Professional Documents
Culture Documents
kernel and could be changed only by rebuilding the kernel. Most modern ver-
sions, including Tru64 UNIX, are more flexible. Tru64 UNIX uses the symbolic link
/etc/zoneinfo/localtime to define the system time zone. The target of this link is a
time zone definition file whose name represents the timezone name, geographic
region, or a major city within the time zone. For example, a Tru64 UNIX version 5
system in the Eastern timezone of the United States has the localtime link defined
as follows:
In some older versions of UNIX, the timezone definition was built into the
kernel and could be changed only by rebuilding the kernel. Most modern ver-
sions, including Tru64 UNIX, are more flexible. Tru64 UNIX uses the symbolic link
/etc/zoneinfo/localtime to define the system time zone. The target of this link is a
time zone definition file whose name represents the timezone name, geographic
region, or a major city within the time zone. For example, a Tru64 UNIX version 5
system in the Eastern timezone of the United States has the localtime link defined
as follows:
Configure theConfigure
system the system
System configuration System
implements
configurationthe user
implements
interface design
the userand
interface
enablesdesign
all theand enables all the
designed functionality.
designed
Almost functionality.
all digital collection
Almost allsystems
digital collection
provide custom
systemsconf-
provide custom conf-
iguration at a certain
iguration
level. Some
at a certain
systemslevel.
are easy
Some tosystems
configure arebut
easy
may
to not
configure
be flexible
but may not be flexible
enough to accommodate
enoughall todesign
accommodate
ideas. Some
all design
systems
ideas.
are Some
very flexible
systemsbutare
may
very flexible but may
not be easy to configure.
not be Iteasy
is very
to configure.
importantIttois understand
very important
the to
capability
understand
of thethe capability of the
system configuration system
before
configuration
designing abefore
user interface
designingforaauser
digital
interface
collection.
for a digital collection.
System configurationSystem
should
configuration
start when ashould
small number
start when
of documents
a small numberand metadata
of documents and metadata
records are available.
records
Usingare theavailable.
small pool
Using
of documents
the small pooland of
metadata
documents records
andas
metadata
a records as a
testing bed makes it
testing
easy tobedadjust
makestheitdesign
easy toand
adjust
experiment
the designwith
andtheexperiment
configuration.
with the configuration.
If the system configuration
If the system
cannotconfiguration
be completed cannot
untilbe
thecompleted
documents until
andthe
metadata
documents and metadata
records are created,
records
then, ifare
thecreated,
systemthen,
allows,
if the
it issystem
wise toallows,
first upload
it is wise
a small
to first upload a small
number of documentsnumberand ofmetadata
documents records
and to
metadata
test the records
configuration
to test settings.
the configuration settings.
SecuringSecuring
User Access
User Access
In How to Cheat atInMicrosoft
How to Cheat
Vista Administration,
at Microsoft Vista
2007
Administration, 2007
Disabling UACDisabling
via Msconfig.exe
UAC via Msconfig.exe
The System Configuration
The System utility
Configuration
(better known utility
to many
(better
administrators
known to many as mscon-
administrators as mscon-
fig.exe) has been around
fig.exe)since
has been
the days
around
of Windows
since the98. days
In of
Windows
Windows Vista,
98. In
mscon-
Windows Vista, mscon-
fig.exe can be usedfig.exe
to disable
can be
UAC used
whether
to disable
it’s temporarily
UAC whether to test
it’s temporarily
if UAC is causing
to test if UAC is causing
any compatibility issues
any compatibility
or if an administrator
issues or ifisan
looking
administrator
to disableis it
looking
for good.
to disable
The it for good. The
steps in doing thissteps
are asinfollows:
doing this are as follows:
3. Click Disable 3.
UAC, andClick
then Disable
click Launch
UAC,(as
andshown
then click
in Figure 9.15).Fig-
Launch (as shown in Figure 9.15).Fig-
ure 9.15. Disable UAC via
ure 9.15.
msconfig.exe
Disable UAC via msconfig.exe
4. A command window
4. will
A appear,
command followed
windowbywill
a notification
appear, followed
bubbleby
informing
a notification bubble informin
you that UAC is disabledyou
andthat
thatUAC
youismust
disabled
restart
and
your
thatcomputer
you musttorestart
apply your
the computer to apply th
change. Go ahead and restart
change.your
Go computer.
ahead and restart your computer.
Best Practices According To Microsoft
Best Practices According To Microsoft
Microsoft highly recommends
Microsoft highly
leaving
recommends
UAC enabledleaving
for PCs
UACinenabled
your organization.
for PCs in your organization.
All users includingAll
IT users
staff should
including
log IT
onstaff
withshould
standard
loguser
on with
privileges,
standardwhile
userad-
privileges, while ad-
ministrators shouldministrators
use two different
shouldaccounts:
use two different
one account
accounts:
that runs
one as
account
a standard
that runs as a standard
user, and a seconduser,
in which,
and awhen
second
prompted
in which,bywhen
UAC,prompted
the administrator
by UAC, can
the enter
administrator can enter
its username and password.
its username and password.
Some Independent
Some Advice
Independent Advice
Make sure all developers
Make sure
on your
all developers
network only
on your
use standard
network user
only accounts
use standard
and user
not accounts and not
administrative ones.administrative
This preventsones.
programs
This prevents
that are being
programswritten
thatfrom
are being
depending
written from depending
on the user havingon administrator
the user havingrights.
administrator
It makes testing
rights.and
It makes
debugging
testing
forand
devel-
debugging for devel-
opers a lot easier and
opers
more
a lot“real
easier
world.”
and more “real world.”
▪ SNMP ▪ SNMP
▪ Monitoring ▪ Monitoring
▪ Licenses ▪ Licenses
swap name | ip_address
zone name
zone name When configuring NetBIOS, specifies the zone W
for the client. fo
swap name | ip_address
swap name | ip_address Specifies the server that provides a swap space for S
clients. Use a valid IP address or valid hostname. c
NokiaIP130:4> set dns domainname acme.com
NokiaIP130:4> set dns domainname acme.com
NokiaIP130:5> setNokiaIP130:5>
dns primary 172.16.22.55
set dns primary 172.16.22.55
Argument
Just because you have your Nokia appliance in a remote location does not mean
it cannot be part of your enterprise backup and restore plans. Using CLISH, you
can manually back up your files when needed, schedule backups to occur at regular
intervals, and transfer the files off of the appliance.
Just because you have your Nokia appliance in a remote location does not mean
it cannot be part of your enterprise backup and restore plans. Using CLISH, you
can manually back up your files when needed, schedule backups to occur at regular
intervals, and transfer the files off of the appliance.
NokiaIP130:7> setNokiaIP130:7>
backup manualsetfilename
backupnokia_backup
manual filename nokia_backup
NokiaIP130:9> setNokiaIP130:9>
backup manualsetonbackup manual on
backup successful backup successful
NokiaIP130:10> quit
NokiaIP130:10> quit
pint[admin]# ls -alpint[admin]#
/var/backup/ ls -al /var/backup/
total 46 total 46
drwxrwxr-x 4 root wheel
drwxrwxr-x
512 Aug
4 root
5 21:48
wheel. 512 Aug 5 21:48 .
drwxr-xr-x 14 root drwxr-xr-x
wheel 512 14Augroot
5 21:48
wheel.. 512 Aug 5 21:48 ..
-rw-r--r-- 1 root wheel
-rw-r--r--
181 Aug
1 root
5 21:48
wheel.htaccess
181 Aug 5 21:48 .htaccess
-rw-rw-r-- 1 root wheel
-rw-rw-r--
414411Aug
root5wheel
21:4841441
nokia_backup_20080805.tgz
Aug 5 21:48 nokia_backup_20080805.tgz
drwxrwxr-x 2 root wheel
drwxrwxr-x
512 Aug
2 root
5 21:48
wheelpkg
512 Aug 5 21:48 pkg
drwxrwxr-x 2 root wheel
drwxrwxr-x
512 Aug
2 root
5 21:48
wheelsched
512 Aug 5 21:48 sched
Scheduling Backups
Scheduling Backups
3 RO network3representation
RO network representation
Several RO systemSeveral
configurations
RO system wereconfigurations
investigated (Marcovecchio
were investigated and(Marcovecchio
Aguirre, and Aguirre,
2005) which are common
2005) which
in seawater
are commonand brackish
in seawaterdesalination
and brackish
applications.
desalination
In applications. In
order to describe the
order
possible
to describe
RO configuration,
the possible RO a simplified
configuration,
superstructure
a simplifiedis superstructure is
presented, which incorporates
presented, whichall theincorporates
feasible processall the
flow
feasible
in theprocess
RO desalination
flow in the RO desalination
system with multiple-product
system withoutput.
multiple-product
As shown in output.
Fig. 1,As
a ROshownnetwork
in Fig.consists
1, a RO network consists
of Nps pressurization
of Nstages
ps pressurization
and NRO reversestagesosmosis
and NRO stages.
reverse In osmosis
this configuration,
stages. In this configuration,
there are three setsthere
of stream
are three
nodessetsemployed:
of streamNnodesps mixing
employed:
junctions,Nps Nmixing
RO reverse
junctions, NRO reverse
osmosis junctions,osmosis
Np outlet junctions,
junctionsNof p outlet
product junctions
streams.ofThe product
junction
streams.
of NpsThe
+ 1 junction of Nps + 1
(10) (10)
(11) (11)
(12)
(12)
(13) (13)
(3.10) (3.10)
where where
represents the pseudo-inverse
represents theof pseudo-inverse
the matrix Bp. Fromof the
(3.10)
matrix
ku and
Bp. From
kp can(3.10) ku and kp can
be found as be found as
, and , and
. By substituting (3.10)
. By substituting
in (3.6), a sufficient
(3.10) incondition
(3.6), a sufficient
for the existence
conditionoffor the existence of
the solution of (3.9)the
is solution of (3.9) is
(3.11) (3.11)
Properties Properties
The input data consists
The input
of a list
dataofconsists
alternative
of asystem
list of alternative
configurations system
withconfigurations
their re- with their re-
spective attributes spective
for the decision
attributes
making,
for theincluding
decision making,
their estimated
including reliability
their estimated
with reliability with
confidence levels, and
confidence
any otherlevels,
data and
related
anytoother
the target
data related
systemtoorthethetarget
environment
system or the environment
that might affect thethat
decision
might affect
making.
theThedecision
control making.
data areThe
thecontrol
criteriadata
for are
selecting
the criteria for selecting
the best system configuration,
the best systemwhich
configuration,
are related to which
the system
are related
non-functional
to the system non-functional
requirements. Therequirements.
mechanisms are Therelated
mechanisms
to the technique(s)
are related tothatthecan
technique(s)
be used forthat can be used for
decision making. Finally,
decision
themaking.
output data
Finally,
willthe
consist
output
of data
a single
willsystem
consistconfiguration
of a single system configuration
that will be deployed.
that will be deployed.
Sources of uncertainty
Sources of uncertainty
External sources ofExternal
uncertainty
sources
are associated
of uncertainty
withare
theassociated
quality of with
the monitoring
the quality of the monitoring
data related to the data
attributes
relatedthat
to the
would
attributes
be usedthat
in the
would
decision
be usedmaking.
in theInternal
decision making. Internal
sources of uncertainty
sources
are associated
of uncertainty
withare
theassociated
differences with
in the
the technique
differencesbeing
in the technique being
used for decision making,
used forand
decision
the inaccuracies
making, andthatthemay
inaccuracies
affect thethat
parameters
may affect
of the parameters of
those techniques. those techniques.
Configuration by a combination
Configuration
of thebyfollowing:–Editing
a combination of the
the configuration
following:–Editing the configuration
file(s)–Using the micctrlfile(s)–Using
utility the micctrl utility
NetMask: 255.255.255.0
NetMask: 255.255.255.0
VerboseLogging: Enabled
VerboseLogging: Enabled