ThinAir Server Platform White Paper June 2000

Size: px
Start display at page:

Download "ThinAir Server Platform White Paper June 2000"

Transcription

1 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, All Rights Reserved

2 Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part of it may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without permission from ThinAirApps Inc. June Printed in the United States of America. Trademark Attributions ThinAirApps SM, ThinAir Server, ThinAir Provider, ThinAirApps logos and/or other ThinAirApps products referenced herein are trademarks of ThinAirApps. The names of other products mentioned herein may be the trademarks of their respective owners. ThinAirApps 428 Broadway New York, New York, USA ThinAirApps, Inc. 1999, All Rights Reserved 1

3 The ThinAir Server Platform ThinAir Server is an open and extensible platform, offering applications a broad range of services focused on the wireless access paradigm. The server provides a rich execution environment, capable of supporting access from many different types of wireless devices, and of allowing applications to serve data to and interact with the users of these devices. Applications leverage core ThinAir Server functionality such as the ability to detect and gather device-specific information, store persistent user information, and access various distributed data access components. Real-Time Access to Data In contrast to mobile computing technologies that rely exclusively on synchronization between device and desktop, the ThinAir Server application model focuses on providing a real-time, two-way communication channel between end-users, with their myriad devices, and back-end data stores and organizational applications. Device users gain instant access to the most up-to-date information and have the ability to affect that data remotely. ThinAirApps, Inc. 1999, All Rights Reserved 2

4 A Secure Solution The modular architecture of ThinAir Server is designed to specifically address the wide range of security models employed by all types and sizes of organizations. The server leverages the same 128-bit Secure Sockets Layer (SSL) protocol relied upon by industry-leading Internet e-commerce and financial applications. The distributed architecture supports the most complex and tightly regulated firewall and LAN configurations with ease. The platform also takes maximum advantage of security mechanisms provided by Wireless Service Providers (WSPs) and device manufacturers, ensuring that your data is secure as it travels the numerous links between the enterprise and wireless device. Groupware Access for ThinAir Server The Groupware Access for ThinAir Server application is included with this server distribution, giving your organization an immediate channel from the most popular wireless devices into secure groupware and messaging servers. The devices supported by the Groupware Access application are include Palm handhelds, WAP and HDML handsets, RIM Pagers, and any HTML Micro-Browser including Pocket IE on Pocket PCs. Leading corporate messaging servers, such as Microsoft Exchange and Lotus Domino, are supported, as well as any open standards-based server which utilizes IMAP, POP, and LDAP. Empowering Developers ThinAir Server is designed to allow developers to quickly build applications that interface with existing Web sites, groupware servers, sales automation tools, databases, or virtually anything else. Please visit the Developer section of the ThinAirApps Web site at for more information and to download the Wireless SDK for ThinAir Server. An Open Platform ThinAir Server is an open, extensible platform for developing and delivering applications to a variety of wireless devices, from palmtops to WAP-enabled handsets. Implemented in 100% Pure Java, the ThinAir Server architecture manages the communication details of each device automatically, allowing developers to concentrate on writing the business logic of their applications. This document introduces developers to the tools and services that make up the Wireless SDK for ThinAir Server. It includes both a general overview of the ThinAir application development model and a series of step-by-step examples that use the SDK APIs to implement useful applications. An application built for ThinAir Server is composed of one or more components called Connectors. Each Connector is a small Java program written on top of the ThinAir Platform API that implements the application for a set of device types. The server provides each Connector with several run-time services, including device identification, session management, and a persistent data store for user information, that satisfy requirements common to most applications. ThinAirApps, Inc. 1999, All Rights Reserved 3

5 For more complex applications, a Connector can be complemented with a data-acquisition component called a Provider. By implementing a Provider, developers can delegate the interaction with a remote data store to a separate module, allowing the Connectors to focus exclusively on communication with devices. ThinAir Server supports Providers running within the same process, as separate processes on a single machine, or as fully distributed components on multiple servers within a public network. These options allow an organization to configure its applications for optimal scalability and fault-tolerance. Groupware Access for ThinAir Server is an example of a full-featured application leveraging the capabilities of the ThinAir Server. The Groupware application is composed of Connectors for Palm and RIM handhelds, WAP and HDML-enabled phones, and HTML Web browser devices including Pocket PC. The standard ThinAir Server installation includes Providers for POP, IMAP, Exchange, and Lotus Domino groupware servers. Each Connector can communicate with any of these Providers to obtain groupware data. Finally, the ThinAir Server architecture employs full SSL services (including HTTPS) to protect communication between devices, Connectors, and Providers. This and other features, including a fully encrypted user profile store, ensure that ThinAir Server meets the highest industry standards for security within a distributed system. ThinAirApps, Inc. 1999, All Rights Reserved 4

6 Architecture ThinAir Server provides a highly modular and pluggable foundation for serving applications to wireless devices. ThinAir Server accepts HTTP (or HTTPS) requests and distributes them to registered applications. These applications then respond to requests with content appropriate for each type of device. In the case of browser-based devices, this may be markup content such as WML, HDML, HTML, or others. For devices that support other types of content, applications may support them as well. Applications running on the server may consist of just a single component, or may in fact be made up of several discrete pieces, all easily administered, which communicate through the core server framework. Depending on the particular scheme of the device/wsp, ThinAir Server applications may also leverage client-side components to handle user-interface and network operations. Devices Independent of any applications running on it, ThinAir Server maintains a pool of device decision logic. This logic, built into dynamically pluggable components installed in the server, allows it to examine an incoming request, make decisions about the nature of the requesting device, and gather detailed information on that device to make available to applications. The server framework takes these responsibilities away from the application developer in a flexible, extensible way. Support for new devices can also be added as they are released into the market, ensuring long-term value of the server. Connectors Connectors, the fundamental building blocks of ThinAir Server applications, are responsible for receiving requests from particular types of devices and returning responses appropriate to the capabilities of those devices. ThinAir Server manages a set of loaded Connectors and delegates incoming requests to them appropriately based on device type and application. By using this approach, a ThinAir Server application can be expanded to support new types of devices simply by adding additional Connector functionality. Connectors may or may not support custom client software installed on the wireless device. ThinAir s Groupware Access application for the Palm handheld consists of both a server-side (Connector) and client-side (.PRC application) component. However, the same application also supports WAP-enabled handsets by taking advantage of the device s built-in WML browser and does not require any ThinAir software on the device. Connectors, then, support ThinAir Server applications and are configured as part of the ThinAir Server configuration process. Connector modules can be removed and inserted into ThinAir Server without restricting information flow to other devices. Providers Any back-end data-access logic required in a ThinAir Server application can be easily separated into a distributed, load-balanced component known as a Provider. While Providers are optional components of applications, in many cases they offer significant performance and management advantages. A Provider may be loaded with, and run in, the same process as ThinAir Server itself. It can also be configured to run standalone, residing on a different machine, including that of the data-store itself, or even in a different LAN or authentication domain. Once registered with a ThinAir Server, Providers accept requests from Connectors, authenticate them, and retrieve data from various stores using appropriate protocols. ThinAirApps, Inc. 1999, All Rights Reserved 5

7 ThinAir Server Device Detection Connector(s) Provider Data Store Device ConnectorAccess session management user profiles Provider proxy User Management Fundamental to ThinAir Server is its ability to manage User Profile information on behalf of applications. These profiles allow applications and administrators to manage user devices, ensuring that the user experience is fully tailored to their particular handheld and that administrators have a convenient, consistent way to control application use. The profile management aspect of the server extends to support different levels of authentication and varying security requirements. ThinAir Server includes a graphical tool, ThinAir Server User Manager, for administering the users, applications, and devices communicating with the server. Security Mechanisms ThinAir Server offers wireless devices a secure gateway into an organization s sensitive internal data stores. In addition to encrypting data as it travels over both wired and wireless public networks the ThinAir Server Platform offers authentication services and ensures the integrity of transmitted data. ThinAirApps leverages an industry-leading SSL 3.0 implementation from RSA Security, Inc. to accomplish this goal. The Secure Sockets Layer (SSL) protocol is a reasonably complex one, and some configuration is required to enable it for ThinAir Server. At the simplest level, SSL requires that a secure server have associated with it a Public Key Certificate and a Private Key. The server manages these through a ThinAir SSL Activation File, a file you generate based on your Certificate and Private Key. Between the Server and Wireless Devices The ThinAir Server manages potentially two SSL connections, one between the server and any Wireless Service Provider s proxy, and one between the server and any distributed Providers running with SSL Mode data connections. In the first case, ThinAir Server acts as a secure server and accepts secure connections from clients. Note that the client is actually not the wireless device in most cases, but a proxy server maintained by the WSP. This means it is important that these proxy servers recognize the Certificate Authority (CA) used to sign the ThinAir Server's Public Key, as it is not typically possible to accept new CAs as one might do in a conventional desktop Web browser such as Microsoft Internet Explorer. This also places restrictions on your ability to use your organization s own CA. ThinAirApps, Inc. 1999, All Rights Reserved 6

8 Between the Server and Distributed Providers When using an SSL Mode data connection between the server and distributed Providers, both components act as both server and client, depending on which makes the connection first. The /certs subdirectory of both the server and distributed Provider installations contains Root Certificates for a number of popular Certificate Authorities Root Certificates that are used to verify the validity of a server s certificate when the component is acting as a client. Both components must have a ThinAir SSL Activation File available, though the Certificate on which they are based may come from an internal or other less popular CA. If using a CA for which there is no Root Certificate in the /certs directory, you will need to add the Root Certificate appropriately. Applications, Devices, and User Profiles The ThinAir Server architecture provides three fundamental abstractions underlying both its administrative and application development models: Applications, Devices, and User Profiles. Applications An application is a collection of services that collaborate to provide wireless access to some computation or data store. In the ThinAir architecture, one or more Connectors implement an application. With the ThinAir User Manager tool, administrators can see which Applications have been installed on a server, and for each application, the users who have registered with it. The ThinAir platform provides a security model for applications that governs the conditions under which users of the system can access them, and how they can take advantage of the server s User Profile functionality. Using the User Manager, administrators can add and remove users to applications and modify these security settings to suit their organization s preferences. Devices ThinAir Server currently supports the industry s most popular and powerful wireless devices, and ThinAirApps mission is to keep pace with the latest advances in wireless technology. When a device contacts the server, its properties (such as screen size, resolution, or color depth) are automatically recognized by the server and made available to applications. If one such property is a unique device identifier, the Connector writer may choose to associate that ID directly with the User Profile of the person making the request. Connectors can use this technique to track users by their devices and to format output conditionally depending on the user and/or type of device to which they are responding. With the User Manager, administrators can graphically relate the devices a user possesses to the applications she is working with. User Profiles Applications often require the ability to identify repeat users and record new ones when they first contact the server. To address this common need, ThinAir Server creates a passwordprotected User Profile for each user of the system, identified by a globally unique ID (the user s ThinAir User ID). User Profiles include information about which devices a user possesses, which applications he has accessed, as well as any application-specific data (such as backend server account information) stored in them by Connectors. The ThinAir User Manager manipulates User Profiles directly, allowing an administrator to inspect a user s profile information, and add (or remove) users to the system and to particular applications. Finally, ThinAir Server can persist User Profiles to a flat file, and will recover this information when restarted. ThinAirApps, Inc. 1999, All Rights Reserved 7

9 Wireless Application Considerations There are many important steps to successfully building and deploying a wireless application. Each new application will be targeted at different sets of devices, and allow interaction with different sets of data. While the ThinAir Server Platform empowers developers to create wireless applications, there are still a variety of issues to understand and work through. Before you begin planning your code, you will want to make a few important decisions about your application: How will wireless extend your existing application? Not all Web or desktop-based applications will be easily extended to wireless devices. , stock trading, and formbased data collection are obvious applications, with fairly straightforward application models. Anything involving a basic push or pull of information can be supported easily. More complicated application models that involve data in various states with a high amount of interaction between the user and server will require more careful planning and consideration. The need for offline queuing and data access will also complicate your application, and its inclusion should be carefully considered. What devices do you want to support? Wireless devices vary widely in price, capabilities, and coverage; if your organization hasn t already standardized on one, it should make this decision very early in the development process. You may find that settling on a single device is impossible because of the diverse needs of your users. The ThinAir Server provides Connector writers with tools to accommodate almost any wireless device, but as the number of devices an application is required to support grows, so will the development effort. Technically, there are several key factors that may affect which device is best suited to your intended application, and thereby influence your design approach: Screen size and resolution. Make sure you ll have enough screen real estate to present a reasonable user interface. Markup language richness. Some devices support a variant of HTML, with an application shell (start screen) and certain resources, such as icons, resident on the device. Other devices use multiple card-based markup languages, allowing for device-side manipulation of data through variables and scripting. Examine the features of the device s markup language, and make sure they can support your intended interaction model. Input mechanism. If your application will require extended text input, be sure that the device provides a keyboard, stylus, or other mechanism that s comfortable to your users. Native application capability. Some wireless devices support only markuplanguage (browser-type) applications, while others are fully programmable. If your application will require complex processing on the device itself, make sure it s of the programmable type. (In many cases, though, processing should be offloaded to the server; the wireless application should be kept as simple as possible.) ThinAirApps, Inc. 1999, All Rights Reserved 8

10 Should your application be implemented as a single Connector or as several Connectors? A Connector is capable of servicing requests from one or more types of devices. If your application logic is basically the same for all device types, with minor changes, you ll probably want to implement it as a single Connector and insert some conditional logic to execute any device-specific code. On the other hand, if your implementation varies widely from device to device, your code will be simplified if you implement a separate Connector for each device type, with shared classes encapsulating the application logic. Do you want to implement Providers? If you are developing a simple application that does not require interaction with a back-end data store, or if some interaction is required, but it can be managed without a lot of complex code, then a Provider may not be necessary. However, if communicating with the back-end data store requires significant processing resources, or if it embeds logic that can be repackaged in a form that s more convenient for use by Connectors, then you may want to implement Providers for the data. You ll also want to consider whether your application would realize significant performance advantages by deploying distributed Providers. Distributed Providers permit the server to dynamically load-balance by routing requests in round-robin fashion to Providers running on different machines. The Connector(s) will handle device requests on one node of the network, while the Providers will communicate with the back-end store on others. How do you want to securely access back-end data stores? An application can attempt to access a secure back-end resource in any way the developer chooses it is a combination of administration and development work that ensure a well-behaved, unbreakable application. In this vein, the application development process happens in concert with the system administration of any back-end resource. For example, an administrator may maintain a database of internal customer data that a developer wishes to access in their application. This would typically be most effectively implemented by having the developer write the application using some standard database-access interface, such as JDBC, in coordination with the administrator maintaining user accounts for that database. The security of the application s back-end, then, can leverage the back-end security system with a username and password scheme. The ThinAir Server environment offers applications straightforward ways to store and securely manage this type of sensitive information, or even just to pass it straight through from the user every time. The Groupware Access for ThinAir Server application is an example of a highly secure solution built using a combination of back-end and internal server authentication and verification mechanisms. Each Groupware Access Provider implements a different security mechanism appropriate to the type of back-end store it accesses, though the application in general also optionally stores encrypted information in the User Profile Store. Conclusion Whether you are interested in wireless access to your groupware or messaging server, or you need to develop your own application, the ThinAir Server Platform provides a robust, secure, extensible solution. For the enterprise, the Groupware Access application is a quick and powerful solution for enabling the myriad of consumer wireless devices to become secure terminals into corporate servers. More enterprise-focused applications will also be released in the coming months, adding to the value of your existing server. For developers, the platform provides a real set of tools and services for enabling existing applications, without proposing an infeasible magical, all-in-one type solution. As the wireless device and application market evolves and expands, ThinAirApps modular and component-based technology can be updated and enhanced to support the most cutting-edge needs. ThinAirApps, Inc. 1999, All Rights Reserved 9

11 Please visit our Web site at for the latest information on our products, and the developer site at for more information on the Wireless SDK. ThinAirApps, Inc. 1999, All Rights Reserved 10

WHITE PAPER. Good Mobile Intranet Technical Overview

WHITE PAPER. Good Mobile Intranet Technical Overview WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

BlackBerry Integration With IBM WebSphere Everyplace Access 4.3

BlackBerry Integration With IBM WebSphere Everyplace Access 4.3 BlackBerry Integration With IBM WebSphere Everyplace Access 4.3 Integration Note Research In Motion 2003 Research In Motion Limited. All Rights Reserved. Contents Integration overview... 3 Related resources...

More information

RIM Introduces New BlackBerry Wireless Handhelds With Integrated Speaker/Microphone And Roaming Capabilities For International Travelers

RIM Introduces New BlackBerry Wireless Handhelds With Integrated Speaker/Microphone And Roaming Capabilities For International Travelers October 16, 2002 RIM Introduces New BlackBerry Wireless Handhelds With Integrated Speaker/Microphone And Roaming Capabilities For International Travelers Java-Based BlackBerry 6710 And BlackBerry 6720

More information

Extending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E

Extending the Domino System. Powered by Notes. The First Groupware and  Server for the Net R E L E A S E Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,

More information

RoadSync Java MIDP 2.0 Manual

RoadSync Java MIDP 2.0 Manual RoadSync Java MIDP 2.0 Manual Table of Contents General Product Information What is RoadSync (Exchange ActiveSync )... 4 Advantages for Companies and IT Administrators... 4 Key Product Features... 5 System

More information

BlackBerry Enterprise Server Express for Microsoft Exchange

BlackBerry Enterprise Server Express for Microsoft Exchange BlackBerry Enterprise Server Express for Microsoft Exchange Version: 5.0 Service Pack: 3 Feature and Technical Overview Published: 2011-04-11 SWDT305802-1526466-0411010819-001 Contents 1 Overview: BlackBerry

More information

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout

More information

Application Security for Java-based BlackBerry Handhelds

Application Security for Java-based BlackBerry Handhelds Application Security for Java-based Originally posted: February 2003 Latest revision: May 2003 Introduction Corporate data access capabilities supported by the BlackBerry platform enable wireless connectivity

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

BlackBerry Enterprise Server Express for IBM Lotus Domino

BlackBerry Enterprise Server Express for IBM Lotus Domino BlackBerry Enterprise Server Express for IBM Lotus Domino Version: 5.0 Service Pack: 3 Feature and Technical Overview Published: 2011-04-11 SWDT305802-1526466-0411011002-001 Contents 1 Overview: BlackBerry

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

General Security Principles

General Security Principles Oracle Enterprise Data Quality for Product Data Security Guide Release 11g R1 (11.1.1.6) E35849-02 February 2013 This document describes the general principles of security of the Oracle Enterprise Data

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

X100 ARCHITECTURE REFERENCES:

X100 ARCHITECTURE REFERENCES: UNION SYSTEMS GLOBAL This guide is designed to provide you with an highlevel overview of some of the key points of the Oracle Fusion Middleware Forms Services architecture, a component of the Oracle Fusion

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...

More information

Oracle Communications Services Gatekeeper

Oracle Communications Services Gatekeeper Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or

More information

Configuration Guide. Installation and. BlackBerry Enterprise Server for Novell GroupWise. Version: 5.0 Service Pack: 4

Configuration Guide. Installation and. BlackBerry Enterprise Server for Novell GroupWise. Version: 5.0 Service Pack: 4 BlackBerry Enterprise Server for Novell GroupWise Version: 5.0 Service Pack: 4 Installation and Configuration Guide Published: 2014-01-14 SWD-20140114171550404 Contents 1 Overview: BlackBerry Enterprise

More information

Qlik Analytics Platform

Qlik Analytics Platform Technical Brief Qlik Analytics Platform Building Engaging Visual Analytics October, 2015 qlik.com Table of Contents Introduction 3 Introducing Qlik Analytics Platform 3 Integration Capabilities 4 Architecture

More information

Alteryx Technical Overview

Alteryx Technical Overview Alteryx Technical Overview v 1.5, March 2017 2017 Alteryx, Inc. v1.5, March 2017 Page 1 Contents System Overview... 3 Alteryx Designer... 3 Alteryx Engine... 3 Alteryx Service... 5 Alteryx Scheduler...

More information

BlackBerry Java Development Environment (JDE)

BlackBerry Java Development Environment (JDE) 1 BlackBerry Java Applications for Accessing SAP Applications BlackBerry Java Development Environment The BlackBerry Java Development Environment (JDE) is a fully integrated development and simulation

More information

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage

More information

OneBridge Mobile Groupware 5.0

OneBridge Mobile Groupware 5.0 OneBridge Mobile Groupware 5.0 release overview Extended Systems 5777 North Meeker Avenue Boise, ID 83713 Tel: (800) 235-7576 (208) 322-7800 Fax: (208) 327-5004 Web: www.extendedsystems.com Rev. 1005 Legal

More information

Safeguarding Cardholder Account Data

Safeguarding Cardholder Account Data Safeguarding Cardholder Account Data Attachmate Safeguarding Cardholder Account Data CONTENTS The Twelve PCI Requirements... 1 How Reflection Handles Your Host-Centric Security Issues... 2 The Reflection

More information

5 OAuth Essentials for API Access Control

5 OAuth Essentials for API Access Control 5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide

Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower Configuration Guide SOAPMDP_Config_7.2.0 Copyright Copyright 2015 SOA Software, Inc. All rights

More information

SSO Integration Overview

SSO Integration Overview SSO Integration Overview 2006-2014 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 7.2 June, 2014 Ping Identity Corporation 1001 17th Street, Suite 100 Denver,

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for VMware ESX Server Release 5 (1.0.3.0.0) to Release 8 (1.1.3.2.0) E13339-05 November 2009 This document is the installation guide

More information

Load Balancing VMware Workspace Portal/Identity Manager

Load Balancing VMware Workspace Portal/Identity Manager Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access

More information

Echidna Concepts Guide

Echidna Concepts Guide Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

Pervasive Web Application Architecture. History Scalability Availability Development Application Architecture

Pervasive Web Application Architecture. History Scalability Availability Development Application Architecture Pervasive Web Application Architecture History Scalability Availability Development Application Architecture It support multiple devices, such as PCs, WAP phones, PDAs and voice-only phones enables to

More information

M.SARAVANA KARTHIKEYAN

M.SARAVANA KARTHIKEYAN PERVASIVE COMPUTING Unit II Part A 1. What is XML? XML stands for EXtensible Markup Language XML is a markup language much like HTML XML was designed to carry data, not to display data XML tags are not

More information

Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server

Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server NN49000-302 Document status: Standard Document version: 0101 Document date: 24 May 2007 All Rights

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

Oracle Mobile Hub. Complete Mobile Platform

Oracle Mobile Hub. Complete Mobile Platform Oracle Mobile Hub Mobile is everywhere and has changed nearly every facet of our lives. The way we work, play, socialize and interact with one another have all been revolutionized by mobile devices. More

More information

Secure Container DME. SecureContainer - DME is available for ios and Android.

Secure Container DME. SecureContainer - DME is available for ios and Android. Secure Container DME Soliton SecureContainer - DME is a remote access solution enabling employees to securely access corporate data using their mobile devices. Corporate e-mail, calendar, to-do s and other

More information

Enhancing VMware Horizon View with F5 Solutions

Enhancing VMware Horizon View with F5 Solutions Enhancing VMware Horizon View with F5 Solutions VMware Horizon View is the leading virtualization solution for delivering desktops as a managed service to a wide range of devices. F5 BIG-IP devices optimize

More information

Making life simpler for remote and mobile workers

Making life simpler for remote and mobile workers : Technology GoToMyPC Technology Making life simpler for remote and mobile workers Learn why GoToMyPC is the most secure, cost-effective and easy-to-use solution for providing remote access to the desktop.

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform

Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform By the F5 business development team for the Microsoft Global Alliance Version 1.0 Introduction As the use of mobile devices in the

More information

Siebel CTI Administration Guide. Siebel Innovation Pack 2015, Rev. A October 2015

Siebel CTI Administration Guide. Siebel Innovation Pack 2015, Rev. A October 2015 Siebel CTI Administration Guide Siebel Innovation Pack 2015, Rev. A October 2015 Copyright 2005, 2015 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided

More information

Wireless Access Protocol(WAP) architecture

Wireless Access Protocol(WAP) architecture Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

BusinessObjects OLAP Intelligence XI

BusinessObjects OLAP Intelligence XI Configuring Overview BusinessObjects OLAP Intelligence XI allows users to connect to and design custom applications against OLAP data sources. OLAP Intelligence XI and its web components use the Microsoft

More information

Server Installation ZENworks Mobile Management 2.6.x January 2013

Server Installation ZENworks Mobile Management 2.6.x January 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.6.x January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

WHITEPAPER. Security overview. podio.com

WHITEPAPER. Security overview. podio.com WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Creating Domains Using the Configuration Wizard 11g Release 1 (10.3.4) E14140-04 January 2011 This document describes how to use the Configuration Wizard to create, update, and

More information

BLOOMBERG FOR BLACKBERRY

BLOOMBERG FOR BLACKBERRY BLOOMBERG FOR BLACKBERRY Maintenance of Device Software 13 February 2008 Version: 1.0 1 CONTENTS 1. INTRODUCTION 2 1.1. Scope 2 2. DOWNLOADING of DEVICE SOFTWARE 3 3. SOFTWARE RELEASE SCHEDULE 4 4. SOFTWARE

More information

Security context. Technology. Solution highlights

Security context. Technology. Solution highlights Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for

More information

Qlik Sense Enterprise architecture and scalability

Qlik Sense Enterprise architecture and scalability White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,

More information

Understanding ACS 5.4 Configuration

Understanding ACS 5.4 Configuration CHAPTER 2 ACS 5.4 Configuration : This chapter explains the differences in configuration between ACS 3.x and 4.x and ACS 5.4 when you convert the existing 3.x and 4.x configurations to 5.4. This chapter

More information

Determining the Best Approach

Determining the Best Approach 2 Determining the Best Approach The remaining chapters of this book cover the capabilities of the BlackBerry application platform and then dig into each application development option in detail. Before

More information

How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications

How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications White Paper Reflection Desktop for X How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications White Paper How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

Siebel Installation Guide for Microsoft Windows

Siebel Installation Guide for Microsoft Windows Siebel Installation Guide for Microsoft Windows Siebel 2018 (Applies to Siebel CRM Updates 18.4 through 18.9) September 2018 Copyright 2005, 2018 Oracle and/or its affiliates. All rights reserved. This

More information

DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com

DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com By Bill Appleton, CTO, DreamFactory Software billappleton@dreamfactory.com Introduction DreamFactory

More information

Novell Access Manager

Novell Access Manager Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

Evaluation Guide Host Access Management and Security Server 12.4

Evaluation Guide Host Access Management and Security Server 12.4 Evaluation Guide Host Access Management and Security Server 12.4 Copyrights and Notices Copyright 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

The SafeNet Security System Version 3 Overview

The SafeNet Security System Version 3 Overview The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products

More information

Lightweight Directory Access Protocol (LDAP)

Lightweight Directory Access Protocol (LDAP) Lightweight Directory Access Protocol (LDAP) Blackboard Web Community Manager Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks,

More information

vshield Administration Guide

vshield Administration Guide vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

WHITE PAPER. F5 and Cisco. Supercharging IT Operations with Full-Stack SDN

WHITE PAPER. F5 and Cisco. Supercharging IT Operations with Full-Stack SDN + WHITE PAPER F5 and Cisco Supercharging IT Operations with Full-Stack SDN Contents Introduction 3 Confronting the bottleneck 3 Evolving SDN technologies 4 An integrated solution 5 Application policies,

More information

A10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE

A10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE A10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE Table of Contents 1. Introduction... 2 2 Deployment Prerequisites... 2 3 Oracle E-Business Topology... 3 4 Accessing the Thunder ADC Application

More information

Link Platform Manual. Version 5.0 Release Jan 2017

Link Platform Manual. Version 5.0 Release Jan 2017 Version 5.0 Release 4.1.1 Jan 2017 Link Platform Manual Copyright 2017 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

TECHNICAL HELP: PRESS * 0

TECHNICAL HELP: PRESS * 0 28-NOV- 2001 1 Oracle Corporation 9i Series iseminar: Presenters: Taesang Choi Eun Heo YunSeok Choi Fukiat Julnual Wednesday, November 28, 2001 28-NOV- 2001 2 think fast. think simple. think smart. 28-NOV-

More information

IBM SecureWay On-Demand Server Version 2.0

IBM SecureWay On-Demand Server Version 2.0 Securely delivering personalized Web applications IBM On-Demand Server Version 2.0 Highlights Delivers personalized Web solutions on demand to anyone, anywhere using profile serving Provides industry-leading,

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

Mozy. Administrator Guide

Mozy. Administrator Guide Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

Delivers cost savings, high definition display, and supercharged sharing

Delivers cost savings, high definition display, and supercharged sharing TM OpenText TM Exceed TurboX Delivers cost savings, high definition display, and supercharged sharing OpenText Exceed TurboX is an advanced solution for desktop virtualization and remote access to enterprise

More information

Safelayer's Adaptive Authentication: Increased security through context information

Safelayer's Adaptive Authentication: Increased security through context information 1 Safelayer's Adaptive Authentication: Increased security through context information The password continues to be the most widely used credential, although awareness is growing that it provides insufficient

More information

Xerox Mobile Print Solution

Xerox Mobile Print Solution Software Version 2.5 Version 1.3 Xerox Mobile Print Solution Information Assurance Disclosure Xerox Mobile Print Solution Copyright 2012 Xerox Corporation. All rights reserved. Includes Material Copyright

More information

Chapter 3. Technology Adopted. 3.1 Introduction

Chapter 3. Technology Adopted. 3.1 Introduction Chapter 3 Technology Adopted 3.1 Introduction The previous chapter described difference between the propose system and traditional methods and also about the existing similar systems. In this chapter,

More information

Siebel CTI Administration Guide. Siebel Innovation Pack 2016 May 2016

Siebel CTI Administration Guide. Siebel Innovation Pack 2016 May 2016 Siebel CTI Administration Guide Siebel Innovation Pack 2016 May 2016 Copyright 2005, 2016 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a

More information

What to Know About Exchange 2013 and Load Balancing

What to Know About Exchange 2013 and Load Balancing What to Know About Exchange 2013 and Load Balancing What are the major differences between Exchange 2010 and Exchange 2013? To answer that let s discuss the main architectural differences between Exchange

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

Load Balancing 101: Nuts and Bolts

Load Balancing 101: Nuts and Bolts Load Balancing 101: Nuts and Bolts Load balancing technology is the basis on which today's Application Delivery Controllers operate. But the pervasiveness of load balancing technology does not mean it

More information

Overview. Business value

Overview. Business value PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to

More information

AppScaler SSO Active Directory Guide

AppScaler SSO Active Directory Guide Version: 1.0.3 Update: April 2018 XPoint Network Notice To Users Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

Oracle Enterprise Single Sign-on Provisioning Gateway

Oracle Enterprise Single Sign-on Provisioning Gateway Oracle Enterprise Single Sign-on Provisioning Gateway Installation and Setup Guide Release 10.1.4.0.3 E10330-01 June 2007 Oracle Enterprise Single Sign-on Provisioning Gateway Installation and Setup Guide,

More information

Developing corporate mobile applications. An alternative approach to native development

Developing corporate mobile applications. An alternative approach to native development Developing corporate mobile applications An alternative approach to native development SUN J2ME Code Camp Paris, November 5th, 2001 Franck Lefèvre Franck.lefevre@DigitalAirways.com 2 The problem with developing

More information

Scaling for the Enterprise

Scaling for the Enterprise White Paper Solutions Business Manager Scaling for the Enterprise by Pete Dohner and Jeremy Vorndam June 2, 2017 Table of Contents Who Should Read This Paper?... 1 Introduction... 1 N-Tier Architecture...

More information

Release Notes 1 of 5. Release Notes. BlackBerry 7100g BlackBerry 7290 Wireless Handheld.

Release Notes 1 of 5. Release Notes. BlackBerry 7100g BlackBerry 7290 Wireless Handheld. Release Notes 1 of 5 Release Notes BlackBerry 7100g BlackBerry 7290 Wireless Handheld Release Notes 2 of 5 NOTE This document is provided for informational purposes only, and does not constitute a binding

More information

Cisco How Virtual Private Networks Work

Cisco How Virtual Private Networks Work Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:

More information

Domino Integration DME 4.6 IBM Lotus Domino

Domino Integration DME 4.6 IBM Lotus Domino DME 4.6 IBM Lotus Domino Document version 1.3 Published 10-05-2017 Contents... 3 Authentication and authorization: LDAP... 4 LDAP identity...4 Access groups...5 User information retrieval...6 Configuration...6

More information

Using the Terminal Services Gateway Lesson 10

Using the Terminal Services Gateway Lesson 10 Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web

More information

Globalbrain Administration Guide. Version 5.4

Globalbrain Administration Guide. Version 5.4 Globalbrain Administration Guide Version 5.4 Copyright 2012 by Brainware, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

ClearPath OS 2200 System LAN Security Overview. White paper

ClearPath OS 2200 System LAN Security Overview. White paper ClearPath OS 2200 System LAN Security Overview White paper Table of Contents Introduction 3 Baseline Security 3 LAN Configurations 4 Security Protection Measures 4 Software and Security Updates 4 Security

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Feature Guide. Sybase mbanking

Feature Guide. Sybase mbanking Feature Guide Sybase mbanking 365 2.1 DOCUMENT ID: DC00785-01-0210-01 LAST REVISED: March 2009 Copyright 2009 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and to any

More information

Verizon Wireless Corporate Setup Guide

Verizon Wireless Corporate  Setup Guide Verizon Wireless Corporate Email Setup Guide Verizon Wireless Corporate Email Setup Guide You must download and subscribe to the Corporate Email Client before you can begin using the application. You may

More information