Sponsored Content
The Lounge War Stories Anger management at work without others finding out Post 302715383 by hedkandi on Sunday 14th of October 2012 10:45:59 PM
Old 10-14-2012
well, thats the thing. there's no standardization of process (although we're moving towards that direction) so theres no RCA for anything. But I realized on the first month itself, if I don't start doing proper tracking when something goes wrong it will come back to me, so I setup tons of loggings to cover all my bases. after that was just tuning it to make it workable for all the non-technical people.
 

8 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Script doesn't work, but commands inside work

Howdie everyone... I have a shell script RemoveFiles.sh Inside this file, it only has two commands as below: rm -f ../../reportToday/temp/* rm -f ../../report/* My problem is that when i execute this script, nothing happened. Files remained unremoved. I don't see any error message as it... (2 Replies)
Discussion started by: cheongww
2 Replies

2. Shell Programming and Scripting

finding duplicate files by size and finding pattern matching and its count

Hi, I have a challenging task,in which i have to find the duplicate files by its name and size,then i need to take anyone of the file.Then i need to open the file and find for more than one pattern and count of that pattern. Note:These are the samples of two files,but i can have more... (2 Replies)
Discussion started by: jerome Sukumar
2 Replies

3. UNIX and Linux Applications

Password management / centralized password management

Hello all, I need help for build server call as Password management / centralized password management server. My situation and example: I have 600 server in my server room running on Linux then I need 1 server only can create login/password and then user can login to all 600 server no... (2 Replies)
Discussion started by: sheikh76
2 Replies

4. IP Networking

NIC will not work, but it did work.

I have a client machine that was built and loaded with SCO UNIX 2.1.3, (yes it is old). The machine worked fine on the closed network that I tested on in my shop. I then had to change it to the network that it would be connected to. Below is the host file, router and subnet mask file that I usually... (0 Replies)
Discussion started by: NC user
0 Replies

5. IP Networking

IP Management

Hello all, I was wondering which way do you use to manage you IPs? For example in our case we have excel sheets and we export them in html first and import it to a server running apache, so to be visible from all. But i was wondering if there are any way (prefer a way running in web server)... (2 Replies)
Discussion started by: @dagio
2 Replies

6. Shell Programming and Scripting

My script work on Linux but not work in sunos.

My script work on Linux but not work in sun os. my script. logFiles="sentLog1.log sentLog2.log" intial_time="0 0" logLocation="/usr/local/tomcat/logs/" sleepTime=600 failMessage=":: $(tput bold)Log not update$(tput rmso) = " successMessage="OK" arr=($logFiles)... (7 Replies)
Discussion started by: ooilinlove
7 Replies

7. IP Networking

Discussion at work, would a router work pluging a cable in wan1 and lan1?

hi all. and sorry for the random question, but this sparkled a raging flame-war at work and i want more points of view situation a router, with linux of some sort, dhcp client requesting for ip in wan1 (as usual with wan ports) dhcp server listening in lan1, and assigning ip (as usual... (9 Replies)
Discussion started by: broli
9 Replies

8. What is on Your Mind?

Individual Risk Management (Personal IT Security) and Browser Cache Management

Original post from this thread on browser caching. To add to this, it is an effective security measure to clear absolutely all cached data (cookies, web content, ....) when closing the browser - i.e. in case of a shutdown. It takes a bit of work to re-login to all the sites but websites will not... (7 Replies)
Discussion started by: bakunin
7 Replies
gbase(1)						      General Commands Manual							  gbase(1)

NAME
gbase - small numeric base converter SYNOPSIS
gbase [options] DESCRIPTION
gbase converts numbers between bases 2 (binary), 8 (octal), 10 (decimal), 16 (hexadecimal). If you specify a number on the command line (preceded by a switch to describe the base the number is in) the program will display that num- ber in the four bases on the console and exit. You can also specify the -s switch which will allow you to enter/display signed numbers. (This allows the use of a - (minus) before a deci- mal number). Just running the program without any switches will display the main window. There are four entry boxes, corresponding to each of the four bases. You can type into any of these boxes and the others will update automagically. The program will ignore any characters that are not allowed for that particular base. It will only allow a - (minus) at the start of a decimal number, if the signed option is on. OPTIONS
--help Display a short help screen and exit --version Print version number and exit -s Treat the number as a signed value -d decimal number Print this decimal number in all bases -h hex number Print this hexadecimal number in all bases -o octal number Print this octal number in all bases -b binary number Print this binary number in all bases AUTHOR
gbase is Copyright (C) 1999 Damian Kramer, Roger Dunce. gbase August 2003 gbase(1)
All times are GMT -4. The time now is 03:46 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy