04-26-2012
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am writing a c++ program that has many calls of pow(input,2). I now realize that this is slowing down the program and these all should be input * input for greater speed.
There should be a simple way of doing this replacement throughout my file with awk, but I am not very familiar with awk.... (2 Replies)
Discussion started by: bluejayek
2 Replies
2. Shell Programming and Scripting
Hi,
I have a file having around 30 records. Each record has 5 fields delimited by PIPE. Few records in the file having Junk characters in the field2 and field4.
I found the junk charcter and I tested it and replace the junk with space with the command below
perl -i -p -e "s/\x00/ /g"... (1 Reply)
Discussion started by: ramkrix
1 Replies
3. Shell Programming and Scripting
Hi,
I need to search for source path in file2 , as per file1 and if found get the next line and take the field value and put it in URL value of file1.
In file1, NF is not same for all the lines.
file1:
<type source="/home/USER/Desktop" Dest="/home/USER/DIR1/Desktop" URL="ssh/path"/>
<type... (8 Replies)
Discussion started by: greet_sed
8 Replies
4. Shell Programming and Scripting
I have 2 files A.txt and B.txt
A.txt 3 fields and separate by a comma
some,thing,florida
any1,thing1,california
some2,thing2,dallas
just,fun,kansas
B.txt has 8 fields and separate by a comma
what,ever,florida-state,,,,,,
some,one,dallas_state,,,,,,
You will see 3rd fields are the... (5 Replies)
Discussion started by: sabercats
5 Replies
5. Shell Programming and Scripting
Hi
I would like to apply this gawk command:
gawk '{$0=gensub(/\y+\y/,"","g"); print}' file
not to the whole $0 but just to the part of $0 that is between:
(a number)"> and </mrk>
Is it possible?
thanks for your help. (4 Replies)
Discussion started by: louisJ
4 Replies
6. UNIX for Dummies Questions & Answers
Hi,
I have an input file with below data and rules file to apply search and replace by each field in the input based on exact value or pattern.
Could you please help me with unix script to read input file and rules file and then create the output and reject files based on the rules file.
Input... (13 Replies)
Discussion started by: chandrath
13 Replies
7. Shell Programming and Scripting
Hi there,
First of all this is my first post here. Thank you in advance for your help.
What I am trying to do is the following. I have a text file where each field of each row is separated by a tabulator.
Looks like this:
ATOM 1 N HSE A 26 3.033 -10.429 -2.262 1.00 17.07 ... (8 Replies)
Discussion started by: doom4
8 Replies
8. Shell Programming and Scripting
Hello friends,
I have huge file with many sets where each "set" has few lines and each set always begins with "Set" in Sq brackets as shown above.
# cat file1 (2 Replies)
Discussion started by: magnus29
2 Replies
9. UNIX for Dummies Questions & Answers
Hi All,
Seeking for your assistance on how to search and replace the last field/column. please see sample below:
inputfile1.csv
="8923523434",="543623534"="afd23535623",="100"="200"
="8923523431",="543623536"="afd23535626",="101"="201"... (3 Replies)
Discussion started by: poginiks
3 Replies
10. Shell Programming and Scripting
Hi,
I have a text file which looks like this
a.txt
A,12,Apple,Red
B,33,Banana,Yellow
C,66,Sky,Blue
I need to search for a particular field(s) in particular column(s) and for that matching line need to replace the nth column.
Sample scenario 1:
Search for 66 in second field and Sky in... (5 Replies)
Discussion started by: wahi80
5 Replies
aclsort(3C) aclsort(3C)
NAME
aclsort() - sort an Access Control List (JFS File Systems only)
SYNOPSIS
DESCRIPTION
The routine sorts JFS Access Control List (ACL) entries into the correct order to be accepted by the acl(2) system call.
points to a buffer containing ACL entries; if non-zero, indicates that the permissions should be recalculated; and specifies the number of
ACL entries in the buffer.
sorts the contents of the ACL buffer as follows:
Entries will be in order and
Entries of type and will be sorted in increasing order by numeric ID.
The call will succeed if all of the following are true:
There is exactly one entry each of type and
There is at most one entry each of type and
Entries of type or may not contain duplicate entries. A duplicate entry is one of the same type containing the same numeric id,
irrespective of permission bits.
If the argument is zero and there are no entries of type and no entries of type the permissions of the and entries must be the same.
If there are no entries of type and no entries of type and the entry is specified, then the entry must also be specified, and the
permissions of the and entries must be the same.
RETURN VALUE
Upon successful completion, the return value is 0. If there are duplicate entries, the return value is the position of the first duplicate
entry. If there is more than one entry of type or they are treated as duplicate entries, and the return value is the position of the first
duplicate entry. For all other errors, the return value is -1.
NOTICES
The buffer is sorted by type and ID before checking for any failures. Therefore the buffer is always sorted, even if there is a failure.
The position of a duplicate entry returned on failure is not the byte offset of the duplicate entry from its base; rather it refers to the
entry number of the duplicate entry within the sorted buffer.
Checks will be performed in order of entry type. If there are multiple failures, the failure returned will be the first encountered, for
example, if the ACL buffer contains a duplicate entry and does not contain an entry, the return value will be the first duplicate entry.
ACLs do not have to be sorted with prior to passing them to acl(2).
DEPENDENCIES
is supported only on JFS file systems on the standard HP-UX operating system.
AUTHOR
was developed by AT&T.
SEE ALSO
acl(2), aclv(5).
aclsort(3C)