settings.py, 231 Pygame ship.bmp, 233 aliens initializing dynamic checking edges, 266 settings, 286 collisions, with bullets, levels 268–269, 291–292 adding, 285–287 collisions, with ship, 272–275 modifying speed controlling fleet settings, 285 direction, 266 resetting the speed, 287 creating an alien, 256 planning, 228 Alien Invasion project, continued asterisk (*) operator, 147 Play button attributes, 159. See also classes: adding, 280–285
    [Show full text]
  • Renaissance Receptions of Ovid's Tristia Dissertation
    RENAISSANCE RECEPTIONS OF OVID’S TRISTIA DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Gabriel Fuchs, M.A. Graduate Program in Greek and Latin The Ohio State University 2013 Dissertation Committee: Frank T. Coulson, Advisor Benjamin Acosta-Hughes Tom Hawkins Copyright by Gabriel Fuchs 2013 ABSTRACT This study examines two facets of the reception of Ovid’s Tristia in the 16th century: its commentary tradition and its adaptation by Latin poets. It lays the groundwork for a more comprehensive study of the Renaissance reception of the Tristia by providing a scholarly platform where there was none before (particularly with regard to the unedited, unpublished commentary tradition), and offers literary case studies of poetic postscripts to Ovid’s Tristia in order to explore the wider impact of Ovid’s exilic imaginary in 16th-century Europe. After a brief introduction, the second chapter introduces the three major commentaries on the Tristia printed in the Renaissance: those of Bartolomaeus Merula (published 1499, Venice), Veit Amerbach (1549, Basel), and Hecules Ciofanus (1581, Antwerp) and analyzes their various contexts, styles, and approaches to the text. The third chapter shows the commentators at work, presenting a more focused look at how these commentators apply their differing methods to the same selection of the Tristia, namely Book 2. These two chapters combine to demonstrate how commentary on the Tristia developed over the course of the 16th century: it begins from an encyclopedic approach, becomes focused on rhetoric, and is later aimed at textual criticism, presenting a trajectory that ii becomes increasingly focused and philological.
    [Show full text]
  • Translate's Localization Guide
    Translate’s Localization Guide Release 0.9.0 Translate Jun 26, 2020 Contents 1 Localisation Guide 1 2 Glossary 191 3 Language Information 195 i ii CHAPTER 1 Localisation Guide The general aim of this document is not to replace other well written works but to draw them together. So for instance the section on projects contains information that should help you get started and point you to the documents that are often hard to find. The section of translation should provide a general enough overview of common mistakes and pitfalls. We have found the localisation community very fragmented and hope that through this document we can bring people together and unify information that is out there but in many many different places. The one section that we feel is unique is the guide to developers – they make assumptions about localisation without fully understanding the implications, we complain but honestly there is not one place that can help give a developer and overview of what is needed from them, we hope that the developer section goes a long way to solving that issue. 1.1 Purpose The purpose of this document is to provide one reference for localisers. You will find lots of information on localising and packaging on the web but not a single resource that can guide you. Most of the information is also domain specific ie it addresses KDE, Mozilla, etc. We hope that this is more general. This document also goes beyond the technical aspects of localisation which seems to be the domain of other lo- calisation documents.
    [Show full text]
  • There's a Lot to Know About XML, and It S Constantly Evolving. but You Don't
    < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic XML in a Nutshell, 3rd Edition By Elliotte Rusty Harold, W. Scott Means Publisher: O'Reilly Pub Date: September 2004 ISBN: 0-596-00764-7 Pages: 712 There's a lot to know about XML, and it s constantly evolving. But you don't need to commit every syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it--clear, concise, useful, and well-organized--in the updated third edition of XML in a Nutshell. < Day Day Up > < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic XML in a Nutshell, 3rd Edition By Elliotte Rusty Harold, W. Scott Means Publisher: O'Reilly Pub Date: September 2004 ISBN: 0-596-00764-7 Pages: 712 Copyright Preface What This Book Covers What's New in the Third Edition Organization of the Book Conventions Used in This Book Request for Comments Acknowledgments Part I: XML Concepts Chapter 1. Introducing XML Section 1.1. The Benefits of XML Section 1.2. What XML Is Not Section 1.3. Portable Data Section 1.4. How XML Works Section 1.5. The Evolution of XML Chapter 2. XML Fundamentals Section 2.1. XML Documents and XML Files Section 2.2. Elements, Tags, and Character Data Section 2.3. Attributes Section 2.4. XML Names Section 2.5. References Section 2.6. CDATA Sections Section 2.7.
    [Show full text]
  • Using Python Release 2.6.2
    Using Python Release 2.6.2 Guido van Rossum Fred L. Drake, Jr., editor April 15, 2009 Python Software Foundation Email: [email protected] CONTENTS 1 Command line and environment 3 1.1 Command line .............................................. 3 1.2 Environment variables .......................................... 7 2 Using Python on Unix platforms 11 2.1 Getting and installing the latest version of Python ............................ 11 2.2 Building Python ............................................. 12 2.3 Python-related paths and files ...................................... 12 2.4 Miscellaneous .............................................. 12 2.5 Editors .................................................. 13 3 Using Python on Windows 15 3.1 Installing Python ............................................. 15 3.2 Alternative bundles ............................................ 15 3.3 Configuring Python ........................................... 16 3.4 Additional modules ........................................... 17 3.5 Compiling Python on Windows ..................................... 18 3.6 Other resources .............................................. 19 4 Using Python on a Macintosh 21 4.1 Getting and Installing MacPython .................................... 21 4.2 The IDE ................................................. 22 4.3 Installing Additional Python Packages .................................. 22 4.4 GUI Programming on the Mac ...................................... 23 4.5 Distributing Python Applications on the Mac .............................
    [Show full text]
  • HP Decforms IFDL Reference Manual
    HP DECforms IFDL Reference Manual Order Number: AA–Q502C–TE January 2006 HP DECforms is a software product for applications, services, and tools that require a structured, forms-based, or menu-based user interface. DECforms is the first commercial implementation of an ANSI/ISO standard for forms-based interfaces, the CODASYL Form Interface Management System (FIMS). Revision/Update Information: This is a revised manual. Operating System: OpenVMS Alpha Version 7.3-2 or later OpenVMS I64 Version 8.2 or later Software Version: HP DECforms Version 4.0 Hewlett-Packard Company Palo Alto, California © Copyright 2006 Hewlett-Packard Development Company, L.P. Confidential computer software. Valid license from HP required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendors standard commercial license. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Oracle CDD, Oracle/Administrator, Oracle CDD/Repository, Oracle Rdb, and Oracle TRACE are trademarks of Oracle Corporation. IEEE is a registered trademark of the Institute of Electrical and Electronics Engineers. ISO is a trademark of the International Organization for Standardization.
    [Show full text]
  • George of Trebizond and Humanist Acts of Self-Presentation
    University of Kentucky UKnowledge Theses and Dissertations--History History 2013 Honor, Reputation, and Conflict: George of Trebizond and Humanist Acts of Self-Presentation Karl R. Alexander University of Kentucky, [email protected] Right click to open a feedback form in a new tab to let us know how this document benefits ou.y Recommended Citation Alexander, Karl R., "Honor, Reputation, and Conflict: George of Trebizond and Humanist Acts of Self- Presentation" (2013). Theses and Dissertations--History. 14. https://uknowledge.uky.edu/history_etds/14 This Doctoral Dissertation is brought to you for free and open access by the History at UKnowledge. It has been accepted for inclusion in Theses and Dissertations--History by an authorized administrator of UKnowledge. For more information, please contact [email protected]. STUDENT AGREEMENT: I represent that my thesis or dissertation and abstract are my original work. Proper attribution has been given to all outside sources. I understand that I am solely responsible for obtaining any needed copyright permissions. I have obtained and attached hereto needed written permission statements(s) from the owner(s) of each third-party copyrighted matter to be included in my work, allowing electronic distribution (if such use is not permitted by the fair use doctrine). I hereby grant to The University of Kentucky and its agents the non-exclusive license to archive and make accessible my work in whole or in part in all forms of media, now or hereafter known. I agree that the document mentioned above may be made available immediately for worldwide access unless a preapproved embargo applies.
    [Show full text]
  • Python Setup and Usage Release 3.4.3
    Python Setup and Usage Release 3.4.3 Guido van Rossum and the Python development team July 16, 2015 Python Software Foundation Email: [email protected] Contents 1 Command line and environment3 1.1 Command line............................................3 1.2 Environment variables........................................7 2 Using Python on Unix platforms 11 2.1 Getting and installing the latest version of Python.......................... 11 2.2 Building Python........................................... 12 2.3 Python-related paths and files.................................... 12 2.4 Miscellaneous............................................ 12 2.5 Editors................................................ 12 3 Using Python on Windows 15 3.1 Installing Python........................................... 15 3.2 Alternative bundles.......................................... 15 3.3 Configuring Python......................................... 15 3.4 Python Launcher for Windows.................................... 17 3.5 Additional modules......................................... 21 3.6 Compiling Python on Windows................................... 21 3.7 Other resources............................................ 22 4 Using Python on a Macintosh 23 4.1 Getting and Installing MacPython.................................. 23 4.2 The IDE............................................... 24 4.3 Installing Additional Python Packages................................ 24 4.4 GUI Programming on the Mac.................................... 24 4.5 Distributing Python Applications
    [Show full text]