Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource.

Size: px
Start display at page:

Download "Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource."

Transcription

1 Siemens PLM Software HEEDS MDO Setting up a Windows-to- Linux Compute Resource

2

3 Contents Introduction 1 On Remote Machine B 2 Installing the SSH Server 2 Configuring the SSH Server 2 Starting the SSH Server 2 On Local Machine A 3 Installing PuTTY 3 Testing the Connection between Machines 4 Creating Passwordless Entry to Remote Machine B using RSA Keys 5 Create Private and Public Keys on Local Machine A 6 Copy Public Key to Remote Machine B 8 Enable and Test Passwordless Access with Pageant on Local Machine A: 9 Setting up Remote Execution in HEEDS 10 Creating a Remote Profile 10 Using Direct Submission for a Compute Resource 11 Using a Scheduled Cluster with PBS Professional for a Compute Resource 13 Using a Scheduled Cluster with LSF for a Compute Resource 15 Notes 17 Troubleshooting 18 SSH Doesn t Connect to Remote Machine 18 Passwordless Connection is Unsuccessful 18 Errors Writing Files on Remote Machine 19 Errors Executing Commands on Remote Machine 19 Example Study 21

4

5 Introduction Introduction This document provides a step-by-step guide to establishing communication between HEEDS MDO and two computers, the first running the Windows operating system and the second running some version of the Linux operating system. Once this communication has been established, HEEDS can then operate on the Windows workstation while submitting jobs to the remote Linux workstation (or cluster), as illustrated in the figure below. Some of the steps defined in this document require administrative privileges on each machine. Before proceeding, please ensure that you have sufficient privileges to complete the required tasks. Local Machine A Remote Machine B Software Needed Windows 7 HEEDS PuTTY Analysis tools (optional) Software Needed Linux SSH Server Analysis tools Queuing tool (optional) A network protocol is required to allow remote login and other network services to operate securely over an unsecured network. The Secure SHell, or SSH, cryptographic network protocol is employed in a client-server architecture for the communications described in this document. Red Cedar Technology strongly recommends utilizing the free, open-source, network file transfer application called PuTTY as the SSH client on Local Machine A and using the SSH server on Remote Machine B to set up a Windows-to-Linux compute resource. Most flavors of Linux come with an SSH server already installed. While other configurations may be possible, they are not recommended or supported by Red Cedar Technology. 1

6 Setting up a Windows-to-Linux Compute Resource On Remote Machine B Most Linux operating systems already come with an SSH Server installed and running. Prior to proceeding with the steps below, you should check with your IT department to confirm. Odds are these steps will not be required on your Linux system. They are provided here in case your system is not already configured with SSH. Remote Machine B Installing the SSH Server The most common SSH Server for Linux is OpenSSH. To install it, use the command: sudo apt-get install openssh-server Configuring the SSH Server Configuring the SSH server is a balance between ease-of-use and security. For the purposes of using it with HEEDS where it will be operating within an internal network between company machines, the default settings are adequate. For more information regarding configuring an SSH server see here or here. Starting the SSH Server 1. Once the installation and configuration is complete, you can start the SSH process with the command: sudo service sshstart 2. To ensure the process is running, use the command: ps -A grep sshd Which should produce a line yielding the process ID. 2

7 On Local Machine A On Local Machine A Local Machine A Installing PuTTY PuTTY is the recommended file transfer application by Red Cedar Technology, serving as the SSH client on Local Machine A. 3. To download PuTTY, navigate here and choose the Windows installer as shown below. 4. Run the downloaded installer with all of the default settings. 3

8 Setting up a Windows-to-Linux Compute Resource Testing the Connection between Machines Having installed PuTTY on Local Machine A and started the SSH Server on Remote Machine B, we should now be able to communicate between the two machines. 1. On local Machine A, launch PuTTY by navigating to Start->All Programs->PuTTY->PuTTY. 2. If you have successfully started a privileged server on Remote Machine B, you should now be able to establish an SSH connection to that machine via PuTTY. In the Host Name (or IP address) field, enter either the host name or the IP address of Remote Machine B, and click Open. If the host name does not work, use the IP address. 3. Login in using the user name and password needed to log in to Remote Machine B. Now that you have created a communication link between the two machines, it is necessary to establish a method of passwordless authentication entry so that a login prompt doesn t appear every time that you want to access the remote Windows workstation. The steps required to support this passwordless entry are described next. 4

9 Creating Passwordless Entry to Remote Machine B using RSA Keys Creating Passwordless Entry to Remote Machine B using RSA Keys PuTTY also serves the purpose of securely passing data to Remote Machine B via RSA keys (passwordless login). In order for HEEDS to exchange data with Remote Machine B, it is required that HEEDS not get prompted for a password, which PuTTY facilitates. Machine A Communications Enabled Machine B Contains contents of Machine A public key Machine A private key (id_rsa) Authorized Keys File (authorized_keys) Machine A public key (id_rsa.pub) Known Hosts file (known_hosts) Contains entries for machines B and C Machine C Contains contents of Machine A public key Authorized Keys File (authorized_keys) Figure 1: Public and Private Key File Setup Figure 1 shows the standard names and locations of folders and files generated during this process. In the example shown, a user would be able to login with a password from Machine A to Machine B and from Machine A to Machine C. The important points to know are: The private key for Machine A never leaves Machine A The public key for Machine A will need to be included in the authorized_key file for any machine it will be connecting to The first time a connection is made, the user is prompted to accept the authenticity of the host machine. If accepted, this creates an entry in the known_hosts file on Machine A. This must be done for each host machine and manually before trying to connect using HEEDS. 5

10 Setting up a Windows-to-Linux Compute Resource Create Private and Public Keys on Local Machine A Local Machine A 1. On local Machine A, go to Start->All Programs->PuTTY->PuTTYgen. 2. In PuTTYgen, click Generate and follow the instructions by moving your mouse around the blank area to produce an encrypted key. 3. Once the key is created, click Save private key and save it to a known location that you will access later. Optionally, provide a password to save with the key. The private key will be the enabler on the local machine to get access to the remote machine. 4. Copy all of the contents in the Public key field by first clicking and dragging to highlight the contents of the window and then press Ctrl+C (or right-click and Copy). We will place it on Remote Machine B such that when Local Machine A tries to gain access to Remote Machine B, it is granted without being prompted for a password. 6

11 Creating Passwordless Entry to Remote Machine B using RSA Keys 7

12 Setting up a Windows-to-Linux Compute Resource Copy Public Key to Remote Machine B Remote Machine B 1. If the remote session established in step 3 in Testing the Connection between Machines is still up, continue to the next step. If not, please follow all of the steps in Testing the Connection between Machines to establish a remote session on remote Machine B. 2. Using the text editor vi, create a temporary file to store your public key by using the command: vipubkey 3. Enter the interactive mode in vi using the i key. Right-click in the window. This should copy the contents of the clipboard (the public key) into the vi window. The editor should look similar to the window below: 4. Exit interactive mode by pressing the Esc key. 5. Save and quit vi by typing: :wq 6. Append the contents of the temporary file to your authorized keys file and remove the temporary file by using the commands: catpubkey>>.ssh/authorized_keys rm f pubkey 7. Close the PuTTY session by issuing the command: exit 8. Close the PuTTYKey Generator. 8

13 Creating Passwordless Entry to Remote Machine B using RSA Keys Enable and Test Passwordless Access with Pageant on Local Machine A: Local Machine A 1. On Local Machine A, open Pageant (Start->All Programs->PuTTY->Pageant). Pageant is a PuTTY SSH authentication agent. Pageant becomes active in the Windows Notification Area in the bottom right-hand corner of your screen. Right-click and choose Add Key. Pageant Icon 2. Navigate to the private key that you saved in PuTTYgen (step 3in Create Private and Public Keys on Local Machine A)and click Open. 3. On Local Machine A, close and reopen PuTTY and log in to Remote Machine B as before. You will be prompted to enter a username but you should be able to log in without the need for a password. If successful, this indicates that the SSH Server-Client relationship is established and the RSA keys are working as intended. If unsuccessful, then passwordless entry will not work and you should review the steps above.heeds will not be able to communicate effectively with Remote Machine B if unsuccessful. 9

14 Setting up a Windows-to-Linux Compute Resource Setting up Remote Execution in HEEDS Up to this point, you have created a communication protocol between a Windows workstation and a Linux machine and allowed proper passwordless authentication. Now, you need to instruct HEEDS how to make use of this information via a compute resource to perform design studies. Local Machine A Creating a Remote Profile A remote profile provides HEEDS the information it needs to connect to a remote machine. In defining a Remote Profile you will provide HEEDS with the necessary information for data transfer to Remote Machine B. 1. Open HEEDS on Local Machine A and navigate to File->Options->Remote Profiles. Click the +button to add a new Remote Profile. Change the name of the profile to something relevant (using your username and the machine name of Remote Machine B is a good practice). Remote profiles 2. Next, fill in the relevant information for the newly created Remote Profile as described below: a. In the remote host name and remote user name fields, you should fill in the information used to login to Remote Machine B. b. Choose Specify remote location to store study data. This is where HEEDS will copy the study data in order to execute analyses on the remote machine. If you have a shared drive between the two machines, choose Uses shared drive resource to access local study data. c. Next, you will define the SSH command field. This field will be populated with a utility that comes with the HEEDS and newer installers. In the image below, %HEEDSVersion% would be replaced with your HEEDS version (i.e., Ver ) and %PLATFORM% with version of Windows (i.e. Win64). Alternatively, you can navigate to the appropriate location and select the plink.bat file provided. d. Lastly, you should fill in the proper SCP command, which points to the pscp.exe file found in the install location of PuTTY. 10

15 Setting up Remote Execution in HEEDS This completes the definition of the Remote Profile so that HEEDS can access Remote Machine B, copy relevant files, execute analysis tools, and copy results back to Local Machine A, making use of PuTTY and Pageant on Local Machine A and an SSH server on Remote Machine B. The last step is to tell HEEDS how jobs should be executed on Remote Machine B (the Linux machine). If Remote Machine B is a workstation, HEEDS can execute processes directly. If the machine is a cluster, HEEDS can integrate with various queuing systems to submit jobs to a queue, monitor their progress, and check for their completion. The next section is broken into three parts based on the execution method. Using Direct Submission for a Compute Resource Direct submission should be used if the compute resource does not have or require a scheduler (queuing system). This scenario treats Remote Machine B as a secondary Linux workstation 1. Create a compute resource for Remote Machine B. In HEEDS, navigate to File->Options->Compute Resources. Click + and add a Direct Cluster compute resource. Name the compute resource using the machine name and method as shown below: 2. Check the box for Remote Execution and select the remote profile created in the previous section. That completes the setup of the compute resource for Remote Machine B. The next portion describes how to use the compute resource for an analysis in a HEEDS process. 3. In the Analysis details, select the Compute resource from the list as shown: 11

16 Setting up a Windows-to-Linux Compute Resource 4. Enter the execution command keeping in mind that it will be executed in the Linux environment and should use Linux path separators (forward slashes) and Linux commands and syntax. The example shown previously uses the cp command to copy the input file to the output file. Note: The example shown will operate serially, but can easily be extended to run in parallel by increasing the Num. designs to execute simultaneously value. 5. A completion check must be defined for remote execution processes. For the example execution command, the completion check is successful if the output file exists: Once the study is started, HEEDS will use PuTTY and its utilities to move the input files to the remote machine, execute the process, check completion, and copy the output files back to Local Machine A. 12

17 Setting up Remote Execution in HEEDS Using a Scheduled Cluster with PBS Professional for a Compute Resource If your queuing system is PBS Pro, then the steps below should be utilized to integrate HEEDS MDO with your scheduler via a compute resource. 1. Create a compute resource for Remote Machine B. In HEEDS, navigate to File->Options->Compute Resources. Click + and add a Scheduled Cluster compute resource. Name the compute resource using the machine name and method as shown below: 2. Fill in the relevant information for the compute resource as described below. There are two main ways to check completion of a job using a queuing system. The first is to check for the job ID in the list of queued and running jobs. The second is to check the existence of an output file. As the second method is nonunique to scheduled clusters, it will not be described here. a. Check the box for remote execution and select the remote profile created above. b. Enter the job submit command (for PBS, this is qsub) and the command flag to set the job name (for PBS, this is N). Alternatively, you can select PBS Commands Only from the Pre-Defined Commands menu to use the most common options. c. Enter a prefix to use in the job name. This should be a short set of characters that can be used to easily identify jobs submitted by HEEDS. d. If using the queue status to check for job completion, check the box for Read Job ID. Enter any string that prepend or append the job ID that is returned upon job submission, so that HEEDS can store them and extract the job ID using qstat. In the example below, when a job is submitted to the queueing software the return value is ID.I96. For example, if the ID was 1234 what would be returned is 1234.I96. e. If using the queue status to check for job completion, define the Default Finished Condition using the command qstat for PBS and select Job ID for how the job is found. 13

18 Setting up a Windows-to-Linux Compute Resource That completes the setup of the compute resource for Remote Machine B. The next portion describes how to use the compute resource for an analysis in a HEEDS process. 3. In the Analysis details, select the Compute Resource from the list as shown: 4. Enter the command that will be executed by the queuing system. Typically this is a script that sets up the run environment, chooses the compute nodes to run on, and executes the analysis process. Ensure that this script is chosen as an input file so that it is copied to the remote machine. Many times this script will call a script generated by HEEDS to update the analysis with new parameter values and extract the appropriate responses. For example, STAR-CCM+ analyses will typically use the updatestarccmmodel.java file as shown below: 5. Define a completion check for the analysis. If using the queue status as a completion check, it will default to the command specified in the Compute Resource defined previously. 6. Note that the maximum execution time set in the advanced section shown above will include both queued time and run time. Once the study is started, HEEDS will use PuTTY and its utilities to move the input files to the remote machine, submit the job to the queue, check completion, and copy the output files back to Local Machine A. 14

19 Setting up Remote Execution in HEEDS Using a Scheduled Cluster with LSF for a Compute Resource If your queuing system is LSF, then the steps below should be utilized to integrate HEEDS MDO with your scheduler via a compute resource. 1. Create a compute resource for Remote Machine B. In HEEDS, navigate to File->Options->Compute Resources. Click + and add a Scheduled Cluster compute resource. Name the compute resource using the machine name and method as shown below: 2. Fill in the relevant information for the compute resource as described and shown below. There are two main ways to check completion of a job using a queuing system. The first is to check for the job ID in the list of queued and running jobs. The second is to check the existence of an output file. As the second method is non-unique to scheduled clusters, it will not be described here. a. Check the box for remote execution and select the remote profile created above. b. Enter the job submit command (for LSF, this is bsub) and the command flag to set the job name (for LSF, this is J). Alternatively, you can select LSF Commands Only from the Pre-Defined Commands menu to use the most common options. c. Enter a prefix to use in the job name. This should be a short set of characters that can be used to easily identify jobs submitted by HEEDS. d. If using the queue status to check for job completion, check the box for Read Job ID. Enter any string that prepend or append the job ID that is returned upon job submission, so that HEEDS can store them and extract the job ID using bjobs. In the example below, when a job is submitted to the queueing software the return value is ID.I96. So for example if the ID was 1234 what would be returned is 1234.I96. e. If using the queue status to check for job completion, define the Default Finished Condition using the command bjobs -w for LSF and select Job ID for how the job is found. 15

20 Setting up a Windows-to-Linux Compute Resource That completes the setup of the compute resource for Remote Machine B. The next portion describes how to use the compute resource for an analysis in a HEEDS process. 3. In the Analysis details, select the Compute resource from the list as shown: 4. Enter the command that will be executed by the queuing system. Typically this is a script that sets up the run environment, chooses the compute nodes to run on, and executes the analysis process. Ensure that this script is chosen as an input file so that it is copied to the remote machine. Many times this script will call a script generated by HEEDS to update the analysis with new parameter values and extract the appropriate responses. 5. Define a completion check for the analysis. If using the queue status as a completion check, it will default to the command specified in the Compute Resource defined previously. 6. Note that the maximum execution time set in the advanced section shown above will include both queued time and run time. Once the study is started, HEEDS will use PuTTY and its utilities to move the input files to the remote machine, submit the job to the queue, check completion, and copy the output files back to Local Machine A. 16

21 Notes Notes While this process only needs to be setup one time, you will need to re-host the private key in Pageant if the Local Machine A is restarted. It is good practice to ensure the key is being hosted before beginning a study. If the key is not hosted and Pageant is not running, HEEDS will not be able to establish a password less connection to the remote machine. 17

22 Setting up a Windows-to-Linux Compute Resource Troubleshooting SSH Doesn t Connect to Remote Machine This section is applicable if you are not able to login to your remote machine. 1. Ensure that you are using the fully qualified domain name. For example, if the hostname is machinea, trying using machinea.city.company.com (using your company s format as appropriate). The command ping is useful for diagnosing this as shown below for a success ping of Red Cedar Technology s external website: 2. If you are still unable to connect, try temporarily disabling the firewall on both machines. If connections are possible without the firewall, this means the inbound and outbound exceptions for ssh were setup incorrectly. Passwordless Connection is Unsuccessful Read this section if you have followed the instructions in the sections above and you are still being prompted for a password when trying to ssh to the remote machine. The issue is most likely in the setup of the authorized_keys file. 1. If using PuTTY and Pageant, ensure that the RSA key was copied and uploaded to the authorized_keys file successfully. Do this by ensuring the RSA key is written on a single line by itself, that it begins with ssh-rsa and that it matches the values found in PuTTY when creating the key. 2. Once this is verified, the next step is to ensure that you are the owner of this file. First log in to the Remote Machine B using PuTTY and your password Navigate to the.ssh folder with the command cd ~/.ssh Enter the command ls l to view the permissions and the ownership information (the l in the command is a lowercase L) 3. Finally, ensure that the file permissions are set to read and write for the owner only. On the same window you used for Step 2, enter the command ls l (the l here is a lowercase L) to view permissions and ownership. The above screenshot shows the files in the current folder. The filenames are found in the last column. The file, authorized_keys, is the first row. The first column of data corresponds to the permissions of the file and 18

23 Troubleshooting the second its ownership. The current permissions are set to none, as denoted by the The correct permissions are -rw To update the permissions, enter the command chmod 600 authorized_keys. The above screenshot shows permissions changed to both read and write, denoted by the -rw Next, column 2 shows that current ownership of the file belongs to Administrators. This ownership needs to match the username defined in HEEDS to access Remote Machine B. In this instance, the username is Tester. To change ownership, enter the command chown %username% authorized_keys. Where %username% corresponds to the username, in this instance Tester. Now column 2 shows correct ownership and permissions to access the authorized_keys file. Ensure these steps are done on.ssh folder as well. The user should now be able to log back in through PuTTY without using their password. Errors Writing Files on Remote Machine This section is applicable when files are not successfully copied to the remote machine. 1. Ensure the drive selections in the remote profile are correctly defined. If a project is one a shared drive and the profile definition specifies a remote drive, HEEDS will write the updated files but they will be empty. This will cause the analysis to fail with empty input files. 2. If using a remote drive, ensure the host location path exists, is correct, and does not end with a / if using Linux. 3. Ensure permissions are appropriate on the remote directory to allow files and directories to be created. Errors Executing Commands on Remote Machine This section is applicable when files are able to be copied to the remote machine, but errors occur when executing the analysis commands successfully. When this occurs, the Tool Output message will contain only output from HEEDS and not any output from the analysis tool. 19

24 Setting up a Windows-to-Linux Compute Resource 1. Try disabling Capture output from utilities which is located in the Run Options. If this solves the issue, but the user would like this output to be captured, the default login shell for the remote machine should be changed using the chsh command to bash or csh. 2. Occasionally the environment that HEEDS sees can be different from that seen when logged in manually to the remote machine. The main results of this can be a lack of properly defined environment variables. To remedy this, modify the execution command to set the variables needed before the execution command. For example, in bash, the following could be used: export SGE_ROOT="/opt/sge"; echo $SGE_ROOT; /submit.sh where the missing environment variable is SGE_ROOT which is needed by a command within the submit.sh script. 20

25 Example Study Example Study In the above example, both NX CAD (from Siemens PLM) and GT-Power (from Gamma Technologies, Inc.) are executed on Local Machine A. ANSYS Mechanical (from Ansys Inc.), Abaqus (from DassaultSimulia), STAR-CCM+ (from CD-adapco), and JMAG (from JSOL) are all solved remotely on Remote Machine B. This is denoted by the image seen in the top right hand corner of an analysis. This icon depicts the use of a direct cluster. Note that scheduled clusters could be substituted for this example. The execution order is broken down further in the table below. HEEDS Example Study Execution Execution Order Analysis Tool Compute Resource 1 NX CAD Local Machine A 2 ANSYS Remote Machine B 3 Abaqus Remote Machine B 4 STAR-CCM+ Remote Machine B 5 JMAG Remote Machine B 6 GT-Power Local Machine A 21

26 Setting up a Windows-to-Linux Compute Resource This software and related documentation are proprietary to Siemens Product Lifecycle Management Software Inc Siemens Product Lifecycle Management Software Inc. Siemens and the Siemens logo are registered trademarks of Siemens AG. NX, Solid Edge, and Teamcenter are trademarks or registered trademarks of Siemens Product Lifecycle Management Software Inc. or their subsidiaries in the United States and in other countries. All other trademarks, registered trademarks, or service marks belong to their respective holders. 22

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource.

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Windows Compute Resource. Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Windows Compute Resource www.redcedartech.com. Setting up a Windows-to-Windows Compute Resource Contents Introduction 1 On Remote Machine

More information

LAB :: Secure SHell (SSL)

LAB :: Secure SHell (SSL) LAB :: Secure SHell (SSL) In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. X replace with your group no. Username apnic and password training

More information

Setting up a Chaincoin Masternode

Setting up a Chaincoin Masternode Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version

More information

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs

FEPS. SSH Access with Two-Factor Authentication. RSA Key-pairs FEPS SSH Access with Two-Factor Authentication RSA Key-pairs access.eps.surrey.ac.uk Contents: Introduction - 3 RSA Key-pairs - 3 Where can I use my RSA Key-Pair? - 3 Step 1 Prepare to generate your RSA

More information

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation

Agent and Agent Browser. Updated Friday, January 26, Autotask Corporation Agent and Agent Browser Updated Friday, January 26, 2018 2018 Autotask Corporation Table of Contents Table of Contents 2 The AEM Agent and Agent Browser 3 AEM Agent 5 Privacy Mode 9 Agent Browser 11 Agent

More information

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Adobe Marketing Using FTP and sftp with the Adobe Marketing Contents Using FTP and sftp with the Adobe Marketing...3 Setting Up FTP Accounts Hosted by Adobe...3 Classifications...3 Data Sources...4 Data

More information

ssh and handson Matsuzaki maz Yoshinobu 1

ssh and handson Matsuzaki maz Yoshinobu  1 ssh and handson Matsuzaki maz Yoshinobu maz@iij.ad.jp 1 Secure Shell (ssh) Replacement for unsecure tools/protocols rsh and telnet Usually listen on tcp/22 Whole communication is encrypted

More information

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version... Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing

More information

Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility

Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility Introduction to Linux Workshop 2 The George Washington University SEAS Computing Facility Course Goals SSH and communicating with other machines Public/Private key generation,.ssh directory, and the config

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

Supercomputing environment TMA4280 Introduction to Supercomputing

Supercomputing environment TMA4280 Introduction to Supercomputing Supercomputing environment TMA4280 Introduction to Supercomputing NTNU, IMF February 21. 2018 1 Supercomputing environment Supercomputers use UNIX-type operating systems. Predominantly Linux. Using a shell

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

Teamcenter Appearance Configuration Guide. Publication Number PLM00021 J

Teamcenter Appearance Configuration Guide. Publication Number PLM00021 J Teamcenter 10.1 Appearance Configuration Guide Publication Number PLM00021 J Proprietary and restricted rights notice This software and related documentation are proprietary to Siemens Product Lifecycle

More information

Bitnami Apache Solr for Huawei Enterprise Cloud

Bitnami Apache Solr for Huawei Enterprise Cloud Bitnami Apache Solr for Huawei Enterprise Cloud Description Apache Solr is an open source enterprise search platform from the Apache Lucene project. It includes powerful full-text search, highlighting,

More information

UoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011)

UoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011) UoW HPC Quick Start Information Technology Services University of Wollongong ( Last updated on October 10, 2011) 1 Contents 1 Logging into the HPC Cluster 3 1.1 From within the UoW campus.......................

More information

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2 Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working

More information

Configuring SSH Public Key Authentication

Configuring SSH Public Key Authentication 6AOSCG0060-29A January 2014 Configuration Guide Configuring SSH Public Key Authentication This guide describes how to configure and use Secure Shell (SSH) public key authentication on products running

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

Setting up my Dev Environment ECS 030

Setting up my Dev Environment ECS 030 Setting up my Dev Environment ECS 030 1 Command for SSHing into a CSIF Machine If you already have a terminal and already have a working ssh program (That is, you type ssh into the terminal and it doesn

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

High-Performance Reservoir Risk Assessment (Jacta Cluster)

High-Performance Reservoir Risk Assessment (Jacta Cluster) High-Performance Reservoir Risk Assessment (Jacta Cluster) SKUA 2009.3 and GOCAD 2009.3 Rock & Fluid Canvas 2009 Epos 4.0 Rollup 3 Configuration Guide 2008 2010 Paradigm Ltd. or its affiliates and subsidiaries.

More information

Parallel Programming Pre-Assignment. Setting up the Software Environment

Parallel Programming Pre-Assignment. Setting up the Software Environment Parallel Programming Pre-Assignment Setting up the Software Environment Authors: B. Wilkinson and C. Ferner. Modification date: Aug 21, 2014 (Minor correction Aug 27, 2014.) Software The purpose of this

More information

Teamcenter NX Remote Manager Guide. Publication Number PLM00123 G

Teamcenter NX Remote Manager Guide. Publication Number PLM00123 G Teamcenter 10.1 NX Remote Manager Guide Publication Number PLM00123 G Proprietary and restricted rights notice This software and related documentation are proprietary to Siemens Product Lifecycle Management

More information

New User Tutorial. OSU High Performance Computing Center

New User Tutorial. OSU High Performance Computing Center New User Tutorial OSU High Performance Computing Center TABLE OF CONTENTS Logging In... 3-5 Windows... 3-4 Linux... 4 Mac... 4-5 Changing Password... 5 Using Linux Commands... 6 File Systems... 7 File

More information

15-122: Principles of Imperative Computation

15-122: Principles of Imperative Computation 15-122: Principles of Imperative Computation Lab 0 Navigating your account in Linux Tom Cortina, Rob Simmons Unlike typical graphical interfaces for operating systems, here you are entering commands directly

More information

Using RDP with Azure Linux Virtual Machines

Using RDP with Azure Linux Virtual Machines Using RDP with Azure Linux Virtual Machines 1. Create a Linux Virtual Machine with Azure portal Create SSH key pair 1. Install Ubuntu Bash shell by downloading and running bash.exe file as administrator.

More information

Table of Contents. Table of Contents Job Manager for remote execution of QuantumATK scripts. A single remote machine

Table of Contents. Table of Contents Job Manager for remote execution of QuantumATK scripts. A single remote machine Table of Contents Table of Contents Job Manager for remote execution of QuantumATK scripts A single remote machine Settings Environment Resources Notifications Diagnostics Save and test the new machine

More information

IT Services Security. The Dark Arts Of SSH. Author: John Curran Version: 0.1

IT Services Security. The Dark Arts Of SSH. Author: John Curran Version: 0.1 IT Services Security The Dark Arts Of SSH Author: John Curran Version: 0.1 STATUS\ REVISION HISTORY Date Version Description 0.1-0.9 Review preparation 1.0 Presented to business & retained by Information

More information

Introduction: What is Unix?

Introduction: What is Unix? Introduction Introduction: What is Unix? An operating system Developed at AT&T Bell Labs in the 1960 s Command Line Interpreter GUIs (Window systems) are now available Introduction: Unix vs. Linux Unix

More information

curl Manager Manual Contents Intro

curl Manager Manual Contents Intro curl Manager Manual Contents Intro... 1 Creating and Changing Your Password... 2 Add a Known Host... 3 Remove a Known Host... 4 Figure Out What s in an Existing known_hosts File... 4 Export Known Hosts

More information

File transfer clients manual File Delivery Services

File transfer clients manual File Delivery Services File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse

More information

CENG 334 Computer Networks. Laboratory I Linux Tutorial

CENG 334 Computer Networks. Laboratory I Linux Tutorial CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction

More information

How to Back Up Linux/UNIX Data Using SSHFS

How to Back Up Linux/UNIX Data Using SSHFS The articles in this section refer to Barracuda Backup Legacy Release firmware or newer. Barracuda Backup uses the SSH Filesystem (SSHFS) and public key authentication to connect and back up Linux data.

More information

CS CS Tutorial 2 2 Winter 2018

CS CS Tutorial 2 2 Winter 2018 CS CS 230 - Tutorial 2 2 Winter 2018 Sections 1. Unix Basics and connecting to CS environment 2. MIPS Introduction & CS230 Interface 3. Connecting Remotely If you haven t set up a CS environment password,

More information

Learn more at solidthinking.com solidthinking, Inc. All Rights Reserved. All other trademarks are properties of their respective owners.

Learn more at solidthinking.com solidthinking, Inc. All Rights Reserved. All other trademarks are properties of their respective owners. Learn more at solidthinking.com 2016 solidthinking, Inc. All Rights Reserved. All other trademarks are properties of their respective owners. Table of Contents Chapter 1: Introduction...1 Installing...3

More information

Working with Basic Linux. Daniel Balagué

Working with Basic Linux. Daniel Balagué Working with Basic Linux Daniel Balagué How Linux Works? Everything in Linux is either a file or a process. A process is an executing program identified with a PID number. It runs in short or long duration

More information

Using a Linux System 6

Using a Linux System 6 Canaan User Guide Connecting to the Cluster 1 SSH (Secure Shell) 1 Starting an ssh session from a Mac or Linux system 1 Starting an ssh session from a Windows PC 1 Once you're connected... 1 Ending an

More information

Titan FTP Server SSH Host Key Authentication with SFTP

Titan FTP Server SSH Host Key Authentication with SFTP 2016 Titan FTP Server SSH Host Key Authentication with SFTP A guide for configuring and maintaining SSH Host Key Authentication for SFTP connections in Titan FTP Server. QuickStart Guide 2016 South River

More information

Machining Line Planner Help

Machining Line Planner Help Machining Line Planner Help Version #1 1 Machining Line Planner Help December 16, 2016 Version #1 NX Machining Line Planner (MLP)... 2 Typical workflow for a machining line process plan... 3 Typical workflow

More information

No More Passwords (with SSH)

No More Passwords (with SSH) No More Passwords (with SSH) Ted Dustman March 30, 2009 Contents 1 Introduction 1 1.1 Local or Remote?................................. 1 1.2 SSH Command Set................................ 1 2 Authentication

More information

Exercise 1: Connecting to BW using ssh: NOTE: $ = command starts here, =means one space between words/characters.

Exercise 1: Connecting to BW using ssh: NOTE: $ = command starts here, =means one space between words/characters. Exercise 1: Connecting to BW using ssh: NOTE: $ = command starts here, =means one space between words/characters. Before you login to the Blue Waters system, make sure you have the following information

More information

Automic Agent Deployment and Upgrade Toolkit. How-To Documentation

Automic Agent Deployment and Upgrade Toolkit. How-To Documentation Automic Agent Deployment and Upgrade Toolkit How-To Documentation Table of Contents AUTOMIC AGENT DEPLOYMENT AND UPGRADE TOOLKIT... 4 Introduction... 4 Overview... 4 Benefits... 4 Compatibility... 5 Key

More information

More Raspian. An editor Configuration files Shell scripts Shell variables System admin

More Raspian. An editor Configuration files Shell scripts Shell variables System admin More Raspian An editor Configuration files Shell scripts Shell variables System admin Nano, a simple editor Nano does not require the mouse. You must use your keyboard to move around the file and make

More information

Remote Support Security Provider Integration: RADIUS Server

Remote Support Security Provider Integration: RADIUS Server Remote Support Security Provider Integration: RADIUS Server 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks

More information

RH033 Red Hat Linux Essentials

RH033 Red Hat Linux Essentials RH033 Red Hat Linux Essentials Version 3.5 QUESTION NO: 1 You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

Unit: Making a move (using FTP)

Unit: Making a move (using FTP) Data Introduction to Unix and HPC (HPC for Wimps) Unit: Making a move (using FTP) Goals: Can login via Secure FTP and see home directory. Can transfer a file from local machine via FTP to home directory.

More information

Introduction to Unix The Windows User perspective. Wes Frisby Kyle Horne Todd Johansen

Introduction to Unix The Windows User perspective. Wes Frisby Kyle Horne Todd Johansen Introduction to Unix The Windows User perspective Wes Frisby Kyle Horne Todd Johansen What is Unix? Portable, multi-tasking, and multi-user operating system Software development environment Hardware independent

More information

Session 1: Accessing MUGrid and Command Line Basics

Session 1: Accessing MUGrid and Command Line Basics Session 1: Accessing MUGrid and Command Line Basics Craig A. Struble, Ph.D. July 14, 2010 1 Introduction The Marquette University Grid (MUGrid) is a collection of dedicated and opportunistic resources

More information

Introduction. SSH Secure Shell Client 1

Introduction. SSH Secure Shell Client 1 SSH Secure Shell Client 1 Introduction An SSH Secure Shell Client is a piece of software that allows a user to do a number of functions. Some of these functions are: file transferring, setting permissions,

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System

More information

Introduction to Linux Workshop 1

Introduction to Linux Workshop 1 Introduction to Linux Workshop 1 The George Washington University SEAS Computing Facility Created by Jason Hurlburt, Hadi Mohammadi, Marco Suarez hurlburj@gwu.edu Logging In The lab computers will authenticate

More information

Learn more at solidthinking.com solidthinking, Inc. All Rights Reserved. All other trademarks are properties of their respective owners.

Learn more at solidthinking.com solidthinking, Inc. All Rights Reserved. All other trademarks are properties of their respective owners. Learn more at solidthinking.com 2016 solidthinking, Inc. All Rights Reserved. All other trademarks are properties of their respective owners. Contents 1 Introduction... 2 1.1 Installing Click2Extrude Polymer...3

More information

Quick Start Guide for Intel FPGA Development Tools on the Microsoft* Azure* Platform

Quick Start Guide for Intel FPGA Development Tools on the Microsoft* Azure* Platform Quick Start Guide for Intel FPGA Development Tools on the Microsoft* Azure* Platform Updated for Intel Quartus Prime Design Suite: 17.1 Subscribe Send Feedback Latest document on the web: PDF HTML Contents

More information

Setting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13.

Setting up PuTTY. Software* Download PuTTY 6/9/18. Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP 5.13. Software* Setting up PuTTY CTEC1767 Data Communications & Networking CTEC1863 Operating Systems CTEC1906 Internet Computing Microsoft Windows 7 (64-bit) PuTTY 0.70 (64-bit) PuTTYgen 0.70 (64-bit) WinSCP

More information

SAP Business One. User Guide. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

SAP Business One. User Guide. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 04 Date 2018-12-31 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Introduction to Cuda Visualization. Graphical Application Tunnelling on Palmetto

Introduction to Cuda Visualization. Graphical Application Tunnelling on Palmetto Introduction to Cuda Visualization The CUDA programming paradigm is NVidia's development tool which is used to enable advanced computer processing on their GPGPU (General Purpose graphics Processing Units)

More information

Precursor Steps & Storage Node

Precursor Steps & Storage Node Precursor Steps & Storage Node In a basic HPC cluster, the head node is the orchestration unit and possibly the login portal for your end users. It s one of the most essential pieces to get working appropriately.

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

KB How to upload large files to a JTAC Case

KB How to upload large files to a JTAC Case KB23337 - How to upload large files to a JTAC Case SUMMARY: This article explains how to attach/upload files larger than 10GB to a JTAC case. It also and describes what files can be attached/uploaded to

More information

1. INTRODUCTION to AURO Cloud Computing

1. INTRODUCTION to AURO Cloud Computing 1. INTRODUCTION to AURO Cloud Computing Welcome to AURO! The purpose of this document is to help you get started with using AURO s Public Cloud Compute. This document covers how to setup and launch a virtual

More information

Backup and Restore Technical Note

Backup and Restore Technical Note Technical Note VERSION: 1.0 UPDATED: July 2017 Copyright Notices Copyright 2002-2017 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Quick Start Guide. by Burak Himmetoglu. Supercomputing Consultant. Enterprise Technology Services & Center for Scientific Computing

Quick Start Guide. by Burak Himmetoglu. Supercomputing Consultant. Enterprise Technology Services & Center for Scientific Computing Quick Start Guide by Burak Himmetoglu Supercomputing Consultant Enterprise Technology Services & Center for Scientific Computing E-mail: bhimmetoglu@ucsb.edu Contents User access, logging in Linux/Unix

More information

Android Rep Console

Android Rep Console Android Rep Console 2.2.10 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective owners.

More information

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Cryptography Application : SSH. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh Cryptography Application : SSH Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [v.1] What is Safely Authentication I am Assured of Which Host I

More information

Logging in to the CRAY

Logging in to the CRAY Logging in to the CRAY 1. Open Terminal Cray Hostname: cray2.colostate.edu Cray IP address: 129.82.103.183 On a Mac 2. type ssh username@cray2.colostate.edu where username is your account name 3. enter

More information

FieldView. Management Suite

FieldView. Management Suite FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote

More information

Network Administration/System Administration (NTU CSIE, Spring 2018) Homework #1. Homework #1

Network Administration/System Administration (NTU CSIE, Spring 2018) Homework #1. Homework #1 Submission Homework #1 Due Time: 2018/3/11 (Sun.) 22:00 Contact TAs: vegetable@csie.ntu.edu.tw Compress all your files into a file named HW1_[studentID].zip (e.g. HW1_bxx902xxx.zip), which contains two

More information

RED IM Integration with Bomgar Privileged Access

RED IM Integration with Bomgar Privileged Access RED IM Integration with Bomgar Privileged Access 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the

More information

Using WestGrid from the desktop Oct on Access Grid

Using WestGrid from the desktop Oct on Access Grid Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you

More information

Application Notes for ALI Solutions OnQ with Avaya Proactive Contact 5.0 with CTI Issue 1.0

Application Notes for ALI Solutions OnQ with Avaya Proactive Contact 5.0 with CTI Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for ALI Solutions OnQ with Avaya Proactive Contact 5.0 with CTI Issue 1.0 Abstract These Application Notes describe the configuration steps

More information

Introduction to Linux Environment. Yun-Wen Chen

Introduction to Linux Environment. Yun-Wen Chen Introduction to Linux Environment Yun-Wen Chen 1 The Text (Command) Mode in Linux Environment 2 The Main Operating Systems We May Meet 1. Windows 2. Mac 3. Linux (Unix) 3 Windows Command Mode and DOS Type

More information

When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used:

When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used: Linux Tutorial How to read the examples When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used: $ application file.txt

More information

PARALLEL COMPUTING IN R USING WESTGRID CLUSTERS STATGEN GROUP MEETING 10/30/2017

PARALLEL COMPUTING IN R USING WESTGRID CLUSTERS STATGEN GROUP MEETING 10/30/2017 PARALLEL COMPUTING IN R USING WESTGRID CLUSTERS STATGEN GROUP MEETING 10/30/2017 PARALLEL COMPUTING Dataset 1 Processor Dataset 2 Dataset 3 Dataset 4 R script Processor Processor Processor WHAT IS ADVANCED

More information

Docker task in HPC Pack

Docker task in HPC Pack Docker task in HPC Pack We introduced docker task in HPC Pack 2016 Update1. To use this feature, set the environment variable CCP_DOCKER_IMAGE of a task so that it could be run in a docker container on

More information

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan

Cryptography Application : SSH. 7 Sept 2017, Taichung, Taiwan Cryptography Application : SSH 7 Sept 2017, Taichung, Taiwan What is Safely Authentication I am Assured of Which Host I am Talking With Authentication - The Host Knows Who I Am The Traffic is Encrypted

More information

NBIC TechTrack PBS Tutorial

NBIC TechTrack PBS Tutorial NBIC TechTrack PBS Tutorial by Marcel Kempenaar, NBIC Bioinformatics Research Support group, University Medical Center Groningen Visit our webpage at: http://www.nbic.nl/support/brs 1 NBIC PBS Tutorial

More information

CHE3935. Lecture 1. Introduction to Linux

CHE3935. Lecture 1. Introduction to Linux CHE3935 Lecture 1 Introduction to Linux 1 Logging In PuTTY is a free telnet/ssh client that can be run without installing it within Windows. It will only give you a terminal interface, but used with a

More information

MVAPICH MPI and Open MPI

MVAPICH MPI and Open MPI CHAPTER 6 The following sections appear in this chapter: Introduction, page 6-1 Initial Setup, page 6-2 Configure SSH, page 6-2 Edit Environment Variables, page 6-5 Perform MPI Bandwidth Test, page 6-8

More information

Quick Start Guide. by Burak Himmetoglu. Supercomputing Consultant. Enterprise Technology Services & Center for Scientific Computing

Quick Start Guide. by Burak Himmetoglu. Supercomputing Consultant. Enterprise Technology Services & Center for Scientific Computing Quick Start Guide by Burak Himmetoglu Supercomputing Consultant Enterprise Technology Services & Center for Scientific Computing E-mail: bhimmetoglu@ucsb.edu Linux/Unix basic commands Basic command structure:

More information

CSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2

CSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2 CSE Linux VM For Microsoft Windows Based on opensuse Leap 42.2 Dr. K. M. Flurchick February 2, 2017 Contents 1 Introduction 1 2 Requirements 1 3 Procedure 1 4 Usage 3 4.1 Start/Stop.................................................

More information

SoftPro 360 User Guide

SoftPro 360 User Guide SoftPro 360 User Guide March 8, 2016 4800 Falls of Neuse Road, Suite 400 Raleigh, NC 27609 p (800) 848 0143 f (919) 755 8350 www.softprocorp.com Copyright and Licensing Information Copyright 1987 2016

More information

Rabbit Linux Masternode with Windows Cold Wallet

Rabbit Linux Masternode with Windows Cold Wallet Rabbit Linux Masternode with Windows Cold Wallet This is the condensed version of the video showing how to install and set up a Linux VPS with Windows cold wallet setup for a Rabbit masternode. If you

More information

Security Provider Integration RADIUS Server

Security Provider Integration RADIUS Server Security Provider Integration RADIUS Server 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Microsoft Dynamics CRM Integration with Bomgar Remote Support

Microsoft Dynamics CRM Integration with Bomgar Remote Support Microsoft Dynamics CRM Integration with Bomgar Remote Support 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown

More information

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171

Key File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY

More information

(7) Get the total energy from the output (1 Hartree = kcal/mol) and label the structure with the energy.

(7) Get the total energy from the output (1 Hartree = kcal/mol) and label the structure with the energy. RUNNING GAUSSIAN ON THE RedHawk cluster computers: General Procedure: The general procedure is to prepare the input file on a PC using GausView, then transfer this file via WinSCP to the RedHawk cluster

More information

SIEMENS. Teamcenter 10.1 Systems Engineering and Requirements Management. MATLAB/Simulink Interface User's Manual REQ00007 L

SIEMENS. Teamcenter 10.1 Systems Engineering and Requirements Management. MATLAB/Simulink Interface User's Manual REQ00007 L SIEMENS Teamcenter 10.1 Systems Engineering and Requirements Management MATLAB/Simulink Interface User's Manual REQ00007 L Manual History Manual Revision Teamcenter Systems Engineering and Requirements

More information

SoftPro 360 User Guide

SoftPro 360 User Guide SoftPro 360 User Guide SoftPro 360 is included with your ProForm license. SoftPro 360 is a revolutionary product which enables requesting services and receiving orders from third party providers directly

More information

CounterACT Macintosh/Linux Property Scanner Plugin

CounterACT Macintosh/Linux Property Scanner Plugin CounterACT Macintosh/Linux Property Scanner Plugin Version 7.0.1 and Above Table of Contents About the Macintosh/Linux Property Scanner Plugin... 4 Requirements... 4 Supported Operating Systems... 4 Accessing

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Windows Authentication. Delphi Service Pack 3. Document Version /10/09

Windows Authentication. Delphi Service Pack 3. Document Version /10/09 Delphi 9.5.2 Service Pack 3 Document Version 1.0 11/10/09 Copyright 2009 Newmarket International, Inc. All rights reserved. The information in this document is confidential and proprietary to Newmarket

More information

CMSC 201 Spring 2018 Lab 01 Hello World

CMSC 201 Spring 2018 Lab 01 Hello World CMSC 201 Spring 2018 Lab 01 Hello World Assignment: Lab 01 Hello World Due Date: Sunday, February 4th by 8:59:59 PM Value: 10 points At UMBC, the GL system is designed to grant students the privileges

More information

Microsoft Dynamics CRM Integration with Remote Support

Microsoft Dynamics CRM Integration with Remote Support Microsoft Dynamics CRM Integration with Remote Support 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

BMC FootPrints 12 Integration with Remote Support

BMC FootPrints 12 Integration with Remote Support BMC FootPrints 12 Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are

More information

BPPM Patrol Agent Installation Steps on Linux and Automation Integration

BPPM Patrol Agent Installation Steps on Linux and Automation Integration BPPM Patrol Agent Installation Steps on Linux and Automation Integration Author: Karlis Peterson, Software Consultant, BMC Software Version: 1.0 Date: May 12, 2013 DISCLAIMER NOTICE This is Field Developed

More information