Skip to main content

Posts

Autosys Architecture

    Autosys Work-Flow • Event Server (or Autosys Database) o Data Repository that stores Autosys system information,events and job definitions. o The Autosys Db is termed ‘Data Server’ which describes a server instance • Event Processor o Interprets and processes all the events it reads from the Autosys Database o A program that actually runs Autosys o Scans the database for processing events. Checks if the events satisfy the starting conditions of the job and the determines the actions • Remote Agent o Temporary process started by the event processor to perform a specific task on a remote machine o It starts the command specified for a given job, sends running and completion information about a task to the Event Server • Step1: The Event Processor scans the Event Server for the next event to processor.If no event is ready,the Event Processor scans again in 5 seconds. • Step2: The Event Processor reads from the Event Server that an event is r...
Recent posts

What is Autosys ?

Introduction to Autosys Autosys is an automated job control system for scheduling, monitoring, and reporting. These jobs can reside on any Autosys-configured machine that is attached to a network. An AutoSys job is any single command, executable, script, or Windows batch file. Each AutoSys job definition contains a variety of qualifying attributes, including the conditions specifying when and where a job should be run. Defining Jobs : There are the two methods you can use to create job definitions: ¦ Using the AutoSys Graphical User Interface (GUI). ¦ Using the AutoSys Job Information Language (JIL) through a command-line interface. Autosys Jobs: Job Types and Structure : There are three types of jobs: command, file watcher, and box. As their names imply, command jobs execute commands, box jobs are containers that hold other jobs (including other boxes), and file watcher jobs watch for the arrival of a specif...

Google Bans Cryptocurrency Mining Android Apps From the Play Store

Following Apple's lead in banning cryptocurrency mining apps, Google has also updated its Play Store policy this week to ban apps that mine cryptocurrencies on users' devices in the background. However, there are countless cryptocurrency mining apps, including MinerGate, AA Miner, NeoNeonMiner, and Crypto Miner, still available on the Play Store. Cryptocurrency mining is not a new concept, but the technology has recently been abused in the past year after hackers found it a great way to make millions of dollars by hijacking PCs to secretly mine cryptocurrency in the background without their users' knowledge or consent. Due to this practice, cryptocurrency mining has emerged as one of the biggest threats, raising negative sentiments towards this alternative revenue scheme, and big tech giants like Apple and Google took strict measures to put restrictions on such apps. Over a month ago, Apple updated its App Store guidelines to ban cryptocurren...

Sharing Is Everything But Caring In The Sharing Economy

Editor’s Note:  Christopher O. Hernæs is Vice President of Strategy, Innovation and Analysis of SpareBank 1 Group, Norway’s second largest financialinstitution. He was previously a partner at Core Group, where he worked with strategy development and innovation for Technology, Media, Telecom and financial services. One of the hot topics so far this year is what will become of P2P services and the sharing economy. Last year Airbnb became the  largest hotel chain in the world , Uber expanded abroad with large protests from incumbents in  the taxi industry  and P2P-lender Lending Club got listed on Wall Street. At the same time pwc estimates the sharing economy to  generate revenues up to $335 billion by 2025 , and Uber alone is  valued at $ 41 million . The millennial generation has also expressed a lack of trust in incumbents and is craving an alternative, and would rather  trust peers over brands . With predictions of the shari...

Lenovo Y50 or Toshiba's Satellite P50 or Hp Envy 15

An new Lenovo Y50 Laptop which has mainly got huge success in Foreign but in India there is still not official date of its announcement . This Laptop no doubt an awesome machine in market currently competing with Alienware's , Asus big laptops. The specification of this laptop is awesome its a perfect gaming pc for about 2-3 years surely But due to not releasing it soon in India i hope it will soon loose it chance to become popular in India it is one 4k display laptop but  Toshiba has already launched his Satellite P50 Laptop With  4K UHD Display And now  HP India Launches New Pavilion AIO PC , Hybrid and Laptops Alongside Envy 15 which further decrease the chances of Lenovo Y50 To become popular in India ... I have been seeing My self how people are daily writing on forums, lenovo's facebook page but they are not getting proper response still lenovo team themself dont know when it will be launched in india Friends If you are waiting for lenovo...

Evil Twin and Fake Wireless Access Point Hacks: What They Are, How To Defend

Hacking is a term with a wide variety of acts associated with it. Some are incredibly complex and demand a high degree of knowledge, others are little more than installing some software on your device and acting a bit...less than ethically. One of the most common hacks is also one of the easiest to defend against. This is what is known as a fake wireless access point. Hackers use this tactic to easily steal data of unsuspecting wireless users in public places. What is a fake wireless access point data theft? This type of attack has a number of nicknames associated with it: AP Phishing, Wi-Fi Phishing, Hotspotter, Evil Twins, and Honeypot AP. All of these are associated with creating a fake Wi-Fi connection that people log into, and whose goal is to steal credentials, logins, and passwords. To accomplish this, hackers simply use a piece of software, or app, that is designed to capture data that is sent over a wireless connection. Examples of software that is sued d...

How to make a invisible folder or to hide a data in a invisible folder .

How to make a invisible folder . Today I will tell you how to make a folder which exists on desktop but can't be seen or you can say a invisible folder. This trick is helpful if you want to hide your important data. Likes pictures videos etc.,. Note ::- dont forgot original location of folder after following steps given below or you will loose access to your important folders. Steps for creating invisible folders . 1 : press right click of your mouse . 2: create a new folder 3 : rename it by erasing all characters and then press Alt + 255 4 : your folder became a blank name folder . 5 : press right click of your mouse 6 : click on properties 7: click customise 8 : change folder icon 9: now search for a blank icon or a blank space there . 10: select a blank icon and then press ok . 11:your folder become invisible . Note : for further security you can right click on your invisible folder and Then hide it so that it become impossible to find that folder by unknown person . _____I__...