Software  >   Systems Software  >   Utility Software  >   File Management Programs  >  

UUCP

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: UNIX to UNIX Copy Protocol
DEFINITION: UUCP (UNIX-to-UNIX Copy Protocol) is a set of UNIX programs for copying (sending) files between different UNIX systems and for sending commands to be executed on another system. The main UUCP commands (each supported by a UUCP program) are:uucp, which requests the copying of a specific file to another specified systemuux, which sends a UNIX command to another system where it is queued for executionuucico,  … 
Definition continues below.
UUCPWhite Papers (View All Report Types)
26 - 50 of 289 Matches Previous Page  | Next Page
Application Serving Environment: WebSphere Application Server Liberty Provile vs. Tomcat
sponsored by IBM
WHITE PAPER: Deciding on an application serving environment is challenging – sifting through an ever-growing market to find the right solutions based on enterprise needs is time consuming and taxing. This comparison white paper considers two possible systems for enterprises.
Posted: 27 Aug 2014 | Published: 31 Oct 2012

IBM

Are You Prepared for a Software Audit?
sponsored by CDW Corporation
WHITE PAPER: Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CDW Corporation

Avoiding Unpleasant ERP Surprises
sponsored by IFS
WHITE PAPER: Prepare your organization for a successful ERP implementation and find out about the consequences of ERP gone wrong.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

IFS

Backup Software: Nine Must-Ask Questions
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 9 key questions to ask when shopping for backup software solutions. Learn how to accurately define your needs and expectations, and know what to look for to determine if a particular solution will meet them or not. Read on to learn more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Iron Mountain

Big Data at Work: Dispelling the Myths, Uncovering the Opportunities
sponsored by SAS
WHITE PAPER: In this white paper, Thomas Davenport separates fact from fiction when it comes to big data.
Posted: 10 Jul 2014 | Published: 03 Mar 2014

SAS

Bringing Together Software-Defined and Object Storage
sponsored by Caringo
WHITE PAPER: Two of the biggest trends in storage today are software-defined storage and object storage. This white paper explains each one and highlights the benefits of a storage software that combines them.
Posted: 27 Jun 2014 | Published: 11 Jun 2014

Caringo

Budgeting for Mid-Market Companies
sponsored by Prophix Software
WHITE PAPER: Uncover all the ins-and-outs of budgeting so you can achieve the most efficient financial process possible.
Posted: 03 Jun 2014 | Published: 31 Dec 2012

Prophix Software

Building Fault-Tolerant Applications on AWS
sponsored by Amazon Web Services and Intel
WHITE PAPER: This comprehensive paper highlights why an Amazon Web Services (AWS) platform is ideal for building fault-tolerant software systems. However, this attribute isn't unique to its platform, so read on to discover what makes the AWS platform unique.
Posted: 14 Jul 2014 | Published: 31 Oct 2011

Amazon Web Services and Intel

Built for Business: 10 Reasons BlackBerry Smartphones Are Still the Best Way to Do Business
sponsored by BlackBerry
WHITE PAPER: It doesn't matter what device ownership model your organization is using today – BYOD (Bring Your Own Device), corporate-owned, COPE (Corporate-Owned, Personally Enabled) or a blend – your mobile employees need smartphones that can deliver on their specific needs and wants.
Posted: 24 Jul 2014 | Published: 14 Aug 2014

BlackBerry

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Are Your File Transfer Methods Compliant?
sponsored by OpenText
WHITE PAPER: This paper will help outline some of the compliance regulations in place, how file transfer may be interpreted as part of these rules, and how a managed file transfer (MFT) solution can provide a secure environment for file transfer activity.
Posted: 18 Oct 2013 | Published: 18 Oct 2013

OpenText

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010

SpringCM

Beyond FTP: Securing and Managing File Transfers
sponsored by Linoma Software
WHITE PAPER: Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol.
Posted: 15 Mar 2010 | Published: 15 Mar 2010

Linoma Software

Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation

Building and Managing a Performance Center of Excellence
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains advice on improving application performance. It also gives 10 tips for building and managing a performance center of excellence.
Posted: 09 Feb 2010 | Published: 09 Feb 2010

Hewlett-Packard Company

Building Your Business Case for Managed File Transfer
sponsored by OpenText
WHITE PAPER: The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing.
Posted: 15 Nov 2011 | Published: 11 Nov 2011

OpenText

Can the Suite Compete? - What Every Recruiter Needs to Know
sponsored by Jobvite
WHITE PAPER: In this resource, HR and business leaders will find a comparison of the strengths and weaknesses of purpose-specific software and bundled software suites, providing you with key information to help you more strategically meet your organization's talent recruitment goals.
Posted: 19 Apr 2013 | Published: 19 Apr 2013

Jobvite
26 - 50 of 289 Matches Previous Page    1 2 3 4 5    Next Page
 
UUCP DEFINITION (continued): …  which runs on a UNIX system as the program that carries out the copying and initiates execution of the commands that have been sent. Typically, this program is run at various times of day; meanwhile, the copy (uucp) and command (uux) requests are queued until the uucico program is run.uuxqt, which executes the commands sent by uux, usually after being started by the uucico program The uucico programs are the programs that actually communicate across a network. There are several network protocols (variations on packet size and error-checking) that can be used by uucico programs, depending on … 
UUCP definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement