Sponsored Content
Full Discussion: Help with incomplete Code
Top Forums UNIX for Dummies Questions & Answers Help with incomplete Code Post 302804525 by Don Cragun on Wednesday 8th of May 2013 06:44:38 PM
Old 05-08-2013
This is not the correct forum for homework exercises.
 

9 More Discussions You Might Find Interesting

1. IP Networking

Incomplete three way handshake

I've got a strange problem with a single mail sender (it is one of those large free mail providers). My mail server works well with thousands of senders but not this one, so we have made a connection dump and it seems that the three way handshake is not completed 15:55:59.177431 IP... (0 Replies)
Discussion started by: 3wayTrouble
0 Replies

2. Shell Programming and Scripting

How to ignore incomplete files

On Solaris & AIX, suppose there is a directory 'dir'. Log files of size approx 1MB are continuously being deposited here by scp command. I have a script that scans this dir every 5 mins and moves away the log files that have been deposited so far. How do I design my script so that I pick up... (6 Replies)
Discussion started by: sentak
6 Replies

3. Solaris

How to ignore incomplete files

On Solaris, suppose there is a directory 'dir'. Log files of size approx 1MB are continuously being deposited here by scp command. I have a script that scans this dir every 5 mins and moves away the log files that have been deposited so far. How do I design my script so that I pick up *only*... (6 Replies)
Discussion started by: sentak
6 Replies

4. Shell Programming and Scripting

incomplete last line

How do I find through script if a contains "incomplete last line". If it does then only insert a new line character as:: echo "" >> filename.txt (4 Replies)
Discussion started by: PRKS
4 Replies

5. Shell Programming and Scripting

script incomplete

#!/bin/bash DIR=/dir/$(date +%y%m) || mkdir "$DIR" for D in $@ # obtem os argumentos do cp /usr/home/backup if backup=null then mkdir backup done How can I complete that script, that's not value, can someone help me complete this... The point of the program is: - If the... (1 Reply)
Discussion started by: strshel
1 Replies

6. Shell Programming and Scripting

Incomplete last line

I need help with appending the last line to the file only if the last line is incomplete. I tried awk 1 filename > new_filename but it appends to every file and I only want to append to the file if the last line is incomplete (3 Replies)
Discussion started by: smee
3 Replies

7. UNIX for Dummies Questions & Answers

Copy operation incomplete

I am logged into AIX 6.1 as a root user. I tried copying about 190GB of data to a different folder. cp -R /u01/data/scope /CY/backup I got the message: cp: Requested a write of 4096 bytes, but wrote only 3584. When the copy operation completed, I checked the /CY/backup/scope folder and... (3 Replies)
Discussion started by: shoefiend
3 Replies

8. Shell Programming and Scripting

Adding incomplete HTML code to a file

Hi folks, I am scraping data from the Internet that has the format similar to what's on this page -- Trigger Notice Report The code I've written for scraping and storing results works fine when the HTML code is well written, but not when there are mistakes. In particular, the code breaks when... (4 Replies)
Discussion started by: ksk
4 Replies

9. UNIX for Dummies Questions & Answers

Delete incomplete data

Hi all, Please help with the following example. I want to keep all people in the data, who at least have Firstname or Lastname or both and at least 1 row of Details. So, Person4 lacking both Firstname and Lastname will be deleted, Person5 with no Details will be deleted. Firstname,Lastname... (3 Replies)
Discussion started by: ritakadm
3 Replies
CREEPY(1)						      General Commands Manual							 CREEPY(1)

NAME
CREEPY - A geolocation information aggregator DESCRIPTION
creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown accompanied with rele- vant information (i.e. what was posted from that specific location) to provide context to the presentation. FEATURES
Map providers available : Google Maps - Virtual Maps - Open Street Maps Location information retieval from : Twitter's tweet location: Coordinates when tweet was posted from mobile device. Place (geographical name) derived from users ip when posting on twitter's web interface. Place gets translated into coordinates using geonames.com" Bounding Box derived from users ip when posting on twitter's web interface.The less accurate source , a corner of the bounding box is selected randomly. Geolocation information accessible through image hosting services API EXIF tags from the photos posted. Social networking platforms currently supported: Twitter Foursquare (only checkins that are posted to twitter). Image hosting services currently supported : flickr - information retrieved from API twitpic.com - information retrieved from API and photo exif tags yfrog.com - information retrieved from photo exif tags img.ly - information retrieved from photo exif tags plixi.com - information retrieved from photo exif tags twitrpix.com - information retrieved from photo exif tags foleext.com - information retrieved from photo exif tags shozu.com - information retrieved from photo exif tags pickhur.com - information retrieved from photo exif tags moby.to - information retrieved from API and photo exif tags twitsnaps.com - information retrieved from photo exif tags twitgoo.com - information retrieved from photo exif tags NOTES
Automatic caching of retrieved information in order to reduce API calls and the possibility of hitting limit rates. GUI with navigable map for better overview of the accumulated information 4 Maps providers (including Google Maps) to use. Open locations in Google Maps in your browser Export retrieved locations list as kmz (for Google Earth) or csv files. Handling twitter authentication in an easy way using oAuth. User credentials are not shared with the application. User/target search for twitter and flickr. AUTHOR
creepy was written by Yiannis Kakavas <jkakavas@gmail.com> This manual page was written by Daniel Echeverry for the Debian GNU/Linux system (but may be used by others). SEE ALSO
The full documentation which includes the keys descriptions is in /usr/share/doc/creepy/README. MAY 08, 2011 CREEPY(1)
All times are GMT -4. The time now is 12:46 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy