Software  >   Systems Software  >   Operating Systems  >   Mainframe Operating Systems  >   UNIX  >   UNIX Shells  >  

C Shell

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Tab C Shell, csh, tcsh
DEFINITION: C shell is the UNIX shell (command execution program, often called a command interpreter) created by Bill Joy at the University of California at Berkeley as an alternative to UNIX's original shell, the Bourne shell. These two UNIX shells, along with the Korn shell, are the three most commonly used shells. The C shell program name is csh, and the shell prompt (the character displayed to indicate readiness  … 
Definition continues below.
C Shell Reports
76 - 100 of 980 Matches Previous Page  |  Next Page
Avoiding Unpleasant ERP Surprises
sponsored by IFS
WHITE PAPER: Prepare your organization for a successful ERP implementation and find out about the consequences of ERP gone wrong.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

IFS

Best practices for enterprise systems management
sponsored by TechTarget
RESOURCE: Access this exclusive guide that compiles key tips and tricks for minimizing top systems management and maintenance challenges in today's organizations. Ensure your IT infrastructure continues to run smoothly with help from the SearchDataCenter.com editorial team.
Posted: 12 Jun 2014 | Published: 25 Sep 2014

TechTarget

Best Practices – Maximizing Efficiency Through Service Automation
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Automating tasks such as provisioning, management, and issue remediation enables IT organizations to transform into a true broker of services, which is extremely beneficial for IT service delivery and overall business efficiency. This white paper provides best practices for using service automation to maximize efficiency and get closer to XaaS.
Posted: 02 Feb 2015 | Published: 31 Oct 2014

FrontRange Solutions Inc.

BMC Mainframe Survey 2011
sponsored by ComputerWeekly.com
IT BRIEFING: Big businesses are planning to grow their mainframe computer capacity despite the downturn  this survey of 1,347 large mainframe users worldwide by BMC Software reveals.
Posted: 09 Mar 2012 | Published: 05 Sep 2011

ComputerWeekly.com

BP Turns to Fujitsu for Technology Upgrade
sponsored by Cisco & Fujitsu
VIDEO: Find which vendor BP selected to ensure a seamless transition to their new operating system.
Posted: 20 Oct 2014 | Premiered: 11 Feb 2014

Cisco & Fujitsu

Brian Madden predicts how Wyse vWorkspace 8.5 will fare in the VDI market
sponsored by Dell, Inc.
EGUIDE: In this expert e-guide, world-renowned independent desktop virtualization expert Brian Madden offers his insight into the release of Wyse vWorkspace 8.5. Find out what he thinks of its simplicity, price and Dell enterprise support, and how it will compare to the competition.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Dell, Inc.

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Balancing Security and Usability of Mobile Devices
sponsored by BlackBerry
WHITE PAPER: This FAQ describes the conflicts that mobile devices bring to the workplace – namely staying secure while keeping employees happy. Learn how to establish a good middle ground for everyone – balancing information security with both convenience and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Bank Of New Zealand Reduces Carbon Footprint With Red Hat On The Mainframe
sponsored by Red Hat and JBoss
CASE STUDY: Like a large number of businesses in New Zealand and around the world, BNZ was close to reaching capacity in its datacenter and needed to determine how to maximise space while keeping costs down. In this case study we'll see how BNZ handled this and other challenges by migrating to Red Hat Enterprise Linux 5 running under z/VM on the mainframe.
Posted: 29 Jul 2009 | Published: 29 Jul 2009

Red Hat and JBoss

Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400)
sponsored by PowerTech
WHITE PAPER: This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

PowerTech

Best Practices for Integrating Mac OS X into Active Directory
sponsored by CDW
VIDEOCAST: Watch this seminar and learn how the built-in capabilities of Mac OS® X can enable you to integrate Mac OS X and Active Directory in a way that fits best with your environment.
Posted: 23 Apr 2010 | Premiered: Apr 23, 2010

CDW

Best practices for migrating from Windows XP to Windows 7
sponsored by Intel
EGUIDE: Upgrades to Windows 7 continue to abound. In fact, the decision to upgrade is often the easiest part -- it is the actual migration itself that is often the most agonizing. Take a look at this expert resource from the editors at SearchEnterpriseDesktop.com for a comprehensive analysis of the Windows 7 migration process.
Posted: 02 Aug 2011 | Published: 01 Aug 2011

Intel

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010

SpringCM

BetFair places its odds on Dell
sponsored by Dell, Inc. and Microsoft Windows 7
CASE STUDY: Leading betting company sees performance gains of approximately 20 per cent with Windows 7 implementation from Dell.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Dell, Inc. and Microsoft Windows 7

Better Software Management and More Secure Computers
sponsored by Dell, Inc. and Intel®
CASE STUDY: This whitepaper details the systems management solution that Princeton University selected to solve their three major IT problems.
Posted: 18 Jun 2014 | Published: 05 Dec 2013

Dell, Inc. and Intel®

BeyondTrust 2009 Microsoft Vulnerability Analysis
sponsored by BeyondTrust Corporation
WHITE PAPER: This report demonstrates the critical role that restricting administrator rights plays in protecting against vulnerabilities. It is important to note that this increased protection is achievable in one simple step without any impact on productivity — by implementing a desktop Privilege Identity Management solution.
Posted: 05 Apr 2010 | Published: 01 Apr 2010

BeyondTrust Corporation

BlackBerry PlayBook Tablet with OS 2.0, BlackBerry Mobile Fusion Management
sponsored by BlackBerry
WHITE PAPER: Discover how you can balance the personal and professional needs of today's mobile workforce and finally find harmony between security and usability.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Bringing Automation to the Data Center
sponsored by CA Technologies.
WHITE PAPER: A number of factors have emerged that clearly demonstrate the requirement for a more holistic approach to data center management.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

CA Technologies.

Bringing Order to the Chaos of “Bring Your Own Device”
sponsored by Enterasys
WHITE PAPER: In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this.
Posted: 01 Jun 2012 | Published: 30 Apr 2012

Enterasys

Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation

BuilderMT Increases Customer Satisfaction from 66% to 90% in Less than a Year with Parature
sponsored by Parature, Inc.
CASE STUDY: BuilderMT is the nation's leading provider of production management software for residential homebuilders, and has achieved wide notoriety and national awards for streamlining the workflow management process and improving the efficiency.
Posted: 25 Feb 2008 | Published: 01 Jan 2006

Parature, Inc.

Building a Mobile Strategy: Analyst Report Shows Key Components to Success
sponsored by Kony
ANALYST REPORT: Access this analyst report to discover how the enterprise appetite for mobilization grows – but progress has been slow.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Kony

Building and Managing a Performance Center of Excellence
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains advice on improving application performance. It also gives 10 tips for building and managing a performance center of excellence.
Posted: 09 Feb 2010 | Published: 09 Feb 2010

Hewlett-Packard Company
76 - 100 of 980 Matches Previous Page    2 3 4 5 6 7    Next Page
 
C SHELL DEFINITION (continued): …  for user input) is the % symbol. The C shell was invented for programmers who prefer a syntax similar to that of the C programming language. The other popular member of the C shell family is called tcsh (for Tab C shell) and is an extended version of C shell. Some of tcsh's added features are: enhanced history substitution (which allows you to reuse commands you have already typed), spelling correction, and word completion (which allows you to type the first couple of letters in a word and hit the tab key to have the program complete it). Once considered "buggy", the C shell has had a number of … 
C Shell definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement