Administering Unidata on Windows Platforms

Total Page:16

File Type:pdf, Size:1020Kb

Administering Unidata on Windows Platforms C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINNT\ADMINNTTITLE.fm March 5, 2010 12:39 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on Windows Platforms UDT-720-IM-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINNT\ADMINNTTITLE.fm March 5, 2010 12:39 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-IM-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2008. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii Administering UniData on Windows Platforms The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice. This software and any copies thereof may not be provided or otherwise made available to any other person. No title to or ownership of the software and associated documentation is hereby transferred. Any unauthorized use or reproduction of this software or documentation may be subject to civil or criminal liability. The information in the software and documentation is subject to change and should not be construed as a commitment by Rocket Software, Inc. Restricted rights notice for license to the U.S. Government: Use, reproduction, or disclosure is subject to restrictions as stated in the “Rights in Technical Data- General” clause (alternate III), in FAR section 52.222-14. All title and ownership in this computer software remain with Rocket Software, Inc. Note This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when exporting this product. Please be aware: Any images or indications reflecting ownership or branding of the product(s) documented herein may or may not reflect the current legal ownership of the intellectual property rights associated with such product(s). All right and title to the product(s) documented herein belong solely to Rocket Software, Inc. and its subsidiaries, notwithstanding any notices (including screen captures) or any other indications to the contrary. Contact information Rocket Software 275 Grove Street Suite 3-410 Newton, MA 02466-2272 USA Tel: (617) 614-4321 Fax: (617) 630-7100 Web Site: www.rocketsoftware.com Administering UniData on Windows Platforms iii Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Table of Contents Table of Contents Chapter 1 Introduction In This Introduction . 1-2 About This Manual . 1-3 Excluded Commands . 1-3 Reserved Characters . 1-4 Case Sensitivity . 1-5 Symbolic Links . 1-6 Phantom Command . 1-6 Dynamic Files . 1-7 Deleting Files. 1-7 PCPERFORM Command . 1-8 Shell Command Differences . 1-8 Use of Semicolon . 1-9 Notes About Terminal Devices and Tape Drives . 1-11 Terminal Devices . 1-11 Tape Devices . 1-11 Printing in UniData for Windows Platforms. 1-13 Chapter 2 Migrating Applications to UniData for Windows Platforms Migrating Applications to UniData for Windows Platforms . 2-3 Process Overview . 2-4 UniData Migration Tools . 2-6 NTMIGRATE File . 2-6 Copy the NTMIGRATE File . 2-7 Create VOC Entry and DICT for NTMIGRATE . 2-7 Set Pointers to NTMIGRATE. 2-8 Compile the UniBasic Tools Programs . 2-8 Special Considerations for UniData SQL. 2-9 Migrating Schema and Dictionaries . 2-9 Migrating privilege Tables. 2-10 :\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINNT\ADMINNTTOC.fm (bookTOC.template) March 5 2010 12:42 pm NT_SCOUT . 2-12 Output . 2-13 NTMIGRATE.LOC . 2-13 Using NT_SCOUT . 2-13 NT_CATALOG_MAP. 2-17 Output . 2-17 Using NT_CATALOG_MAP . 2-18 TAR2FTP . 2-19 Output . 2-19 Using TAR2FTP . 2-20 convcode, convdata, convidx . 2-24 Purpose . 2-24 Using convcode, convdata, and convidx . 2-24 NT_UPDATE_PATHS. 2-27 Using NT_UPDATE_PATHS . 2-27 NT_RECATALOGGER . 2-29 Using NT_RECATALOGGER . 2-29 SQL_UNIX_2_NT . 2-30 Using SQL_UNIX_2_NT. 2-30 Chapter 3 Managing and Using the UDTelnet Service Introduction . 3-3 Requirements for the UDTelnet Service. 3-3 Overview of Features . 3-5 Configurability . 3-5 Direct Access to UniData . 3-5 Security. 3-5 Secure Sockets Layer . 3-6 Terminal Emulation . 3-6 Integration with UniData Serial Terminal Support . 3-7 Configuring the UDTelnet Service . 3-8 Service Options . 3-10 User Profiles . 3-13 Customizing User Profiles . 3-15 Generated Profiles . 3-18 Starting, Stopping and Pausing UDTelnet. 3-20 Controlling UDTelnet from UniData Admin . 3-20 Controlling UDTelnet from the Control Panel. 3-21 Configuring SSL for Telnet . 3-22 Table of Contents v Chapter 4 Managing and Using the UDSerial Service Introduction . 4-3 Requirements . 4-3 Overview of Features . 4-5 Security . 4-5 Terminal Emulation . 4-5 Logging . 4-6 Integration with UniData Telnet Service . 4-6 Configuring the UniData Terminal Server . 4-7 Service Option . 4-8 Port Configuration . 4-9 Control Keys . 4-12 Modem Options. 4-13 Logon Script. 4-15 Auto Connection . 4-16 Starting and Stopping the UniData Terminal Server. 4-18 Controlling UDSerial from UniAdmin . 4-18 Controlling UDSerial from the Control Panel . 4-19 Chapter 5 UniData and Services UniData and Services . 5-2 What Is a Service? . 5-3 Principal UniData Services . 5-4 Shared Basic Code Server (sbcs) . 5-4 Shared Memory Manager (smm) . 5-5 Clean Up (cleanupd). 5-6 Monitoring UniData Services . 5-7 Log Files . 5-8 Chapter 6 UniData and Memory Windows Platforms and Shared Memory . 6-3 UniData and Shared Memory . 6-4 smm and Shared Memory . 6-4 Learning about Global Pages . 6-10 Learning about Local Control Tables . 6-11 sbcs and Shared Memory . 6-13 Self-Created Segments . 6-13 Chapter 7 Configuring Your UniData System Configuring Your UniData System . 7-2 vi Administering UniData on Windows Platforms Configuration Procedure . 7-3 1. Identify Disk Requirements . 7-3 2. Identify Memory Requirements. 7-3 3. Verify Version Compatibilities . 7-4 4. Check/Reset System-Level Parameters . 7-4 5. Check/Reset UniData Configuration Parameters . 7-4 6. Define Peripherals within UniData . 7-5 7. Create UniData Accounts . 7-5 8. Add Windows Users. 7-6 9. Set Environment Variables . 7-6 10. Review UniData Security . 7-8 11. Convert Data Files. 7-8 12. Review Backup Procedures . 7-9 Chapter 8 Starting, Stopping, and Pausing UniData Normal Operation . 8-3 UniData Log Files . 8-3 Start UniData with startud . 8-4 Stop UniData with stopud. 8-5 Pausing UniData . 8-6 The dbpause Command . 8-6 The dbpause_status Command . 8-7 Resuming Processing . 8-8 Additional Commands. 8-9 Stopping a User Process with stopudt . 8-9 Stopping a User Process with deleteuser . 8-10 Displaying ipc Facilities with ipcstat . 8-11 Stopping UniData with stopud -f. 8-12 Chapter 9 Managing UniData Accounts What Is a UniData Account?. 9-3 Creating a UniData Account. 9-4 Deleting an Account . 9-8 Clearing Space in UniData Accounts . 9-9 CLEAR.ACCOUNT. 9-9 Chapter 10 Managing UniData Security Customizing Permissions . 10-3 Customizing a VOC File . 10-6 Removing Entries . 10-6 Table of Contents vii Customizing UniData . 10-8 Remote Items . 10-10 The SETFILE Command . 10-12 LOGIN and LOGOUT Paragraphs . 10-13 UniData SQL Privileges. 10-16 Field-Level Security for UniQuery . 10-17 Points to Remember about Field-Level Security . 10-17 The QUERY.PRIVILEGE File . 10-18 UniQuery Processing . 10-20 Turning on Field-Level Security . 10-20 Chapter 11 Managing UniData Files UniData Hashed Files . 11-4 Static Hashed Files . 11-5 Dynamic Hashed Files . 11-6 Dynamic Files and Overflow . 11-6 When Dynamic Files Are Created . 11-9 Tips and Constraints for Creating a Dynamic File . 11-10 Dynamic Files and Disk Space . 11-11 Sequentially Hashed Files . 11-17 The over001 File . 11-17 The gmekey File . 11-18 DIR-Type Files . 11-20 Multilevel Directory Files . 11-23 Index Files and Index Log Files . 11-25 Index-Related Files for a Static Hashed File . ..
Recommended publications
  • UNIX Shell Programming (15CS35) Solution Internal Assessment
    UNIX Shell Programming (15CS35) Solution Internal Assessment- II November - 2016 1. Explain significance of following commands (2x5=10 M) i. cp ?????? progs Wild card ? matches any single character, hence the above command (cp) copies files whose names are six in length to progs directory ii. ls *.[xyz]* Wild card * matches any number of characters, hence the above command (ls) lists all the files having extension as either x, or y or z. iii. ls jones[0-9][0- 9][0-9] In the above command the character class[0-9] matches any digit between 0 to 9. Hence the above command lists all the files beginning with jones and having last three characters as any digit between 0 to 9. iv. echo * The above command lists all the file in the current directory. v. cp foo foo* The above command copies the file foo to file called foo*. Here the wild card * loses its meaning. 1. Write UNIX commands for the following (2 X 5= 10 M) i. Find and replace all the occurrences of unix with UNIX in the file after confirming the user. : 1,$s/unix/UNIX/gc ii. List all the files in the current directory which names are having exactly 5 characters and any number of characters in their extension. ls ?????.* iii. Copy all files stored in /home/vtu with .c, .cpp and .java extensions to progs sub- directory in current directory cp /home/vtu/*.{c,cpp,java} ./progs iv. Delete all files containing agra or agar in their file names. rm *ag[ra][ar]* v.
    [Show full text]
  • Moxa Nport Real TTY Driver for Arm-Based Platform Porting Guide
    Moxa NPort Real TTY Driver for Arm-based Platform Porting Guide Moxa Technical Support Team [email protected] Contents 1 Introduction ...................................................................................2 2 Porting to the Moxa UC-Series—Arm-based Computer ....................2 2.1 Build binaries on a general Arm platform ...................................................... 2 2.2 Cross-compiler and the Real TTY driver ........................................................ 3 2.3 Moxa cross-compiling interactive script......................................................... 4 2.4 Manually build the Real TTY driver with a cross-compiler ................................ 5 2.5 Deploy cross-compiled binary to target......................................................... 8 3 Porting to Raspberry Pi OS .............................................................9 4 Porting to the Yocto Project on Raspberry Pi ................................ 10 4.1 Prerequisite............................................................................................... 10 4.2 Create a Moxa layer for the Yocto Project..................................................... 11 4.3 Install a Moxa layer into the Yocto Project.................................................... 17 4.4 Deploy the Yocto image in Raspberry Pi ....................................................... 17 4.5 Start the Real TTY driver in Raspberry Pi ..................................................... 18 4.6 Set the default tty mapping to the Real TTY configuration ............................
    [Show full text]
  • Printing Printf: Formatted Printing
    Printing printf: formatted printing So far we have just been copying stuff from standard-in, files, pipes, etc to the screen or another file. Say I have a file with names and phone numbers. I would like to print it out with vertically aligned columns. (so my printout is not in the same format as the input file) File contents: Desired display: Bob 4929 Bob 4929 Chuck 4882 Chuck 4882 printf is a command from the C programming language to control printing. Shell script #!/bin/bash printf "Hello world.\n" a=`echo Hello world. | wc | nawk '{print $2}' ` printf "This phrase contains %d words\n" $a Run it alpaca.ceri.memphis.edu512:> printex.sh Hello world. This phrase contains 2 words alpaca.ceri.memphis.edu513:> #!/bin/bash printf "Hello world.\n" a=`echo Hello world. | wc | nawk '{print $2}' ` printf "This phrase contains %d words\n" $a We need the double quotes “ . “ to define an argument (the stuff inside the quotes) for printf. #!/bin/bash printf "Hello world.\n" a=`echo Hello world. | wc | nawk '{print $2}' ` printf "This phrase contains %d words\n" $a The argument in double quotes has - Regular text (“Hello world”, “This text contains “) - Some funny new thing - %d – a format specifier. - The already known specification for a new line - \n #!/bin/bash printf "Hello world.\n" a=`echo Hello world. | wc | nawk '{print $2}' ` printf "This phrase contains %d words\n" $a We also have another argument, the $a, which is a shell variable, at the end. Note that the items are delimited with spaces, not commas.
    [Show full text]
  • Unix Commands (09/04/2014)
    Unix Commands (09/04/2014) • Access control – login <login_name> – exit – passwd <login_name> – yppassswd <loginname> – su – • Login as Super user – su <login> • Login as user <login> • Root Prompt – [root@localhost ~] # • User Prompt – [bms@raxama ~] $ On Line Documentation – man <command/topic> – info <command/topic> • Working with directories – mkdir –p <subdir> ... {-p create all directories in path if not present} mkdir –p /2015/Jan/21/14 will create /2015, Jan, 21 & 14 in case any of these is absent – cd <dir> – rm -r <subdir> ... Man Pages • 1 Executable programs or shell commands • 2 System calls (functions provided by the kernel) • 3 Library calls (functions within program libraries) • 4 Special files (usually found in /dev) • 5 File formats and conventions eg /etc/passwd • 6 Games • 7 Miscellaneous (including macro packages and conventions), e.g. man(7), groff(7) • 8 System administration commands (usually only for root) • 9 Kernel routines [Non standard] – man grep, {awk,sed,find,cut,sort} – man –k mysql, man –k dhcp – man crontab ,man 5 crontab – man printf, man 3 printf – man read, man 2 read – man info Runlevels used by Fedora/RHS Refer /etc/inittab • 0 - halt (Do NOT set initdefault to this) • 1 - Single user mode • 2 - Multiuser, – without NFS (The same as 3, if you do not have networking) • 3 - Full multi user mode w/o X • 4 - unused • 5 - X11 • 6 - reboot (Do NOT set init default to this) – init 6 {Reboot System} – init 0 {Halt the System} – reboot {Requires Super User} – <ctrl> <alt> <del> • in tty[2-7] mode – tty switching • <ctrl> <alt> <F1-7> • In Fedora 10 tty1 is X.
    [Show full text]
  • Gnu Coreutils Core GNU Utilities for Version 5.93, 2 November 2005
    gnu Coreutils Core GNU utilities for version 5.93, 2 November 2005 David MacKenzie et al. This manual documents version 5.93 of the gnu core utilities, including the standard pro- grams for text and file manipulation. Copyright c 1994, 1995, 1996, 2000, 2001, 2002, 2003, 2004, 2005 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. Chapter 1: Introduction 1 1 Introduction This manual is a work in progress: many sections make no attempt to explain basic concepts in a way suitable for novices. Thus, if you are interested, please get involved in improving this manual. The entire gnu community will benefit. The gnu utilities documented here are mostly compatible with the POSIX standard. Please report bugs to [email protected]. Remember to include the version number, machine architecture, input files, and any other information needed to reproduce the bug: your input, what you expected, what you got, and why it is wrong. Diffs are welcome, but please include a description of the problem as well, since this is sometimes difficult to infer. See section “Bugs” in Using and Porting GNU CC. This manual was originally derived from the Unix man pages in the distributions, which were written by David MacKenzie and updated by Jim Meyering.
    [Show full text]
  • Processes in Linux/Unix
    Processes in Linux/Unix A program/command when executed, a special instance is provided by the system to the process. This instance consists of all the services/resources that may be utilized by the process under execution. • Whenever a command is issued in unix/linux, it creates/starts a new process. For example, pwd when issued which is used to list the current directory location the user is in, a process starts. • Through a 5 digit ID number unix/linux keeps account of the processes, this number is call process id or pid. Each process in the system has a unique pid. • Used up pid’s can be used in again for a newer process since all the possible combinations are used. • At any point of time, no two processes with the same pid exist in the system because it is the pid that Unix uses to track each process. Initializing a process A process can be run in two ways: 1. Foreground Process : Every process when started runs in foreground by default, receives input from the keyboard and sends output to the screen. When issuing pwd command $ ls pwd Output: $ /home/geeksforgeeks/root When a command/process is running in the foreground and is taking a lot of time, no other processes can be run or started because the prompt would not be available until the program finishes processing and comes out. 2. Backround Process : It runs in the background without keyboard input and waits till keyboard input is required. Thus, other processes can be done in parallel with the process running in background since they do not have to wait for the previous process to be completed.
    [Show full text]
  • Systems Supplement for COP 3601
    Systems Guide for COP 3601: Introduction to Systems Software Charles N. Winton Department of Computer and Information Sciences University of North Florida 2010 Chapter 1 A Basic Guide for the Unix Operating System 1. 1 Using the Unix On-line Manual Pages Facility The following are some of the Unix commands for which you may display manual pages: cal cat cd chmod cp cut date echo egrep ex fgrep file find gcc gdb grep kill less ln locate ls mail make man mesg mkdir mv nohup nl passwd pr ps pwd rm rmdir set sleep sort stty tail tee time touch tr tty uname umask unset vim wall wc which who whoami write For example, to display the manual pages for the command "cp" enter man cp Note that you may also enter man man to find out more about the "man" command. In addition there may be commands unique to the local environment with manual pages; e.g., man turnin accesses a manual page for a project submission utility named Aturnin@ that has been added to the system. If you enter a command from the Unix prompt that requires an argument, the system will recognize that the command is incomplete and respond with an error message. For example, if the command "cp" had been entered at the Unix prompt the system would respond with the information such as shown below: cp: missing file arguments Try `cp --help' for more information. The "cp" command is a copy command. If the arguments which tell the command which file to copy and where to locate the copied file are missing, then the usage error message is generated.
    [Show full text]
  • Tips for Riding Metro for People with Disabilities and Senior
    50.173 2/18 50.173 [email protected]. purchase one, call 202-962-2700 or email email or 202-962-2700 call one, purchase Metrobuses. Reduced Fare SmarTrip Fare Reduced ID and how to to how and ID disabilities. ® points on most most on points To find out if you’re eligible for a Metro Metro a for eligible you’re if out find To providing Metro services to individuals with with individuals to services Metro providing Eligibility Certification and Outreach at 202-962-2703. 202-962-2703. at Outreach and Certification Eligibility and transfer transfer and operate vehicles and equipment when when equipment and vehicles operate about Metro’s free travel training, Contact the Office of of Office the Contact training, travel free Metro’s about for locations. for intersections intersections don’t know how, let us show them. For more information information more For them. show us let how, know don’t sensitivity training and are trained to to trained are and training sensitivity Prince George’s counties. See wmata.com wmata.com See counties. George’s Prince announce stops, stops, announce who doesn’t use Metrobus or Metrorail because they they because Metrorail or Metrobus use doesn’t who Managers and Train Operators receive receive Operators Train and Managers select public libraries in Montgomery and and Montgomery in libraries public select audio systems systems audio If you know a senior citizen or someone with a disability disability a with someone or citizen senior a know you If Metrobus Operators and Metrorail Station Station Metrorail and Operators Metrobus at all Metro sales offices, transit stores and and stores transit offices, sales Metro all at Digital signs and and signs Digital The benefits are life-changing.
    [Show full text]
  • Shell Scripting
    Shell Scripting Alexander B. Pacheco LTS Research Computing Outline 1 Introduction Types of Shell Variables File Permissions Input and Output 2 Shell Scripting Getting Started with Writing Simple Scripts Arithmetic Operations Flow Control Arrays Command Line Arguments Functions 3 Unix Utilities grep sed 4 awk programming 5 Wrap Up 2 / 76 Introduction Introduction What is a SHELL The command line interface is the primary interface to Linux/Unix operating systems. Shells are how command-line interfaces are implemented in Linux/Unix. Each shell has varying capabilities and features and the user should choose the shell that best suits their needs. The shell is simply an application running on top of the kernel and provides a powerful interface to the system. her Softwa Ot re Shell Kernel rdwa a r e H 4 / 76 Types of Shell sh : Bourne Shell Developed by Stephen Bourne at AT&T Bell Labs csh : C Shell Developed by Bill Joy at University of California, Berkeley ksh : Korn Shell Developed by David Korn at AT&T Bell Labs backward-compatible with the Bourne shell and includes many features of the C shell bash : Bourne Again Shell Developed by Brian Fox for the GNU Project as a free software replacement for the Bourne shell (sh). Default Shell on Linux and Mac OSX The name is also descriptive of what it did, bashing together the features of sh, csh and ksh tcsh : TENEX C Shell Developed by Ken Greer at Carnegie Mellon University It is essentially the C shell with programmable command line completion, command-line editing, and a few other features.
    [Show full text]
  • CIS18A: Introduction to Linux/Unix CLASSROOM ATC
    http://voyager.deanza.fhda.edu/~lalitha/cis18a/cis18a.html CIS18A: Introduction to Linux/Unix CLASSROOM ATC 204 WINTER 2015 : Section INFO: 00444 CIS -018A-61Y College academic Calendar: Winter 2015 http://deanza.fhda.edu/calendar/winterdates.html Instructor Information Name: Lalitha Krishnamurthy Office Hours: Not applicable ie None Email: krishnamurthylalitha at fhda dot edu Online Lab Hours: Wednesdays 845PM-10PM Lecture timings for CIS18A : M/W 6 PM - 750 PM Course Description This course is designed to discuss Linux/Unix Operating environment and its features. Linux/Unix commands, file structure, Regular expressions, shell features will be discussed Introduction to the features of the UNIX/LINUX operating system including text editing, text file manipulation, electronic mail, Internet utilities, directory structures, input/output handling, and shell features are part of the course curriculum CIS18A Student Learning Outcome Statements (SLO) Use the Unix/Linux Operating System utilities and shell features for basic file manipulation, networking, and communication. Course Objectives Edit text using the vi editor Maintain file and directory system Establish security and file permission, Perform basic file maintenance and use information utilities Utilize the shells Run shell commands, Implement quoting rules Communicate with email and communication utilities Apply filters and use implement basic regular expression Use basic utilities to explore system data, user data, and common tasks: exit, passwd, who, whoami, finger, w, tty, stty, uname, clear,
    [Show full text]
  • GPL-3-Free Replacements of Coreutils 1 Contents
    GPL-3-free replacements of coreutils 1 Contents 2 Coreutils GPLv2 2 3 Alternatives 3 4 uutils-coreutils ............................... 3 5 BSDutils ................................... 4 6 Busybox ................................... 5 7 Nbase .................................... 5 8 FreeBSD ................................... 6 9 Sbase and Ubase .............................. 6 10 Heirloom .................................. 7 11 Replacement: uutils-coreutils 7 12 Testing 9 13 Initial test and results 9 14 Migration 10 15 Due to the nature of Apertis and its target markets there are licensing terms that 1 16 are problematic and that forces the project to look for alternatives packages. 17 The coreutils package is good example of this situation as its license changed 18 to GPLv3 and as result Apertis cannot provide it in the target repositories and 19 images. The current solution of shipping an old version which precedes the 20 license change is not tenable in the long term, as there are no upgrades with 21 bugfixes or new features for such important package. 22 This situation leads to the search for a drop-in replacement of coreutils, which 23 need to provide compatibility with the standard GNU coreutils packages. The 24 reason behind is that many other packages rely on the tools it provides, and 25 failing to do that would lead to hard to debug failures and many custom patches 26 spread all over the archive. In this regard the strict requirement is to support 27 the features needed to boot a target image with ideally no changes in other 28 components. The features currently available in our coreutils-gplv2 fork are a 29 good approximation. 30 Besides these specific requirements, the are general ones common to any Open 31 Source Project, such as maturity and reliability.
    [Show full text]
  • Dyalog for UNIX UI Guide
    Dyalog for UNIX UI Guide Dyalog version 18.0 The tool of thought for software solutions Dyalog is a trademark of Dyalog Limited Copyright © 1982-2020 by Dyalog Limited All rights reserved. Dyalog for UNIX UI Guide Dyalog version 18.0 Document Revision: 20210429_180 Unless stated otherwise, all examples in this document assume that ⎕IO ⎕ML ← 1 No part of this publication may be reproduced in any form by any means without the prior written permission of Dyalog Limited. Dyalog Limited makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Dyalog Limited reserves the right to revise this publication without notification. email: [email protected] https://www.dyalog.com TRADEMARKS: SQAPL is copyright of Insight Systems ApS. Array Editor is copyright of davidliebtag.com Raspberry Pi is a trademark of the Raspberry Pi Foundation. Oracle®, Javascript™ and Java™ are registered trademarks of Oracle and/or its affiliates. UNIX® is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company Limited. Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries. Windows® is a registered trademark of Microsoft Corporation in the United States and other countries. macOS® and OS X® (operating system software) are trademarks of Apple Inc., registered in the U.S. and other countries. All other trademarks and copyrights are acknowledged. iii Contents Overview
    [Show full text]