Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >   UNIX  >   UNIX Shells  >  

Korn Shell

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: ksh
DEFINITION: The Korn shell is the UNIX shell (command execution program, often called a command interpreter) that was developed by David Korn of Bell Labs as a comprehensive combined version of other major UNIX shells. Incorporating all the features of C shell (csh) and Tab C-shell (tcsh) with the script language features similar to that of the Bourne shell, the Korn shell is considered the most efficient shell.  … 
Definition continues below.
Korn ShellWhite Papers (View All Report Types)
51 - 75 of 558 Matches Previous Page  | Next Page
Avoiding Unpleasant ERP Surprises
sponsored by IFS
WHITE PAPER: Prepare your organization for a successful ERP implementation and find out about the consequences of ERP gone wrong.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

IFS

Backup Software: Nine Must-Ask Questions
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 9 key questions to ask when shopping for backup software solutions. Learn how to accurately define your needs and expectations, and know what to look for to determine if a particular solution will meet them or not. Read on to learn more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Iron Mountain

Big Data at Work: Dispelling the Myths, Uncovering the Opportunities
sponsored by SAS
WHITE PAPER: In this white paper, Thomas Davenport separates fact from fiction when it comes to big data.
Posted: 10 Jul 2014 | Published: 03 Mar 2014

SAS

Build more robust native mobile applications with IBM the MobileFirst Platform
sponsored by IBM
WHITE PAPER: Learn how IBM MobileFirst Platform Foundation can securely enable mobile application development, delivery and management.
Posted: 15 Sep 2014 | Published: 30 Jun 2014

IBM

Buyer's Guide to Eneterprise File Sync and Share (that users will love)
sponsored by Code42
WHITE PAPER: Read this buyer's guide to evaluate sync/share solutions and ensure you choose one that aligns with your users' needs and your organizations' preferences.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

Code42

CA Technologies DB2 Mainframe for z/OS Utilities: What Makes Them Unique?
sponsored by CA Technologies.
WHITE PAPER: Explore this technical whitepaper to learn how CA Technologies Database Management software for DB2 for z/OS has changed and evolved in response to customer needs for IBM DB2 for z/OS business applications. Read on to learn how this utility supports the latest versions of DB2 for z/OS and what makes these utilities unique.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

CA Technologies.

CA Technologies Extends Mainframe Software License for Use with IBM Rational Development and Test Environment for System z
sponsored by CA Technologies.
WHITE PAPER: Explore this resource to learn why CA Technologies is offering their mainframe customers the ability to purchase a seat license for their mainframe software so they can run it in IBM's RD&T environment. Click on the link to learn more.
Posted: 13 Jun 2014 | Published: 31 Dec 2012

CA Technologies.

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Balancing Security and Usability of Mobile Devices
sponsored by BlackBerry
WHITE PAPER: This FAQ describes the conflicts that mobile devices bring to the workplace – namely staying secure while keeping employees happy. Learn how to establish a good middle ground for everyone – balancing information security with both convenience and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010

SpringCM

BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER: This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010

BeyondTrust Corporation

BlackBerry PlayBook Tablet with OS 2.0, BlackBerry Mobile Fusion Management
sponsored by BlackBerry
WHITE PAPER: Discover how you can balance the personal and professional needs of today's mobile workforce and finally find harmony between security and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Bringing Automation to the Data Center
sponsored by CA Technologies.
WHITE PAPER: A number of factors have emerged that clearly demonstrate the requirement for a more holistic approach to data center management.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

CA Technologies.

Bringing Order to the Chaos of “Bring Your Own Device”
sponsored by Enterasys
WHITE PAPER: In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this.
Posted: 01 Jun 2012 | Published: 30 Apr 2012

Enterasys

Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation

Building and Managing a Performance Center of Excellence
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains advice on improving application performance. It also gives 10 tips for building and managing a performance center of excellence.
Posted: 09 Feb 2010 | Published: 09 Feb 2010

Hewlett-Packard Company

Built-in Manageability and Proactive Security for Business Desktop PCs
sponsored by Intel Corporation
WHITE PAPER: Read this white paper to learn how built in desktop management can help address today?s key IT challenges such as avoiding malicious attacks, accurate inventory of assets, and the demand for IT services.
Posted: 05 Sep 2006 | Published: 01 Oct 2006

Intel Corporation

Can the Suite Compete? - What Every Recruiter Needs to Know
sponsored by Jobvite
WHITE PAPER: In this resource, HR and business leaders will find a comparison of the strengths and weaknesses of purpose-specific software and bundled software suites, providing you with key information to help you more strategically meet your organization's talent recruitment goals.
Posted: 19 Apr 2013 | Published: 19 Apr 2013

Jobvite

Case Study : Virgin Media enhances productivity by consolidating testing tools
sponsored by Hewlett-Packard Limited
WHITE PAPER: This case study looks at how Virgin Media developed a set of transparent, efficient, and unified software testing tools to speed development, and increase quality.
Posted: 07 Nov 2013 | Published: 03 Sep 2012

Hewlett-Packard Limited

Centralized management for UNIX, Linux, Web and database platforms with Active Directory
sponsored by Centrify Corporation
WHITE PAPER: Enable UNIX and Linux server workstations to participate seamlessly in an Active Directory domain, establishing Directory as the single point of administration and security policy enforcement. Also, learn how to eliminate security exposures to...
Posted: 10 Dec 2007 | Published: 01 Nov 2007

Centrify Corporation
51 - 75 of 558 Matches Previous Page    1 2 3 4 5 6    Next Page
 
KORN SHELL DEFINITION (continued): … The Korn shell is the UNIX shell (command execution program, often called a command interpreter) that was developed by David Korn of Bell Labs as a comprehensive combined version of other major UNIX shells. Incorporating all the features of C shell (csh) and Tab C-shell (tcsh) with the script language features similar to that of the Bourne shell, the Korn shell is considered the most efficient shell. Korn, Bourne, and C are the three most commonly used UNIX shells.The Korn shell is considered a member of the Bourne shell family and uses as its shell prompt (character displayed to indicate readiness for user input) the $ symbol. Because it is the easiest shell to use, inexperienced users usually prefer the Korn shell and, not surprisingly, it is the one most often used in commercial environments.Sometimes known by its program name ksh, the Korn is the default shell on many UNIX systems.
Korn Shell definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement