Software on Berserk

Total Page:16

File Type:pdf, Size:1020Kb

Software on Berserk - -4pc - -4pc Berserk User’s Guide Eric Nodwell Scott Webster Copyright © 2002-2004 Eric NodwellScott Webster This document can be freely redistributed according to the terms of the GNU General Public License. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". Table of Contents Introduction ..................................................................................... 3 What is the Berserk computer system? ........................................................ 3 Introduction to Command Line Linux ......................................................... 3 Guidelines - Getting Along With Other Users .................................................. 4 Use the cluster Luke! ....................................................................... 4 Berserk Features ................................................................................. 4 Printing .................................................................................... 4 Setting default print options ............................................................ 4 Setting print options from the command line .............................................. 6 Using xpp or kprinter instead of lpr ...................................................... 6 Printing to espresso (colour laser printer) ................................................. 7 Setting the Default Printer .............................................................. 7 How to cancel a print job ............................................................... 8 How to print to a Berserk printer from Physics ............................................ 8 Windows Networking: Accessing Berserk from a lab Windows computer ......................... 8 FTP: Sending and receiving large data files .................................................... 9 Outgoing FTP ......................................................................... 9 Incoming FTP ......................................................................... 9 Floppies and CDs ........................................................................... 9 How do a use the floppy/cdrom drive? ................................................... 9 Burning CDs .......................................................................... 9 The Trash: Restoring accidently deleted files .................................................. 11 Sound .................................................................................... 12 Configuring Sound ................................................................... 12 Playing Audio CDs ................................................................... 13 Scanning Images .......................................................................... 13 Software on Berserk ............................................................................. 13 Text Editors ............................................................................... 13 Kate ................................................................................ 13 jpico and nano ....................................................................... 13 Emacs and XEmacs ................................................................... 13 Vi, Vim and Elvis .................................................................... 14 LaTeX .................................................................................... 14 1 Berserk User’s Guide - -4pc - -4pc Kile ................................................................................. 14 TeXmacs ............................................................................ 14 Word Processing and Office Software ........................................................ 14 OpenOffice (StarOffice) ............................................................... 14 KOffice ............................................................................. 15 WordNet ............................................................................ 15 Reference Managers ....................................................................... 15 Pybliographer ........................................................................ 15 Image Manipulation and CAD .............................................................. 15 QCad ............................................................................... 15 The GIMP ........................................................................... 15 Inkscape ............................................................................ 16 Sodipodi ............................................................................ 16 gThumb ............................................................................. 16 Mathematics and Number Crunching (and some Plotting) ...................................... 16 Matlab .............................................................................. 16 Maple ............................................................................... 17 Mathematica ......................................................................... 17 Igor Pro ............................................................................. 18 Octave .............................................................................. 18 Numerical Python, Scientific Python, SciPi and MayaVI .................................. 18 FDTD ............................................................................... 18 FElt ................................................................................. 19 Plotting and Scientific Graphics ............................................................. 19 Grace ............................................................................... 19 Gri ................................................................................. 19 GnuPlot ............................................................................. 19 Mathematical and Scientific Utilities ......................................................... 20 Units ................................................................................ 20 GPeriodic ........................................................................... 20 g3data .............................................................................. 20 Qalculate ............................................................................ 20 Programming .............................................................................. 20 Anjuta and KDevelop ................................................................. 20 Python .............................................................................. 20 Lahey Fortran ........................................................................ 20 GCC Compiler (versions 2.95 and 3.2) .................................................. 21 Intel C/C++ and Fortran Compilers ..................................................... 21 ATLAS, LAPACK and BLAS linear algebra libraries ..................................... 21 GNU Scientific Library ............................................................... 22 netCDF ............................................................................. 22 noweb - Literate Programming ......................................................... 22 Bluefish ............................................................................. 22 Quanta .............................................................................. 23 Viewers and Players ........................................................................ 23 XMMS .............................................................................. 23 RealPlayer ........................................................................... 23 Handy Little Utilities ....................................................................... 23 wget ................................................................................ 23 ImageMagick ........................................................................ 24 KSnapshot ........................................................................... 24 ps2eps, ps2pdf and pstoedit ............................................................ 24 Tips ........................................................................................... 24 2 Berserk User’s Guide - -4pc - -4pc LaTeX Tips ............................................................................... 24 Getting Started with LaTeX ........................................................... 24 Using Emacs to edit LaTeX files. ...................................................... 24 Generating HTML from LaTeX ........................................................ 25 Generating accents in LaTeX .......................................................... 25 Drawing circuit diagrams with LaTeX .................................................. 25 Changing the print margins or paper size ................................................ 25 Counting the number of words in a LaTeX file ........................................... 26 Emacs Tips ............................................................................... 26 Changing the font size in Emacs ....................................................... 26 Inserting special characters such as a degree sign ........................................ 26 Removing the Toolbar and Scrollbar
Recommended publications
  • Backbox Penetration Testing Never Looked So Lovely
    DISTROHOPPER DISTROHOPPER Our pick of the latest releases will whet your appetite for new Linux distributions. Picaros Diego Linux for children. here are a few distributions aimed at children: Doudou springs to mind, Tand there’s also Sugar on a Stick. Both of these are based on the idea that you need to protect children from the complexities of the computer (and protect the computer from the children). Picaros Diego is different. There’s nothing stripped- down or shielded from view. Instead, it’s a normal Linux distro with a brighter, more kid-friendly interface. The desktop wallpaper perhaps best We were too busy playing Secret Mario on Picaros Diego to write a witty or interesting caption. exemplifies this. On one hand, it’s a colourful cartoon image designed to interest young file manager. In the programming category, little young for a system like this, but the it children. Some of the images on the we were slightly disappointed to discover it may well work for children on the upper end landscape are icons for games, and this only had Gambas (a Visual Basic-like of that age range. should encourage children to investigate the language), and not more popular teaching Overall, we like the philosophy of wrapping system rather than just relying on menus. languages like Scratch or a Python IDE. Linux is a child-friendly package, but not On the other hand, it still displays technical However, it’s based on Debian, so you do dumbing it down. Picaros Diego won’t work details such as the CPU usage and the RAM have the full range of software available for every child, but if you have a budding and Swap availability.
    [Show full text]
  • Arxiv:Cs/0107036V2 [Cs.SC] 31 Jul 2001
    TEXmacs interfaces to Maxima, MuPAD and REDUCE A. G. Grozin Budker Institute of Nuclear Physics, Novosibirsk 630090, Russia [email protected] Abstract GNU TEXmacs is a free wysiwyg word processor providing an excellent typesetting quality of texts and formulae. It can also be used as an interface to Computer Algebra Systems (CASs). In the present work, interfaces to three general-purpose CASs have been implemented. 1 TEXmacs GNU TEXmacs [1] is a free (GPL) word processor which typesets texts and mathematical formulae with very high quality (like LAT X), • E emphasizes the logical structure of a document rather than its appearance (like • LATEX), is easy to use and intuitive (like typical wysiwyg word processors), • arXiv:cs/0107036v2 [cs.SC] 31 Jul 2001 can be extended by a powerful programming language (like Emacs), • can include PostScript figures (as well as other figures which can be converted • to PostScript), can export LAT X, and import LAT X and html, • E E supports a number of languages based on Latin and Cyrillic alphabets. • It uses TEX fonts both on screen and when printing documents. Therefore, it is truly wysiwyg, with equally good quality of on-screen and printed documents (in contrast to LyX which uses X fonts on screen and calls LATEX for printing). There is a similar commercial program called Scientific Workplace (for Windows). TEXmacs can also be used as an interface to any CAS which can generate LATEX output. It renders LATEX formulae on the fly, producing CAS output with highest 1 typesetting quality (better than, e.g., Mathematica, which uses fixed-width fonts for formula output).
    [Show full text]
  • THINC: a Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
    THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2011 c 2011 Ricardo A. Baratto This work may be used in accordance with Creative Commons, Attribution-NonCommercial-NoDerivs License. For more information about that license, see http://creativecommons.org/licenses/by-nc-nd/3.0/. For other uses, please contact the author. ABSTRACT THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto THINC is a new virtual and remote display architecture for desktop computing. It has been designed to address the limitations and performance shortcomings of existing remote display technology, and to provide a building block around which novel desktop architectures can be built. THINC is architected around the notion of a virtual display device driver, a software-only component that behaves like a traditional device driver, but instead of managing specific hardware, enables desktop input and output to be intercepted, manipulated, and redirected at will. On top of this architecture, THINC introduces a simple, low-level, device-independent representation of display changes, and a number of novel optimizations and techniques to perform efficient interception and redirection of display output. This dissertation presents the design and implementation of THINC. It also intro- duces a number of novel systems which build upon THINC's architecture to provide new and improved desktop computing services. The contributions of this dissertation are as follows: • A high performance remote display system for LAN and WAN environments.
    [Show full text]
  • Mobile Phones and Cloud Computing
    Mobile phones and cloud computing A quantitative research paper on mobile phone application offloading by cloud computing utilization Oskar Hamrén Department of informatics Human Computer Interaction Master’s programme Master thesis 2-year level, 30 credits SPM 2012.07 Abstract The development of the mobile phone has been rapid. From being a device mainly used for phone calls and writing text messages the mobile phone of today, or commonly referred to as the smartphone, has become a multi-purpose device. Because of its size and thermal constraints there are certain limitations in areas of battery life and computational capabilities. Some say that cloud computing is just another buzzword, a way to sell already existing technology. Others claim that it has the potential to transform the whole IT-industry. This thesis is covering the intersection of these two fields by investigating if it is possible to increase the speed of mobile phones by offloading computational heavy mobile phone application functions by using cloud computing. A mobile phone application was developed that conducts three computational heavy tests. The tests were run twice, by not using cloud computing offloading and by using it. The time taken to carry out the tests were saved and later compared to see if it is faster to use cloud computing in comparison to not use it. The results showed that it is not beneficial to use cloud computing to carry out these types of tasks; it is faster to use the mobile phone. 1 Table of Contents Abstract ..................................................................................................................................... 1 Table of Contents ..................................................................................................................... 2 1. Introduction .......................................................................................................................... 5 1.1 Previous research ........................................................................................................................
    [Show full text]
  • Linux Virtual COM User's Manual
    LES301A-KIT LES301AE-KIT LES302A-KIT LES302AE-KIT 1- and 2-Port 10/100 Device Servers, RS-232/422/485, DB9 M Linux Virtual COM User’s Manual ® BLAC K BOX Customer Order toll-free in the U.S.: Call 877-877-BBOX (outside U.S. call 724-746-5500) Support FREE technical support 24 hours a day, 7 days a week: Call 724-746-5500 or fax 724-746-0746 Mailing address: Black Box Corporation, 1000 Park Drive, Lawrence, PA 15055-1018 Information Web site: www.blackbox.com • E-mail: [email protected] Linux Virtual COM user manual Trademarks Used in this Manual Trademarks Used in this Manual Black Box and the Double Diamond logo are registered trademarks of BB Technologies, Inc. Ubuntu is a registered trademark of Canonical Ltd. Linux is a registered trademark of Linus Torvalds. SUSE is a registered trademark of Novell, Inc. Red Hat and Fedora are registered trademarks of Red Hat, Inc. Debian is a registered trademark of Software in the Public Interest, Inc. Any other trademarks mentioned in this manual are acknowleged to be the property of the trademark owners. We‘re here to help! If you have any questions about your application or our products, contact Black Box Tech Support at 724-746-5500 or go to blackbox.com and click on “Talk to Black Box.” You’ll be live with one of our technical experts in less than 30 seconds. Page 2 724-746-5500 | blackbox.com Linux Virtual COM user manual 724-746-5500 | blackbox.com Guides Contained in this Document IMPORTANT ANNOUNCEMENT: The information contained in this document is the property of Black Box Corporation and is supplied for the sole purpose of the operation and maintenance of products of Black Box Corporation.
    [Show full text]
  • Accessing Windows Applications from Unix and Vice Versa
    50-20-42 DATA COMMUNICATIONS MANAGEMENT ACCESSING WINDOWS APPLICATIONS FROM UNIX AND VICE VERSA Raj Rajagopal INSIDE Accessing Windows Applications from an X-Station, Coexistence Options, Windows in an X-Station, Accessing Windows Applications, Accessing UNIX Applications from Windows Desktops, Emulators Migrating from one environment to another takes planning, resources and, most importantly, time (except in very trivial cases). This implies that even if eventually migrating to another environment, one still has to deal with coexistence among environments in the interim. In many com- panies it would make good business sense not to migrate legacy systems at all. Instead, it may be better to develop new systems in the desired en- vironment and phase out the legacy applications. The data created by the legacy applications is important and one must ensure that data can be ac- cessed from a new environment. Coexistence considerations are very im- portant in this case. Coexistence between Windows PAYOFF IDEA NT, UNIX, and NetWare deals with a Some users want applications they develop in number of related issues. One may one environment to execute in other environ- need to access Windows applications ments with very little change. With this approach, they can continue to develop applications with from a UNIX machine or need to ac- the confidence that they will execute in another cess UNIX applications from Win- environment even if the environments change in dows desktops. One may prefer to the future. In applications that can run in both have the same type of desktop (Òan Windows NT and UNIX, this can be accomplished enterprise desktopÓ) for all users and in several ways: be able to access different environ- •use APIs — there are three flavors of this ap- ments.
    [Show full text]
  • Behavior Based Software Theft Detection, CCS 2009
    Behavior Based Software Theft Detection 1Xinran Wang, 1Yoon-Chan Jhi, 1,2Sencun Zhu, and 2Peng Liu 1Department of Computer Science and Engineering 2College of Information Sciences and Technology Pennsylvania State University, University Park, PA 16802 {xinrwang, szhu, jhi}@cse.psu.edu, [email protected] ABSTRACT (e.g., in SourceForge.net there were over 230,000 registered Along with the burst of open source projects, software open source projects as of Feb.2009), software theft has be- theft (or plagiarism) has become a very serious threat to the come a very serious concern to honest software companies healthiness of software industry. Software birthmark, which and open source communities. As one example, in 2005 it represents the unique characteristics of a program, can be was determined in a federal court trial that IBM should pay used for software theft detection. We propose a system call an independent software vendor Compuware $140 million dependence graph based software birthmark called SCDG to license its software and $260 million to purchase its ser- birthmark, and examine how well it reflects unique behav- vices [1] because it was discovered that certain IBM products ioral characteristics of a program. To our knowledge, our contained code from Compuware. detection system based on SCDG birthmark is the first one To protect software from theft, Collberg and Thoborson that is capable of detecting software component theft where [10] proposed software watermark techniques. Software wa- only partial code is stolen. We demonstrate the strength of termark is a unique identifier embedded in the protected our birthmark against various evasion techniques, including software, which is hard to remove but easy to verify.
    [Show full text]
  • The GNOME Desktop Environment
    The GNOME desktop environment Miguel de Icaza ([email protected]) Instituto de Ciencias Nucleares, UNAM Elliot Lee ([email protected]) Federico Mena ([email protected]) Instituto de Ciencias Nucleares, UNAM Tom Tromey ([email protected]) April 27, 1998 Abstract We present an overview of the free GNU Network Object Model Environment (GNOME). GNOME is a suite of X11 GUI applications that provides joy to users and hackers alike. It has been designed for extensibility and automation by using CORBA and scripting languages throughout the code. GNOME is licensed under the terms of the GNU GPL and the GNU LGPL and has been developed on the Internet by a loosely-coupled team of programmers. 1 Motivation Free operating systems1 are excellent at providing server-class services, and so are often the ideal choice for a server machine. However, the lack of a consistent user interface and of consumer-targeted applications has prevented free operating systems from reaching the vast majority of users — the desktop users. As such, the benefits of free software have only been enjoyed by the technically savvy computer user community. Most users are still locked into proprietary solutions for their desktop environments. By using GNOME, free operating systems will have a complete, user-friendly desktop which will provide users with powerful and easy-to-use graphical applications. Many people have suggested that the cause for the lack of free user-oriented appli- cations is that these do not provide enough excitement to hackers, as opposed to system- level programming. Since most of the GNOME code had to be written by hackers, we kept them happy: the magic recipe here is to design GNOME around an adrenaline response by trying to use exciting models and ideas in the applications.
    [Show full text]
  • \", 22 \', 22 \(, 31, 32 \), 31, 32 \-, 26 \., 22 \=, 22 \[, 32 \], 32 \ˆ, 21, 22 \`, 22
    i i i ‘beginlatex’ --- 2018/12/4 --- 23:30 --- page 289 --- #325 i Index Index See Table 2 on page xxx for the meanings of the typographic formatting used here and in the text. \", 22 \ae, 22 \', 22 \affiliation, 42 \(, 31, 32 afm2tfm, 234 \), 31, 32 textbf, 17 \-, 26 Apple Mac \., 22 editor, 189, 194 /p, 236 installation, 189 \=, 22 apt, 190 \@, 162, 164 apt-get, xxvi \[, 32 Aquamacs, 222 \], 32 \arabic, 170 \ˆ, 21, 22 ArcInfo, 96 \`, 22 textbf, 13 \ , 21, 22 array, 85 \arraybackslash, 85 10pt, 37 \arraystretch, 87 11pt, 37 article, 11, 35 12pt, 11, 37 \author, xxx, 42–44, 108, 162 AutoCAD, 95 a4paper, 36, 38 avant, 143 \AA, 22 \aa, 22 b, 100 AbiWord, 175, 177, 178 \b, 22 abstract, 44, 45 babel, 20, 30, 50, 120 \abstractname, 45 textbf, 9 abstracts, 44 textbf, 254 accents, 19 BaKoMa TEX, xxix Acrobat Reader, 185, 194, 222, 258 \baselinestretch, 133 acronym, 126 bbding, 73, 171 \addbibresource, 120 beer, 123 \addcontentsline, 52 lite, 123 \addtocontents, 53 American, 123 \AE, 22 Rogue £ Formatting Information ¢ 289 ¡ i i i i i i i ‘beginlatex’ --- 2018/12/4 --- 23:30 --- page 290 --- #326 i FORMATTING INFORMATION Chocolate Stout, 124 \centering, 29, 85, 87, 148 \begin, 20, 40, 41, 45, 74, 82, cep, 93 163, 180 chancery, 143 \bfseries, 12, 149 textbf, 247 biber, ix, 5, 19, 62, 112–114, 120– \chapter, 47, 48 122, 125 chapter, 170 biber, 247, 249 characters BIBINPUTS, 116 accented, 19 biblatex, 5, 112, 113 ASCII, 267 biblatex, ix, 5, 19, 112–114, 116– math, 31 121 special, 15, 31 biblatex-apa, 114 charmap, 21 biblatex-cheatsheet, 114 charter,
    [Show full text]
  • Emacspeak User's Guide
    Emacspeak User's Guide Jennifer Jobst Revision History Revision 1.3 July 24,2002 Revised by: SDS Updated the maintainer of this document to Sharon Snider, corrected links, and converted to HTML Revision 1.2 December 3, 2001 Revised by: JEJ Changed license to GFDL Revision 1.1 November 12, 2001 Revised by: JEJ Revision 1.0 DRAFT October 19, 2001 Revised by: JEJ This document helps Emacspeak users become familiar with Emacs as an audio desktop and provides tutorials on many common tasks and the Emacs applications available to perform those tasks. Emacspeak User's Guide Table of Contents 1. Legal Notice.....................................................................................................................................................1 2. Introduction.....................................................................................................................................................2 2.1. What is Emacspeak?.........................................................................................................................2 2.2. About this tutorial.............................................................................................................................2 3. Before you begin..............................................................................................................................................3 3.1. Getting started with Emacs and Emacspeak.....................................................................................3 3.2. Emacs Command Conventions.........................................................................................................3
    [Show full text]
  • Documentation of Northern Alta: Grammar, Texts and Glossary
    Documentation of Northern Alta: grammar, texts and glossary Alexandro-Xavier García Laguía ADVERTIMENT. La consulta d’aquesta tesi queda condicionada a l’acceptació de les següents condicions d'ús: La difusió d’aquesta tesi per mitjà del servei TDX (www.tdx.cat) i a través del Dipòsit Digital de la UB (diposit.ub.edu) ha estat autoritzada pels titulars dels drets de propietat intel·lectual únicament per a usos privats emmarcats en activitats d’investigació i docència. No s’autoritza la seva reproducció amb finalitats de lucre ni la seva difusió i posada a disposició des d’un lloc aliè al servei TDX ni al Dipòsit Digital de la UB. No s’autoritza la presentació del seu contingut en una finestra o marc aliè a TDX o al Dipòsit Digital de la UB (framing). Aquesta reserva de drets afecta tant al resum de presentació de la tesi com als seus continguts. En la utilització o cita de parts de la tesi és obligat indicar el nom de la persona autora. ADVERTENCIA. La consulta de esta tesis queda condicionada a la aceptación de las siguientes condiciones de uso: La difusión de esta tesis por medio del servicio TDR (www.tdx.cat) y a través del Repositorio Digital de la UB (diposit.ub.edu) ha sido autorizada por los titulares de los derechos de propiedad intelectual únicamente para usos privados enmarcados en actividades de investigación y docencia. No se autoriza su reproducción con finalidades de lucro ni su difusión y puesta a disposición desde un sitio ajeno al servicio TDR o al Repositorio Digital de la UB.
    [Show full text]
  • El Manual De GNU TEXMACS
    El manual de GNU TEXMACS Índice 1. Iniciar . 9 1.1. Convenciones para este manual . 9 1.2. Congurar TEXMACS . 9 1.3. Crear, guardar y cargar documentos . 10 1.4. Imprimir documentos . 10 2. Escribir documentos sencillos . 11 2.1. Generalidades para teclear de texto . 11 2.2. Tecleando texto estructurado . 11 2.3. Etiquetas basadas en contenido . 12 2.4. Listas . 12 2.5. Entornos . 13 2.6. Aspectos de presentación . 14 2.7. El sistema de selección de fuentes . 14 2.8. Dominando el teclado . 15 2.8.1. Reglas generales de prejos . 15 2.8.2. Algunos atajos de teclado fundamentales . 15 2.8.3. Atajos de teclado para el modo texto . 16 2.8.4. Comandos híbridos y simulación LATEX . 16 2.8.5. Objetos dinámicos . 16 2.8.6. Personalización del teclado . 17 3. Fórmulas matemáticas . 19 3.1. Principales constructos matemáticos . 19 3.2. Tecleando símbolos matemáticos . 20 3.3. Tecleando operadores grandes . 20 3.4. Teclear delimitadores grandes . 21 3.5. Acentos matemáticos anchos . 22 4. Material tabular . 23 4.1. Creando tablas . 23 4.2. El modo para dar formato . 23 4.3. Especicando el alineamiento de la celda y la tabla . 24 4.4. Especicando el tamaño de la celda y la tabla . 24 4.5. Bordes, acolchado y color de fondo . 25 4.6. Características avanzadas de la tabla . 25 5. Links and automatically generated content . 27 5.1. Creating labels, links and references . 27 5.2. Inserting images . 27 5.3. Generating a table of contents . 28 5.4.
    [Show full text]