Sponsored Content
Top Forums Shell Programming and Scripting This might be a programming teaser! Post 302271955 by otheus on Monday 29th of December 2008 06:54:39 AM
Old 12-29-2008
So use your algorithm and awk like this:
Code:
awk -F\; 'FILENAME=="fileA" { processA; } FILENAME=="fileB" { processB; } '\
'{ # do something here for both files after processing in processA and processB }'

 

10 More Discussions You Might Find Interesting

1. Programming

c programming or unix programming!?

i would like advice on the usbject of c programming (in the middle of reading a book on C). could i benefit more if i apply that knowledge in the unix format if i were able to, or would that take the point out of learning C, basically I want to stay away from strying too far away from unix and use... (1 Reply)
Discussion started by: moxxx68
1 Replies

2. Shell Programming and Scripting

Unix Systems Programming Vs Unix Programming

Several months ago I found a link that explained the difference between how a Unix Systems Admin would do scripting compared to what a Unix Programmer would do. It showed a basic script and then show several iterations that explained how the Systems Admin would change it to make it better. I was... (0 Replies)
Discussion started by: BCarlson
0 Replies

3. Programming

C Brain Teaser

Dear Gurus, I have encountered a C question, which I thought of sharing with you. This question was asked by one of my technical training staff...Though my training was over I'm still thinking of a solution for this.. Write a C program to do a small task(lets say just simply printing a "Hello... (34 Replies)
Discussion started by: vrk1219
34 Replies

4. UNIX for Dummies Questions & Answers

Carreer:Networking Programming in Unix (C programming Language)

Hello, I am trying to learn Networking Programming in C in unix enviorment. I want to know how good it is to become a network programmer. i am crazy about Network programming but i also want to opt for the best carreer options. Anybody experienced Network Programmer, please tell me is my... (5 Replies)
Discussion started by: vibhory2j
5 Replies

5. Programming

C Programming - Hardware Programming

Can someone help me on suggesting some ways to access the memory content in RAM directly from C/C++ source code. Please provide me any book name or any URL so that I can get an exhaustive knowledge over it. If possible please give me some tips on interacting with hardwares directly through... (3 Replies)
Discussion started by: nandumishra
3 Replies

6. Programming

Brain Teaser Extended

Hi Gurus, To the Brain Teaser, if I add another condition, say the executable should not be altered, how the program should be altered? (no perl please, purely C). I forgot to mention this condition my staff had mentioned. ( forgot then and got now :D ) The program executed the first time... (4 Replies)
Discussion started by: vrk1219
4 Replies

7. UNIX for Dummies Questions & Answers

How does unix system administration, unix programming, unix network programming differ?

How does unix system administration, unix programming, unix network programming differ? Please help. (0 Replies)
Discussion started by: thulasidharan2k
0 Replies

8. UNIX for Dummies Questions & Answers

From iOS programming to Linux system programming

Hello. I like Linux and C programming language. Allways wanted to understand kernel and become a Linux system programmer. And I also like Objective-C and iOS. These two programming areas have relations: 1. Linux and iOS are UNIX-like systems, POSIX compliant. 2. It is useful to know C language... (2 Replies)
Discussion started by: Rockatansky
2 Replies

9. Shell Programming and Scripting

sed regexp teaser

G'day, Here's a teaser for a sed guru, which I surely am not one, as even my basic sed skills are rusted from years of not practising ... lol Ok ... we have a string of digits such as: 632413741610252847552619172459483022433027602515212950543016701812771409213148672112 we want it split... (9 Replies)
Discussion started by: naderra
9 Replies

10. What is on Your Mind?

Cyber Dystopia Teaser (720 HD)

Working on a new cybersecurity, dystopian world series and made a short 2 min teaser today. Cyber Dystopia (720 HD) https://www.youtube.com/watch?v=g9Ca07J_YC8 If anyone has any ideas for the story, please write out some story lines in the comments and join the production team! (1 Reply)
Discussion started by: Neo
1 Replies
confstr(3C)															       confstr(3C)

NAME
confstr() - get string-valued configuration values SYNOPSIS
DESCRIPTION
provides a method for applications to get configuration-defined string values. Its use and purpose are similar to (see sysconf(2)), except that it is used where string values rather than numeric values are returned. The name parameter can take on the following name values, which are defined in A default value for the environment variable which can be used to locate commands in Section 1 of the and utilities defined in the POSIX.2 standard that are currently implemented in the HP-UX operating system. Which kernel is supported on the hardware. Current values returned include "32", "32/64" or "64". Whether the kernel is 32-bit or 64-bit. Current values returned include "32" or "64". The hardware model string. Unique identifier for each machine. Returned as an opaque string of printable ASCII characters. This string has the same value for all partitions in a physical machine. Refer to for a unique identifier for partitions in a machine. For hardware classes first released with HP-UX 11i or later, this ID is unique across all hardware classes. For earlier hardware classes, the ID number is unique only within the hard- ware class. A null string is returned if no ID number is available; this is expected to be the case only for proto- type machines or other systems improperly configured in manufacturing. Comparisons of this value must be made using the string compare functions, see string(3C). Identifier for each partition existing on a machine. Returned as an opaque string of printable ASCII characters. For any machine not supporting partitions this value will be the same as Com- parisons of this value must be made using the string compare functions, see string(3C). Machine serial number. The value will be a printable ASCII string. This string is not available on all classes of machines; if unavailable, the string will be empty. This string is not a unique identifier of the machine, since machines of different classes can have the same serial number. If a unique identifier is needed, use or The set of initial options to be given to the and utilities to build an application using a programming model with 32-bit int, long, pointer, and off_t types. The set of final options to be given to the and utilities to build an application using a programming model with 32-bit int, long, pointer, and off_t types. The set of libraries to be given to the and utilities to build an application using a programming model with 32-bit int, long, pointer, and off_t types. The set of options to be given to the utility to check application source using a programming model with 32-bit int, long, pointer, and off_t types. The set of initial options to be given to the and utilities to build an application using a programming model with 32-bit int, long, and pointer types, and an off_t type using at least 64-bits. The set of final options to be given to the and utilities to build an application using a programming model with 32-bit int, long, and pointer types, and an off_t type using at least 64-bits. The set of libraries to be given to the and utilities to build an application using a programming model with 32-bit int, long, and pointer types, and an off_t type using at least 64-bits. The set of options to be given to the utility to check application source using a programming model with 32-bit int, long, and pointer types, and an off_t type using at least 64-bits. The set of initial options to be given to the and utilities to build an application using a programming model with 32-bit int, and 64-bit long, pointer, and off_t types. The set of final options to be given to the and utilities to build an application using a programming model with 32-bit int, and 64-bit long, pointer, and off_t types. The set of libraries to be given to the and utilities to build an application using a programming model with 32-bit int, and 64-bit long, pointer, and off_t types. The set of options to be given to the utility to check application source using a programming model with 32-bit int, and 64-bit long, pointer, and off_t types. The set of initial options to be given to the and utilities to build an application using a programming model with an int type using 32 bits and long, pointer, and off_t types using at least 64-bits. The set of libraries to be given to the and utilities to build an application using a programming model with an int type using 32 bits and long, pointer, and off_t types using at least 64-bits. The set of libraries to be given to the and utilities to build an application using a programming model with an int type using 32 bits and long, pointer, and off_t types using at least 64-bits. The set of options to be given to the utility to check application source using a programming model with an int type using 32 bits and long, pointer, and off_t types using at least 64-bits. The set of initial options to be given to the utility to build an application using a programming model with 32-bit int, long, pointer, and off_t types. The set of final options to be given to the utility to build an application using a programming model with 32-bit int, long, pointer, and off_t types. The set of libraries to be given to the utility to build an application using a programming model with 32-bit int, long, pointer, and off_t types. The set of initial options to be given to the utility to build an application using a programming model with 32-bit int, long, and pointer types, and an off_t type using at least 64 bits. The set of final options to be given to the utility to build an application using a programming model with 32-bit int, long, and pointer types, and an off_t type using at least 64 bits. The set of libraries to be given to the utility to build an application using a programming model with 32-bit int, long, and pointer types, and an off_t type using at least 64 bits. The set of initial options to be given to the utility to build an application using a programming model with 32-bit int and 64-bit long, pointer, and off_t types. The set of final options to be given to the utility to build an application using a programming model with 32-bit int and 64-bit long, pointer, and off_t types. The set of libraries to be given to the utility to build an application using a programming model with 32-bit int and 64-bit long, pointer, and off_t types. The set of initial options to be given to the utility to build an application using a programming model with an int type using at least 32 bits and long, pointer, and off_t types using at least 64 bits. The set of final options to be given to the utility to build an application using a programming model with an int type using at least 32 bits and long, pointer, and off_t types using at least 64 bits. The set of libraries to be given to the utility to build an application using a programming model with an int type using at least 32 bits and long, pointer, and off_t types using at least 64 bits. This value is a <newline>-separated list of names of programming environments supported by the implementation in which the widths of the blksize_t, cc_t, mode_t, nfds_t, pid_t, ptrdiff_t, size_t, speed_t, ssize_t, suseconds_t, tcflag_t, useconds_t, wchar_t, and wint_t types are no greater than the width of type long. If len is not zero, and if name is known and has a configuration-defined value, copies that value into the len-byte buffer pointed to by buf. If the string to be returned is longer than len bytes, including the terminating null, truncates the string to len-1 bytes and null- terminates the result. The application can detect that the string was truncated by comparing the value returned by with len. If len is zero and buf is NULL, returns the integer value as defined below, but does not return a string. If len is zero but buf is not NULL, the result is unspecified. RETURN VALUE
If name is invalid, returns zero and sets to If name does not have a configuration-defined value, returns 0 (zero) and leaves unchanged. If name has a configuration-defined value, returns the size of buffer that would be needed to hold the entire configuration-defined value. If this return value is less than len, the string returned in buf has been truncated. EXAMPLES
The following code fragment calls to determine the correct buffer size for allocates space for this buffer, then gets the configuration value for AUTHOR
was developed by HP. FILES
symbolic constants and structures used for support of the /usr/group standard SEE ALSO
getconf(1), errno(2), fpathconf(2), pathconf(2), sysconf(2), malloc(3C), thread_safety(5). STANDARDS CONFORMANCE
confstr(3C)
All times are GMT -4. The time now is 09:37 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy