The Input/Output Definition File (IODF) is a critical Control Point in the management of the IBM z/Series Platform. IODF Explorer Release 4.0 USER GUIDE Contact us for additional information: NewEra Software Technical Support 800-421-5035 support@newera.com www.newera.com Rev: 2009-04-24 IODF Explorer 4.0 ¾ Copyright, Trademark and Legal Notices Copyrights This Getting Started Guide and the related Software Product(s) are protected under a Copyright dated 2009 by NewEra Software, Inc. All rights are reserved. License Agreement This Getting Started Guide describes the installation and operation of Image FOCUS, its environment and applications. It is made available only under the terms of a license agreement between the licensee and NewEra Software Inc. No part of this Guide or the related Software Product(s) may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of NewEra Software, Inc. Trademarks and Copyrights of Others The following products and/or registered trademarks of International Business Machines Corporation are referenced in this document: MVS, VM, RACF, z/OS, SYSPLEX, JES, VTAM, TSO, ISPF, ICKDSF, DFSMSdss, DF/DSS, and others. 2 NewEra Software, Inc. ‐ Image Control Environment (ICE) Applications IODF Explorer 4.0 ¾ Technical Support Information NewEra Software is dedicated to providing the highest level of technical Around-the-clock- support support to meet our customers’ growing needs. In order to meet these needs, NewEra provides around‐the‐clock technical support, 7 days a week, 24 hours a day. In case of an emergency, please use the following phone numbers to Reach us by Telephone during Business Hours reach our technical support staff during normal business hours (6 AM to 4 PM Pacific Time): • In North America, dial 1‐800‐421‐5035 • Outside North America, dial 1‐408‐201‐7000 During non‐business hours, phone the above numbers and you will Reach us by Telephone during non-Business receive instructions on how to contact a Technical Support Hours Representative or a Technical Support Manager. If you have access to the Internet, you can send our technical support Sending Email staff an email message (support@newera.com). Your email message will be answered by the next business day. If you have product technical questions or product recommendations, you can send them as an email message. If you have access to the Internet, you can access our technical support Help through the NewEra website from www.newera.com. Your request will be answered by the next business day. NewEra is committed to providing the highest level of quality to our Service Levels customers by adopting the following criteria for responding to customer requests: • All critical questions received by phone during working hours will be answered within 15 minutes of receiving the request; • All email or NewEra Homepage technical questions will be answered by the next business day. NewEra understands the significance of providing our customers with We Want Your Suggestions! the highest quality support and welcomes all suggestions as to how we may improve Technical Support. 3 NewEra Software, Inc. ‐ Image Control Environment (ICE) Applications IODF Explorer 4.0 ¾ Recent Enhancements to the IODF Explorer • Processor Utilization Reports that remove all the guesswork, making assignments clear and easily understood; • Operation Manager’s Reports that will help to prevent confusion at the time of z/OS system initialization; • A Group Compare function that identifies changes between elements within different IODFs; • A Partition Compare function that provides change analysis at a more granular “partition” level; • Users can select either a Summary or Detail Report for an individual target. This function is also available for comparing OSCP targets; • The user interface has been enhanced to provide additional display capacity and selection options. This will allow users with larger IODF configurations to mix and match up to 48 OSCP and 48 IOCP targets as needed when using enhanced analysis, worksheet, search and compare functions; • The FICON/ESCON Switch interface has been enhanced to include new worksheet, search and compare functions, including full mapping of the switch configuration. New analytic functions have been added and are designed to report on component usage: LISTPORT, LISTCHIP, LISTCTLU and LISTIODU and component availability: OPENPORT, OPENCHIP, OPENCTLU and OPENIODU; • Address Compare has been added to already existing Element, Group, Device, and Partition Compare functions; • New analytic functions have been added to the I/O Device Search Interface. “FullPath” allows users to trace connectivity from a specified device through the structure to the CHPID. “CandList” allows users to have a precise list of devices that are accessible by partition. These new tools have been designed to assist hardware planners in their examination of I/O Device connectivity across their entire z/Series Hardware Platform; • Partition Inspection provides validation of IPL Integrity for any partition from within the IODF Explorer. 4 NewEra Software, Inc. ‐ Image Control Environment (ICE) Applications IODF Explorer 4.0 Table of Contents ¾ Copyright, Trademark and Legal Notices .............................................................................................. 2 Copyrights ......................................................................................................................................... 2 License Agreement ............................................................................................................................ 2 Trademarks and Copyrights of Others .............................................................................................. 2 ¾ Technical Support Information ............................................................................................................. 3 ¾ Recent Enhancements to the IODF Explorer ........................................................................................ 4 ¾ System Requirements and Limitations ............................................................................................... 11 System Limitations under TSO ........................................................................................................ 11 System Requirements for the IODF Explorer .................................................................................. 11 System Limitations for the IODF Explorer ....................................................................................... 11 Other notes for the IODF Explorer user .......................................................................................... 11 IODF Explorer – difference between TSO and ICE versions ............................................................ 11 ¾ Unlocking the Latent Value of the Input/Output Definition File ........................................................ 13 The IODF as a z/OS Control Point .................................................................................................... 13 How the IODF Explorer Adds Value ................................................................................................ 13 ¾ What can the IODF Explorer do for you? ............................................................................................ 15 Can I find out what components make up the IODF? ..................................................................... 15 IODF Configuration Overview ............................................................................................................. 16 OSCP (z/OS/MVSCP) Configuration Profile Report ............................................................................. 17 IOCP (Hardware) Configuration Profile Report ................................................................................... 18 IODF Configurations in Detail – Worksheets ...................................................................................... 19 IODF Configurations in Detail – Query Tools ...................................................................................... 20 Can I find out what components have changed in an IODF? .......................................................... 23 Setting up an IODF Baseline ................................................................................................................ 23 5 NewEra Software, Inc. ‐ Image Control Environment (ICE) Applications IODF Explorer 4.0 FullDF IO Content Compare ................................................................................................................ 24 Group Compare ................................................................................................................................... 28 Element Compare ............................................................................................................................... 30 Partition Compare ............................................................................................................................... 31 Device Compare .................................................................................................................................. 33 Address Compare ................................................................................................................................ 35 Switch Compare .................................................................................................................................
Bash Scripts #4 Input/Output + Oneliners By: Deepayan Patra & Sam Yong (Pixel) Pet Tax Sam’s doggo Yoshi How to Become a Bash Expert Bash as a full-fledged scripting language STEP 3 Bash as a data STEP 2 processing language Learn to browse files and run programs STEP 1 01 03 Unix Process Communication More Scripting Everything is a file! How to use pipes and more to stream info! 02 04 Scripting w. I/O Redirect Oneliners How programs talk to each other! One line programs to make Bash so easy! 01. Unix Process Comm. (it’s I/Opening) Unix as a 2-layered API ● C functions ○ for “real” system programming ● Shell commands ○ subset of C functionality ○ for scripting and interactive use Unix as a 2-layered API ● C functions (15-213) ○ for “real” system programming ● Shell commands (GPI) ○ subset of C functionality ○ for scripting and interactive use Unix process interacts with the world ● stdin ● stdout ● args ● stderr ● env Process ● exitcode ● fs ● fs ● network ● network We can script some of these ● stdin ● stdout ● args ● stderr ● env Process ● exitcode ● fs ● fs ● network ● network Input & Output (streams) ● stdin - standard input (file descriptor = 0) ○ raw_input, scanf ● stdout - standard output (file descriptor = 1) ○ print, printf ● stderr - standard error (file descriptor = 2) ○ fprint(stderr) Arguments ● args - command line arguments ● Scripts can access arguments with ○ $# = number of arguments given to the script (different from “argc” in C, which includes program name) ○ $1 = first argument, $2 = second argument, … ● e.g. $ echo Hello World ○ $# = 2 ○ $1 = Hello ○ $2 = World ○ $0 = echo DEMO Environment Variables ● A list of key-value pairs DEMO ● Essentially the shell’s global variables ● Any program can use these variables ○ Access a VAR by $VAR ● printenv - prints currently set environment variables Exit Code ● All programs exit with some code ● This is determined by the programmer ● In general, exit 0 means success ● Anything else indicates some error/failure ● Process can access last executed program’s exit code DEMO 02.
Dell EMC SC Series Best Practices with Vmware Vsphere 5.X–6.X
Best Practices Dell EMC SC Series: Best Practices with VMware vSphere Abstract This document provides best practices for integrating VMware® vSphere® 5.x- 7.x hosts with Dell EMC™ SC Series storage. May 2021 2060-M-BP-V Revisions Revisions Date Description July 2016 Initial release: Combined vSphere 5.x and 6.x best practice documents, added SCOS 7.1 updates September 2016 Minor revisions and corrections October 2016 Changed Disk.AutoremoveOnPDL to reflect current VMware guidance January 2017 Updated for vSphere 6.5 changes; added appendix D summarizing all host settings February 2017 Updated Linux guest disk timeout recommendations in section 4.7.2 April 2017 Updated iSCSI login timeout recommendation July 2017 Updated SAS driver info in 4.2.3, Added auto UNMAP requirements in 16.3.5 April 2018 Updated to provide vSphere 6.7 guidance October 2018 Minor revisions and corrections December 2018 Added SAS front-end lsi_msgpt3 module parameter recommendation in 4.2.3 March 2019 Modified SATP claim rules in section 6.9.1 and appendix D July 2019 Minor revisions and corrections (VMFS3.EnableBlockDelete=1) September 2019 Claim rule syntax corrections April 2020 vSphere 7.0 additions December 2020 Minor clarifications January 2021 Esxcli command syntax change for DelayedAck in appendix D.1 May 2021 Updated section 4.2.3 with additional KB articles for SAS FE connectivity Acknowledgments Author: Darin Schmitz The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose.
Developing Programs Using the Hardware Abstraction Layer, Nios II
6. Developing Programs Using the Hardware Abstraction Layer January 2014 NII52004-13.1.0 NII52004-13.1.0 This chapter discusses how to develop embedded programs for the Nios® II embedded processor based on the Altera® hardware abstraction layer (HAL). This chapter contains the following sections: ■ “The Nios II Embedded Project Structure” on page 6–2 ■ “The system.h System Description File” on page 6–4 ■ “Data Widths and the HAL Type Definitions” on page 6–5 ■ “UNIX-Style Interface” on page 6–5 ■ “File System” on page 6–6 ■ “Using Character-Mode Devices” on page 6–8 ■ “Using File Subsystems” on page 6–15 ■ “Using Timer Devices” on page 6–16 ■ “Using Flash Devices” on page 6–19 ■ “Using DMA Devices” on page 6–25 ■ “Using Interrupt Controllers” on page 6–30 ■ “Reducing Code Footprint in Embedded Systems” on page 6–30 ■ “Boot Sequence and Entry Point” on page 6–37 ■ “Memory Usage” on page 6–39 ■ “Working with HAL Source Files” on page 6–44 The application program interface (API) for HAL-based systems is readily accessible to software developers who are new to the Nios II processor. Programs based on the HAL use the ANSI C standard library functions and runtime environment, and access hardware resources with the HAL API’s generic device models. The HAL API largely conforms to the familiar ANSI C standard library functions, though the ANSI C standard library is separate from the HAL. The close integration of the ANSI C standard library and the HAL makes it possible to develop useful programs that never call the HAL functions directly.
SYSTEM PROGRAMMER'S GUIDE for the TRS-80 Model 4/4P using Montezuma Micro CP/M* 2.2 \ZcfV t?roHJIc 1*01 stTil O<£i***JL Oir 4 TABLE OF CONTENTS 1. INTRODUCTION 1 2. THE SYSTEM PARAMETER BLOCK 3 3. I/O USING THE IOBYTE ..5 4. THE KEYBOARD DRIVER 9 5. THE VIDEO DISPLAY DRIVER .....11 6. THE PARALLEL PRINTER DRIVER 13 7. THE SERIAL PORT DRIVER 16 8. THE MEMORY DISK DRIVE 17 9. DISK I/O 19 9.1. The Floppy Disk Driver 19 9.2. DPB Extensions 19 9.3. DCB Definitions . 21 9.4. Using the Disk Driver 22 9.5. EXBIOS - Extending the BIOS 23 9.6. The Hard Disk Driver 23 10. CP/M BOOTS 25 10.1. The Cold Boot 25 10.2. The Warm Boot 25 11. PITFALLS AND TRAPS .27 11.1. INTERRUPTS : 27 11.2. FEATURES UNIQUE TO THE Z80 27 11.3. RAM USAGE 28 12. INDEX 29 13. THE LISTING 31 Montezuma Micro CP/M" System Programmer's Manual 1. INTRODUCTION All of the information in this manual is copyrighted by Montezuma Micro, including the source code listings. The purpose of this manual is to provide you with the information necessary to modify the BIOS of your own copy of CP/M". Much like the service manual for a car, this document will show you how the BIOS works, and how you can use your own options with it. It will NOT teach you how to use CP/M and it will NOT teach you how to write assembly language programs for use with CP/ M.
Linux Tape Backup with Mt and Tar Command Howto by VIVEK GITE on APRIL 19, 2006 · 30 COMMENTS · Last Updated at JUNE 3, 2009
Linux Tape Backup With mt And tar Command Howto by VIVEK GITE on APRIL 19, 2006 · 30 COMMENTS · last updated at JUNE 3, 2009 Magnetic tape is a non-volatile storage medium consisting of a magnetic coating on a thin plastic strip. Nearly all recording tape is of this type, whether used for video, audio storage or general purpose digital data storage using a computer. How do I make backup using tapes under Linux operating systems? Linux (and other Unixish system) use mt command to control magnetic tape drive operation. You need to use mt command while working with tape drive. It allows you to reading and writing to tape. The default tape drive under Linux is /dev/st0 (first SCSI tape device name). You can read more about tape drives naming convention used under Linux here. Following paragraph summaries command you need to use control tape drive for backup/restore purpose. Rewind tape drive:# mt -f /dev/st0 rewindBackup directory /www and /home with tar command (z - compressed):# tar -czf /dev/st0 /www /homeFind out what block you are at with mt command:# mt -f /dev/st0 tellDisplay list of files on tape drive:# tar -tzf /dev/st0Restore /www directory:# cd / # mt -f /dev/st0 rewind # tar -xzf /dev/st0 wwwUnload the tape:# mt -f /dev/st0 offlineDisplay status information about the tape unit:# mt -f /dev/st0 statusErase the tape:# mt -f /dev/st0 eraseYou can go BACKWARD or FORWARD on tape with mt command itself: (a) Go to end of data:# mt -f /dev/nst0 eod(b) Goto previous record:# mt -f /dev/nst0 bsfm 1(c) Forward record:# mt -f /dev/nst0 fsf 1Replace /dev/st0 with your actual tape drive name.
Appendix A. Caché ObjectScript Reference Commands Command Description Break[:cond] Interrupt execution of the current routine for debugging purposes. Break[:cond] [status] Activate or deactivate user interrupts. Close[:cond] device[:parameter] Close the device, make it available again for other users and, possibly, set the device characteristics. CONTINUE[:cond] End the current execution of the code block of a For, WHILE, or Do/WHILE loop and check the condition to determine whether a further iteration follows. Do[:cond] Invoke a subroutine or code block and continue the Do[:cond] {…} WHILE expression program processing with the next command after com- pletion. Do[:cond] entryref[(parameter)] Invoke a subroutine, pass the optional parameter and [:cond] continue the program processing with the next com- mand after completion. Else Execute the following commands only if the value of $Test is 0. Else {…} Execute the following code block only if none of the preceding If and ElseIf conditions were true. ElseIf expression {…} Execute the following command block only if none of the preceding If and ElseIf conditions were true and expres- sion is true. For Execute the remainder of the line or the following code For {…} block until a Quit or Goto command ends the loop. For variable=expression[,...] Repeat the execution of the following commands in the For variable=expression[,...] {…} routine line or the following code block for different For variable=start:increment:[end] values of a local variable. For variable=start:increment:[end] {…} Goto[:cond] Resume the normal execution of a routine that was interrupted with the Break command. Goto[:cond] location[:cond] Continue the program execution at another line or in another routine.
Unix Large File Processing Secrets .DUVWHQ 6HOI 30 6TXDUHG ,QF 6DQ )UDQFLVFR &$ ABSTRACT To most SAS programmers working in the UNIX environment, large file processing is synonymous with the historical maximum file size limit of 2 gigabytes. Though this is a significant concern, there are additional dimensions to managing and working with large quantities of data. Large file processing is any job large enough that you think twice before typing submit. The term is applied here to any situation where a task is constrained by physical resources, including: system file size limits, system storage or workspace limits, total processing time, CPU availability, and process contention with other users. The weapons which can be applied to these are programmer time and skill. Ultimately, pushing the limits of the envelope is a question of balancing these factors. This paper identifies several techniques for large file processing on Unix, including: • Recent SAS and OS large file support enhancements. • Efficiency techniques. • Sorting data. • Working to and from tape • Advanced data coding methods of the world still focuses on measuring inputs, and not product. Think about your program and what you need out of it. Figure LARGE FILE SUPPORT out, within reason, the best way to accomplish this. Remember SAS and OS Enhancements that there are usually several equivalent methods available. The Unix maximum file size limit exists because of the limited After a reasonable enhancement in program efficiency has been file addressing space allowed by a 32 bit integer. Methods for achieved, it’s generally best to forego further improvements. overcoming this limit are described in Tom Truscott’s 1996 Remember: efficiency improvements only go so far.