Friday, December 19, 2008

Handy Windows Commands

Hey Guys..let's look at some handy windows commands...
So many times we search for a particaular program in start menu, then try to locate it. But there are shortcuts for some programs which you can use to invoke these programs from RUN command..simply press the Windows key and R..and type the command and hit Enter...

 
The run option of Start menu is used to run a program or to open a document directly. If you 
Do not know the exact location of the program or document then click on Start button to open
Run and type the programs shortcut name to open it directly.

Run Commands

Appwiz.cpl -- Used to run Add/Remove wizard

Calc --Calculator

Cfgwiz32 --ISDN Configuration Wizard

Charmap --Character Map

Chkdisk --Repair damaged files 

Cleanmgr --Cleans up hard drives

Clipbrd --Windows Clipboard viewer

Control --Displays Control Panel

Cmd --Opens a new Command Window

Control mouse --Used to control mouse properties

Dcomcnfg --DCOM user security

Debug --Assembly language programming tool

Defrag --Defragmentation tool

Drwatson --Records programs crash & snapshots

Dxdiag --DirectX Diagnostic Utility

Explorer --Windows Explorer

Fontview --Graphical font viewer

Fsmgmt.msc -- Used to open shared folders

Firewall.cpl  -- Used to configure windows firewall

Ftp -FTP.exe program

Hostname --Returns Computer's name

Hdwwiz.cpl -- Used to run Add Hardware wizard

Ipconfig --Displays IP configuration for all network adapters

Logoff -- Used to logoff the computer

MMC --Microsoft Management Console

Msconfig --Configuration to edit startup files

Mstsc -- Used to access remote desktop

Mrc -- Malicious Software Removal Tool

Msinfo32 --Microsoft System Information Utility

Nbtstat --Displays stats and current connections using NetBIOS over TCP/IP

Netstat --Displays all active network connections

Nslookup--Returns your local DNS server

Osk ---Used to access on screen keyboard

Perfmon.msc -- Used to configure the performance of Monitor.

Ping --Sends data to a specified host/IP

Powercfg.cpl -- Used to configure power option

Regedit --Registry Editor

Regwiz -- Registration wizard

Sfc /scannow -- System File Checker

Sndrec32 --Sound Recorder

Shutdown -- Used to shutdown the windows

Spider -- Used to open spider solitaire card game

Sfc / scannow -- Used to run system file checker utility.

Sndvol32 --Volume control for soundcard

Sysedit -- Edit system startup files

Taskmgr --Task manager

Telephon.cpl -- Used to configure modem options.

Telnet --Telnet program

Tracert --Traces and displays all paths required to reach an Internet host

Winchat -- Used to chat with Microsoft

Wmplayer -- Used to run Windows Media player

Wab -- Used to open Windows address Book.

WinWord -- Used to open Microsoft word

Winipcfg --Displays IP configuration

Winver -- Used to check Windows Version

Wupdmgr --Takes you to Microsoft Windows Update

Write -- Used to open WordPad

P.S: This can also be used for handy reference.

Wednesday, December 10, 2008

BitTorrent: Unusual Guide

BitTorrent: Unusual Guide

Intro:

BitTorrent is a p2p system that distributes downloads among peer downloaders. When you are downloading, you are simultaneously uploading the same file to other users. 

The actual process of file transferring is decentralized. The Fundamental idea of BitTorrent is that users upload at the same time they are downloading. By doing so network bandwidth is used in an efficient manner. 

BitTorrent is designed to work better as the demand to download a specific file increases. Which is in direct contrast to WinMX and other p2p programs queue concept. The more that try to download a bittorrent at the same time the better. 

Unlike most other p2p models there is no search function for BitTorrent. To Download a file using bittorrent, you must find .torrent files from a variety of sources. These sources include websites, irc and even emailing torrent files from one person to another. 

There are central servers (tracker) which coordinates the action of all peers engaged in downloading. The tracker does not have any knowledge of content of files bittorrent users download, it only manages connections. Allowing a large quantity of downloaders with limited tracker bandwidth usage. 

BitTorrent is best understood by analogy. Visualize a group of people (BitTorrent users) sitting around a table (Tracker). Each person at the table can both talk and listen to any other person at the table. These people are each trying to get a complete copy of the book. 

Person 1 has pages 1-9, 35-46 and 88-100. 

Person 2 has 10,28-35,44-60 and 72 

Person 3 has 5-20 32-39, 80-92 

Person 4 has 9-27 and 58-73. 

Between them, they have every page except 74-87. So each user could continue to complete (Download) the book from each other, each one getting a page from the other, in exchange for a page they do not have. Until a time that another person shows up who has the missing 74-87, or even a person who has the entire book. In which the other users would each gather pages that were missing from the whole to distribute among themselves until every copy was complete. 

A user who has the entire "book" would be called a seed. A person with the entire file (seed) is required for the process to begin, but it is possible to have a distributed copy without having any single user possessing a complete copy as other users continue to share their partial long after there are no seeds in a swarm. 

It is always good to have a complete copy, but it is not vital.

Terms:

torrent
A small metadata file which contains information about the data you want to download, not the data itself. It is downloaded from a web site (BitTorrent file extension is .torrent) by clicking on a download link. It can also be saved to your computer. This is useful if you want to be able to re-open the torrent later on without having to find the link again. 

peer
A peer is another computer on the internet that is sharing the file you wish to download. Typically a peer does not have the complete file, if it did it would be called a seed. Peers are also called leeches, to distinguish them from those who have completed their download and continue to leave their BitTorrent Client running and act as a seed. 

seed
A computer that has a complete copy of the specific torrent you are downloading . Once your client finishes downloading, it will remain open until you click the Finish button. This is known as seeding. You can also start a BitTorrent Client with a complete file, and once BitTorrent has checked the file it will connect and seed the file to others. It is good to continue seeding a file after you have finished downloading, to help others finish. Also, when a new torrent is posted to a tracker, someone must seed it in order for it to be available to others. The tracker doesn't know anything of the actual contents of a file, so it's important to follow through and seed a file if you upload the torrent to a tracker. 

reseed
When there are zero seeds for a given torrent (and not enough peers to have a distributed copy), all the peers will get stuck with an incomplete file, since no one in the swarm has the missing pieces. When this happens, someone with a complete file (a seed) must connect to the swarm so that those missing pieces can be transferred. This is called reseeding. Usually a request for a reseed comes with an implicit promise that the requester will leave his or her client open for some time period after finishing (to add longevity to the torrent). 

distributed copies
In some versions of the client, you will see "Connected to x seeds; also seeing x.xxx distributed copies." A seed is a computer with the complete file. However, the swarm can collectively have a complete copy (or copies) of the file, even without seeds a complete distributed copy can be available if the sum total of the users have a complete copy among themselves. BitTorrent doesn't distribute in sequential order, so this is possible. 

swarm
The group of users that are collectively connected for a particular file. Example, if you start a BitTorrent Client and it tells you that you're connected to 5 peers and 1 seeds, then the swarm consists of you and those 6 other people. 

tracker
Server on the Internet that coordinates the action of BitTorrent Clients. Upon opening a torrent, you contact the tracker and receive a list of peers to connect to. Throughout the transfer, your computer will query the tracker, telling it how much you've downloaded and uploaded and how much before finishing. If a tracker is down and you try to open a torrent, you will be unable to connect. If a tracker goes down during a torrent (you have already connected at some point and are already talking to peers), you will be able to continue transferring with those peers, but no new peers will be able to contact you. Tracker errors are often temporary, leave the client open and continue trying. 

share rating
A ratio of your amount uploaded divided by your amount downloaded. The amounts used are for the current session only, not over the history of the file. If you achieve a share ratio of 1.0, that would mean you've uploaded as much as you've downloaded. The higher the number, the more you have contributed. If you see a share ratio of this means infinity, which will happen if you open a BitTorrent Client with a complete file (i.e., you seed the file.) In this case you download nothing since you have the full file, and so anything you send will cause the ratio to reach infinity. While share ratings are just displayed for your convenience, courtesy to others should cause you to keep this ratio as high as possible. 

choked
When a connection is choked, it means that the transmitter isn't currently sending anything else on the link. A BitTorrent Client signals that it's choked to other clients for a number of reasons, the most common is that by default a client will only maintain --max_uploads active simultaneous uploads, the rest will be marked choked. A connection can also be choked for other reasons, for example a peer downloading from a seed will mark his connection as choked since the seed has no need to receive. 

optimistic unchoking
Periodically, the client shakes up the list of uploaders and tries sending on different connections that were previously choked, and choking the connections it was just using. You can observe this action every 10 or 20 seconds or so, by watching the "Advanced" panel of one of the experimental clients. 

interested
Term used in the protocol specification. refers to the state of a downloader with respect to a connection. A downloader is marked as interested if the other end of the link has any pieces that the client wants, otherwise the connection is marked as not interested. 

snubbed
If the client has not received anything after a certain period (default: 60 seconds), it marks a connection as snubbed, in that the peer on the other end has chosen not to send. See the definition of choked for reasons why an uploader might mark a connection as choked. The real function of keeping track of this variable is to improve download speeds. Occasionally the client will find itself in a state where even though it is connected to many peers, it is choked by all of them. The client uses the snubbed flag in an attempt to prevent this situation. It notes that a peer with whom it would like to trade pieces with has not sent anything in a while, and rather than leaving it up to the optimistic choking to eventually select that peer, it instead reserves one of its upload slots for sending to that peer. 

Readers, more to come onthe topic, keep visiting !!

Saturday, November 29, 2008

Mainframes : The Invincible Technology

It's long time I have not added anything to my blog...the reason is heavy work load...hey wait..just for change I will introduce You all a technology that is 30 years old and belive me it is the technology which is the backbone of today's  IT world..and coincidentelly it is the technology which is I am working on..
It is the evergreen techonology from IT pioneer IBM called "Mainframes"...Let me introduce you some concepts of mainframes...just read on...an enjoy the post...

Mainframes are basically computers with high data processing capability unlike super computers which focues on the speed of data processign mainframes deal with huge loads of data..You need to run a JOB to execute a peice of work and all jobs are batch processed..but there is room for user interactions in mainframes called ONLINE processing which responds to user's interaction immediately ..though mainframes executes online transaction in batch mode only ...This online mode of Maineframes is called CICS..so i will say something on CICS in this post...read on guys..this is very rare and important info for mainframe aspirants..as there is limited info avaialable on maiframes on Internet..It;s a long post...atke ur time and enjoy..

Repository: CICS

CCS: Customer Information System
Command Level Language
Online Programs
Multi Tasting
Multithreading

BMS is used for Develop screens


Basic Mapping Support (Assembler Maoro)

SDF is a tool used for developing screens

Screen Definition Facility

MAPSET 1-8 Alpha Numeric – MAPSET --- DFHMSD
MAP1
MAP2
MAP3 (Defined Field
Hierarchy Mapset Defination)
1-8 --------- MAP ------ DFHMDI


1-30 ------ FIELDS ---- DFHMDF


Text Fields Nonenterable

MAP is nothing but screen
MAP Consists of Fields (Protect & Un Protect)

Text Fields Variables


User id Source BMSMACRO (BMS001)


72

User Defined ` Operands Parameters 
Names
DEHMSD TYPE = MAP or DSECT or &SYSPARM X MODE = IN/OUT or INOUT X
MAPS 001(S) LANGUAGE = COBOL X
Mandotory CNTL=(FRSET, PRINT,FREEKB,ALARAM)

To release the lock for keyboard
or
To unlock Keyboard
TIOAPEX = YES 

Terminal Inputoutput Area prefix – Used to reserve 
12 bytes of storage for I/O commands


MAPS001 Compiler 
Customer Details

Cust.No. ------

Cust.Name -----


VARIABLES
MAP (object Prog) 
IOAFL Store in Load Stored in
Module Copy library
IOAFL as a member

Physical Map Symbolic Map
I = Input 
O=Output Used by end user Used by Appln Programmer
A=Attribute 
F=Field Stored in Loadlib Stored in Copylib 
L=Length

Parameter:-
In Symbolic Map each variable is divided into 5 parts like I,O,A,FL
Type = MAP ----- Generates Physical map
Type = DSECT --- Generates Symbolic Map
Type = &SYSPARM --- Generates both Physical & symbolic Map

1. Physical MAP:-

It is the actual output of Assembler Macro . i.e.object program which consists of text & variables

It will be copied to load module

Can be used by End user

2. Symbolic MAP:-

Which Consists of variable (5 Variables generated for variable)

Stored in copy library i.e. user defined PDS as separate member which must be copied into Application program.

Can be used by Application Programmer to receive or send data to the user or to chage field Attributes or to position the cursor at required location. 















MAPS00IS DFHMSD Type = MAP or DSECT or &SYSPARM, X
Mode = In/out or INOUT X
LAN = COBOL X
TIOAPFX = YES
CNTL = (FRSET,PRINT, FREEKB) X

MAP001M DFHMDI SIZE = (24,80) --- Default X
= (10,20)
10 = Rows, 20 = Cols.

DFHMDF Pos = (1,10) X
10= St Pos of Col, 1 = St pos of Row 
Initial = “ Customer Details) X
Length = 25

DFHMDF Pos = (2,10) X
Initial = “………………” X
Length = 25 X

DFHMDF Pos = (4,1) X
Initial = “Cust.No” X
Length = 8 X

Mcust No DFHMDF Pos = (4,11) X
ATTRB = (Unprotect / Protect,IC, Red,Drk,Skip,Fset) X

Input Cursor or 
Insert Cursor Color
Dark

To skip to next enterable field
PICIN = “9(S)” X
PICOUT = “Z(5)” X
Length = 16 X

DFHMDF Pos = (7,1) X
Initial = “Cust.Name” X
Length = 9 X

McustNam DFHMDF Pos = (7,12) X
PICIN = “x(10)” X
PICOUT = “x(10)” X
Attrb: (Unprotect/Red/Drk/Askip/FSET) X 










USERID SOURCE COPLIB (MCT001M)

01 MCNST001I

02 MCNST NO I PIC 9(5)

02 Filler PIC X(12) ---- For Commands

02 MCNST NO L PIC S9(4)Comp --- Automatically Generated by system

02 MCNST NO A PIC X(1)

02 MCNST NO F Redefines Mcnst No A PIC X(1)

02 MCNSTNAMI PIC X(10)

02 Filler PIC X(12)

02 MCNSTNAML PIC S9(4)Comp

02 MCNSTNAMA PIC X(1)

02 MCNSTNAMF Redefines McnstNam A PIC X(1)

01 Mcnst0010 Redefines MCnst001I

02 McnstNoo PIC Z(5)
02 McnstNamO PIC X(10)


WORKING ---- STORAGE SECTION

Copy MCT001M

STEPS TO WRITE ASSEMBLER MACRO:-

Create PDS & Member then code Assembler Macro by using DFHMSD, DFHMD1, DFHMDF

Compiler Assembelr Macro by using JCL or ISPF panel

Go to Spool by = S.ST find for syntax errors

Type F MNOTE in command prompt or ERROR if there are any syntax error



COMPILE


ASSEMBLE



LINK EDITORS 










Exec CICS

SEND TEXT

Form (“ Contact system Admin”) ……….. Like display “Contact system Admin”
Contact system Admin 











End - Exec

Exec CICS

Send Text

From (WS – MSG) using Variable instead of Static Text

End – Exec

Exec CICS

Send CICS COBOL

MAP(“Mcnst001M”) SEND DISPLAY
MAPset(“Mcnst001S”) RECEIVE ACCEPT

End – Exec

Exec CICS

Send Variables
MAP (WS-MAP)
MAP set (WS-MAPSET)

End – Exec

Exec CICS
Receive
MAP (WS-MAP)
MAP set (WS-MAPSET)

End – Exec
Customer Details

Cust.No. = 10

Cust.Name = XYZ



DB2 Normal Conversation


CUSTOMER DETAILS

Cust.No …………………..

Cust Name ……




…………. 




Pr Psendo Conversation 

Reinificati 
Termination Reinifiation


At the time of waiting for response, release the resources i.e. terminate the transaction or program (Connection).After receiving the response, reinitiate the transaction or program . This Conversion is called psendo conversion.

In system view, it is two step process
v 1. Termination
v 2. Reinitiation

In user view, it is only single step

Exec CICS

Return
TransID (“TO01”) User Defined

End – Exec

PSEVDO CONVERSATION:-


TRANS
TRO1

ONLINE SYSTEM 
MAP DisplayedNormal Conversation Psendo Conversation 

When message or Map sent to the terminal, transaction will be terminated & waiting for the users response.

After receiving response from the user reinitiate the transaction (acquirer all the resources)

In system view, multitasking

In user view, single task.

ADVANTAGES:-

Releases all the resources at the time of waiting for the users response

COMMUNICATION AREA:-

At the time of terminating the transaction, the working storage – section variables are stored into a variable declared in linkage section

This area is called communication area

It is global

The max six of this variable is 6JK.

(linkage Section)

01 DFHCOMMAREA PIC X (65,53J)

At the time of reinitiation the data is retrieve from the variable

Communication Area can be used to pass the data from on transaction to another.

For the first entry of transaction the Communication Area is empty

For next entry, it must not be zero.

PROCE4DURE DIVISION

If EIBCALEN = 0 To check the length of Communication Area, it is zero for first entry, non zero 
For next entry.
Exec CICS

Send
MAP (MAPNAME)

MAPSET (MAPSET)
End – exec
Exec CICS

Return
Transid (“TR01”)
End-Exec
Else
Exec CICS
Receive MAP (MAPNAME)
MAPSET (MAPSET)
End – Exec

End-it
Cust.No. …….
Cust Name ……..
Message: ………

Enter F2 F3 F4If EIBCALEN = 0

Exec CICS
Send
MAP(MAPNAME)
MAPSET(MAPSETNAME)
End – Exec

Exec CICS Functionlays
Return 
Transid)”TR01”) Stored
EIBAID
End – Exec.

End – If DFHAID Attention Identifers
(F1 –F24)
Perform Receive- Map – Para three Receive – Map – Exit
Perform Function – Keys – Para three Function – Keys – Exit
Receive – Map – Para

Exec CICS

Receive
MAP(MAPNAME) Copy DFHAID in WS - Section
MAPSET(MAPSETNAME)
End – Exec 01 EIBAID PIC X(4)
88 DFHPF1 Value “F1”
Receive – Map – Exit 88 DFHPF2 Value “F2”
88 DFHEnter Value “Enter” Exit

Function – Keys – Para

Evaluate EIBAID
When DFHEnter 88 DFHPF24 Value “F24”

Perform validation – logic three validation – logic – exit
When DFHPF3

Pefrom Exit – logic three exit – logic –Exit
When DFHPF10

Perform Insert – logic three Insert – logic – Exit

When DFHPF11

Perform update – logic three update – logic – Exit
When Other

Perform Invalid – Key three Invalid – Key – Exit

End – Evaluate



Function – keys – exit In map
1 line --- Header
Exit 23line --- Messages
24 or last --- Footer
Validation – logic

If McnstNoI = Zeroes
Move “Invalid cust. No.” to MMESGO
Exec CICS Move - 1 to McnstNol – Dynomic way to position the cursor
Send
MAP (MAP NAME)
MAPSET(MAPSETNAME)

End – Exec

Exec CICS To Dynamically position the 
cursor
Return 1. Move – 1 to Mcnst NoL
Transid(“TR01”) i.e. Lengthfield
2. Send
End – Exec Map (…………….)
End if Map (…………….)
Cursor (200) relative
If Mcnst NoI No is not Numeric cursor position

Move Spaces to MMESGO
Move “Must be Numeric” to MMESGO

Move - 1 to Mcnst NoL
Exec CICS
Send
MAP (MAPNAME)
MAPSET(MAPSETNAME)
End –exec

Exec CICS Send Para

Return

Transid(“TR01”)
End – Exec
End if
If Mcnst NoI (1:1) < > 1
Move Spaces To MMESGO
Move “First digit Must be 1” to MMESGO
Move – 1 To McnstNoL
Exec CICS
Send
MAP(MAPNAME)
MAPSET(MAPSET NAME)
End – Exec
Exec CICS
Return
Transid (“TR01”)
End-Exec End-If
Move McnstNoI to (DFHCommArea(1:5)) Ws-Cust-No

If McnstNamI = Spaces

Move “Invalid Name” to MMESGO
Move – 1 toMcnstNamL
Perform Send – Para

End If

Move McnstNamI to(DFHCommArea(6:10)) Ws-Cust-Name

Move Ws-Comm-area to DFHcommArea


CURSOR TECHINQUES:-



Three Types of Cursor techniques

(i) Static –By specifying i.e in Assembler macro, Cursor can be positioned at
required field.

(ii) Dynamic Cursor position –Dynamically cursor can be positioned by assigning - 1 to the length field from symbolic map.This technique is used in application program more frquently

Eg:- Involid Data validation or to jump from one field to another field

(iii) Relative cursor position – Cursor can be positioned at required location by specifying relative position relative to zero in the Cursor option with send map command.



DFH Comm Area:


System defined global variable which must be declared in linkage section with 01 level no

Which can be used to pass the data from on program to another program, on transaction to another transaction.

Max size area for DFH Comm Area is 65Kbytes


PROCEDURE DIVISION :-


Move Spaces to DFH Comm Area
I nitialise DFH Comm Area ----- Aliphanumaric, Numaeric

To transfer the control from one program to another

We use XCIL

Exec CICS

XCTL
Program (“CICSOOL”)
CommArea(DFHcommArea)
Length (Comm-Length)

End- Exec

We can use link to transfer the control

The diff between XCTL &LINK is when we use XCTL the control is not Expected to back to the screen but when we use link it will expect that the control will back

Exec CICS

LINK

Program(“CICS001”)
CommAre(DFHCommArea)
Length(Comm – length)

End Exec

If we use F8 Key Page up & F9 for Page down, data is to be transferred from database to screen.But we use temp area for storing this info.this is call queene

01 Ws-Comm-Area

02 Transfer - data

03 CustNo. PIC 9(5)

02 Save – data

03 CustNo. PIC 9(5)
03 CustName PIC X(20)

02 Multiple – rows
03 Ws-data PIC X(5) access 1,00,000times

LINK:-

Which can be used to transfer the control from one prog to another prog
Control is expected back to original prog.(no need of explicit CICS command to transfer back)
Ef:- Validations

Socket programming
Complex business functionalities

XCTL:-


Which can be used to transfer the control from one prog. To another Prog.
Control is not expected back to original prog
To get the control back to main prog XCITL command must be used in sub program

Eg:- Transfering the control from main menu (prog) to sub prog or subprog to main menu(Prog)


Link --- to lower level
XCTL --- to same level
Return --- to Higher level


MOVE 30 TO WS_TSO_LEN

Exec CICS Ws - Section
01 Ws -TSQ - AREA
Write Ts 02 Ws –TSQ-CusfNo Pic 59(5)
QUEUE(“TS001”) 02 Ws- TSQ – CustName Pic X(10)
From (Ws-TSQ-AREA) 02 Ws-TSQ – CustLoc Pic X(10)
LENGTH (Ws-TSQ-LEN) 01 Ws-TSQ-LEN Pic 59(4) comp
ITEM(Ws-TSQ-Item)
Main/Aux 
If we want to define that Quene auxiliary memory.We have to define Quene id TST table it is CICS supplied table.


End-Exec

Add + 1 to Ws-TSQ-Item

To define queid in TST exate member &write the following assembler maoro.

USEID SOURCE DFHTST (TS0001)

DFHTST Type = “Queue” TST = Temporary Storage Table

QueID = “TS001”

TO Retrieve the data from queue to structure:-

Move +1 to Ws-TSQ-ITEM
Perform until Qzero (End of Queue)

Exec CICS

ReadQ TS
QUEUE (“TS001”)
Into(Ws-TSQ-AREA)
Length(Ws-TSQ-LEN)
Item(Ws-TSQ-Item)

End – Exec

Add +1 to Ws – TSQ – Item
End – Perform

Response Code:- To find the end of the queue

Deleting the Queue:

Exec CICS
DeleteQTS We cannot delete single row in queue
QUEUE(“TS001”) When we apply delete command the queue
End - Exec becomes empty
Queue is global

Up dating The Queue:-

Exec CICS

RewriteQts
From (Ws-TSQ-Area)
Queue(“TS001”)
Length(Ws-TSQ-Len)
Item(Ws-TSQ-Item)

End – Exec

TSQ:- Temporary storage queue

Which is similar to physical sequential file
Records entered in entry – sequential order with relative record number
Records can be sequentially or Random by using item number which must be defined in Working – Storage Section as separate field
The Queue name must be user defined i.e. 1-8 Alph numeric characters must be unique in system
TSQ can be storage in main memory or Auxiliary memory (QueueID or Queue Name must be defined in TST(Temp Storage Table) which is CICS supplied table
TSQ can be used to pass the data within CICS
TSQ can be used to reduce no. of DB2 calls & improve program efficiency
TSQ can be used for page up, Page down logic
TSQ can be used for reporting printing online
Entire TSQ data can be deleted by using delete command (No specific row deletion)


TDQ:- Transient Data Queue

Used to pass the data from one CICI to another CICS region
Used to pass the data from CICS to Batch Program






TDQ



Intra Partition Extra Partition CICS to CICS region CICS to Batch Delete, Write Delete Write Apply

While using TSQ, we can read the records any no of times
While using TDQ, multiple read against TSQ is not possible
Read is destructive i.e. when we read the queue the data is lost
Updation is not possible
Delete can apply to intra partition but not to extra position.

TDQ can be stored in main or auziliary.

If we store in Auxiliary we need to define

Queue ID DCT Table (Destination Control Table)


DFHDCT Type = QUEUF
Type = Intra/ Extra
Queid = “TD001”
Trigerleve = 1000
Program = Cobol


01 Ws-Hd

02 Ws – Sub – He – 1 PIC X(100) value “Customer Details”
02 Ws – Sub – He – 2 PIC X (100) value “Page No”

01 Ws-line PIC X(100) value A;;” ---“

PROCEDURE DIVISION

WRITE Cust - Rep from Ws-Sub-He-1
WRITE Cust - Rep from Ws-Line
WRITE Cust – Rep from Ws-Sub – He – 2


TSQ TDQ

Records entered in entry Sep. order Records entered in entry sep.order with
With relative record number out relative record number

Multiple read commands can be applied Only one read command can be applied
Against rows against rows (Read is destructive)
Records can be accessed Sepertially Only sequential access
Or random

Queue must be defined in TST if the Queue must be defined m DCT
Data store in auxiliary memory (Destination Control Table)

Can be used to pass the data from Can be used to pass data withinCICS
One prog to another within CICS region region or outside of CICS region like
Batch

Eg:- Report printing, Trigessing Batch Prog
Bb specifying Trigger level

Updation is passible Updation is not possible


CICS Supplied Tables

PCT -- Program control Table --- Transaction
PPJ -- Processing Prog Table -- Program / Mapsets
TCT – Terminal Control Table


DFHPCT TYPE = TRANSACTION
Transid = “TR01”
Program = “CICS001”
Program = “CICS002”




DFHPPT TYPE = Program Type = MAPSET
Program = “CICS001” MAPSET = Mcnstcol
TransID = “TR01” Tra

Friday, October 3, 2008

The touchless touch screen user interface


As much as I love the iPhone, I can’t stand getting fingerprints all over the phone’s beautiful glossy screen. So I was jazzed when the guys over at Norway’s Elliptic Labs let me know about their new touchless user interface technology.
This is breath taking invention, whereas Software Giant Microsoft is busy with its so called Surface Technology, this invention would distract them and they might have to reconsider their technology.
Just think, if a user can sit comfortably at distance and easily control all his operations on his PC, why would anybody think of Surface Technology, where the user has to sit near the Surface!!




The system is capable of detecting movements in 3-dimensions without ever having to put your fingers on the screen.

Their patented touchless interface doesn’t require that you wear any special sensors on your hand either. You just point at the screen (from as far as 5 feet away), and you can manipulate objects in 3D.


Elliptic says the technology is compact enough that it could eventually be embedded into mobile devices. Representatives of the company will be on hand at the upcoming GDC show in San Francisco this February to show off their system in person.

I am really waiting for this technology to launch soon so that this would be a tight slap on Microsoft's Surface Technology.
Hail Maicrosoft!!

Source: Elliptic Labs 

Saturday, March 22, 2008

Top 10 Hacks of The History ...

*** TOP 10 HACKS OF HISTORY***

Here is a list of the top 10 hacks of all time.


Early 1990s

Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.


November 2002


Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a "fast-track extradition" to the US where he is a wanted man. The next hearing in the case is slated for today.


1995

Russian computer geek Vladimir Levin effected what can easily be called The Italian Job online - he was the first person to hack into a bank to extract money. Early 1995, he hacked into Citibank and robbed $10 million. Interpol arrested him in the UK in 1995, after he had transferred money to his accounts in the US, Finland, Holland, Germany and Israel.


1990

When a Los Angeles area radio station announced a contest that awarded a Porsche 944S2 for the 102nd caller, Kevin Poulsen took control of the entire city's telephone network, ensured he is the 102nd caller, and took away the Porsche beauty. He was arrested later that year and sentenced to three years in prison. He is currently a senior editor at Wired News.


1983

Kevin Poulsen again. A little-known incident when Poulsen, then just a student, hacked into Arpanet, the precursor to the Internet was hacked into. Arpanet was a global network of computers, and Poulsen took advantage of a loophole in its architecture to gain temporary control of the US-wide network.


1996

US hacker Timothy Lloyd planted six lines of malicious software code in the computer network of Omega Engineering which was a prime supplier of components for NASA and the US Navy. The code allowed a "logic bomb" to explode that deleted software running Omega's manufacturing operations. Omega lost $10 million due to the attack.


1988

Twenty-three-year-old Cornell University graduate Robert Morris unleashed the first Internet worm on to the world. Morris released 99 lines of code to the internet as an experiment, but realised that his program infected machines as it went along. Computers crashed across the US and elsewhere. He was arrested and sentenced in 1990.


1999

The Melissa virus was the first of its kind to wreak damage on a global scale. Written by David Smith (then 30), Melissa spread to more than 300 companies across the world completely destroying their computer networks. Damages reported amounted to nearly $400 million. Smith was arrested and sentenced to five years in prison.


2000

MafiaBoy, whose real identity has been kept under wraps because he is a minor, hacked into some of the largest sites in the world, including eBay, Amazon and Yahoo between February 6 and Valentine's Day in 2000. He gained access to 75 computers in 52 networks, and ordered a Denial of Service attack on them. He was arrested in 2000.


1993

They called themselves Masters of Deception, targeting US phone systems. The group hacked into the National Security Agency, AT&T, and Bank of America. It created a system that let them bypass long-distance phone call systems, and gain access to the pbx of major carriers.

Tuesday, January 8, 2008

Tare Zameen Par

Main Kabhi Batlata Nahin
Par Andhere Se Darta Hoon Main Maa
Yun To Main,Dikhlata Nahin
Teri Parwaah Karta Hoon Main Maa
Tujhe Sab Hain Pata, Hain Na Maa
Tujhe Sab Hain Pata,,Meri Maa

Bheed Mein Yun Na Chhoro Mujhe
Ghar Laut Ke Bhi Aa Naa Paoon Maa
Bhej Na Itna Door Mujkko Tu
Yaad Bhi Tujhko Aa Naa Paoon Maa
Kya Itna Bura Hoon Main Maa
Kya Itna Bura Meri Maa

Jab Bhi Kabhi Papa Mujhe
Jo Zor Se Jhoola Jhulate Hain Maa
Meri Nazar Dhoondhe Tujhe
Sochu Yahi Tu Aa Ke Thaamegi Maa
Unse Main Yeh Kehta Nahin
Par Main Seham Jaata Hoon Maa

Chehre Pe Aane Deta Nahin
Dil Hi Dil Mein Ghabraata Hoon Maa
Tujhe Sab Hai Pata Hai Naa Maa
Tujhe Sab Hai Pata Meri Maa
Main Kabhi Batlata Nahin
Par Andhere Se Darta Hoon Main Maa

Yun To Main,Dikhlata Nahin
Teri Parwaah Karta Hoon Main Maa
Tujhe Sab Hain Pata, Hain Na Maa
Tujhe Sab Hain Pata,,Meri Maa