Hello,
Sir's,
I would like to ask for help. This is my problem, i am working for a mbs for aix,hp-ux and solaris. And i am making a script that will automatically implement the said mbs.
For example it will automatically change the permmisions of /usr/bin, /etc/passwd and so on. . . .... (7 Replies)
Hi guys
Iam looking for a small help.I wrote a script. in that iam trying to take the default value ,when we press enter.this part iam struggling can somebody help please
Example:
do u need this server:
For this one if we press enter it has to take server name as... (4 Replies)
Hi Experts,
I have a file which contains-
..
..
<?xml version='1.0' encoding='ISO-8859-1' standalone='no'?>
<LogItems>
<log logid="83efeae5190809080000080410">
<category>Upstream.TEL</category>
<operation>MAKE</operation>
<target>mms</target>
<user>purple</user>... (3 Replies)
original content:
0000000000 TIAA-CREF
0000000000 CAREMARK
all said and done, i'd like to look like this:
$00,000,000.00 TIAA-CREF
$00,000,000.00 CAREMARK (2 Replies)
How to get to know, where are the current logs been updated in the system
or most recently updated logs in the system.
consider /usr/abc/def
and inside the def folder , i have many subfolders
The command out put ,need to give me the log files and there location , which are... (7 Replies)
Hello every one ,
I am just trying to sort df -h out in a particular order to differentiate SAN disks and local disks .. does any body have any script or any useful command ??
thanks in advance .. (8 Replies)
Hi,
ServerA (SFTP server)
ServerB (SFTP client)
ServerB:> sftp user@ServerA
ServerB:> put sample.txt
ServerB:> get sample2.txt
My question is that which machine will encrypt the sample.txt and sample2.txt files.
Thanks (8 Replies)
Hello,
I have a file with the below contents :
Policy Name: Backup_bkp
Policy Type: Catalog_bkp
Active: yes
Effective date: 08/07/2013 02:02:12
Mult. Data Streams: no
Client Encrypt: no
Checkpoint: no
Policy Priority: ... (11 Replies)
Discussion started by: rahul2662
11 Replies
LEARN ABOUT REDHAT
slasv2
SLASV2(l) ) SLASV2(l)
NAME
SLASV2 - compute the singular value decomposition of a 2-by-2 triangular matrix [ F G ] [ 0 H ]
SYNOPSIS
SUBROUTINE SLASV2( F, G, H, SSMIN, SSMAX, SNR, CSR, SNL, CSL )
REAL CSL, CSR, F, G, H, SNL, SNR, SSMAX, SSMIN
PURPOSE
SLASV2 computes the singular value decomposition of a 2-by-2 triangular matrix [ F G ] [ 0 H ]. On return, abs(SSMAX) is the larger singu-
lar value, abs(SSMIN) is the smaller singular value, and (CSL,SNL) and (CSR,SNR) are the left and right singular vectors for abs(SSMAX),
giving the decomposition
[ CSL SNL ] [ F G ] [ CSR -SNR ] = [ SSMAX 0 ]
[-SNL CSL ] [ 0 H ] [ SNR CSR ] [ 0 SSMIN ].
ARGUMENTS
F (input) REAL
The (1,1) element of the 2-by-2 matrix.
G (input) REAL
The (1,2) element of the 2-by-2 matrix.
H (input) REAL
The (2,2) element of the 2-by-2 matrix.
SSMIN (output) REAL
abs(SSMIN) is the smaller singular value.
SSMAX (output) REAL
abs(SSMAX) is the larger singular value.
SNL (output) REAL
CSL (output) REAL The vector (CSL, SNL) is a unit left singular vector for the singular value abs(SSMAX).
SNR (output) REAL
CSR (output) REAL The vector (CSR, SNR) is a unit right singular vector for the singular value abs(SSMAX).
FURTHER DETAILS
Any input parameter may be aliased with any output parameter.
Barring over/underflow and assuming a guard digit in subtraction, all output quantities are correct to within a few units in the last place
(ulps).
In IEEE arithmetic, the code works correctly if one matrix element is infinite.
Overflow will not occur unless the largest singular value itself overflows or is within a few ulps of overflow. (On machines with partial
overflow, like the Cray, overflow may occur if the largest singular value is within a factor of 2 of overflow.)
Underflow is harmless if underflow is gradual. Otherwise, results may correspond to a matrix modified by perturbations of size near the
underflow threshold.
LAPACK version 3.0 15 June 2000 SLASV2(l)