10-30-2006
That is what is my point of concern!!!Awk doesnt takes variables values and comparison cannt be performed with varaible as number of times the sequence is repeated is unknown .... the parameters may be repeated after n sec for total m hrs ....
KRgs
Aps
10 More Discussions You Might Find Interesting
1. Linux
Could anyone help i have a question that i have a problem with for my home work it is,
How do i change file permissions in a command line enviromet
thanx (1 Reply)
Discussion started by: Cube3k
1 Replies
2. Programming
Hi to all,
I need in Microsoft C++ to IDENTIFY unix files
which are LINKS.
I use CFTPFILEFIND class.
Thanks
:-)
.:rolleyes: (0 Replies)
Discussion started by: mizrachi
0 Replies
3. Red Hat
Hello Friends ,
Where do i check the following settings in redhat ?
1. Minimum required number of characters in the password (passwordMinLength)
2. Minimum number of digit characters, meaning numbers between zero and nine (passwordMinDigits)
3. Minimum number of ASCII alphabetic... (2 Replies)
Discussion started by: avklinux
2 Replies
4. AIX
Dears
i need some assistance in implementing following scenario, as per audit observation we have restrict remote log in of specific users after official hours by clients, but the same user needs to be log in from LFT console round the clock(or any time after logout,because certain application... (1 Reply)
Discussion started by: m_raheelahmed
1 Replies
5. UNIX for Advanced & Expert Users
I have a file that reads File (X.txt)
Contents of record 1:
rdrDESTINATION_ADDRESS (String) "91 971502573813"
rdrDESTINATION_IMSI (String) "000000000000000"
rdrORIGINATING_ADDRESS (String) "d0 movies"
rdrORIGINATING_IMSI (String) "000000000000000"
rdrTRAFFIC_EVENT_TIME... (0 Replies)
Discussion started by: magedfawzy
0 Replies
6. Solaris
When I modify the file attributes of files and run a ls -l to view the changes everything looks correct, however when I run the init 6 to reboot the server the file attributes devert back to the origininal read only permissions. Any help would be appreciated (2 Replies)
Discussion started by: jimcz2it
2 Replies
7. Solaris
Hello,
We have one Solaris 10 machine which has three LDAP servers configured. We want to remove one of them. I tried below ldapclient command however no change is made.
----------------------------------------------------------------------
ldapclient mod -a "defaultServerList=10.149.9.20... (0 Replies)
Discussion started by: alfa_w
0 Replies
8. UNIX for Dummies Questions & Answers
I'm using xml_grep command to get the value of different tags in a xml-file.
No i also need the value of an attribute in a tag.
Can I use xml_grep for this? Does anybody know how?
ex. :
<Name xmlns:xsi="http://www.w3.org/2001/XMLinst" xsi:spaceSchema="Name_5879.xsd">
...
</Name>
I... (1 Reply)
Discussion started by: pistach
1 Replies
9. Red Hat
Hi Linux Experts,
I am using RHEL 6.4, on checking I identified some files ends with the file attribute like dot (.) at the end. Whereas, I checked with the same level of other servers and I don't identify dot(.) at the end of file attribute. Why is it so? is there any meaning for it.
... (3 Replies)
Discussion started by: gsiva
3 Replies
10. Shell Programming and Scripting
Hi,
i want to list all system processes showing the attributes pid, user name, cpu consumption, and the difference between the resident memory and the swap memory needed to stock the process in case of suspending it.
i have two questions, the resident memory is the attribute size i think,... (4 Replies)
Discussion started by: Eskizoide
4 Replies
LEARN ABOUT DEBIAN
bup-margin
bup-margin(1) General Commands Manual bup-margin(1)
NAME
bup-margin - figure out your deduplication safety margin
SYNOPSIS
bup margin [options...]
DESCRIPTION
bup margin iterates through all objects in your bup repository, calculating the largest number of prefix bits shared between any two
entries. This number, n, identifies the longest subset of SHA-1 you could use and still encounter a collision between your object ids.
For example, one system that was tested had a collection of 11 million objects (70 GB), and bup margin returned 45. That means a 46-bit
hash would be sufficient to avoid all collisions among that set of objects; each object in that repository could be uniquely identified by
its first 46 bits.
The number of bits needed seems to increase by about 1 or 2 for every doubling of the number of objects. Since SHA-1 hashes have 160 bits,
that leaves 115 bits of margin. Of course, because SHA-1 hashes are essentially random, it's theoretically possible to use many more bits
with far fewer objects.
If you're paranoid about the possibility of SHA-1 collisions, you can monitor your repository by running bup margin occasionally to see if
you're getting dangerously close to 160 bits.
OPTIONS
--predict
Guess the offset into each index file where a particular object will appear, and report the maximum deviation of the correct answer
from the guess. This is potentially useful for tuning an interpolation search algorithm.
--ignore-midx
don't use .midx files, use only .idx files. This is only really useful when used with --predict.
EXAMPLE
$ bup margin
Reading indexes: 100.00% (1612581/1612581), done.
40
40 matching prefix bits
1.94 bits per doubling
120 bits (61.86 doublings) remaining
4.19338e+18 times larger is possible
Everyone on earth could have 625878182 data sets
like yours, all in one repository, and we would
expect 1 object collision.
$ bup margin --predict
PackIdxList: using 1 index.
Reading indexes: 100.00% (1612581/1612581), done.
915 of 1612581 (0.057%)
SEE ALSO
bup-midx(1), bup-save(1)
BUP
Part of the bup(1) suite.
AUTHORS
Avery Pennarun <apenwarr@gmail.com>.
Bup unknown- bup-margin(1)