08-17-2010
This will not detect the case when it loops back to the middle of the list. You can have two pointers starting at the head, advance one by one step, two for the other. Check if they meet.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I might know the answer to this, but I just want to see if any of you know any work arounds before I go and re-write the whole thing.
I have a script as follow:
$ cat testing
#! /usr/bin/ksh
f ()
{
echo "Type \"y\" \c"
read value
if ;
then
... (1 Reply)
Discussion started by: fidodido
1 Replies
2. HP-UX
Hi ,
I am getting the below error if i am trying to set the passwd of a user:
New password:
Password cannot be circular shift of logonid.
is there a way thru which i can set the passwd of the user same as the username.
Thanks & regards,
Sagar. (2 Replies)
Discussion started by: sag71155
2 Replies
3. Shell Programming and Scripting
I have about 20 different variables that I need to check for null values then replace with a specific string if they are null. I've been doing this via 20 different if then statements like this:
if ; then
WIND="UUU"
fi
Is there a more elegant way to do this? The vars aren't sequential in... (6 Replies)
Discussion started by: audiophile
6 Replies
4. Shell Programming and Scripting
I have an event log which is a circular file. I would like to be able to see real-time updates of that event log. Kind of the equivalent of a 'tail -f'. But obviously 'tail -f' won't work if my circular file has already cycled over. Any ideas as to how I can do this? Let me know if I am clear.... (10 Replies)
Discussion started by: sdilucca
10 Replies
5. Programming
hi all,
i need a c++ function which converts a linear list to circular.
presently i am working with two files. i.e., one linear list file. and one circular list file to do some operations. i thought it will be helpful if there is a function that converts a linear list to circular n undo the... (1 Reply)
Discussion started by: vidyaj
1 Replies
6. UNIX for Dummies Questions & Answers
I have box created with filewatch job as the first job follwed by 2 other jobs . For the time period of 8:00 am to 8:00 pm,we can get files anytime , with out any restriction on the number of times we get the file.
So for this I need to make this box work in circular fashion i.e. once the box... (5 Replies)
Discussion started by: nishantrk
5 Replies
7. Shell Programming and Scripting
Hi Experts,
I am checking how to get day in Perl.
If it is “Monday” I need to process…below is the pseudo code.
Can you please prove the code for below condition.
if (today=="Monday" )
{
while (current_time LESS THAN 9:01 AM)
... (1 Reply)
Discussion started by: ajaypatil_am
1 Replies
8. Shell Programming and Scripting
I have modified a script to do a circular DNS look up.
The theory is this
for a given subnet build a range if IP's
do a reverse look up on those IP's
take the output of the reverse look up then and do a forward look up
If the returns match up give a good status
If not return a fail... (1 Reply)
Discussion started by: snoman1
1 Replies
9. Shell Programming and Scripting
Hi Help,
I am trying to create something like ---
Suppose, I have grid origin at X=600000.0 & Y=90000.0.
For any values of X, Y values lying within a circular periphery defined by circle of radius R=500m;X=599500.0 & 600500.0 ;Y=90500.0 & 89500.0should have a default=0or else it should... (4 Replies)
Discussion started by: Indra2011
4 Replies
10. Programming
Hello,
I think there's an easier way to do this but can't seem to recall but given an array of animals and an initial value is a random index in the array, here it's 3.
3,4,5,4,3,2,1,0,1,2,3,4,5,4,3,2,1,0... inifinite repeat
a quick brute force solution i came up with was two functions, i... (6 Replies)
Discussion started by: f77hack
6 Replies
LEARN ABOUT CENTOS
sensors-detect
SENSORS-DETECT(8) System Manager's Manual SENSORS-DETECT(8)
NAME
sensors-detect - detect hardware monitoring chips
SYNOPSIS
sensors-detect
DESCRIPTION
sensors-detect is an interactive program that will walk you through the process of scanning your system for various hardware monitoring
chips, or sensors, supported by libsensors(3), or more generally by the lm_sensors tool suite.
sensors-detect will look for the following devices, in order:
o Sensors embedded in CPUs, south bridges and memory controllers.
o Sensors embedded in Super I/O chips.
o Hardware monitoring chips accessed through ISA I/O ports.
o Hardware monitoring chips reachable over the SMBus or more generally any I2C bus on your system.
As the last two detection steps can cause trouble on some systems, they are normally not attempted if the second detection step led to the
discovery of a Super I/O chip with complete hardware monitoring features. However, the user is always free to ask for all detection steps
if so is his/her wish. This can be useful if a given system has more than one hardware monitoring chip. Some vendors are known to do this,
most notably Asus and Tyan.
WARNING
sensors-detect needs to access the hardware for most of the chip detections. By definition, it doesn't know which chips are there before
it manages to identify them. This means that it can access chips in a way these chips do not like, causing problems ranging from SMBus
lockup to permanent hardware damage (a rare case, thankfully.)
The authors made their best to make the detection as safe as possible, and it turns out to work just fine in most cases, however it is
impossible to guarantee that sensors-detect will not lock or kill a specific system. So, as a rule of thumb, you should not run sensors-
detect on production servers, and you should not run sensors-detect if can't afford replacing a random part of your system. Also, it is
recommended to not force a detection step which would have been skipped by default, unless you know what you are doing.
SEE ALSO
sensors(1), libsensors(3)
AUTHOR
Frodo Looijaard and Jean Delvare
lm-sensors 3 December 2008 SENSORS-DETECT(8)