libdata-uuid-perl 1.219-2 source package in Ubuntu

Changelog

libdata-uuid-perl (1.219-2) unstable; urgency=low


  * Fix replace and break versions of libossp-uuid-perl providing
    Data::UUID shim.

 -- Jonas Smedegaard <email address hidden>  Sat, 20 Jul 2013 22:52:37 +0200

Upload details

Uploaded by:
Debian Perl Group
Uploaded to:
Sid
Original maintainer:
Debian Perl Group
Architectures:
any
Section:
misc
Urgency:
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Trusty release universe misc

Downloads

File Size SHA-256 Checksum
libdata-uuid-perl_1.219-2.dsc 2.0 KiB 82826dc54088024b6a05f026785b9e1cc576237c512344443b3a30facc26e929
libdata-uuid-perl_1.219.orig.tar.gz 16.4 KiB c736d39a6fabf163423b85d94c62cbba6f57ca2f3115e21a0d0c91c23836da28
libdata-uuid-perl_1.219-2.debian.tar.gz 3.6 KiB 07f035617c070fbf70e7322dfe346205eb68c24b27aadbeb7c35e32fc89b02a5

No changes file available.

Binary packages built by this source

libdata-uuid-perl: globally/universally unique identifiers (GUIDs/UUIDs)

 Data::UUID provides a framework for generating v3 UUIDs (Universally
 Unique Identifiers, also known as GUIDs (Globally Unique Identifiers).
 A UUID is 128 bits long, and is guaranteed to be different from all
 other UUIDs/GUIDs generated until 3400 CE.
 .
 UUIDs were originally used in the Network Computing System (NCS) and
 later in the Open Software Foundation's (OSF) Distributed Computing
 Environment. Currently many different technologies rely on UUIDs to
 provide unique identity for various software components. Microsoft
 COM/DCOM for instance, uses GUIDs very extensively to uniquely identify
 classes, applications and components across network-connected systems.
 .
 The algorithm for UUID generation, used by this extension, is described
 in the Internet Draft "UUIDs and GUIDs" by Paul J. Leach and Rich Salz.
 (See RFC 4122.) It provides reasonably efficient and reliable
 framework for generating UUIDs and supports fairly high allocation
 rates -- 10 million per second per machine -- and therefore is suitable
 for identifying both extremely short-lived and very persistent objects
 on a given system as well as across the network.