Tell The United States Patent and Trademark Office that software and business method patents should not be part of the EU-US patent treaty. The USPTO has put a call out for public comments. They can be contacted, either by sending a fax to Mr. Santamauro to (571) 273-0085 or by emailing plharmonization@uspto.gov. The deadline is June 22 (Sunday).
I am using HP-UX,KSH
$ jobs -l
+ 19377 Running nohup ksh cat_Duplicate_Records_Removal.ksh </dev/null >/dev/null 2>&1 &
$ ps -p 19377 -fl
F S UID PID PPID C PRI NI ADDR SZ WCHAN STIME TTY TIME COMD
401 S catmgr 19377 19491 ... (1 Reply)
turbostat reports C-states of all CPU cores, and includes entries for each hyper-threaded core as well. Often enough the two logical cores on a single physical core will list different C state percentages. Does that make any sense?
Is this reporting the c-states of the few duplicated parts... (8 Replies)
netstat | awk '/server/ {for(i=1;i<2;i++) {getline;print}'
Output:
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
ESTABLISHED
TIME_WAIT
TIME_WAIT
From the above command I'm getting all the states. I want to count the states and write to a file, like
"Count of ESTABLISHED... (6 Replies)
Hi,
Any rugby fans out there. Sevens rugby is really exciting to watch. The final is only about 20mins give or take, but its fast paced and very exciting.
The IRB Sevens World Series, is a series of international rugby union sevens tournaments. The tournaments, run by the IRB, feature... (0 Replies)
Hi guys,
Can you help me please to find an appropriate course of UNIX in the United States.
Also, can you provide me some information about the schools or institutes that offer it in the U.S.
Thanks, (0 Replies)
I am trying to write my own Unix compliant (SUSv4) OS - Just a hobby OS, nothing serious. While going through the standard, I couldn't find any explicit information on process states. What I could find was (excluding the real-time considerations)-
From this it can be inferred that the... (2 Replies)
KAME_IPSEC(4) BSD Kernel Interfaces Manual KAME_IPSEC(4)NAME
ipsec -- IP security protocol
SYNOPSIS
#include <sys/types.h>
#include <netinet/in.h>
#include <netinet6/ipsec.h>
options KAME_IPSEC
options IPSEC_ESP
options IPSEC_NAT_T
options IPSEC_DEBUG
DESCRIPTION
ipsec is the first implemtation of IPSEC in NetBSD. It is being replaced by fast_ipsec(4).
The following kernel options are available:
options IPSEC
Includes support for the IPsec protocol. IPSEC will enable secret key management part, policy management part, AH and IPComp. Kernel binary
will not be subject to export control in most of countries, even if compiled with IPSEC. For example, it should be okay to export it from
the United States of America. INET6 and IPSEC are orthogonal so you can get IPv4-only kernel with IPsec support, IPv4/v6 dual support kernel
without IPsec, and so forth. This option requires INET at this moment, but it should not.
options IPSEC_DEBUG
Enables debugging code in IPsec stack. This option assumes IPSEC.
options IPSEC_ESP
Includes support for IPsec ESP protocol. IPSEC_ESP will enable source code that is subject to export control in some countries (including
the United States), and compiled kernel binary will be subject to certain restriction. This option assumes IPSEC.
options IPSEC_NAT_T
Includes support for IPsec Network Address Translator Traversal (NAT-T), as described in RFCs 3947 and 3948. This feature might be patent-
encumbered in some countries. This option assumes IPSEC and IPSEC_ESP.
SEE ALSO ioctl(2), socket(2), ipsec_set_policy(3), fast_ipsec(4), icmp6(4), intro(4), ip6(4), ipsec(4), racoon(8), setkey(8), sysctl(8)STANDARDS
Daniel L. McDonald, Craig Metz, and Bao G. Phan, PF_KEY Key Management API, Version 2, RFC, 2367.
HISTORY
The implementation described herein appeared in WIDE/KAME IPv6/IPsec stack.
BUGS
The IPsec support is subject to change as the IPsec protocols develop.
There is no single standard for policy engine API, so the policy engine API described herein is just for KAME implementation.
AH and tunnel mode encapsulation may not work as you might expect. If you configure inbound ``require'' policy against AH tunnel or any
IPsec encapsulating policy with AH (like ``esp/tunnel/A-B/use ah/transport/A-B/require''), tunneled packets will be rejected. This is
because we enforce policy check on inner packet on reception, and AH authenticates encapsulating (outer) packet, not the encapsulated (inner)
packet (so for the receiving kernel there's no sign of authenticity). The issue will be solved when we revamp our policy engine to keep all
the packet decapsulation history.
Under certain condition, truncated result may be raised from the kernel against SADB_DUMP and SADB_SPDDUMP operation on PF_KEY socket. This
occurs if there are too many database entries in the kernel and socket buffer for the PF_KEY socket is insufficient. If you manipulate many
IPsec key/policy database entries, increase the size of socket buffer or use sysctl(8) interface.
BSD January 16, 2012 BSD