To be or not to be (part 2)

 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Complex Event Processing RSS News To be or not to be (part 2)
# 1  
Old 10-20-2007
To be or not to be (part 2)

John Trigg
Sat, 20 Oct 2007 14:20:19 -0500
As a follow-on to Richard's description of determinism and its importance to a CEP architecture and how it is an inherent characteristic of Apama, an interesting piece from Hans Gilde on the potential downfalls when determinism (and many other issues) are not considered in an event replay solution
http://hansgilde.wordpress.com/2007/...d-bi-using-ep/


Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

How to make a loop to read the input from a file part by part?

Hi All, We've a VDI infrastructure in AWS (AWS workspaces) and we're planning to automate the process of provisioning workspaces. Instead of going to GUI console, and launching workspaces by selecting individual users is little time consuming. Thus, I want to create them in bunches from AWS CLI... (6 Replies)
Discussion started by: arun_adm
6 Replies

2. Shell Programming and Scripting

[Solved] Printing a part of the last line of the specific part of a file

Hi, I have 80 large files, from which I want to get a specific value to run a Bash script. Firstly, I want to get the part of a file which contains this: Name =A xxxxxx yyyyyy zzzzzz aaaaaa bbbbbb Value = 57 This is necessary because in a file there are written more lines which... (6 Replies)
Discussion started by: wenclu
6 Replies

3. Shell Programming and Scripting

comparing part of header with part of detailed records.

Hi there, I am lil confused with the following issue. I have a File, which has the following header: IMSHRATE_043008_101016 a sample detailed record is :9820101 A982005000CAVG030108000000000000010169000MAR 2008 9820102 MAR 2008 D030108 ... (1 Reply)
Discussion started by: cmaroju
1 Replies

4. Shell Programming and Scripting

help me in this part

why we use strcpy and strcat in KSH program?? (1 Reply)
Discussion started by: debasis.mishra
1 Replies

5. Shell Programming and Scripting

Help part 2

Ok well this isn't homework or classwork, I have been done with school for many years. I offered to help my co-worker who's daughter needs help. I didn't realize I had got rid of all of my UNIX books until after I agreed to help. (3 Replies)
Discussion started by: penguin123
3 Replies
Login or Register to Ask a Question
UNAFS(8)						      System Manager's Manual							  UNAFS(8)

NAME
unafs - script to warn users about their weak passwords SYNOPSIS
unafs password-files cell-name DESCRIPTION
This manual page documents briefly the unafs command, which is part of the john package. This manual page was written for the Debian GNU/Linux distribution because the original program does not have a manual page. john, better known as John the Ripper, is a tool to find weak passwords of users in a server. The unafs tool gets password hashes out of the binary AFS database, and produces a file usable by John. SEE ALSO
john(8), mailer(8), unique(8), unshadow(8). The programs are documented fully by John's documentation, which should be available in /usr/share/doc/john or other location, depending on your system. AUTHOR
This manual page was written by Jordi Mallach <jordi@debian.org>, for the Debian GNU/Linux system (but may be used by others). John the Ripper and mailer were written by Solar Designer <solar@openwall.com>. The complete list of contributors can be found in the CRED- ITS file in the documentation directory. john June 03, 2004 UNAFS(8)