RE: [U2] [UD] Exit BASIC program with SELECT list?

2004-10-27 Thread Dean Fox
I had this discussion with Ian Sanders and from what I understood, in
current versions of [UV] that the pointer is now maintained in loops. So
that there is no longer speed related advantages (pointer based) using
REMOVE.

FOR I = 1 TO 1
   X = ARRAY
NEXT I

Is equivalent to:

FOR I = 1 TO 1
   X = REMOVE(ARRAY)
NEXT I

-[d]-

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, October 27, 2004 9:10 AM
To: [EMAIL PROTECTED]
Subject: RE: [U2] [UD] Exit BASIC program with SELECT list?


On 26 Oct 2004 13:26:22 -0700, Allen Egerton wrote:
> Why wouldn't you use the REMOVE statement?

On 26 Oct 2004 16:33:55 -0700, Allen E. Elwood wrote:
> Ohh.lemme see, could it be that I've never heard of REMOVE?

A caution with REMOVE - It removes up to the next DELIMITER, so if you have
value marks or lower delimiters in your data, you won't skip an entire
attribute.  Full UniData syntax is

REMOVE var FROM dyn.var [AT col.pos] SETTING delim.code

delim.code returns the delimiter:  0=End, 1=Record Mark, 2=Attribute Mark,
etc.

I found the following works rather well, and returns full attributes
without extra coding:

SELECT DYM.ARRAY TO LIST.VAR
LOOP WHILE READNEXT ATTR FROM LIST.VAR DO
   
REPEAT

Also, when building a list, I found on our system that using

NEW.LIST = NEW.LIST:@AM:NEW.VAL

works faster than the <-1> construct.

Your mileage may vary.

--Tom Pellitieri
  Century Equipment
  Toledo, Ohio
---
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] t-load on Unidata

2004-11-19 Thread Dean Fox
What ever you do, don't forget to rewind the floppy. Or, was that just a R83
thing. That one issue had my head spinning for 2 days before I figured it
out. A, the early days.

-Original Message-
From: George Smith [mailto:[EMAIL PROTECTED]
Sent: Friday, November 19, 2004 12:26 PM
To: [EMAIL PROTECTED]
Subject: [U2] t-load on Unidata


I have found a limited amount of info on t-load and t-att and settape
but am still at loss on how to
t-load some program files from a floppy that was created by mvBase.

Can some one give me the exact steps.
thanks

grs
---
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] [UV] How far can STR1 := SPACE(1000000) grow?

2004-11-22 Thread Dean Fox
Mine is bigger. WooHoo!

510 STR1 SIZE = 51000
511 STR1 SIZE = 51100
Available Memory Exceeded
Abort(coredump)

Sorry, it's early on a Monday.

-[d]-

-Original Message-
From: Marco Manyevere [mailto:[EMAIL PROTECTED]
Sent: Monday, November 22, 2004 3:44 AM
To: [EMAIL PROTECTED]
Subject: [U2] [UV] How far can STR1 := SPACE(100) grow?


Please try the following on your server and find out how far you can go
before malloc fails.

On my Unixware server with 8Gb RAM, I can only go as far as 24 to 30 MB
before the process fails with 'Available memory exceeded'.  Running 'sar -r'
at the Unix prompt shows me over 3 Gig of RAM is still free. Are there any
parameters I can change to increase the limit?

On my XP latop with 512MB RAM, I can run the program upto 250MB then it
begins to really crawl, taking upto 15 seconds to go through the loop.

BLOCK = SPACE(100)
STR1 = ''
FOR I = 1 TO 100
   STR1 := BLOCK
   PRINT I:' STR1 SIZE = ':100*I
NEXT

RETURN
END






-
 ALL-NEW Yahoo! Messenger - all new features - even more fun!  
---
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/


RE: [U2] LOOP or GOTO on READNEXT

2004-12-13 Thread Dean Fox
Your understanding of the BASIC select is correct. It starts in group one
and works it's way down.  In my early years of PICK programming I learned
this the hard way.  As this user hasn't yet seen adverse effects is luck vs.
design.

Probably because of the a change to the least significant portion of the ID
(hash wise) and the number of groups vs. items, they're all hashing to the
same group after the ID change.

In a similar test where the new ID would hash to a forward group, in the
code provided, it would be deleted. Been there, done that and now know
better.

-[d]-

-Original Message-
From: Derek Falkner [mailto:[EMAIL PROTECTED]
Sent: Monday, December 13, 2004 11:16 AM
To: [EMAIL PROTECTED]
Subject: RE: [U2] LOOP or GOTO on READNEXT


Karl,

I cannot speak to the issue of speed but I am concerned about the safety of
either process; I believe you may end up with missing employees!

I believe the BASIC SELECT sets a pointer at the start of group 1 and steps
it through each item in that group before moving on to group 2. What could
happen is that the record with the new 6 digit key is written to a later
group and the item with the old key is deleted. Later, the SELECT would pick
up the new employee and, even though it already has a 6-digit key, would
write it back to the file and then immediately delete it!

I would prefer to see a TCL-style SELECT be performed instead of the BASIC
SELECT, e.g. PERFORM "SELECT CUSTEMP" instead of SELECT CF. This will
definitely not select any of the newly-created items, though it would also
fail if any employees on file already had 6-digit keys.

Alternatively, you could check the new item key differs from the original
item key before deleting an item.
E.g.   write REC on CF,NK
 if K # NK then
delete CF,K 
 end

If my understanding of the BASIC SELECT is wrong I would be happy if someone
on this list could enlighten me.

Oh, and I must add that I much prefer the LOOP ... REPEAT syntax too! I
wouldn't imagine there would be much difference in speed and I find it
easier to write/debug.

Thanks for the interesting question!

Derek Falkner
Kingston, Ontario, Canada


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Monday, December 13, 2004 10:33 AM
To: [EMAIL PROTECTED]
Subject: [U2] LOOP or GOTO on READNEXT


I've seen 2 ways to read a client key, change the length to 6 digits, then
write it back out, delete the old one and move on:

EXAMPLE 1 of 2:
!(FIXEMPNO) - Fix the employee number length
  open '','CUSTEMP' to CF else stopm 'Not'
  select CF
10:   readnext K else stop
  read REC from CF,K then
 NK = fmt(K,"R%6")
 write REC on CF,NK
 delete CF,K
  end
  go 10
   end

EXAMPLE 2 of 2:
!(FIXEMPNO) - Fix the employee number length
  DONE = 0
  open '','CUSTEMP' to CF else stopm 'Not'
  select CF
  loop
 readnext K else DONE = 1
  read REC from CF,K then
 NK = fmt(K,"R%6")
 write REC on CF,NK
 delete CF,K
  end
  repeat
   end

My intent is not to start a religious discussion about GO or GOTOs because I
see that method all over the place and regardless of why, who or whatever,
my question is, which is faster. (I prefer using loop..repeat syntax, FWIW).

-- 
Karl L. Pearson
Director of IT,
ATS Industrial Supply
Direct: 801-978-4429
Toll-free: 800-789-9300 1,29
Fax: 801-972-3888
http://www.atsindustrial.com
[EMAIL PROTECTED]
---
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/


[U2][UV] ENCRYPT() Function

2004-12-14 Thread Dean Fox
There is a new function starting in UV 10.0 that I have never used,
ENCRYPT().  The manual reads like bad stereo instructions.

Has anyone used it or is using it? I'm looking for information on practical
uses, code samples, usage examples, etc.

We have a need to encrypt/decrypt certain attributes within an item, not the
whole item itself and probably on-the-fly string encrypt/decrypt.

Would anyone have a code snippet of say encrypting attributes 5 9 and 14 or
something like that in an item using 128-DES encryption. Is each attribute a
separate function call, or can I pass all three attributes at one time. Any
hints on key storage and retrieval? Same for on-the-fly string encryption.
What is salt and IV?

I'm going to get reading and after I send this off start playing. I'm hoping
to shorten the learning curve by seeing if any of you have experience with
it.

Thanks
-[d]-
---
u2-users mailing list
[EMAIL PROTECTED]
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2] [UV] ACOS problem (floating point numbers)

2005-04-13 Thread Dean Fox
Results from UP-UX Universe 10.1
01 RUN PT TEST
VAR1 = 0.26983554628015
VAR2 = 0
VAR3 = 0.73016445371985
VAR4 = 1
Program "TEST": Line 19, Argument domain error in arc-cosine, zero returned.


On 4/13/05, Mike Dallaire <[EMAIL PROTECTED]> wrote:
> Adrian,
> ACOS is the inverse value of COS.  At any point when COS equates to 0, ACOS
> will be undefined, as it would be 1/0.  When calculating distances (assuming
> east-west being your x axis and north-south being your y axis), COS would
> always be 0 when there is no east or west vector involved (the distance
> traveled east or west is 0, or the sum of the vectors is 0, depending upon
> your calculation)
> Adding the null character may fool the processor into not seeing the value
> as 0, I am not sure.  However, anytime you are using trigonometric functions
> you need to take into account values where they can be undefined.  SIN and
> COS are the only functions defined for all values, IIRC.
> HTH,
> Mike
> 
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Womack, Adrian
> Sent: Wednesday, April 13, 2005 4:55 AM
> To: u2-users@listserver.u2ug.org
> Subject: [U2] [UV] ACOS problem (floating point numbers)
> 
> We have some code that is calculating distances between points, using
> SIN(), COS() and ACOS().
> 
> Occasionally we get the error: "Argument domain error in arc-cosine,
> zero returned"
> 
> This seems to be occurring when two floating point numbers are added
> together and the result is exactly 1 (or at least seems to be exactly
> 1), I assume internally the number is slightly over 1.
> 
> Here's some example code:
> 
>  PRECISION 14
> 
>  FROM.LAT = -31.29583
>  FROM.LONG = 119.65194
>  DEST.LAT = -31.29583
>  DEST.LONG = 119.65194
> 
>  VAR1 = SIN(FROM.LAT) * SIN(DEST.LAT)
>  VAR2 = (DEST.LONG - FROM.LONG)
>  VAR3 = COS(FROM.LAT) * COS(DEST.LAT) * COS(VAR2)
> 
>  VAR4 = VAR1 + VAR3
> 
>  CRT "VAR1 = ":VAR1
>  CRT "VAR2 = ":VAR2
>  CRT "VAR3 = ":VAR3
>  CRT "VAR4 = ":VAR4
> 
>  TEMP1 = ACOS(VAR4)
>  TEMP2 = ACOS(VAR4:"")
> 
> VAR4 is displayed as "1", but when TEMP1 is assigned we get the above
> error message.
> When TEMP2 is assigned we get no error (i.e. the temporary variable
> passed to the second ACOS function was a string not a number).
> 
> Maybe concatenating an empty string during the ACOS() call is the fix
> for this but it's not really ideal.
> 
> Anyone have any comments on this? And what happens on your machine?
> 
> BTW our widezero config setting is 3dc0
> 
> AdrianW
> 
> DISCLAIMER:
> Disclaimer.  This e-mail is private and confidential. If you are not the
> intended recipient, please advise us by return e-mail immediately, and
> delete the e-mail and any attachments without using or disclosing the
> contents in any way. The views expressed in this e-mail are those of the
> author, and do not represent those of this company unless this is clearly
> indicated. You should scan this e-mail and any attachments for viruses. This
> company accepts no liability for any direct or indirect damage or loss
> resulting from the use of any attachments to this e-mail.
> ---
> u2-users mailing list
> u2-users@listserver.u2ug.org
> To unsubscribe please visit http://listserver.u2ug.org/
> ---
> u2-users mailing list
> u2-users@listserver.u2ug.org
> To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2] MvInternet - IBM Licensing Requirement

2005-04-17 Thread Dean Fox
I've been watching this thread and not saying anything because my view
is contradictory to what seems to be the majority.

I have 5 people visiting my web site, some are reading the page, some
have left for coffee after loading the page and others are cutting and
pasting from the page.  Nevertheless, they are web site visitors. They
are not logged in users of the DBMS.  They can't be. The HTML protocol
doesn't work that way.

The user of the DBMS is the web service. If a link on the web page
needs data, the web service "logs on" to the DBMS, retrieves the data
and "logs off".  One user license used for the duration.  In my mind,
I need as many DBMS user licenses as I need web service connections.

If it takes 20 seconds to perform the SELECT FILE and return the
results, then for those 20 seconds, one DBMS license is consumed. If
it takes .5 seconds to read an Item, then one DBMS license is consumed
for .5 seconds.

So long as there is no threading, and by threading I mean multiple
unrelated requests in the same connection. If each DBMS request
consumes one license, legalese or not, I'll sleep the sleep of the
rightest.

Besides how would I manage this?  At what point would they be
considered a logged in user of the DBMS? When they load my home page?
Or perhaps two links later when they load the "Review Order" page? 
They retrieve their order and it's now displayed, how long are they to
be considered still logged on? Because, after viewing their order
they've moved on to a completely different site. Do I time them out
after 30 seconds? One hour?

The consumer of the license is the web service.  One license per
request. If I can feed 100 web site visitors and the web service only
needs 5 connections at any given moment, then I need 5 DBMS licenses.

Sorry if that fails the morality and legal tests. It's the way my
brain is wired.

-[d]-

On 4/17/05, Webmaster <[EMAIL PROTECTED]> wrote:
>  The problem with multiplexing is the fact that DBMS vendors are still
> banking on the one-to-one human ratio to make a profit. More and more people
> are looking for an open DBMS backend and not always a per-user environment.
> That's why MySQL and Postgres are moving up in the DBMS arena. It's been way
> past the time for a services license model and architecture. You can
> multiplex in a huge variety of methods that currently do not warrant an
> arrest for DB assault. Some methods are more efficient and easier to
> implement than others. The wording of many EULAs can be interpreted many
> ways and that can lead to problems. Dual-licensing is one way to bundle OEM
> DBMS systems and multiplexing products together, but it's not really a
> solution for the masses. Look at the following scenario:
> 
> You establish a web site that gets ~20 DBMS hits per second. (that's a high
> amount of traffic)
> You implement a web service that uses 20 user licenses and each license runs
> in the DBMS for 1 second or less.
> Ideally, your solution is capable of handling a minimum of 20 users per
> second. It could possibly handle 40 users per second depending on the code
> being run.
> 
> This scenario does not breach the EULA, since you are not handling more
> concurrent users than you have licenses for. Each connection uses a license,
> but only for a split second and then it is released. The same could be said
> for buying 10 licenses for 30 employees and allowing each department to use
> their terminals during a specified time in the day. You are still
> 'multiplexing', but most view the latter as a valid license useage while the
> first is "abusive minimizing of licenses". Seems contradictory logic to me.
> 
> Glen
> http://picksource.com
> http://mvdevcentral.com
> 
> > -Original Message-
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] Behalf Of David Jordan
> > Sent: Sunday, April 17, 2005 7:17 AM
> > To: u2-users@listserver.u2ug.org
> > Subject: RE: [U2] MvInternet - IBM Licensing Requirement
> >
> >
> > Other RDBMS are worse, you usually have the choice of named users
> > or server
> > licenses and you don't have the advantage of concurrent licenses.  The
> > number of sites who put up something like a phone book list on SQL Server
> > with 10 license as they expected no more than 10 people at a time
> > accessing
> > the database to only find out later that they needed a couple of 100
> > licenses for every potential user who accesses the system.  Worse if you
> > access the database from your desktop and your phone then you require 2
> > licenses not one.  Using RDBMS for Internet facilities requires a Server
> > License of the database to get around this issue of named licenses.
> >
> > The wording in the licensing for UniVerse did specify that it was a breach
> > of the license to use this type of multiplexed processing to minimise
> > licensing.  This is covered with Redback with special licensing
> > and I am not
> > aware of this being made available to other 3rd parties, but I am
> > sure that
> > some a

Re: [U2] MvInternet - IBM Licensing Requirement

2005-04-18 Thread Dean Fox
"What people are doing is through special programs and queuing where they can
run several users continuously with several background processes that stay
active.  This is what IBM has frowned upon."
-
My brain wiring doesn't allow me to separate this scenario from real
life either.

None of this "falls under the rules of Piracy ie running one Microsoft
Word on multiple PCs". That's spreading FUD and is so far off the
point cannot be addressed directly.

Look at it this way. I have 500 employees and I pay two full time
people to do nothing but run reports for whoever dials their extension
and makes a request.

These two employees are logged in all day, they remember, manage and
distribute the hundreds of requests they get all day. That's all they
do. Does your scenario suggest I need 500 licenses rather than two?

If not, how does this differ from web services running even from
within UV? Is the difference human vs. program?  I fully understand
the loss of revenue to IBM argument.  I'm not going to pay taxes I
don't owe either.  If I can replace a person with a program, a
telephone extension with a web interface, I have saved my company
money and have cost IBM nothing I didn't owe before. I'm just more
productive.

I failed ethics in college. I was failing my second attempt until my
Professor gave me a clue.  The test questions are supposed to be grey
he said, your problem is Dean, you don't think like a criminal. And,
I'm still confused today.  If I replace a person with a program and a
telephone extension with a web interface, do I go to jail or get
promoted? What I'm hearing is jail. But my brain isn't wired to
understand why.

-[d]-


On 4/18/05, Tony Gravagno <[EMAIL PROTECTED]> wrote:
> Until I saw Dean's posting I was also going to just let it go.  The trigger
> for me was the equating of multi-user license usage to running multiple
> copies of software on different systems.  Copying software allows more than
> one person to execute different functions at exactly the same time.  All
> DBMS products are engineered to allow us to perform the following
> sequential functions:
>   Accept connection and query
>   Read state data from cache or disk
>   Perform operation on all data
>   Write state data to cache or disk
>   Respond to user and disconnect
> This is the way web servers work and one common way of engineering a
> disconnected client/server model.  There is no physical way that anyone
> process can perform those functions for two users simultaneously, the way
> two instances of pirated software does.  All users must wait for any user
> consuming a license to disconnect before they consume the license in their
> own turn.  The terms "connect" and "disconnect" may imply logging in or
> simply going inactive as someone else consumes the license resource - the
> point is that the way MV platforms are engineered, only one user can make
> use of the resource at any given moment in time.
> 
> This use of licenses has a long standing legal precedent, here are two
> examples:
> Modems which came into use in 2nd to 3rd generation systems allowed
> one user to connect and then disconnect, followed by another user who did
> the same.  "Per-seat" licensing, compared to "named user" licensing has
> always acknowleged this paradigm.  Today, if we choose to allow one user to
> consume that license for a period of 2 hours before giving it up, or 200
> milliseconds, that is a matter of design.  There are no set standards for
> how long a user must consume a license in order to be considered legal,
> except where software vendors impose some minimum connect time.  Such
> impositions are considered bad design and virtually no company takes a
> stance on this because it's technically and politically unreasonable.
> Software like UniObjects, PDP.NET, mv.NET, ODBC and RPC, are
> specifically designed to allow software to connect, process, and disconnect
> as described above.  These products and technologies, and many others like
> them have established a precedent which allows developers to effectively
> consume licenses with as short a connect time as possible.  I have not
> heard of a single legal case in the IT world, not just the MV market,
> brought by a DBMS vendor against a VAR/developer for abuse of this common
> communications design.  I think any company that does so would be
> committing political suicide, if it allowed its developer base to go so
> long without action, and then all of a sudden claimed that accepted
> practices and established connectivity products were now in violation of
> their legal terms.
> 
> Unless IBM publicly states their position on this topic, takes a developer
> to court, or just sends a polite "please rethink your license consumption"
> note to someone, we will not know how liberal they are about their
> licensing, regardless of what their license actually says.  My guess is
> that no DBMS company will take action unless there is blatent abuse.  Such

Re: [U2] MvInternet - IBM Licensing Requirement

2005-04-18 Thread Dean Fox
I'm not shooting the messenger.  My apologies.  What Microsoft says
about their licensing they can take up with the EU and other criminal
charges they have and will continue to answer too.  It's is a separate
issue unrelated to my discussion about IBM and their product. As is
copyright violation, this is not a discussion of profiting from
duplicating software for distribution.

My discussion is license consumption as it pertains to IBM and their
Universe product.

"Your examples if you have 500 staff requesting reports from 2 IT
people who do the processing then it is obvious 2 user license." "Your
example of Web Service is difficult".

Why? Even though I'm not looking for you answer. I ask to raise a point.

 "With U2 the licensing is concurrent and the licensing is according
to demand. Ie if 100 users could access the system at the same time
then you would need a 100 licenses."

Users that could have access in my example, and actually do thought
the IT staff is 500. But it is obvious to you that only 2 licenses are
required.  I can't imagine a DBMS licensing based upon the number of
telephone extensions you have in your building.

It appears the separation you make is the difference between a person
performing a function and a program performing the same function.  If
it's two people, two licenses are required.  If it's two programs, 500
licenses are required.  I'm not convinced the definition of a user
license is subjective.

At some point I would like to write a Web/UV application.  When I do,
I will be as productive with my user licenses as CPU cycles allow.  In
the mean time, our speculations as to what is or is not allowed are
just that.  I don't separate the functions of a human to the functions
of a program as far as licenses are concerned. They're both performing
the same tasks, abet one is far more productive than the other. 
Increasing productivity within a connection (user license) does not
relate in my mind a legal requirement for more licenses.

It's only my opinion.  Perhaps IBM and possibly the courts will give
us a definition.


On 4/18/05, David Jordan <[EMAIL PROTECTED]> wrote:
> Hi Dean
> 
> I have gone through a number of detailed sessions with Microsoft on issues
> of Piracy and Microsoft regards improper licensing of database licenses in
> the same light as running one version of Word on multiple PCs.  In my
> estimation there are probably more companies who have run into trouble with
> Microsoft over misuse of database license that misuse of Office licenses.
> 
> Please don't shoot the messenger I am only passing on what I am aware of
> licensing legalities.  The complexities of licensing has to be studied very
> carefully and is dependent on databases, licensing agreements and methods of
> use.  It is not to say a situation is right or wrong it is a question if it
> fits the licensing agreement.   Unfortunately many people feel that if
> something is technically possible, then it is legally possible which is not
> the case.
> 
> Your examples if you have 500 staff requesting reports from 2 IT people who
> do the processing then it is obvious 2 users license.
> 
> Your example of Web Services is difficult.  If the database has named
> licensing then everyone who accesses the database requires a license or you
> purchase a license per processor.  With U2 the licensing is concurrent and
> the licensing is according to demand. Ie if 100 users could access the
> system at the same time then you would need a 100 licenses.  However if you
> use a 3rd party product to process the 100 users through 10 licenses then
> you could fall foul of licensing issues.  The other area that may expose you
> to license issues if you use persistence then you may cross the line again.
> 
> This is not as simple and clear cut as many may think and it does fall under
> strict copyright laws.
> 
> Regards
> 
> David Jordan
> ---
> u2-users mailing list
> u2-users@listserver.u2ug.org
> To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2] Web Connectivity - IBM Licensing Requirement {Unclassified}

2005-04-19 Thread Dean Fox
Pounding the table, "Setup a web interface to UV and go to jail" bit
did sound a little over the top. Glad to hear I can start my new
project with a clear conscience :) Thanks for the info. Someone needs
a new script.

On 4/19/05, HENDERSON MIKE, MR <[EMAIL PROTECTED]> wrote:
> Folks,
> 
> I've stayed out of this until now, but I would point out that one of the
> major features of IBM's next release of UniObjects.Net is advertised as
> being native support for connection pooling.  Connection pooling is also
> one of the major features of Redback.
> 
> From this, one could reasonably infer that IBM not only don't care too
> much about that kind of multiplexing of licenses for web connections,
> but that they actively support it.
> 
> HTH
> 
> Mike
> 
> > -Original Message-
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] On Behalf Of
> [EMAIL PROTECTED]
> > Sent: Wednesday, 20 April 2005 02:35
> > To: u2-users@listserver.u2ug.org
> > Subject: Re: [U2] MvInternet - IBM Licensing Requirement
> 
> [snip]
> 
> > I disagree with your interpretation of what you perceive to be
> happening.
> > Perhaps you could point us at a U2 or IBM site that specifically and
> > officially address this, otherwise I claim you're just making a
> mountain
> > out of something that they could care less about.
> 
> [snip]
> 
> > Will Johnson
> > ---
> > u2-users mailing list
> > u2-users@listserver.u2ug.org
> > To unsubscribe please visit http://listserver.u2ug.org/
> >
> 
> The information contained in this Internet Email message is intended
> for the addressee only and may contain privileged information, but not
> necessarily the official views or opinions of the New Zealand Defence Force.
> If you are not the intended recipient you must not use, disclose, copy or
> distribute this message or the information in it.
> 
> If you have received this message in error, please Email or telephone
> the sender immediately.
> ---
> u2-users mailing list
> u2-users@listserver.u2ug.org
> To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2] Using the Encrypt Function

2005-05-05 Thread Dean Fox
ALGORITHM = "des-ede3-cbc"  ;* 168-BIT KEY DES ALGORITHM
ACTION= "2" ;* 2=ENCRYPT
DTA   = "WHOMPUM"   ;* DATA OR NAME OF FILE CONTAINING DATA
DATALOC   = "1" ;* 1=DATA IS STRING 2=DATA IN FILE
KEY   = "PASSWORD"  ;* ACTUAL KEY OR FILE NAME CONTAINING THE KEY
KEYLOC= "1" ;* 1=KEY IN DATA 2=KEY IN FILE
KEYACTION = "2" ;* 2=DERIEVE KEY FROM PASS PHRASE 1=USE
ACTUAL KEY-168 BITS
SALT  = ""  ;* STRING CONTAINING THE SALT VALUE?
IV= ""  ;* STRING CONTAINING IV?
RESULT= ""  ;* RESULT BUFFER OR UNIX FILE NAME
RESULTLOC = "1" ;* 1=RESULT BUFFER 2=UNIX FILE STORING RESULT
B=ENCRYPT(ALGORITHM,ACTION,DTA,DATALOC,KEY,KEYLOC,KEYACTION,SALT,IV,RESULT,RESULTLOC)
CRT "ENCRYPT  ":DTA
CRT "B  = ":B
CRT "RESULT = '":RESULT:"'"
CRT "LENGTH = ":LEN(RESULT)

On 5/5/05, D Averch <[EMAIL PROTECTED]> wrote:
> I've read all of the documentation:
> 
> ENCRYPT(algorithm, action, data, dataLoc,key, keyLoc, keyAction,
> salt, IV, result, resultLoc)
> 
> I have tried many different variables and values and cannot get it to return
> only a 4 (The key cannot be derived).  What values should I be putting into
> the function to get a string encrypted?
> ---
> u2-users mailing list
> u2-users@listserver.u2ug.org
> To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/


Re: [U2] AUTOLOGOUT

2005-07-14 Thread Dean Fox
This is what I wrote for a client. Maybe it will help. It uses a
couple local UV files built from a UNIX command query(s) and if I
recall user profiles using a "charge to".  I'd have to pull it apart
to remember the details but maybe there's something in here that might
help.

There was a UV file with user timeout parameters that was checked when
the system load exceeded a specified amount.  The logout/logoff from
both UV and UNIX functioned completely when all parameters were met.

-[d]-

001   PROGRAM AUTO.LOGOFF
002 **  This program is designed to automatically logoff users that
003 **  have been inactive for a specified lenght of time.  It takes
004 **  into consideration keyboard inactivity as well as CPU usage so as not
005 **  to logoff a user who is currently processing data.
006 **
007 **  A priority user file is examined. Consideration is made for users
008 **  that are not to be logged off at all or for users who have longer
009 **  inactivity allowances. Unless an emergency limit has been reached.
010 **  In that case priority users are allowed to be logged off with
011 **  a regular timeout default.
012 **
013 **  Currently there are 90 UDT licenses. This program is set to activate
014 **  when 80+ licenses are being used.  It's felt there's no reason to
015 **  logoff a user to conserve licenses if < the max are in use, etc.
016 **
017 **
018 **  USE.REC<1> = Last two charactors of tty identifier
019 ** <2> = User login id
020 ** <3> = PID
021 ** <4> = CPU usage
022 ** <5> = Keyboard inactivity
023 ** <6> = Delete flag
024 **
025 **TUSER<1> = Last two charactors of tty identifier
026 ** <2> = User login id
027 ** <3> = PID
028 ** <4> = CPU usage
029 ** <5> = Keyboard inactivity
030 ** <6> = Delete flag
031 ** <7> = User Priority
032 **
033 **PUSER<1> = Priority Level
034 ** <2> = Max Inactivity Allowed
035 **
036 ** HIST.REC<1>   = Current Number of udt Sessions
037 ** <2.M> = Last two charactors of tty identifier
038 ** <3.M> = User login id
039 ** <4.M> = PID
040 ** <5.M> = CPU usage
041 ** <6.M> = Keyboard inactivity
042 ** <7.M> = Delete Flag
043 ** <8.M> = User Priority
044 ** <9.M> = Run Date (Internal)
045 *
046 *  MODIFICATION HISTORY
047 *
048 *  No  Date  SCRno   Who  Description
049 *  00  29-04-02  0   def  Orginal Code...
050 *
051
052   CRT ">>> AUTO.LOGOFF <<<"
053
054   CALL MP.OPEN("PRIORITY.USER" , PRIORITY.USER , OPENSTAT) ; IF OPENSTAT
055   OPEN "DICT","PRIORITY.USER" TO DICT.PRIORITY.USER ELSE STOP 201,"DICT,
056   CALL MP.OPEN("TRACK.USER" , TRACK.USER , OPENSTAT) ; IF OPENSTAT THEN
057   CALL MP.OPEN("LOGOFF.HIST" , LOGOFF.HIST , OPENSTAT) ; IF OPENSTAT THE
058
059   DONE= 0
060   KILL.ALL= 0
061   SESSION.LIMIT   = 80
062   EMERGENCY.LIMIT = 88
063   DEFAULT.TIMEOUT = 20
064
065   LOOP UNTIL DONE DO
066  SLEEP 300;* Run every 5 minutes
067
068  IF TIME() > 85500 THEN KILL.ALL = 1
069  RUN.DATE = DATE()
070
071  GOSUB 1000 ; * Build Usage Variable
072
073  USER.CNT = DCOUNT(USE.REC<1>,@VM)
074  FOR NXT.USER = 1 TO USER.CNT
075 GOSUB 2000;* Check Usage
076  NEXT NXT.USER
077
078  GOSUB 3000;* Logoff Qualified Users
079
080 * Check for program abort flag / sleep the night
081  IF KILL.ALL THEN
082 KILL.ALL = 0
083 CLEARFILE TRACK.USER;* Clear accumulated users
084 * Clear Out History Past 7 Days
085 DEL.DATE = OCONV(RUN.DATE - 7,'D')
086 STMT = 'SELECT LOGOFF.HIST WITH DATE < "' :DEL.DATE: '"'
087 EXECUTE STMT CAPTURING RESULT RETURNING ERROR
088 LOOP WHILE READNEXT ID DO
089DELETE LOGOFF.HIST,ID
090 REPEAT
091 SLEEP 21600;* Sleep six hours
092  END
093  READV DONE FROM DICT.PRIORITY.USER,"TERMINATE",1 ELSE DONE = 0
094
095   REPEAT
096
097 * Program Termination
098   RETURN
099
100 1000 ;* Build Usage Variable
101
102   USE.REC = ""
103
104 * Get udt Sessions
105   STMT = "ps -ef | grep udt | grep -v root | grep -v grep | grep -v PHAN
106   PCPERFORM STMT CAPTURING RESULT
107   ATTR.CNT = DCOUNT(RESULT,@AM)
108   UDT.SESSIONS = ATTR.CNT
109
110 * Write History Record / End Processing if Not Exceeding udt Session Limit
111   LOGOFF.HIST.ID = OCONV(RUN.DATE,"D4-"):"_":OCONV(TIME(),"MTS")
112   HIST.REC= UDT.SESSIONS
113   HIST.REC<9> = RUN.DATE
114   WRITE HIST.REC ON LOGOFF.HIST,LOGOFF.HIST.ID
115
116 * Set Session Usage for Each User
117   FOR NXT.ATTR = 1 TO ATTR.CNT
118  IF RESULT[1,1] = " " THEN RESULT = RESULT = TRIM(RESULT)
120  RESULT = CONVERT(" " , @VM , RESULT)
121  TTY = RESULT,@VM)-2> [LEN(RESULT
123  

Re: [U2] London - Again

2005-07-22 Thread Dean Fox
It's always been this way. History is repeating itself:

Contrary to popular belief, Adolf Hitler, second cousin to Osama Bin
Laden are currently winning their war against freedom.

Bin Laden's stated objective is to disrupt and destroy our Western
culture and the freedoms associated with it.  I wonder sometimes, in
the USA, a representative form of government, who the current majority
are representing. Bin Laden writes the script and the current majority
running this country enact laws according to his will.

"Of course the people don't want war. But after all, it's the leaders
of the country who determine the policy, and it's always a simple
matter to drag the people along whether it's a democracy, a fascist
dictatorship, or a parliament, or a communist dictatorship. Voice or
no voice, the people can always be brought to the bidding of the
leaders. That is easy. All you have to do is tell them they are being
attacked, and denounce the pacifists for lack of patriotism, and
exposing the country to greater danger."

-- Herman Goering at the Nuremberg trials 

Those who forget history, repeat it. I never forget, Jesus is a
liberal. As part of his mission to separate believers from the rest, I
am _very_ comfortable knowing I've passed the test.

Let those radicals do their thing. They'll soon fade into history.
Seek them out and give them your shirt too. Yes, some souls will be
sent home, but drag me from my car because I own a tazer and accuse me
of terrorism? These are people who have failed the test.

Signed,
A Liberal For Eternity; Following Or Christ Jesus Teachings.

On 7/22/05, Jerry Banker <[EMAIL PROTECTED]> wrote:
> It's getting kind of crazy here. I heard on the news this morning that they
> arrested a man setting in his truck outside of a train station. He had a
> Tazer and a machete under the seat. I guess I better not go to a train
> station, my pickup has more implements of destruction in it than that.
> 
> - Original Message -
> From: "Don Kibbey" <[EMAIL PROTECTED]>
> To: 
> Sent: Friday, July 22, 2005 10:05 AM
> Subject: Re: [U2] London - Again
> 
> 
> Unleash the soccer hooligans!!
> 
> Seriously, my prayers are with all those in London who have to put up
> with this madness.  Stay safe, stay alert.
> ---
> u2-users mailing list
> u2-users@listserver.u2ug.org
> To unsubscribe please visit http://listserver.u2ug.org/
> ---
> u2-users mailing list
> u2-users@listserver.u2ug.org
> To unsubscribe please visit http://listserver.u2ug.org/
---
u2-users mailing list
u2-users@listserver.u2ug.org
To unsubscribe please visit http://listserver.u2ug.org/