Tuesday, August 09, 2005

[TechRepublic] Using arrays in bash

Linux NetNote
Home | Downloads | Discussions | Tech Q&A | White Papers | Books & CDs | Newsletters

Plan a Cost-Effective Transition to 64-bit Environments
 

If you're considering migrating some of your applications to 64-bit, this Intel paper explains how to maximize the business value of the 64-bit capabilities, while minimizing the cost, risk, and disruption caused by software migration.


Using arrays in bash

Arrays in bashAssigning variables in bash is easily done and extremely useful, but like other programming languages, bash can also use arrays. This is particularly handy when you want to read the contents of a file into an array or simply keep your scripts more organized and logical.

There are two ways of declaring an array--read the tip to see the examples.

Don't miss a tip!

Check out the Linux Archive.

Get more information on Linux

For more Linux resources, check out our Servers Topic Center.

Don't miss these Linux resources

White Paper: Scalix E-mail Platform Strengthens Connectivity for Town of Weymouth, MA
Download this case study to read why the town of Weymouth, Massachusetts chose the Linux-based Scalix e-mail platform for its public school system's messaging and calendaring needs. Find out why the Web-based Scalix, which provides an easy interface with Outlook as well as cross-compatibility with both Windows and Macintosh systems, was the solution of choice for a town that needed a secure messaging environment at a price it could afford.

Key bugs in core Linux code squashed
Serious security bugs in key parts of the latest Linux code have been fixed, but some small glitches have been introduced, according to a recent scan.

Evaluate the benefits of Linux the smart way
  Linux sounds great, but is it right for your organization? Get details on installation, configuration, e-mail protocols, printer sharing, and security and system management. Plus, you'll receive a bonus CD, which includes an interview with Linux creator, Linus Torvalds. Order your copy of Administrator's Guide to Linux in the Enterprise today!

An absolutely secure network is not possible, but the risk can be managed
No network can claim to be 100 percent secure. Hackers are clever and motivated to access your network. The best way to protect against these attacks is by knowing their tricks and planning counter measures to defeat them.

Will paying researchers for reporting vulnerabilities really pay off?
3Com's TippingPoint recently announced its Zero Day Initiative (ZDI), a program that pays researchers for reporting security vulnerabilities. What will this mean for computer security? Jonathan Yarden investigates the new program and weighs in on its potential impact.

Download: Processor differences can complicate cross-platform development
Developing software for multiple platforms means accounting for the variations and idiosyncrasies of each system--an exercise in experimentation and frustration for a lot of programmers. This chapter from Write Portable Code examines the issues you'll run into when moving code between processor architectures.

  Find a tech job
  Recent job postings from

> Search for Java jobs
> Search for COBOL jobs
> Search for Project Manager jobs

> Search for Oracle jobs
> Search for Network Admin jobs
> Find 70,000+ Tech Jobs

  Sign-up for email job alerts
- - - Partner Marketplace - - -


Copyright © 2005 CNET Networks, Inc. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc.
CNET Networks, Inc.
235 Second Street
San Francisco, CA 94105
U.S.A.