Solved

Adding path in linux/unix

Posted on 2014-09-21
10
184 Views
Last Modified: 2014-10-19
How can I add a path in linux/unix so a module check that location.  The error I am recieving now is
cant locate module.pm @INC

Thanks
Jack
0
Comment
Question by:Jack_son_
  • 3
  • 3
  • 2
  • +1
10 Comments
 
LVL 84

Expert Comment

by:ozo
ID: 40335626
see
perldoc lib

cf. @INC in
perldoc perlvar
0
 
LVL 13

Assisted Solution

by:Sandy
Sandy earned 500 total points
ID: 40336403
echo $PATH

set PATH=$PATH;<your path>
export PATH

TY/SA
0
 

Author Comment

by:Jack_son_
ID: 40336445
Thanks; one question, this wont remove the paths that are in place, I just want to add to the path list
0
 
LVL 13

Accepted Solution

by:
Sandy earned 500 total points
ID: 40336446
no it wont..
0
VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

 

Author Comment

by:Jack_son_
ID: 40336731
it is indicating this is a directory and gives an error
0
 
LVL 84

Expert Comment

by:ozo
ID: 40337501
What is indicating, and what error?
Is your question about $PATH in the shell environment, or about @INC in perl?
0
 

Author Comment

by:Jack_son_
ID: 40345998
The program seems to be getting the path from @INC in perl; I am not an expert in this area and just need to add one more dir to this path
0
 
LVL 84

Expert Comment

by:ozo
ID: 40346002
see
perldoc lib
0
 
LVL 58

Expert Comment

by:Gary
ID: 40390610
I've requested that this question be closed as follows:

Accepted answer: 500 points for ozo's comment #a40335626

for the following reason:

This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Why do we like using grid based layouts in website design? Let's look at the live examples of websites and compare them to grid based WordPress themes.
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…
Any person in technology especially those working for big companies should at least know about the basics of web accessibility. Believe it or not there are even laws in place that require businesses to provide such means for the disabled and aging p…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now