Saturday, October 31, 2009

NIM server configuration

# #
# This script backs up the operating system of selected AIX servers #
# and stores the backup images as new resources in NIM master.
# #

# Gets the name of all NIM clients:
CLIENTLIST=`lsnim -t standalone | awk '{print $1}'`
function backup_me_in_nim
# This function gets the nim client name and
# makes a mksysb backup resource in NIM master
echo "Mksysb started for $CLIENT. Please wait ..." >> $ERRORLOG
RESOURCE_NAME=mksysb_"$CLIENT"_`date +"%a%d%h%y"`
if [[ -e $BACKUP_FILE ]]; then
echo "$RESOURCE_NAME already exists!" >> $ERRORLOG
nim -o define -t mksysb -a server=master -a
location=$BACKUP_FILE -a source=$CLIENT -a mk_image=yes -a mksysb_flags=XeA
# Checks whether mksysb is successful or not:
if [[ $? != 0 ]]; then
echo "Mksysb backup of $CLIENT failed." >> $ERRORLOG
echo "Backup finished successfully for $CLIENT." >>
clean_old_backups $CLIENT
} # end of function
function clean_old_backups
NUMBER_OF_BACKUPS_TO_KEEP=3 # Only this number of backups will be kept
MKSYSB_LIST=`ls -ltr /export/images/mksysb_"$CLIENT"* | awk '{ print $9}'`
COUNTER=`ls -ltr /export/images/mksysb_"$CLIENT"* | awk '{ print $9}' | wc
for file in $MKSYSB_LIST
RESOURCE_NAME=`echo $file | cut -f4 -d\/`
if [[ `lsnim | grep $RESOURCE_NAME | wc -l` -eq 0 ]]; then
echo "$RESOURCE_NAME does not exist in NIM and cannot be
removed!" >> %ERRORLOG
nim -o remove $RESOURCE_NAME # Removes the resource from NIM
if [[ $? != 0 ]]; then
echo "$RESOURCE_NAME resource could not be removed from NIM
database!" >> $ERRORLOG
echo "$RESOURCE_NAME resource removed from NIM database
successfully." >> $ERRORLOG
rm -f $file
if [[ $? != 0 ]]; then
echo "$file could not be deleted from filesystem!" >> $ERRORLOG
echo "Old backup $file deleted." >> $ERRORLOG
} # end of function
# start of execution:
echo ----------------------------------------------------------- >>
echo "Mksysb backup by NIM beginning at `date`" >> $ERRORLOG
# This loop do the mksysb backup of AIX systems in NIM:
for nimclient in $CLIENTLIST
nim -Fo check $nimclient 2>> $ERRORLOG
if [[ $? != 0 ]]; then
echo "$nimclient cannot be reset. mksysb operation aborted." >>
echo "$nimclient is healthy in NIM." >> $ERRORLOG
backup_me_in_nim $nimclient
#backs up the nim server database:
/usr/lpp/bos.sysmgt/nim/methods/m_backup_db /etc/objrepos/nimdb.backup 2>>
if [[ $? != 0 ]]; then
echo "NIM database backup failed." >> $ERRORLOG
echo "NIM database backup succeded." >> $ERRORLOG
# Getting mksysb for NIM master
echo "Mksysb started for NIM master. Please wait ..." >> $ERRORLOG
backup_me_in_nim $nimclient # backs up master OS
echo "End of mksysb backup `date` " >> $ERRORLOG
echo ----------------------------------------------------------- >>

Medical Training

when searching medical training, LVN has been excellent training in filed of medicine. They are offering extensive variety of healthcare programs and CEU/ Short-Term Courses.program offerings include Vocational Nurse (LVN or LPN), Ultrasound Technology (Diagnostic Medical Sonography), Radiologic Technology (X-Ray), MRI Technology, Psychiatric Technician, Phlebotomy Technician (CPT 1).

This academy provide me information regarding medical training, hope whoever looking for such kind of medical training will be benefited through MRI

Monday, October 19, 2009

SMS Password Change / Model 285

Power-on the system. When the OK prompt is displayed press it again and as soon as you hear two beeps (or a keyboard symbol), press 1. Sometimes you may have to press f1. The following similar option will be displayed.*
SMS Menu
Series Firmware
Version RG041029_d79e00_regatta
SMS 1.3 (c) Copyright IBM Corp. 2000,2003 All rights reserved.
Main Menu
1. Select Language
2. Change Password Options
3. View Error Log
4. Setup Remote IPL (Initial Program Load)
5. Change SCSI Settings
6. Select Console
7. Select Boot Options
From the menu you can select option 2 to change your password.

Friday, October 16, 2009

Cannot open or remove a file containing a running program

To resolve this login as root.

Run ps -ef grep ftpd to get a list of running FTP daemons.

Kill the the ftpd processes then the file can be deleted.

When the connection broke the thread was not killed so it thinks it is still copying data to the file and the file remains locked until the process is killed.

Thursday, October 15, 2009

Can a Financial Analyst Do justice working as Sr Business Analyst

It really depends on how the individual organization implements these two roles. If the titles represent what I see as their role, then my answer is no.

One could conceivably gain the training/experience necessary to do the other, but these are drastically different roles.

A financial analyst is more of an accountant and may work with billing, reconciliation, etc.

A business analyst is geared towards requirements elicitation and related functions, working with the project team/project manager extensively and the customer/stakeholders.

However, other financial analysts analyze capital investment projects from a financial perspective, provide analysis of investments and investment alternatives, and provide advice to investors and brokers.

Google for "BABOK" which is the body of knowledge for business analysis. It will give you a clearer picture of what that role entails.

sweets of different varities

Wednesday, October 14, 2009

What does Oracle error 6550 mean?

I want to know what the following error means and how to solve it:

EXP-00056: ORACLE error 6550 encountered
ORA-06550: line 1, column 41:
PLS-00302: component 'SET_NO_OUTLINES' must be declared
ORA-06550: line 1, column 15:
PL/SQL: Statement ignored
EXP-00000: Export terminated unsuccessfully


The most common reason for Oracle error 6550 is that your export version is higher than your database version. Use the correct exp version for your database and you will not receive this error.

Unix-to-Linux migration

Unix to Linux migration: Now that you have your Linux server up and running, what's next? We can turn it into a Web server, an e-mail server, or even more fun, let's port your Unix-based applications to that new box. That's easy for me to say, but it's not going to be a snap for you. This is certainly not an overnight project, nor a project that should be taken lightly. Here are some tips that can make a Unix-to-Linux migration less complex and more fun.

Though Linux certainly is Unix-like, it is not Unix. Even if it were, there still would be a lot to do to port your application over successfully. For instance, you may have an application that runs on Sun Solaris, but perhaps it has not yet been ported over successfully to IBM's AIX. It would be shortsighted and foolish of you to undertake such a task on your own without support either from your hardware vendor or applications group. Similarly, porting your functioning Unix based application to a Linux environment is going to take some work and proper planning.

Planning and planning well is the key to success. That's the first tip. Let's look at a migration project to see what can happen along the way. I'll keep things vendor- and productneutral.

In this way, you can see that the basic steps will work regardless of the specific platform you are running. For example, you have an application X, which is running on a Y database. It is running on a server made by Z running W Unix.
First off, behind the scenes without your knowledge, the CIO has already been tasked to cut costs in all areas of IT. After doing a detailed cost analysis, she has determined that using Linux would cut support costs of your application 200%. You've been tasked to make it all work.
Where do you start? The most important piece is the assessment. You must write down exactly what you want to accomplish and what you have to work with. Start with what you've got, and break it down by hardware, software, database, data and network. Get all the version numbers down carefully, because you will find that some versions might run better than others on Linux, and some might not be supported at all.

Do some research and find out if your application has already been ported to Linux (and if it has, what variant, and on what kernel). You don't want to rewrite the same script if it already has been written. If it has, then you're in good shape. If your application is home-grown running on a Y database, then your first step must be to contact Y. Ask if Y has been ported to Linux. If not, you may be out of luck. If it has, you can move on.
Your next step: Find out what is involved in moving the database over to Linux, and get your DBAs start learning about how to support this database on that platform. From here, you'll move on to determining the right Linux server for your environment. As you know, there are many Linux variants out there. What is right for you? As usual, it depends. Are you the type that likes a lot of handholding, or do you tend to Google around for all your answers?
Breaking my code of neutrality, I'd go with either SuSE or Red Hat; you can't go wrong with either one. After you've picked your distribution, bring it in as quickly as you can, and start playing. Make sure you spec out your Intel or AMD PC wisely. If your RISC box is a four-way IBM p690 with 4GB of RAM, don't bring in a single processor box with 512 MG of RAM and expect the application to run nicely. I also would advise you not to get a pre-installed version of Linux on your hardware, but to install it yourself. That's the only way you'll learn.

Tuesday, October 13, 2009

health tips

It is popular in Japan today to drink water immediately after waking up every morning. Furthermore, scientific tests have proven a its value. We publish below a description of use of water for our readers. For old and serious diseases as well as modern illnesses the water treatment had been found successful by a Japanese med ical society as a 100% cure for the following diseases:

Headache, body ache, heart system, arthritis, fast heart beat, epilepsy, excess fatness, bronchitis asthma, TB, meningitis, kidney and urine diseases, vomiting, ga str itis, diarrhea, piles, diabetes, constipation, all eye diseases, womb, cancer and men str ual diso rd ers, ear nose and throat diseases.


1. As you wake up in the morning before brushing teeth, drink 4 x 160ml glasses of water .....interesting

2. Brush and clean the mouth but do not eat or drink anything for 45 minutes

3. After 45 minutes you may eat and drink as normal.

4. After 15 minutes of breakfast, lunch and dinner do not eat or drink anything for 2 hours

5. Those who are old or sick and are unable to drink 4 glasses of water at the beginning may commence by taking little water and gradually increase it to 4 glasses per day.

6. The above method of treatment will cure diseases of the sick and others can enjoy a healthy life.

The following list gives the number of days of treatment required to cure/control/reduce main diseases:

1. High Blood Pressure - 30 days

2. Ga str ic - 10 days

3. Diabetes - 30 days

4. Constipation - 10 days

5. Cancer - 180 days

6. TB - 90 days

7. Arthritis patients should follow the above treatment only for 3 days in the 1st week, and from 2nd week onwa rd s - daily.

This treatment method has no side effects, however at the commencement of treatment you may have to urinate a few times.

It is better if we continue this and make this procedure as a routine work in our life.

Drink Water and Stay healthy and Active.

This makes sense .. The Chinese and Japanese drink hot tea with their meals ..not cold water. Maybe it is time we adopt their drinking habit while eating!!! Nothing to lose, everything to gain...

For those who like to drink cold water, this article is applicable to you.

It is nice to have a cup of cold drink after a meal. However, the cold water will solidify the oily stuff that you have just consumed . It will slow down the digestion.

Once this 'sludge' reacts with the acid, it will break down and be absorbed by the intestine faster than the solid food. It will line the intestine. Very soon, this will turn into fats and lead to cancer. It is best to drink hot soup or warm water after a meal.

A serious note about heart attacks: Women should know that not every heart attack symptom is going to be the left arm hurting.

Be aware of intense pain in the jaw line.

You may never have the first chest pain during the course of a heart attack.

Nausea and intense sweating are also common symptoms.

60% of people who have a heart attack while they are asleep do not wake up.

Pain in the jaw can wake you from a sound sleep. Let's be careful and be aware. The more we know, the better chance we could survive...

A cardiologist says if everyone who gets this mail sends it to everyone they know, you can be sure that we'll save at least one life.

**Please be a true friend and send this article to all your friends you care about......I just did!!!**








Protects your heart

prevents constipation

Blocks diarrhea

Improves lung capacity


Combats cancer

Controls blood pressure

Saves your eyesight

Shields against Alzheimer's


Aids digestion

Lowers cholesterol

Protects your heart

Stabilizes blood sugar


Battles diabetes

Lowers cholesterol

Helps stops str okes

Controls blood pressure


Protects your heart

Quiets a cough

Strengthens bones

Controls blood pressure


Prevents constipation

Helps hemorrhoids

Lowers cholesterol

Combats cancer


Controls blood pressure

Combats cancer

Strengthens bones

Protects your heart


Combats cancer

Protects your heart

Stabilizes blood sugar

Boosts memory


Strengthens bones

Saves eyesight

Combats cancer

Protects your heart


Combats cancer

Prevents constipation

Promotes weight loss

Protects your heart


Saves eyesight

Controls blood pressure

Lowers cholesterol

Combats cancer

Keep Walking.....

Just to check this out......
The Organs of your body have their sensory touches at the bottom of your foot, if you massage these points you will find relief from aches and pains as you can see the heart is on the left foot.

Typically they are shown as points and arrows to show which organ it connects to.

It is indeed correct since the nerves connected to these organs terminate here.

This is covered in great details in Acupressure studies or textbooks.

God created our body so well that he thought of even this. He made us walk so that we will always be pressing these pressure points and thus keeping these organs activated at all times.

So, keep walking...


Carrot + Ginger + Apple - Boost and cleanse our system.

Apple + Cucumber + Celery - Prevent cancer, reduce cholesterol, and eliminate stomach upset and headache.

Tomato + Carrot + Apple - Improve skin complexion and eliminate bad breath.

Bitter gou rd + Apple + Milk - Avoid bad breath and reduce internal body heat.

Orange + Ginger + Cucumber - Improve Skin texture and moisture and reduce body heat.

Pineapple + Apple + Watermelon - To dispel excess salts, nourishes the bladder and kidney.

Apple + Cucumber + Kiwi - To improve skin complexion.

Pear & Banana - regulates sugar content.

Carrot + Apple + Pear + Mango - Clear body heat, counteracts toxicity, decreased blood pressure and fight oxidization .

Honeydew + Grape + Watermelon + Milk - Rich in vitamin C + Vitamin B2 that increase cell activity and str engthen body immunity.

Papaya + Pineapple + Milk - Rich in vitamin C, E, Iron. Improve skin complexion and metabolism.

Banana + Pineapple + Milk - Rich in vitamin with nutritious and prevent constipation

Health - Very Very Important Tips

Answer the phone by LEFT ear.
Do not drink coffee
TWICE a day.
Do not take pills with
COOL water.
Do not have
HUGE meals after 5pm.
Reduce the amount of
OILY food you consume.
Drink more
WATER in the morning, less at night.
Keep your distance from hand phone
Do not use headphones/earphone for
LONG period of time.
Best sleeping time is from
10pm at night to 6am in the morning.

Do not lie down immediately after taking medicine before sleeping.
When battery is down to the
LAST grid/bar, do not answer the phone as the radiation is 1000 times.

Prevention is better than cure.

Monday, October 12, 2009

The Myth Of Refreshing The Desktop

"Do you refresh your desktop?". Ask this to any Windows user and 99% of them will reply with a "yes". Of course, there are various needs for refreshing the desktop but the majority of people who does it doesn't even know why he is doing it. Refreshing the desktop is perhaps the biggest computer myth among all Windows users. Every single person I have met does this or at least used to do it. It's not known who first discovered this remarkably useless trick and what he achieved from it, but it just spread. Most new users learn this trick from other new users without caring to know what it does. Some do it devotedly just because others do it, while some others have various weird explanations for it. A few of them assumes that it refreshes the RAM, while some others believe that doing it will somehow keep their PCs running smooth and easy. I have seen some users obsessed with refreshing the desktop, doing it every 30 seconds or so. They have even learnt the keyboard shortcut - F5 (just to mention, these are the people who never use keyboard shortcuts). They would press the key and wouldn't release it for a long time, sending the desktop into a frenzy of refreshes.
What does a desktop refresh actually do? Refreshing the desktop simply redraws the icons on the desktop. That's it! It doesn't refreshes the RAM. It doesn't clean your PC. It doesn't refreshes your computer the way it does to you when you wake up from a nap. Refreshing the desktop has absolutely no effect on the working or performance of the computer. So why is the tool there? As I said, refresh is used to re-display or redraw the icons on the desktop. Sometimes when you bring some changes to the desktop icons, the change doesn't get reflected instantly. In such cases, refreshing the desktop becomes necessary to bring the change to effect. Say, you have the desktop icons set to arrange themselves alphabetically on your desktop. When you add a new item to the desktop, this item wouldn't get arranged alphabetically, instead it would appear at the bottom of icon list on the desktop, irrespective of it's name. Now if you refresh the desktop, all the icons would be once more arranged alphabetically and the newly added item would go to it's appropriate position. This is what refresh is for. It is to re-display the desktop. Refresh has the same function when done in explorer. Also Refresh is basically the command used to refresh/reload the video buffer(VGA memory). Sometimes the changes made in the VGA memory are not reflected to the screen properly...Refresh just corrects the prob...
So, if you are in the habit of refreshing the desktop, stop it. You are just wasting your time and effort. And the next time you see a person doing it, don't forget to explain to him the futility of this action.
Also, during the times of windows 3.1 - win 95 it was normal for PCs to hang, crash n be restarted every now n then! It looks like even knowledgeable ppl used the desktop refresh just to get an assurence that the OS is working n not freezed from the resulting flicker of icons.
Today PCs are very stable n crash only once in a blue moon but the habit still continues, and I think for same reason, even I do it sometimes

Best Covering Letter

I am very interested in the entry-level position. I recently completed Master of Business Economics and am actively seeking employment with firms in the Middle East region. My courses in investments, finance and business have given me a solid base upon which I plan to build my career. During my college internships, I dealt with a variety of budgets and conducted market research while handling numerous administrative duties. The experience allowed me to learn important skills and to develop the confidence needed to succeed in a competitive environment.

I have enclosed my resume for your review.

Thank you for your time and consideration.

It would be a pleasure to interview with you and I look forward to hearing from you soon.

5 key parameters for choosing an information security consultant

  • Be in the know: Identify exactly what is needed from the information security consultant.
  • Client sensitivities: Ensure that your client is comfortable with your consultant.
  • Background checks: Ask for references, or ask your network of professionals for feedback on the consultant's past work.
  • Education and certification: Select only those consultants who have the skills with which you are comfortable.
  • Beware of big talk: Ensure that a consultant can deliver on the value promised.

Sunday, October 11, 2009


what is arthritis?
Arthritis is the inflammation of synovial membrane in he joint, known as synovitis and it is otherwise called arthritis. arthritis is a disorder where the smooth lining of a movable joint is destroyed creating uneven, immovable surface. this impairs free movement of he joint resulting in pain, stiffness, and deformity.

Common types of arthritis:
There are more than 160 kinds of arthritis, but mostly seen are

  • Degenerative osteoarthritis due to wear and tear of aging.
  • Rheumatoid arthritis
  • gouty arthritis
  • post traumatic arthritis.
Is it curable?
Correct diagonsis at an early stage followed by treatment using latest technique have proved that patients can go back to earlier active lifestyles within short period of time.

Today world celebrating world Arthritis Day.

Saturday, October 10, 2009

Tips on Managing Risk in the Cloud Computing

BECAUSE CLOUD PROVIDERS run in a multi-tenant environment, they create the potential or enormous risk aggregation. Just one bad actor can open up all customers to a data privacy breach or interruption of services. To avoid becoming the casualty of these kinds of disasters, here are some questions to ask cloud providers.

  • Is the provider insured, and for what kinds of breaches: data privacy, network interruptions, business interruptions, cyber-extortion loss?
  • For how much is the provider insured?Does the provider have customers in regulated industries (i.e., those governed by the Health Insurance Portability and Accountability Act or Sarbanes-Oxley)?
  • Can these customers be contacted for references?
  • Has a rogue employee ever disrupted the provider’s services?
  • How long does it take the provider to restore operations after a computer attack or unplanned system outage?
  • Within the past three years, has the provider ever been accused of a privacy violation by a business customer, consumer or government agency?
  • Does the provider have a third-party endorsement or certificate of its privacy process and practices?
  • Can it provide details?
  • Does the provider have specific privacy provisions in any subcontracting agreements?Has a third party audited the provider’s network security processes and practices?
  • Can the provider offer details?What data encryption services does the provider offer?
  • Which physical security measures does the provider have in place to control and monitor human access to its main servers and customer data?