Automated Validation of Trusted Digital Repository Assessment Criteria Journal of Digital Information (JoDI), Vol 8, No 2, 2007

Size: px
Start display at page:

Download "Automated Validation of Trusted Digital Repository Assessment Criteria Journal of Digital Information (JoDI), Vol 8, No 2, 2007"

Transcription

1 Autmated Validatin f Trusted Digital Repsitry Assessment Criteria Jurnal f Digital Infrmatin (JDI), Vl 8, N 2, 2007 Reagan W. Mre San Dieg Supercmputer Center 9500 Gilman Drive La Jlla, CA mre@sdsc.edu MacKenzie Smith MIT Libraries 77 Massachusetts Avenue Cambridge, MA kenzie@mit.edu ABSTRACT The RLG/NARA trusted digital repsitry (TDR) certificatin checklist defines a set f preservatin assessment criteria. The criteria can be mapped int management plicies that define hw a digital preservatin envirnment is perated. We explre hw these management plicies can be autmated thrugh their characterizatin as rules that cntrl preservatin services. By integrating a rule-based data management system with the DSpace digital library, we expect t demnstrate autmated audits f the TDR checklist. The system is sufficiently general that ne can als demnstrate the cmpleteness and self-cnsistency f preservatin envirnments. This is the cncept that all required preservatin are cntrlled by management plicies, and that fr each management plicy the required preservatin are preserved. Categries and Subject Descriptrs H.3.4 [Systems and Sftware]: Distributed systems, D.2.9 [Management]: life cycle, sftware prcess mdels, H.3.6 [Library Autmatin]: Large text archives General Terms Management, Dcumentatin, Verificatin. Keywrds Rule-based cnsistency management, Plicy expressin 1. INTRODUCTION The Research Library Grup, in cllabratin with the Natinal Archives and Recrds Administratin, has published An Audit Checklist fr the Certificatin f Trusted Digital Repsitries [TDR] [1]. The checklist defines a set f management plicies that are rganized int criteria fr the functinal prperties: Organizatin; Repsitry Functins, Prcesses, and Prcedures; The Designated Cmmunity & the Usability f Infrmatin; and Technlgies & Technical Infrastructure. While the dcument des nt specify the implementatin f the management plicies, we can define rules that check the implied assertins. We examine the set f rules and assciated state infrmatin required t autmate the verificatin f the trusted digital repsitry. In effect, we attempt t define the set f rules that validate the trustwrthiness f a repsitry. We extend this result t examine the cmpleteness and self-cnsistency f preservatin envirnments themselves. If it is pssible t define management plicies fr authenticity and integrity f recrds [2], ne can assert that a preservatin envirnment is cmplete when preservatin attributes exist fr each management plicy. We can assert that a preservatin envirnment is selfcnsistent if fr each preservatin attribute, a management plicy has been defined. An unexpected result frm this analysis is that the required preservatin fr cmpleteness and self-cnsistency are dependent n attributes used t define the entire preservatin envirnment (peple, management rules, etc.), and are nt simply assciated with attributes that identify recrds. Our apprach can be used t implement a prvably trustwrthy preservatin envirnment. 2. PRESERVATION ENVIRONMENT One can think f a preservatin envirnment as the set f sftware that prtects recrds frm changes that ccur in hardware systems, sftware systems, and even presentatin mechanisms. Preservatin envirnments insulate recrds frm changes that ccur in the external wrld while retaining the ability t display the recrds and assert authenticity and integrity f the recrds. Fr this t be feasible, the preservatin envirnment must manage all f the names needed t identify, discver, and manage recrds. The preservatin envirnment must als prvide mechanisms t guarantee the ability t parse and present digital data, even after the riginal creatin applicatin has becme bslete. A preservatin envirnment shuld be able t use mdern technlgy t access and display ld recrds. irods Trust Repsitries 1

2 Preservatin management plicies define the preservatin attributes that shuld be maintained by the preservatin envirnment. The RLG audit checklist describes a set f assessment criteria that the management plicies shuld cnserve. A preservatin envirnment is trustwrthy when it implements these management plicies. The DSpace digital asset management sftware [3], in cmbinatin with the Strage Resurce Brker (SRB) [4] distributed data management sftware, is an example f a preservatin envirnment. The cmbined system supprts the implementatin f a trusted digital repsitry fr lng-term preservatin. DSpace prvides management f standard prcessing steps fr the curatin f recrds. The SRB prvides management f the digital entities that may be replicated r distributed acrss multiple strage systems [5]. Tgether the tw systems prvide the capabilities needed t implement a preservatin envirnment. The DSpace/SRB system prvides administrative cmmands that can be issued t supprt ingestin f recrds, check assertins abut integrity and authenticity f the preserved recrds, and cntrl the display f recrds. Fr very large cllectins, these administrative tasks becme nerus. The ability t autmate the applicatin f administrative tasks that implement management plicies is essential fr building scalable preservatin envirnments. At the San Dieg Supercmputer Center, an integrated Rule-Oriented Data System (irods) is under develpment [6]. The irods system expresses management plicies as rules that cntrl the executin f preservatin micr-services, and manages the utcmes as persistent state infrmatin. Each rule is expressed as an [event cnditin (set f actins)] in which the actins are either micr-services r ther rules. Fr each Client Interface micr-service, a recvery prcedure is defined. The state infrmatin that is needed t execute a rule is dwnladed frm the persistent state infrmatin repsitry int a temprary cache. On successful cmpletin, the persistent state infrmatin is updated t preserve the utcme f applying the rule. Typical micr-services include the validatin f access cntrls, the selectin f a strage lcatin, the strage f a recrd, the replicatin f a recrd, and the validatin f a checksum. A typical rule may invke multiple micrservices. Thus a rule fr the ingestin f a recrd may invke each f the micr-services just described. A beta versin f the irods system was released in December The develpment f the irods envirnment required a cmplete descriptin f the prperties f a preservatin envirnment. In the develpment f the SRB data grid, three lgical namespaces were used t manage the identity f strage resurces, recrds, and persns. Preservatin attributes culd then be assciated as fr an entity defined by ne f these namespaces. In the irods envirnment, three additinal lgical namespaces were required t manage the identity f rules, micr-services, and persistent state infrmatin. In traditinal preservatin envirnments, preservatin attributes are mapped nt the lgical naming set used t identify recrds. We shall see that the management f a preservatin envirnment requires preservatin attributes that are mapped nt all six lgical namespaces: recrds, strage systems, persns, rules, micr-services, and persistent state infrmatin. The preservatin envirnment needs t manage all cmpnents f the preservatin envirnment t successfully satisfy assertins required fr a trusted digital repsitry. Admin Interface Resurces Resurce-based Services Rule Invker Rule Service Manager Rule Mdifier Mdule Cnfig Mdifier Mdule Metadata Mdifier Mdule Micr Service Engine Check Mdule Check Mdule Check Mdule Mdules Metadata-based Services Current State Repsitry Rule Cnfs Micr Service Metadata Persistent irods Trust Repsitries 2

3 Figure 1. irods rule-based data management system architecture The architecture f the irods system is shwn in Figure 1. The shaded cmpnents are the extensins applied t data grid technlgy t implement rule-based data management. The riginal data grid technlgy prvided a persistent repsitry (t hld bth state infrmatin and ), services fr the remte manipulatin f data and, access methds fr administratin f the preservatin envirnment, and user access methds. The rule-based envirnment adds: Rule base this stres the rules that implement the management plicies. Rule invker this lads the rule set needed t manage the interactins f a specified user with a specific recrd series. Rule engine this executes the rules that express management plicies. Temprary state infrmatin cache this manages the state infrmatin generated n executin f the micr-service set assciated with a rule. If recvery prcedures are invked t handle prblems with remte strage systems, the updates are made t the temprary state infrmatin cache. Micr-service cnsistency check mdule when new versins f micr-services are added, the functinality supprted by the micr-services is verified fr cnfrmance with prir functinality. Rule cnsistency check mdule when new versins f rules are added, the persistent state infrmatin that is generated is verified fr cnfrmance with prir persistent state infrmatin. Persistent state cnsistency check mdule when new persistent state infrmatin is defined, cnsistency checking is dne t ensure n verlap with prir persistent state infrmatin. The six lgical namespaces enable a preservatin envirnment t cntrl all prperties required t preserve recrds independently f the chice f hardware and sftware strage systems. The preservatin envirnment cntrls the identity f the archivists. The preservatin envirnment cntrls the file names under which recrds are stred. The preservatin envirnment manages the access cntrls defining wh is allwed t ingest recrds, wh is allwed t view recrds, and wh is allwed t manage recrd dispsitin. The preservatin envirnment can be migrated nt new types f strage systems and new catalgs withut having t change any f the namespaces. The ability t add new versins f rules, micr-services, and persistent state infrmatin means that the preservatin envirnment itself can evlve. The management plicies used tday can be extended t meet the new preservatin requirements that becme evident as technlgy evlves. The cmbinatin f DSpace and irods is designed t autmate the applicatin f preservatin management plicies at scale. 3. ASSESSMENT CRITERIA The RLG audit checklist can be applied t the DSpace/SRB system as implemented by a given rganizatin t determine whether all the management plicies are being adequately met t insure lng-term preservatin f the cntents. In this paper we g ne step further, and seek t have the DSpace/iRODS system autmatically validate the trustwrthiness defined by lcal plicy decisins. Our apprach is based upn the characterizatin f each item in the checklist as a rule that must be prcessed. Fr each rule, we identify the state infrmatin that must be prvided t drive the executin f the rule. We then validate the trustwrthiness based upn the state infrmatin that is generated by the applicatin f the rule. This prvides a mechanism t assert hw the trusted digital repsitry is being managed, and als prvides the infrmatin that is needed t validate the assertin. In ur design prcess, we discvered many implicatins within the TDR criteria that impact the ability t describe trustwrthiness. We encapsulate these implicatins in the fllwing bservatins: 1. The assessment criteria can be mapped t management plicies. 2. Implementatin f many f the management plicies requires mapping t a set f rules that can be autmatically evaluated. 3. Management rules require definitin f cntrl parameters that define hw an assertin is applied, as well as attributes that encapsulate the result f the applicatin f the rule The types f rules that are needed include: 1 As an example, take an assertin abut replicatin fr preservatin purpses. The cntrl parameter might be three cpies lcated in different cntinents, and the attributes wuld be the date and lcatin f each cpy made. irods Trust Repsitries 3

4 Specificatin f assertins (setting flags and ) Deferred cnsistency cnstraints that may be applied at any time (i.e. a-peridic) Peridic rules that execute defined prcedures Atmic rules applied n each peratin (access cntrls, audit trails) 5. The level f management granularity n which the rules are applied encmpasses the enterprise level, the archives level, the cllectin (recrd-series) level, and the item level. A specificatin f the multiple levels f management granularity is needed t understand hw t apply the TDR assessment criteria. 6. The rule that is applied at each level f granularity may differ, even thugh the same assessment criteria are being applied. This is ne f the mst imprtant bservatins: that each management plicy may require the definitin f multiple rules that are applied differently at each level f granularity. 7. Within the DSpace/SRB envirnment, additinal management plicies are needed beynd thse specified in the TDR dcument. These include plicies related t business case; security architecture; pen surce sftware license; user privacy; retentin schedule; dispsitin; destructin f recrds; withdrawal f recrds; risk management; prtectin data staging; and audit frequency. These shuld be evaluated fr pssible inclusin in a future versin f the TDR checklist. 8. The actual implementatin f the assessment criteria is dependent upn the persistence f the namespaces n which the management plicies are applied [7]. The management plicies need t apply t persistent identifiers fr users, files, strage systems, rules, micr-services, and persistent state infrmatin. The persistent identifiers are managed as six separate namespaces. Preservatin is then assciated with entities identified by each naming set. Thus preservatin prperties assciated with archivists are stred as attributes n the archivist s name. Preservatin prperties assciated with strage systems are stred as attributes n the strage repsitry name. 9. The trusted preservatin repsitry shuld implement multiple levels f virtualizatin t enable migratin nt new technlgy withut impacting the ability f the system t meet the assessment criteria. In practice this includes bth management f the six persistent namespaces and the management f tw levels f mapping between the actins specified in user interfaces and the standard peratins fr interacting with strage systems (data virtualizatin). The preservatin envirnment maps frm the applicatin level actins t standard micr-services. The micr-services are then mapped t the set f standard peratins that can be executed at remte strage systems. A preservatin envirnment als manages the authenticatin envirnment (trust virtualizatin), and the rule executin engine (cnstraint virtualizatin) independently f the chice f hardware infrastructure [8]. We als bserve that the chice f levels f granularity impacts the types f rules that are needed. The rules used at the enterprise level are typically assertins that define the state infrmatin required by rules executed at finer levels f granularity. The deferred cnsistency cnstraints are typically applied at the cllectin level t enfrce assertins made n the cllectin. An example is checking cmpliance f Submissin Infrmatin Packages with Service Level Agreement specificatins. The peridic rules are applied at the cllectin (recrd series) level, and are driven by mandates fr peridic validatin f integrity. An example wuld be the validatin f integrity every 6 mnths. The atmic rules are evaluated at the item level n each executin f a related peratin. The standard example is the checking f access cntrls befre an peratin is perfrmed upn a file. If additinal levels f granularity are defined, such as a recrd grup level, ne cncern is that additinal types f rules may be required. In practice, we expect nly these fur types f rules. This implies that a rule engine that is capable f executing all fur rule types shuld be able t autmate validatin f the trustwrthiness f a digital repsitry. The irods system has been designed t supprt the fur types f rules that have been identified (specificatin f assertins, deferred cnsistency cnstraints, peridic rules, and atmic rules). Thus the irods system shuld be able t execute the rules that implement the management plicies. By creating rules that cmpare the persistent state infrmatin utcmes with the assertins that drive the management plicies, irods will be able t track whether the management plicies are being met. This cnstitutes autmatin f the validatin f trustwrthiness f a digital repsitry. Finally, we bserve that the mapping f the certificatin criteria t the management plicies planned fr the DSpace/iRODS system is nt ne-t-ne. Multiple assessment criteria may apply t a particular repsitry management plicy. We address this issue by explicitly listing each time when the assessment criteria shuld be applied, and the additinal rules that are applied. 4. RULES T prvide a flavr f the assessment, we list sme example rule sets fr selected TDR criteria. We select an example frm each level f granularity, including a case irods Trust Repsitries 4

5 where the same TDR criteria must be evaluated at multiple levels f the data management hierarchy. The left-mst clumn in tables 1-4 is the management numbering scheme used in the DSpace/SRB plicy assessment. The numbering scheme uses 1 fr enterprise level, 2 fr archives level, 3 fr cllectin level, and 4 fr item level. The secnd number identifies the management plicy at that level f granularity. The secnd clumn lists the crrespnding plicy. The third clumn lists the TDR criteria number that mst clsely crrespnds t the management plicy. # Plicy layers / types Annual review f planning prcesses Table 1. Enterprise Level Rule Example TDR A4.2 Rule r prcedure State inf - result f rule applicatin Timestamp f last planning prcess review List f dates f annual review prcess Descriptin Annual prcess t review and adjust business plans Repsitry has in place at least annual prcesses t review and adjust business plans as necessary The 4 th clumn lists the type f rule that is needed. The 5 th clumn lists examples f the state infrmatin that are needed fr either executing the rule, r fr managing the result f the applicatin f the rule. The right-mst clumn prvides an explanatin f the plicy. In Table 1, there are tw items listed fr the plicy entitled Annual review f planning prcesses. The first rw is the criteria as prpsed within the DSpace/SRB system. The secnd rw lists the crrespnding TDR criteria. # 4. Plicy layers / types 2.14 Persistent identifiers TDR B2.4 Table 2. Archives Level Rule r prcedure rule - check that handle was created Set/update naming specificatin State inf result f rule applicatin List f types f GUID. Lists f lcatins f handle systems fr creating GUIDs Specificatin f standard naming cnventin fr physical files Descriptin Management f mapping f identifiers t SIPs. Which type are assigned and t what? Are multiple identifiers fr an item supprted? Repsitry has and uses a naming cnventin that can be shwn t generate visible, unique identifiers fr all AIPs B2.5 Set/update templates Prducerarchive submissin pipeline fr extracting n ingest; Template based extractin If unique identifiers are assciated with SIPS befre ingest, they are preserved in a way that maintains a persistent assciatin with the resultant AIP. In Table 2, tw assessment criteria frm the TDR checklist shuld be applied t the management plicy fr persistent identifiers. The types f rules that are needed include bth deferred cnsistency checking as well as setting f state infrmatin needed fr rule validatin. The persistent identifiers require mapping t the identifier used in the Archival Infrmatin Package (AIP) frm the identifiers specified in the Submissin Infrmatin Package (SIP). In Tables 3 and 4, the same TDR criterin (A5.1) is applied at multiple levels f granularity. Rule A5.1 was applied at bth the cllectin and item level. In additin t managing the service level agreement that specifies the required cnsistency checks, is als needed t allw changes t the service level agreement t ccur. Fr the item level rule, we als listed the additinal TDR criteria that were applied. This indicates that multiple assessment criteria are applicable fr a given plicy. The validatin f the data frmat requires checking rules related t Service Level Agreements, AIP definitins, allwed transfrmative migratins, and assciatin f with each file. # Plicy layers / types Service level agreements fr cllectins Table 3. Cllectin Level TDR A5.1 Rule r prcedure flags State inf - result f rule applicatin Flag fr specificatin f type f service level agreement Depsit agreement fr strage f data specifying access, replicas, cnsistency checks Descriptin Maintain a service level agreement fr each cllectin. Specify required by SIP type. If repsitry manages, preserves, and/r prvides access t digital materials n behalf f anther rganizatin, it has and maintains apprpriate cntracts r depsit irods Trust Repsitries 5

6 agreements. The full assessment f the TDR criteria takes 13 pages t print in 8-pint type. The cmplete mapping is available upn request. Please cntact Reagan Mre at mre@sdsc.edu fr a cpy r visit the prject website at 5. TRUSTED DIGITAL REPOSITORY The autmatin f the verificatin f the assessment criteria fr a trusted digital repsitry can nw be implemented as a set f peridic rules that are applied t the preservatin envirnment. The rules examine the persistent state infrmatin, cmpare the values with the desired values, and generate reprts f the recrds r prperties that are nt in cmpliance. Sme f the rules are applied n each peratin perfrmed within the preservatin envirnment. Examples are the authenticatin f the identity f the archivist and the checking f access cntrls. Sme f the rules are applied as deferred cnsistency checks. Since preservatin envirnments may be distributed acrss multiple administrative dmains and access multiple types f strage systems, a mechanism is needed t handle wide-area-netwrk failures. If a preservatin peratin is suppsed t create a replica at a remte strage lcatin (t avid data lss in case f a natural disaster), it may nt be pssible t cmplete the peratin. The netwrk may be dwn r the remte strage system may be ff line fr maintenance. In this case, a deferred cnsistency flag is set that indicates the replica must still be created. Deferred cnsistency checks lk fr such cases and attempt t cmplete the peratin. If the replica is created successfully, the deferred replica creatin flag is reset. If the attempt is unsuccessful, the flag is nt updated, and a future attempt may succeed in creating the replica. # 6. Plicy layers / types 4.2 Frmat Rule r TDR prcedure A5.1 Peridic rule - check cnsistency with required frmats rule - check that depsit agreement exists Table 4. Item Level State inf - result f rule applicatin List f supprted frmats and flag fr SLA supprt level fr each Descriptin Whether file frmat is accepted, preservatin SLA fr each accepted frmat; Als any requirements fr quality within frmat (e.g. cmpliance with TIFF 6.0 acceptance specs) Depsit If repsitry manages, agreement fr preserves, and/r strage f prvides access t data digital materials n specifying behalf f anther B2.1 rule that AIP definitin exists access, replicas, cnsistency checks rganizatin, it has and maintains apprpriate cntracts r depsit agreements. Repsitry has an identifiable, written Statement f definitin fr each AIP characteristics r class f infrmatin f each AIP preserved by the repsitry rule - check Criteria fr allwed allwed B2.2 (r class) that is transfrmative transfrmative migratin is migratins perfrmed B3.9 B4.2 : check fr changes t allwed transfrmative migratins rule - check required Prcedure fr updating transfrmative migratin strategy: Audit trail f changes; check fr changes t migratin strategy Repsitry has a definitin f each AIP adequate t fit lng-term preservatin needs Repsitry has mechanisms t change its preservatin plans as a result f its mnitring activities Validatin Repsitry captures r that minimum creates minimum and is ensures that it is present assciate with the AIP rules are typically applied peridically because the preservatin envirnment is a dynamic entity. Prperties that have been asserted as verified in the past may change based n circumstances nt under archivist cntrl. T make this cncept clearer, cnsider a validatin f integrity. One f the prperties shuld be the existence f replicas at a remte site that have been verified as being bit-fr-bit identical with the riginal. There are multiple surces f risk that can cause this prperty t becme invalid: Media crruptin the tape n which the replica was created may be damaged and becme unreadable Administrative errr a systems administratr at the remte site may have erased the file Vendr prduct errr the remte strage system may have crrupted the data. An example is a micr-cde update t a tape drive that is incrrectly perfrmed. Replicas must be peridically checked t verify that they are still reliable. A trustwrthy preservatin envirnment is ne in which all assertins n integrity and authenticity have been irods Trust Repsitries 6

7 verified within a specified time perid. The verificatin prcess must be repeated peridically. Preservatin envirnments are live systems that require cnstant appraisal and validatin. 6. SELF-CONSISTENT PRESERVATION ENVIRONMENTS Given the ability t characterize assessment criteria as rules that verify preservatin attribute values, we can nw explre the cncepts f cmpleteness and self-cnsistency fr preservatin envirnments. Multiple preservatin grups have created lists f preservatin that shuld be assciated with a trusted digital repsitry. An example is the PREMIS preservatin list. This defines authenticity and integrity, prvenance, and administrative that shuld be created fr each recrd within a digital repsitry [9]. Fr trustwrthiness, assessment criteria can be defined t validate the attribute value assciated with each PREMIS element. Verificatin tests culd include whether the attribute exists, whether the value lies within the expected range r is included in the expected enumerated list. Each recrd can be examined and a list generated f all recrds that are nn-cmpliant. When all recrds have the required, the system can be cnsidered trustwrthy. Assessment criteria, therefre, shuld prvide cnsistency checks n all preservatin assciated with each recrd. A preservatin envirnment can be cnsidered self-cnsistent when a management plicy exists fr each required preservatin attribute. In practice, there are multiple preservatin attributes that are used t express administrative required t keep the preservatin envirnment running crrectly. Thus we need t differentiate between the attributes required t assert preservatin prperties (integrity and authenticity) and attributes required t mnitr the running f the preservatin envirnment (time the last set f assertins were validated). We als want t assert that a preservatin envirnment is cmplete. If preservatin attributes exist fr each management plicy, then we have clsure. We can map frm required preservatin attributes t the management plicies needed t assess trustwrthiness. We can then map frm these management plicies back t the preservatin that are needed t keep the preservatin envirnment running successfully. We will have demnstrated that the system is capable f validating the assessment criteria. This analysis raises the questin: Shuld preservatin envirnments be based n the management plicies required t assert trustwrthiness? Or shuld preservatin envirnments be defined by a set f required preservatin attributes? In practice, mst preservatin envirnments have been designed t assciate required preservatin with each recrd. These attributes may then be rganized, as in the Life Cycle Data Requirements Guide [10]. A preservatin envirnment that meets these requirements can be defined and implemented. By examining the preservatin envirnment frm the perspective f assessment criteria, we discver that additinal preservatin are required, assciated with all six lgical namespaces used t identify resurces, persns, recrds, rules, micr-services, and persistent state infrmatin. Examples f these additinal preservatin attributes include: User Resurce Rule Identificatin as archivist, r staff Allwed rles fr creating dispsitin dcuments, transferring recrds, anntating recrds Type f strage system Access classificatin Media type Rule type Access cntrl Versin number Persistent State Versin number Attribute creatin date These additinal attributes are needed because the preservatin envirnment itself evlves. Given that the technlgy that is used t implement a preservatin envirnment changes ver time as new technlgy is acquired, the preservatin envirnment must als evlve t maintain an unchanging recrd cllectin. The preservatin attributes that are needed t maintain trustwrthiness include nt nly the required preservatin attributes assciated with the recrd prvenance, but als the preservatin attributes that define the preservatin envirnment attributes. 7. ACKNOWLEDGMENTS This prject was supprted by the Natinal Archives and Recrds Administratin under NSF cperative agreement thrugh a supplement t SCI , Cyberinfrastructure; Frm Visin t Reality. The views and cnclusins cntained in this dcument are irods Trust Repsitries 7

8 thse f the authrs and shuld nt be interpreted as representing the fficial plicies, either expressed r implied, f the Natinal Science Fundatin, the Natinal Archives and Recrds Administratin, r the U.S. gvernment. 8. REFERENCES [1] Audit Checklist fr Certifying Digital Repsitries, [2] Fr a general discussin f the definitin f authenticity and integrity in digital preservatin envirnments see Lynch, C. (2000). Authenticity and integrity in the digital envirnment: An explratry analysis f the central rle f trust. In Authenticity in a digital envirnment (Cuncil n Library and Infrmatin Resurces reprt). [3] DSpace digital repsitry, [4] Strage Resurce Brker data grid, [5] Mre, R., A. Rajasekar, M. Wan, Data Grids, Digital Libraries and Persistent Archives: An Integrated Apprach t Publishing, Sharing and Archiving Data, Special Issue f the Prceedings f the IEEE n Grid Cmputing, Vl. 93, N.3, pp , March [6] Rajasekar, A., M. Wan, R. Mre, W. Schreder, A Prttype Rule-based Distributed Data Management System, HPDC wrkshp n Next Generatin Distributed Data Management, May 2006, Paris, France. [7] Mre, R., Building Preservatin Envirnments with Data Grid Technlgy, American Archivist, vl. 69, n. 1, pp , July [8] Mre, R., R. Marcian, Technlgies fr Preservatin, chapter 6 in Managing Electrnic Recrds, edited by Julie McLed and Catherine Hare, Facet Publishing, UK, Octber [9] Preservatin Metadata: Implementatin Strategies (PREMIS) defines a schema t supprt digital preservatin activities and digital lifecycle management. The current schema can be fund at [10] LCDRG irods Trust Repsitries 8

Admin Report Kit for Exchange Server

Admin Report Kit for Exchange Server Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses

More information

Adverse Action Letters

Adverse Action Letters Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin

More information

HP Server Virtualization Solution Planning & Design

HP Server Virtualization Solution Planning & Design Cnsulting & Integratin Infrastructure Services HP Server Virtualizatin Slutin Planning & Design Service descriptin Hewlett-Packard Cnsulting & Integratin Infrastructure Cnsulting Packaged Services (HP

More information

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110 NCTA-Certified Clud Technlgist (NCT) Exam NCT-110 Exam Infrmatin Candidate Eligibility: The NCTA-Certified Clud Technlgist (NCT) exam requires n applicatin fee, supprting dcumentatin, nr ther eligibility

More information

Introduction to Mindjet on-premise

Introduction to Mindjet on-premise Intrductin t Mindjet n-premise Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 www.mindjet.cm 2012 Mindjet. All Rights Reserved

More information

OATS Registration and User Entitlement Guide

OATS Registration and User Entitlement Guide OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t

More information

Customer Upgrade Checklist

Customer Upgrade Checklist Custmer Upgrade Checklist Getting Ready fr Yur Sabre Prfiles Upgrade Kicking Off the Prject Create a prfiles prject team within yur agency. Cnsider including peple wh can represent bth the business and

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

Reporting Requirements Specification

Reporting Requirements Specification Cmmunity Mental Health Cmmn Assessment Prject OCAN 2.0 - ing Requirements Specificatin May 4, 2010 Versin 2.0.2 SECURITY NOTICE This material and the infrmatin cntained herein are prprietary t Cmmunity

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7

IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

Overview of Data Furnisher Batch Processing

Overview of Data Furnisher Batch Processing Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...

More information

OVAL Language Design Document

OVAL Language Design Document OVAL Language Design Dcument Versin 5.1 2006 The MITRE Crpratin. All rights reserved. Intrductin...3 OVAL Overview...3 Implementatin f the Language...3 OVAL Definitin Schema...4 ...4 ...4

More information

UPGRADING TO DISCOVERY 2005

UPGRADING TO DISCOVERY 2005 Centennial Discvery 2005 Why Shuld I Upgrade? Discvery 2005 is the culminatin f ver 18 mnths wrth f research and develpment and represents a substantial leap frward in audit and decisin-supprt technlgy.

More information

Child Care Services Association Request for Proposal Durham PreK Website

Child Care Services Association Request for Proposal Durham PreK Website Child Care Services Assciatin Request fr Prpsal Durham PreK Website Prject Summary Child Care Services Assciatin (CCSA) (Agency) is seeking prpsals frm a firm r individual designer/develper (Vendr) t develp

More information

App Orchestration 2.6

App Orchestration 2.6 App Orchestratin 2.6 Terminlgy in App Orchestratin 2.6 Last Updated: July 8, 2015 Page 1 Terminlgy Cntents Elements f App Orchestratin... 3 Dmains... 3 Multi-Datacenter Deplyments... 4 Delivery Sites...

More information

High Security SaaS Concept Software as a Service (SaaS) for Life Science

High Security SaaS Concept Software as a Service (SaaS) for Life Science Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...

More information

PAGE NAMING STRATEGIES

PAGE NAMING STRATEGIES PAGE NAMING STRATEGIES Naming Yur Pages in SiteCatalyst May 14, 2007 Versin 1.1 CHAPTER 1 1 Page Naming The pagename variable is used t identify each page that will be tracked n the web site. If the pagename

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in this

More information

ROCK-POND REPORTING 2.1

ROCK-POND REPORTING 2.1 ROCK-POND REPORTING 2.1 AUTO-SCHEDULER USER GUIDE Revised n 08/19/2014 OVERVIEW The purpse f this dcument is t describe the prcess in which t fllw t setup the Rck-Pnd Reprting prduct s that users can schedule

More information

Forcepoint UEBA Management of Personal Data

Forcepoint UEBA Management of Personal Data Frcepint UEBA Management f Persnal Data 2018 Frcepint LLC. All Rights Reserved Dcument Classificatin: Public FPWSCMPD-2018MAY24 Frcepint UEBA Management f Persnal Data CONTENTS Disclaimer... 2 General...

More information

Patch Management Policy

Patch Management Policy Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:

More information

Oracle Universal Records Management Oracle Universal Records Manager Adapter for Documentum Installation Guide

Oracle Universal Records Management Oracle Universal Records Manager Adapter for Documentum Installation Guide Oracle Universal Recrds Management Oracle Universal Recrds Manager Adapter fr Dcumentum Installatin Guide December 2009 Universal Recrds Manager Adapter fr Dcumentum Installatin Guide, Cpyright 2009, Oracle.

More information

CA CMDB Connector for z/os

CA CMDB Connector for z/os PRODUCT SHEET: CA CMDB CONNECTOR FOR Z/OS CA CMDB Cnnectr fr z/os CA CMDB Cnnectr fr z/os discvers mainframe cnfiguratin items (CIs) and enables ppulatin f that infrmatin int the CA CMDB repsitry. Designed

More information

Element Creator for Enterprise Architect

Element Creator for Enterprise Architect Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the

More information

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems

Date: October User guide. Integration through ONVIF driver. Partner Self-test. Prepared By: Devices & Integrations Team, Milestone Systems Date: Octber 2018 User guide Integratin thrugh ONVIF driver. Prepared By: Devices & Integratins Team, Milestne Systems 2 Welcme t the User Guide fr Online Test Tl The aim f this dcument is t prvide guidance

More information

Extended Traceability Report for Enterprise Architect

Extended Traceability Report for Enterprise Architect Extended Traceability Reprt User Guide Extended Traceability Reprt fr Enterprise Architect Extended Traceability Reprt fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins

More information

Maximo Reporting: Maximo-Cognos Metadata

Maximo Reporting: Maximo-Cognos Metadata Maxim Reprting: Maxim-Cgns Metadata Overview...2 Maxim Metadata...2 Reprt Object Structures...2 Maxim Metadata Mdel...4 Metadata Publishing Prcess...5 General Architecture...5 Metadata Publishing Prcess

More information

Case Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website.

Case Metrics Guide. January 11, 2019 Version For the most recent version of this document, visit our documentation website. Case Metrics Guide January 11, 2019 Versin 9.6.202.10 Fr the mst recent versin f this dcument, visit ur dcumentatin website. Table f Cntents 1 Case Metrics 3 1.1 Case Metrics Cmpatibility Matrix 3 1.2

More information

CaseWare Working Papers. Data Store user guide

CaseWare Working Papers. Data Store user guide CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3

More information

Microsoft Excel Extensions for Enterprise Architect

Microsoft Excel Extensions for Enterprise Architect Excel Extensins User Guide Micrsft Excel Extensins fr Enterprise Architect Micrsft Excel Extensins fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Installatin... 4 Verifying

More information

Document Hosting System (DHS) v2.1.4 Manual. Description. User Roles

Document Hosting System (DHS) v2.1.4 Manual. Description. User Roles Dcument Hsting System (DHS) v2.1.4 Manual Descriptin AllTranstek s DHS (Dcument Hsting System) prvides a centralized library fr secure archiving, management, and delivery f dcuments. User Rles There are

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

DocAve 6 Granular Backup and Restore

DocAve 6 Granular Backup and Restore DcAve 6 Granular Backup and Restre User Guide Service Pack 3 Revisin H Issued August 2013 1 Table f Cntents Abut DcAve Granular Backup and Restre... 5 Cmplementary Prducts... 5 Submitting Dcumentatin Feedback

More information

Creating a TES Encounter/Transaction Entry Batch

Creating a TES Encounter/Transaction Entry Batch Creating a TES Encunter/Transactin Entry Batch Overview Intrductin This mdule fcuses n hw t create batches fr transactin entry in TES. Charges (transactins) are entered int the system in grups called batches.

More information

CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led

CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: www.inf-trek.cm CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER Curse 10964B; Duratin: 5 Days; Instructr-led WHAT YOU WILL LEARN This curse

More information

UFuRT: A Work-Centered Framework and Process for Design and Evaluation of Information Systems

UFuRT: A Work-Centered Framework and Process for Design and Evaluation of Information Systems In: Prceedings f HCI Internatinal 2007 UFuRT: A Wrk-Centered Framewrk and Prcess fr Design and Evaluatin f Infrmatin Systems Jiajie Zhang 1, Keith A. Butler 2 1 University f Texas at Hustn, 7000 Fannin,

More information

Installation and Getting Started

Installation and Getting Started Eurstat Data Transmissin Tls & Services EDAMIS Web Applicatin v3.1 Installatin and Getting Started TABLE OF CONTENTS: 1 Intrductin... 2 2 Installatin... 2 2.1 Prerequisites... 2 2.2 EWA installatin...

More information

Network Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Survey Template

Network Rail ARMS - Asbestos Risk Management System. Training Guide for use of the Import Survey Template Netwrk Rail ARMS - Asbests Risk Management System Training Guide fr use f the Imprt Survey Template The ARMS Imprt Survey Template New Asbests Management Surveys and their Survey Detail reprts can be added

More information

MAGNET identity management proposal for Personal Networks. Dimitris M. Kyriazanos

MAGNET identity management proposal for Personal Networks. Dimitris M. Kyriazanos Internatinal Telecmmunicatin Unin MAGNET identity management prpsal fr Persnal Netwrks Dimitris M. Kyriazans PhD Student NTUA Geneva, 5 December 2006 Persnal Netwrk - A Definitin A Persnal Netwrk (PN)

More information

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu

BANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu

More information

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist

Customer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System

More information

CONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2

CONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2 Réf. ThmX-NT-SI-CC001 Table f Cntents Sftware Technical Specificatins fr ThmX Authr : Philippe Page 1 / 9 1.INTRODUCTION... 2 2.TECHNICAL REQUIREMENTS... 2 3.DOCUMENTATION REQUIREMENTS... 4 4.COMPUTING

More information

Exchange Archive Monitoring

Exchange Archive Monitoring Unified Archive \ Best Practices \ Mail Archiving Exchange Archive Mnitring ZL TECHNOLOGIES Last Updated: Octber 21, 2014 This dcument intrduces the numerus ZL UA features and functinalities an rganizatin

More information

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page

Proper Document Usage and Document Distribution. TIP! How to Use the Guide. Managing the News Page Managing the News Page TABLE OF CONTENTS: The News Page Key Infrmatin Area fr Members... 2 Newsletter Articles... 3 Adding Newsletter as Individual Articles... 3 Adding a Newsletter Created Externally...

More information

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010

Final Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010 Date June 15 th 2010 Authrs Charitn Kuridis Dr Mia Fu Dr Andrew Kelly Thmas Papagergiu Client Eurpean Cmmissin DG Climate Actin Directrate A: Internatinal & Climate Strategy Unit A4: Strategy & Ecnmic

More information

Users, groups, collections and submissions in DSpace. Contents

Users, groups, collections and submissions in DSpace. Contents Users, grups, cllectins and submissins in DSpace Cntents Key cncepts... 2 User accunts and authenticatin... 2 Authrisatin and privileges... 2 Resurce plicies... 2 User rles and grups... 3 Submissin wrkflws...

More information

TRANSPIRE Data Management plan Version 1.0 April

TRANSPIRE Data Management plan Version 1.0 April Deliverable Reprt Authr : Thmas Archer / Rbert Trncs Date : 29.05.2017 Deliverable Deliverable name (Shrt name) WP N. Lead participant Type Diss. Level Date D6.2 Data Management Plan 5 NTNU Reprt Public

More information

SAS Viya 3.2 Administration: Mobile Devices

SAS Viya 3.2 Administration: Mobile Devices SAS Viya 3.2 Administratin: Mbile Devices Mbile Devices: Overview As an administratr, yu can manage a device s access t SAS Mbile BI, either by exclusin r inclusin. If yu manage by exclusin, all devices

More information

Software Engineering

Software Engineering Sftware Engineering Chapter #1 Intrductin Sftware systems are abstract and intangible. Sftware engineering is an engineering discipline that is cncerned with all aspects f sftware prductin. Sftware Prducts

More information

ClassFlow Administrator User Guide

ClassFlow Administrator User Guide ClassFlw Administratr User Guide ClassFlw User Engagement Team April 2017 www.classflw.cm 1 Cntents Overview... 3 User Management... 3 Manual Entry via the User Management Page... 4 Creating Individual

More information

Chapter 6: Lgic Based Testing LOGIC BASED TESTING: This unit gives an indepth verview f lgic based testing and its implementatin. At the end f this unit, the student will be able t: Understand the cncept

More information

Aloha Offshore SDLC Process

Aloha Offshore SDLC Process Alha Sftware Develpment Life Cycle Alha Offshre SDLC Prcess Alha Technlgy fllws a sftware develpment methdlgy that is derived frm Micrsft Slutins Framewrk and Ratinal Unified Prcess (RUP). Our prcess methdlgy

More information

Software Usage Policy Template

Software Usage Policy Template Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/

More information

EU General Data Protection Regulation

EU General Data Protection Regulation EU General Data Prtectin Regulatin Sally Ubnske, Senir Business Systems Analyst, subnske@ariessys.cm Sean MacRae, Business Systems Analyst, smacrae@ariessys.cm GDPR Summary The Eurpean Parliament, the

More information

Password Management Guidelines

Password Management Guidelines Unified Cntract System Passwrd Management Guidelines Versin 2.5 Revisin date: 26-06-2006 Authr:J.Thiyagarajan Cpyright 2006 by Hexaware Technlgies Limited All rights reserved. All text and figures included

More information

Dell EqualLogic PS Series Arrays: Expanding Windows Basic Disk Partitions

Dell EqualLogic PS Series Arrays: Expanding Windows Basic Disk Partitions TECHNICAL REPORT Dell EqualLgic PS Series Arrays: Expanding Windws Basic Disk Partitins ABSTRACT This Technical Reprt describes hw t expand Micrsft Windws basic disk vlumes after increasing the size f

More information

RxAXIS Security Module 09/25/2013

RxAXIS Security Module 09/25/2013 RxAXIS Security Mdule 09/25/2013 Lessn Title Intrductin: Security Mdule In this tutrial we are ging t lk at the Security Maintenance Mdule f the RxAXIS system. When used, this system gives emplyees access

More information

Chapter 14. Basic Planning Methodology

Chapter 14. Basic Planning Methodology Chapter 14 Basic Planning Methdlgy This chapter prvides a basic and generic methdlgy fr planning prtectin requirements. It fcuses n the primary cnsideratins fr designing and implementing a basic strage

More information

Integrating QuickBooks with TimePro

Integrating QuickBooks with TimePro Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data

More information

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering

E. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is

More information

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins) Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective

More information

Workshop Background. Purpose. Context

Workshop Background. Purpose. Context Wrkshp Backgrund Purpse Prvide yu with resurces and tls t help yu t create, stre, and use metadata t help extend the use f yur research utputs. Cntext Wrkshp Series: Preservatin and Curatin f ETD Research

More information

Dashboard Extension for Enterprise Architect

Dashboard Extension for Enterprise Architect Dashbard Extensin fr Enterprise Architect Dashbard Extensin fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins f the free versin f the extensin... 3 Example Dashbard

More information

BlackBerry Server Installation and Upgrade Service

BlackBerry Server Installation and Upgrade Service Server and Upgrade Service Prgram Descriptin ( Install and Upgrade Service Prgram Descriptin ) NOTE: This dcument includes all attached Annexes, is prvided fr infrmatinal purpses nly, and des nt cnstitute

More information

Infrastructure Series

Infrastructure Series Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing

More information

SOLA and Lifecycle Manager Integration Guide

SOLA and Lifecycle Manager Integration Guide SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names

More information

Update: Users are updated when their information changes (examples: Job Title or Department). o

Update: Users are updated when their information changes (examples: Job Title or Department). o Learn Basic User Integratin Batch File Prcessing The Learn Basic User Integratin is designed t manage the rganizatinal changes cmpanies are challenged with n a daily basis. Withut a basic type f integratin,

More information

OmniPCX Record PCI Compliance 2.3

OmniPCX Record PCI Compliance 2.3 S T R A T E G I C W H I T E P A P E R OmniPCX Recrd PCI Cmpliance 2.3 Alcatel-Lucent Enterprise Services Page 1/11 OmniPCX-Recrd R2.3 PCI Cmpliance White Paper Legal ntice Alcatel, Lucent, Alcatel-Lucent

More information

Ascii Art Capstone project in C

Ascii Art Capstone project in C Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,

More information

Creating an Automation Framework to make Record and Play Automation practical for Test Use Cases

Creating an Automation Framework to make Record and Play Automation practical for Test Use Cases Creating an Autmatin Framewrk t make Recrd and Play Autmatin practical fr Test Use Cases Cpyright Ntice Gemetric Limited. All rights reserved. N part f this dcument (whether in hardcpy r electrnic frm)

More information

Cookbook Qermid Defibrillator web service Version This document is provided to you free of charge by the. ehealth platform

Cookbook Qermid Defibrillator web service Version This document is provided to you free of charge by the. ehealth platform Ckbk Qermid Defibrillatr web service Versin 1.01 This dcument is prvided t yu free f charge by the ehealth platfrm Willebrekkaai 38 38, Quai de Willebrek 1000 BRUSSELS All are free t circulate this dcument

More information

Overview. Enhancement for Policy Configuration Module

Overview. Enhancement for Policy Configuration Module Overview Digital File Plicy Management: Cnfiguratin Mdule Enhancement and Inter-applicatin Plicy Sharing Digital file plicies determine hw digital files are prcessed befre being depsited int RUcre repsitry.

More information

Element Creator for Enterprise Architect

Element Creator for Enterprise Architect Element Creatr User Guide Element Creatr fr Enterprise Architect Element Creatr fr Enterprise Architect... 1 Disclaimer... 2 Dependencies... 2 Overview... 2 Limitatins... 3 Installatin... 4 Verifying the

More information

INFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION

INFORMATION TECHNOLOGY SERVICES NIST COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION NIST 800-171 COMPLIANCE AT FSU - CONTROLLED UNCLASSIFIED INFORMATION WHAT IS NIST 800-171 COMPLIANCE AND WHY DO WE HAVE TO DO IT? Any Cntrlled Unclassified Infrmatin (CUI) residing in nnfederal infrmatin

More information

Constituent Page Upgrade Utility for Blackbaud CRM

Constituent Page Upgrade Utility for Blackbaud CRM Cnstituent Page Upgrade Utility fr Blackbaud CRM In versin 4.0, we made several enhancements and added new features t cnstituent pages. We replaced the cnstituent summary with interactive summary tiles.

More information

CCNA Security v2.0 Chapter 3 Exam Answers

CCNA Security v2.0 Chapter 3 Exam Answers CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin

More information

UML : MODELS, VIEWS, AND DIAGRAMS

UML : MODELS, VIEWS, AND DIAGRAMS UML : MODELS, VIEWS, AND DIAGRAMS Purpse and Target Grup f a Mdel In real life we ften bserve that the results f cumbersme, tedius, and expensive mdeling simply disappear in a stack f paper n smene's desk.

More information

Assignment 10: Transaction Simulation & Crash Recovery

Assignment 10: Transaction Simulation & Crash Recovery Database Systems Instructr: Ha-Hua Chu Fall Semester, 2004 Assignment 10: Transactin Simulatin & Crash Recvery Deadline: 23:59 Jan. 5 (Wednesday), 2005 This is a grup assignment, and at mst 2 students

More information

Oracle FLEXCUBE Universal Banking Development Workbench- Screen Development II

Oracle FLEXCUBE Universal Banking Development Workbench- Screen Development II Oracle FLEXCUBE Universal Banking 12.0.3 Develpment Wrkbench- Screen Develpment II August 2013 1 Cntents 1 Preface... 3 1.1 Audience... 3 1.2 Related Dcuments... 3 2 Intrductin... 4 3 Generated Files...

More information

OO Shell for Authoring (OOSHA) User Guide

OO Shell for Authoring (OOSHA) User Guide Operatins Orchestratin Sftware Versin: 10.70 Windws and Linux Operating Systems OO Shell fr Authring (OOSHA) User Guide Dcument Release Date: Nvember 2016 Sftware Release Date: Nvember 2016 Legal Ntices

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

Log shipping is a HA option. Log shipping ensures that log backups from Primary are

Log shipping is a HA option. Log shipping ensures that log backups from Primary are LOG SHIPPING Lg shipping is a HA ptin. Lg shipping ensures that lg backups frm Primary are cntinuusly applied n standby. Lg shipping fllws a warm standby methd because manual prcess is invlved t ensure

More information

Iowa State University

Iowa State University Iwa State University Cyber Security Smart Grid Testbed Senir Design, Design Dcument Dec 13-11 Derek Reiser Cle Hven Jared Pixley Rick Suttn Faculty Advisr: Prfessr Manimaran Gvindarasu Table f Cntents

More information

Kaltura MediaSpace Installation and Upgrade Guide. Version: 5.0

Kaltura MediaSpace Installation and Upgrade Guide. Version: 5.0 Kaltura MediaSpace Installatin and Upgrade Guide Versin: 5.0 Kaltura Business Headquarters 5 Unin Square West, Suite 602, New Yrk, NY, 10003, USA Tel.: +1 800 871 5224 Cpyright 2013 Kaltura Inc. All Rights

More information

PF Process from clinical data Collection to SDTM

PF Process from clinical data Collection to SDTM PF Prcess frm clinical data Cllectin t SDTM 29 May 2018 PIERRE FABRE LABORATORIES p 1 SUMMARY 01 Cntext Actuel Prcess 02 03 04 Areas fr Imprvement Cnclusin Q&A p 2 Cntext p 3 Cntext (1) Over the last 2

More information

What's New 3. Install DocuSign for SharePoint 5. DocuSign for SharePoint Settings 11. Send Documents using DocuSign for SharePoint 23

What's New 3. Install DocuSign for SharePoint 5. DocuSign for SharePoint Settings 11. Send Documents using DocuSign for SharePoint 23 Quick Start Guide DcuSign fr SharePint On-Prem v3.1 Published: July 18, 2017 Overview DcuSign fr SharePint allws users t sign r get signatures frm any SharePint dcument library. This guide prvides infrmatin

More information

TRAINING GUIDE. Overview of Lucity Spatial

TRAINING GUIDE. Overview of Lucity Spatial TRAINING GUIDE Overview f Lucity Spatial Overview f Lucity Spatial In this sessin, we ll cver the key cmpnents f Lucity Spatial. Table f Cntents Lucity Spatial... 2 Requirements... 2 Setup... 3 Assign

More information

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform

Your New Service Request Process: Technical Support Reference Guide for Cisco Customer Journey Platform Supprt Guide Yur New Service Request Prcess: Technical Supprt Reference Guide fr Cisc Custmer Jurney Platfrm September 2018 2018 Cisc and/r its affiliates. All rights reserved. This dcument is Cisc Public

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

Kaltura Video Extension for SharePoint 2013 Deployment Guide for Microsoft Office 365. Version: 1.0

Kaltura Video Extension for SharePoint 2013 Deployment Guide for Microsoft Office 365. Version: 1.0 Kaltura Vide Extensin fr SharePint 2013 Deplyment Guide fr Micrsft Office 365 Versin: 1.0 Kaltura Business Headquarters 250 Park Avenue Suth, 10th Flr, New Yrk, NY 10003 Tel.: +1 800 871 5224 Cpyright

More information

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL

More information

DocAve 6 ediscovery. User Guide. Service Pack 3, Cumulative Update 1. Revision F Issued August DocAve 6: ediscovery

DocAve 6 ediscovery. User Guide. Service Pack 3, Cumulative Update 1. Revision F Issued August DocAve 6: ediscovery DcAve 6 ediscvery User Guide Service Pack 3, Cumulative Update 1 Revisin F Issued August 2013 1 Table f Cntents Abut DcAve ediscvery... 4 Cmplementary Prducts... 4 Submitting Dcumentatin Feedback t AvePint...

More information

Chapter 10: Information System Controls for System Reliability Part 3: Processing Integrity and Availability

Chapter 10: Information System Controls for System Reliability Part 3: Processing Integrity and Availability Chapter 10: Infrmatin System Cntrls fr System Reliability Part 3: Prcessing Integrity and Availability Cntrls Ensuring Prcessing Integrity Input Prcess Output Input Cntrls Garbage-in Garbage-ut Frm Design

More information

Taking advantage of FundRef, Ringgold, and ORCID

Taking advantage of FundRef, Ringgold, and ORCID Gt ID? Taking advantage f FundRef, Ringgld, and ORCID Mike Di Natale Business Systems Analyst mdinatale@ariessys.cm rcid.rg/0000-0002-0136-5875 bit.ly/emug15-gtid Agenda Intrductin Integrated Identifiers

More information

CORE 7 to 8 Data Migration Guide

CORE 7 to 8 Data Migration Guide CORE 7 t 8 Data Migratin Guide i Cpyright 2011 Vitech Crpratin. All rights reserved. N part f this dcument may be reprduced in any frm, including, but nt limited t, phtcpying, translating int anther language,

More information

Course 10262A: Developing Windows Applications with Microsoft Visual Studio 2010 OVERVIEW

Course 10262A: Developing Windows Applications with Microsoft Visual Studio 2010 OVERVIEW Curse 10262A: Develping Windws Applicatins with Micrsft Visual Studi 2010 OVERVIEW Abut this Curse In this curse, experienced develpers wh knw the basics f Windws Frms develpment gain mre advanced Windws

More information

Post-Event Response Version: 2.0 Overview Date: 3/17/2004. Annex 6, Part 1: Smallpox Response System Requirements

Post-Event Response Version: 2.0 Overview Date: 3/17/2004. Annex 6, Part 1: Smallpox Response System Requirements Pst-Event Respnse Versin: 2.0 Annex 6, Part 1: Smallpx Respnse System Requirements Versin 2.0 Centers fr Disease Cntrl Page 1 and Preventin (CDC), 2004 Pst-Event Respnse Versin: 2.0 Intrductin The guidelines

More information

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel NiceLabel LMS Installatin Guide fr Single Server Deplyment Rev-1702 NiceLabel 2017. www.nicelabel.cm 1 Cntents 1 Cntents 2 2 Architecture 3 2.1 Server Cmpnents and Rles 3 2.2 Client Cmpnents 3 3 Prerequisites

More information