Show
Ignore:
Timestamp:
12.06.2013 20:46:48 (7 years ago)
Author:
davidb
Message:

Improved wording

Files:
1 modified

Legend:

Unmodified
Added
Removed
  • gs2-extensions/afrepo/trunk/src/src/DONE.txt

    r27599 r27611  
    99* 
    10101. Run:  
    11 *   afr-makelinks 
    12 * to populate: 
    13 *   $GEXTAMP_INSTALLED/htdocs/afrepo/audio-ids 
    14 * with MD5 hashmap values based on the audio filenames in: 
    15 *   $GEXTAMP_INSTALLED/htdocs/afrepo/audio-files 
     11*    afr-makelinks 
     12*  to populate: 
     13*    $GEXTAMP_INSTALLED/htdocs/afrepo/audio-ids 
     14*  with MD5 hashmap based on content in 'audio-files' 
    1615* 
    17162. Followed by: 
    18 *   ./AFR-CLASSIFY.sh 
     17*    afr-classify-echoprint 
    1918*  to associate (where possible) Echonoest and/or MusicBrainz Linked Data 
    2019*  with each MD5 hashmapped audio file 
     20*  (this can be re-run as many times as needed to pick up on fingerprints that timed out) 
    2121* 
    22223. Next run in sequence 
    23 *   4s-backend-setup salami 
    24 *   4s-backend salami 
    25 *   4s-httpd -p @4store-port@ salami 
    26 * to initialize and start the 4store 'tripple-store' server  
    27 * ('4s-backend-setup' need only be run the very first time) 
    28 * To stop the server use 'kill' on the process ID *without* the -9 flag 
     23*    4s-backend-setup salami 
     24*    4s-backend salami 
     25*    4s-httpd -p @4store-port@ salami 
     26*  to initialize and start the 4store 'tripple-store' server  
     27*  ('4s-backend-setup' need only be run the very first time) 
     28*  To stop the server use 'kill' on the process ID *without* the -9 flag 
    2929* 
    30304. And then run: 
    31 *   afr-generateall 
    32 * to generate static RDF files and populate the tripple-store backend 
    33 * (the latter is to support Sparql queries) 
     31*    afr-generateall 
     32*  to generate static RDF files and populate the tripple-store backend 
     33*  (the latter is to support Sparql queries) 
    3434* 
    35355. Finally, run:  
    36 *   apchectl start 
     36*    apchectl start 
    3737* 
    3838* And in a web browser load up the URL: