04-25-2014
Yup, basically thats what it does.
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
hi ,
i am writing a script to copy the MQ messages from onw queue to another. The following i got from one site, but i di not understand , can anyone explain.
/root/scripts/sap/q -m$Q_MANAGER -i$Q_NAME_SRC_1 -F/logs/mq/MQ_COPYdump_$Q_NAME_SRC_1.$$
/root/scripts/sap/q -m$Q_MANAGER... (0 Replies)
Discussion started by: Satyak
0 Replies
2. Shell Programming and Scripting
I am relatively new to Shell Scripting. I can't understand the following two scripts. Can someone please spare a minute to explain?
1) content s of file a are
(021) 654-1234
sed 's/(//g;s/)//g;s/ /-/g' a
021-654-1234
2)cut -d: -f1,3,7 /etc/passwd |sort -t: +1n gives error (3 Replies)
Discussion started by: shahdharmit
3 Replies
3. Shell Programming and Scripting
Hi All;
Is there anybody can explain this script please?
trap 'C_logmsg "F" "CNTL/c OS signal trapped, Script ${G_SCRIPTNAME] terminated"; exit 1' 2
trap 'C_logmsg "F" "Kill Job Event sent from the Console, Script ${G_SCRIPTNAME] terminated"; exit 1' 15 (3 Replies)
Discussion started by: thankbe
3 Replies
4. Shell Programming and Scripting
#!/usr/bin/perl
use strict;
use warnings;
print "Demo of array slicing \n";
my @abc="a b c d e f g h i j k l m n o p q r s t u v w x y z";
my @a=@abc;
my @random=@abc;
my @comp=@abc;
my @comp1=(@abc,"Hello",@abc);
print "abc is @abc \n";
print "a is @a \n";
print "random is @random \n";... (1 Reply)
Discussion started by: dnam9917
1 Replies
5. Shell Programming and Scripting
Hi! all I am reading one research paper in that I found one peak detection algorithm, I am just trying to understand how it works please anyone help me to convert algorithm to awk as I am not able to understand, here I am attaching that paper also, please help me to understand this logic (Page... (1 Reply)
Discussion started by: Akshay Hegde
1 Replies
6. Shell Programming and Scripting
Hello world! Can someone please explain me how this code works? I'ts supposed to find words in a dictionary and show the anagrams of the words.
{
part = word2key($1)
data = $1
}
function word2key(word, a, i, x, result)
{
x = split(word, a, "")
asort(a)
... (1 Reply)
Discussion started by: jose2802
1 Replies
7. Shell Programming and Scripting
New to korn shel1 and having an issue. The following is suppose to read the parameter values from files in a source directory and then pass them on to a log file in a different directory, The ArchiveTracker scripts is suppose to call the parameterreader script to exact the parameter values and... (3 Replies)
Discussion started by: bayouprophet
3 Replies
8. Shell Programming and Scripting
Please help me to understand the below 3 lines of code.execute shell in jenkins
1)APP_IP=$( docker inspect --format '{{ .NetworkSettings.Networks.'"$DOCKER_NETWORK_NAME"'.IPAddress }}' ${PROJECT_NAME_KEY}"-CI" )
2)HOST_WORKSPACE=$(echo ${WORKSPACE} | sed... (1 Reply)
Discussion started by: naresh85
1 Replies
9. UNIX for Beginners Questions & Answers
#!/bin/awk -f
BEGIN {i=1;file="modified.txt"}
{
if ($0 !~ /^DS:/) {print $0 >> file} else {
if ($0 ~ /^DS:/) {print "DS: ",i >> file;if (i==8) {i=1} else {i++}};
}
}
END {gzip file}
Can someone explain to me how this above script works, I got it from a friend but not able... (3 Replies)
Discussion started by: Kamesh G
3 Replies
LEARN ABOUT HPUX
nlist_ia
nlist_ia(4) Kernel Interfaces Manual nlist_ia(4)
NAME
nlist_ia: nlist, nlist64 - structure formats for Integrity systems
SYNOPSIS
Remarks
The exact content of the structure defined below can be best found by examining It varies somewhat between various HP-UX implementations.
This manpage describes on Integrity systems. For on PA-RISC systems, see nlist_pa(4).
DESCRIPTION
and can be used to extract information from the symbol table in an object file (see nlist(3C)). They are basically the same tool, and both
can process SOM and Elf files. Since symbol tables are machine dependent (as defined in each implementation's copy of a header file, is
defined to encapsulate the differences.
The nlist function, either or when used with the corresponding nlist structure, can be used to extract certain information about selected
symbols in the symbol table. The data associated with each symbol is machine specific, thus only the name and position of the field in the
function is standardized by HP-UX. The rest of the structure includes at least the value and type of the symbol. The names and meanings
of all fields not standardized will change no more than necessary.
The structure is the same as the structure and is used for source compatibility purposes.
SEE ALSO
nlist(3C), a.out(4).
Integrity Systems Only nlist_ia(4)