For anyone in the area of Raleigh, North Carolina this week I will be presenting at the North Carolina Oracle User Group’s fall meeting. I will be giving a presentation on Oracle Shell Scripting which includes several tips and scripts from my book by the same title.
The webcomic xkcd is so good I have to resist the urge to blog just about every strip, but the latest one is just too good not to share.
This of course applies not only to programmers, but sys-admins and DBAs as well. I mean really, some of those Oracle installs take a long time!
In Firefox (at least version 188.8.131.52 on the PC, I haven’t confirmed this on others) you can search for text by simply typing a slash (/). As long as you’re not in a text entry box the / character will open up the find dialog box just like control-f would.
For those of you who don’t understand the significance of this, in the popular UNIX command line text editor vi you search for text by typing
/string to find. This is typical of how vi works: powerful, simple commands which are rarely obvious.
The outside of the laptop which showed up in Andy Armstrong’s mail July 5th read “We’ve taken the idea that the outside world is a dangerous place for unprotected content.” and the inside reads “And shredded it.”
Thanks to Zach for posting the full text of the interior which reads:
â€œTo derive maximum benefit from your business critical content, you need to share it across a wide user base. But the more people who have access to it, the greater the threat of sensitive information leaking to your competitors. Thatâ€™s just for starters; content proliferation also raises the risk of regulatory non-compliance and escalating management costs. You know you canâ€™t live without your information, but youâ€™d be forgiven for wondering how to live with it.
Oracleâ€™s recently acquired Information Rights Management solution can help. A key component of our Document and Records Management portfolio, it enables you to share your information when and with whom you want – without fear of the outside world.
But it doesnâ€™t stop there. Should the worst happen – and your laptop falls into unsafe hands – we can even scamble your content before anyone works out how to access it.
Weâ€™ll be in touch shortly with more details of how to shred your content management worries.â€
So what’s the story? What bandwagon is Oracle getting on here? Only time will tell. Burleson thinks it may be another step in their “unbreakable” theme. I think it may be something with Application Express as a content management system. Something to do with enterprise blogs or wiki or some other web 2.0 kind of content management.
UNIX and Linux shells provide an abundance of useful built-in information that can be referenced in globally available variables. In order to see the information provided in a shell, the
set command can be run as demonstrated below.
Here’s a partial output of the
BASH_VERSINFO=(="2" ="05b" ="0" ="1" ="release" ="i386-redhat-linux-gnu")
PS1='[\u@\h \W]\$ '
SSH_CLIENT='184.108.40.206 1379 22'
SSH_CONNECTION='220.127.116.11 1379 192.168.15.105 22'
The contents of a shell variable can be displayed by using the
echo command and prefacing the variable name with a dollar sign as demonstrated below. Shell variables are referenced using all capital letters.
$ echo $TERM
$ echo $USER
$ echo $HOSTNAME ... $LOGNAME
appsvr.mytec.com ... tclark
There are also some special built-in variables that can be useful when creating shell scripts. Some of them are listed in the table below.
|$#||The total number of arguments passed to a shell script on the command line.|
|$*||All arguments passed to the shell script.|
|$0||The command (script) invoked on the command line.|
|$1 – $9||The first through ninth arguments passed to the shell script from the command line.|
These variables are provided by the shell and the names should not be used for other variables.