Data exchange using EDAMIS. Item 2.1 of the agenda SISAI-Metadata Working Group meeting 2015
|
|
- Maximillian Carr
- 5 years ago
- Views:
Transcription
1 Data exchange using EDAMIS Item 2.1 of the agenda SISAI-Metadata Working Group meeting 2015
2 Agenda 1. EDAMIS data transfer infrastructure 2. EDAMIS Web Application (EWA) 3. EDAMIS Web Portal (EWP) 4. Intended developments / changes in EDAMIS SISAI-Metadata Working Group meeting
3 EDAMIS data transfer infrastructure The Electronic Data files Administration and Management Information System (EDAMIS) is the integrated environment for data transmissions between Eurostat and the Member States For data delivery two transfer features / protocols are available: EWA / Statel (FTP/HTTP) EWP / EWF (HTTPS) Year Transferred files EWA EWP / EWF (58%) (39%) (53%) (45%) (44%) (44%) (42%) (47%) SISAI-Metadata Working Group meeting
4 EDAMIS data transfer infrastructure Member States Mail smtp Mail Server stopped Data Centre Statel ftp / http Statel Environment Explorer / Robot EWA EWP https EDAMIS SISAI-Metadata Working Group meeting
5 EDAMIS Web Application (EWA) In all National Statistical Institutes, ECB, OECD and some Central Banks the EWA is implemented. Situation 45 installations in the different organisations 42 installations using EWA V3.1.0 or higher. 3 installations using EWA Migration intended in the next few weeks. 4 installations where the user management is not synchronised at the moment. Transfer protocol HTTP used by 22 EWA Transfer protocol FTP used by 23 EWA SISAI-Metadata Working Group meeting
6 EDAMIS Web Application (EWA) Near future The transfer protocol FTP will be stopped because of security constraints. The destination address (URL) for the HTTP protocol will be changed. FTP switch of protocol in all Windows EWA as both protocols are available. Unix / Linux EWA will be changed later. The underlying Statel client has to be replaced. technical person in charge in Member States already asked whether change is possible in their network premises. HTTP change of destination URL New address will be provided when the environment is finally tested SISAI-Metadata Working Group meeting
7 EDAMIS Web Portal (EWP) All EDAMIS users with corresponding rights can send data via the user interface. Three features are available Situation Three features are available at the moment: Send Datafile (simple) - encrypted data delivery via https Send Datafile (advanced) - normal data delivery via https WebForm - special delivery feature via https Near Future A new file upload feature will be operational in July enhanced proxy management in order to avoid network security problems in Member States better performance and possibility to send big data (> 100MB) already tested by several organisations SISAI-Metadata Working Group meeting
8 EDAMIS Web Portal (EWP) SISAI-Metadata Working Group meeting
9 Intended developments / changes in EDAMIS EDMAMIS infrastructure Intended to change underlying EDAMIS infrastructure for several central components: Replacement of operation system platform SunSolaris by Linux / RedHat Migration of web application server Coldfusion from V8 to V10 Change should be realised transparent for end users, i.e. there will be no long interruption of the service EDAMIS Web Forms (EWF) Modification of the code used for this transfer feature. Increasing number of problems with Java Feature has now reached its limitation Analysing of the future of EWF component has already started SISAI-Metadata Working Group meeting
10 Intended developments / changes in EDAMIS WebService The current transport layer was developed around years ago. There are restrictions on the current transmission protocols of Statel Requests by several Member States to have the possibility for a direct application to application communication via WebService Analysing of the new feature has already started SISAI-Metadata Working Group meeting
Action plan to diagnose STATEL-eWA connection problems
Action plan to diagnose STATEL-eWA connection problems Table of contents 1. SCOPE OF THE DOCUMENT...3 2. HOW TO DIAGNOSE PROBLEM WITH STATEL 4.2...3 2.1. STATEL TRANSMISSION MODE... 3 2.2. DIRECT FTP CONNECTION...
More informationedamis Web Forms for sending data to Eurostat
Scope Creating Web Form instances for datasets by using the edamis Web Portal. Preparing data for sender. Making official transfers. Accessing to the Web Form Entry list. Prerequisites To be an edamis
More informationDirectorate B: Quality, methodology and information systems
EUROPEAN COMMISSION EUROSTAT Directorate B: Quality, methodology and information systems EDAMIS Dataset Naming Convention (DSNC) The naming convention for 1. Datasets, 2. Dataset occurrences This document
More informationProposals for the 2018 JHAQ data collection
EUROPEAN COMMISSION EUROSTAT Directorate F: Social statistics Unit F-5: Education, health and social protection DOC 2017-PH-02.2 Proposals for the 2018 JHAQ data collection Item 2.2 of the Agenda Meeting
More informationQuick User Guide for TCO EDAMIS 3.3
Quick User Guide for TCO EDAMIS 3.3 Author Eurostat Unit B5: Data and metadata services and standards Release 1.0 Status Final Reference GUI 2016-04-20 GUI (Quick User Guide for TCO) F.doc TABLE OF CONTENTS
More informationUNIT 5 MANAGING COMPUTER NETWORKS LEVEL 3 NETWORK PROTOCOLS
UNIT 5 MANAGING COMPUTER NETWORKS LEVEL 3 NETWORK PROTOCOLS NETWORK PROTOCOLS A network manager needs to be aware of a number of different protocols, especially those that exist in the Application Layer
More informationOverview of the U.S. Bank secure migration web portal
Overview of the U.S. Bank secure migration web portal What is the purpose of this portal? Provides a secure delivery method for current and future transmission details Facilitates collaboration with U.S.
More informationLinux VPN Configuration
Linux VPN Configuration Note. This information is based on Red Hat 9.0, it should be used as a guide only as other distributions may have similar installation methods. VPN Software Installation - PPP (Point-to-Point
More informationData Consistency Management for Hybrid Scenarios
Data Consistency Management for Hybrid Scenarios Thomas Schröder, SAP SE April 6th, 2015 Customer Agenda Introduction Cross Database Comparison for Hybrid Use Cases Scenario 1: Comparison based on Hana
More informationUnit 28 Website Production ASSIGNMENT 1
Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web
More informationWhat s New in GoAnywhere MFT 5.6?
What s New in GoAnywhere MFT 5.6? Introductions Bob Luebbe, CISSP Chief Architect Steve Luebbe Director of Engineering Agenda Introduction to GoAnywhere MFT 5.6 Overview of new features Live demo How to
More informationData Access and Analysis with Distributed, Federated Data Servers in climateprediction.net
Data Access and Analysis with Distributed, Federated Data Servers in climateprediction.net Neil Massey 1 neil.massey@comlab.ox.ac.uk Tolu Aina 2, Myles Allen 2, Carl Christensen 1, David Frame 2, Daniel
More informationWatchGuard Dimension v1.1 Update 1 Release Notes
WatchGuard Dimension v1.1 Update 1 Release Notes Build Number 442674 Revision Date March 25, 2014 WatchGuard Dimension is the next-generation cloud-ready visibility solution for our Unified Threat Management
More informationRicoh Managed File Transfer (MFT) User Guide
Ricoh Managed File Transfer (MFT) User Guide -- TABLE OF CONTENTS 1 ACCESSING THE SITE... 3 1.1. WHAT IS RICOH MFT... 3 1.2. SUPPORTED BROWSERS... 3 1.3. LOG IN... 3 1.4. NAVIGATION... 4 1.5. FORGOTTEN
More informationUploaded files are stored for 6 months, after which time we remove them. Please note the SIFT Server is for the transfer of Chorus information only.
SIFT User guide Our secure internet file transfer (SIFT) server is a secure mechanism that allows you to receive e-bills, invoices, CDRs, price books, NGA schedule availability and other sensitive information
More informationSTATEL Hub Installation Guide Eurostat
STATEL Hub Installation Guide I STATEL Hub Installation Table of Contents Foreword 0 Part I Introduction 2 1 Welcome... 2 2 Requirements... 2 Part II Installation 2 1 Download installer... program 2 2
More informationA corporate approach to processing microdata in Eurostat
A corporate approach to processing microdata in Eurostat Pál JANCSÓK and Christine WIRTZ Eurostat Unit B4 1 Agenda Introduction Generic SAS Tool (GSAST) architecture Microdata processing Architecture Metadata
More informationXML Web Service? A programmable component Provides a particular function for an application Can be published, located, and invoked across the Web
Web Services. XML Web Service? A programmable component Provides a particular function for an application Can be published, located, and invoked across the Web Platform: Windows COM Component Previously
More informationVMware Workspace ONE UEM VMware AirWatch Cloud Connector
VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationVMware AirWatch Cloud Connector Guide ACC Installation and Integration
VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationIntroducing SkyPipe link optimisation for BGAN
Introducing SkyPipe link optimisation for BGAN Version 2 6 June 2008 inmarsat.com/bgan Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationAn overview of irods clients. Ton Smeele
An overview of irods clients Ton Smeele agenda irods client-server architecture Client libraries Out of the box clients Example customer-developed client irods used in a 2-tier model Client Server Client
More informationTCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1
TCP/IP Overview Basic Networking Concepts 09/14/11 Basic TCP/IP Networking 1 What is TCP/IP? TCP/IP is a name refers to an entire collection of data communication protocols: TCP: Transmission Control Protocol
More informationAxway Activator Release Notes
Axway Activator 6.0.0 Release Notes Document version: April 2018 Product version requirements New features and enhancements Known issues and limitations Documentation Support services Product version requirements
More informationDistributed Systems. Bina Ramamurthy. 6/13/2005 B.Ramamurthy 1
Distributed Systems Bina Ramamurthy 6/13/2005 B.Ramamurthy 1 Introduction Distributed system is the one in which hardware and software components at networked computers communicate and coordinate their
More informationOSI and TCP/IP Models
EECS 3214 Department of Electrical Engineering & Computer Science York University 18-01-08 12:12 1 OSI and / Models 2 1 / Encapsula5on (Packet) (Frame) 3 / Model and Example Protocols A list of protocols
More informationINTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET
INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET 1. INTRODUCTION Hello friends are topic is Internet and World Wide Web the most popular services of our topic is social networking and online shopping
More informationLab 1: Packet Sniffing and Wireshark
Lab 1: Packet Sniffing and Wireshark Fengwei Zhang Wayne State University Course: Cyber Security Practice 1 Packet Sniffer Packet sniffer is a basic tool for observing network packet exchanges in a computer
More informationSmart Call Home Quick Start Configuration Guide
Smart Call Home Quick Start Configuration Guide Smart Call Home offers proactive diagnostics and real-time alerts on click Cisco devices, which provides higher network availability and increased operational
More informationWAM!NET Direct! SM. Service Description
WAM!NET Direct! SM Service Description INTRODUCTION The Direct! Service is a subscription based content delivery service that provides customers with the ability to send, receive, and track digital files
More informationECAS User Guide for external EDAMIS users - How to request an account / reset a password -
EUROPEAN COMMISSION EUROSTAT Directorate B: Corporate statistical and IT services Unit B3: EDAMIS ECAS User Guide for external EDAMIS users - How to request an account / reset a password - Date 03.12.2012
More informationConnectivity architecture
Introduction This document describes FLIGHTMAP s connectivity architecture, as is available in FLIGHTMAP release 4.1. This is the first FLIGHTMAP release to fully implement the innovative FLIGHTHUB module
More informationCCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationMessaging Service Management and Analysis
Messaging Service Management and Analysis Hypersoft OmniAnalyser delivers to enterprise customers detailed and comprehensive information on the quality of service, workload, usage and performance of their
More informationAudit report and analyse overview. Audit report user guide v1.1
Audit report and analyse overview Audit report user guide v1.1 Contents Service Overview... 3 Customer Agent Installation... 3 Customer Windows setup... 4 Enable SNMP... 4 Allow inbound SNMP in Windows
More information(5) Affiliation (10) XML (15) Web Augmentation (20) Gateways. (4) Kernel (9) ES test (14) SSL. (1) Portal (6) EDI (11) Web Directories (16) W3C
PART 1: MULTIPLE CHOICE QUESTIONS (15 MARKS) This part consists of 15 multiple choice questions. On the answer sheet, fill you answer for each question. 1. At its early days was called Gateway, nowadays
More informationUSE CASE - HYBRID CLOUD IZO MANAGED CLOUD FOR AWS
USE CASE - HYBRID IZO MANAGED FOR AWS 1. LET S UNDERSTAND THE MARKET DYNAMICS In this era of digitisation, the cloud debate is over enterprises have already moved a sizeable portion of their business workloads
More informationThe COLDEX Metadata Synchronisation Service (MSS) and other services
The COLDEX Metadata ynchronisation ervice () and other services LTC Group, UNED, October 2003 1 Technological options for the... 1 1.1 Distributed Java Objects... 1 1.2 Web ervices and OAP... 2 1.3 Messaging...
More informationYou also have the option of being able to automatically delete the document from SharePoint if the Note is deleted within CRM.
Overview The SharePoint Integration provides functionality for you to be able to automatically upload documents to a SharePoint site when they are entered as a Note within CRM. Once uploaded to SharePoint,
More informationAdding Distribution Settings to a Job Profile (CLUI)
CHAPTER 7 Adding Distribution Settings to a Job Profile (CLUI) Revised: October 10, 2008, Distribution tabs tell the Cisco MXE 3000 what to do with output files once encoding is complete. This section
More informationIZO MANAGED CLOUD FOR AZURE
USE CASE - HYBRID CLOUD IZO MANAGED CLOUD FOR AZURE 1. LET S UNDERSTAND THE MARKET DYNAMICS In this era of digitisation, the cloud debate is over-enterprises have already moved a sizeable portion of their
More informationHow A Website Works. - Shobha
How A Website Works - Shobha Synopsis 1. 2. 3. 4. 5. 6. 7. 8. 9. What is World Wide Web? What makes web work? HTTP and Internet Protocols. URL s Client-Server model. Domain Name System. Web Browser, Web
More informationService Description Safecom Customer Connection Version 3.5
Service Description Safecom Customer Connection Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION...3 2 SERVICE DEFINITION...3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationConnect the Appliance to a Cisco Cloud Web Security Proxy
Connect the Appliance to a Cisco Cloud Web Security Proxy This chapter contains the following sections: How to Configure and Use Features in Cloud Connector Mode, on page 1 Deployment in Cloud Connector
More informationDistributed Systems. Why use distributed systems? What is a distributed system? Intro to Distributed Systems and Networks.
Intro to Distributed Systems and Networks Hank Levy Distributed Systems Nearly all systems today are distributed in some way, e.g.: they use email they access files over a network they access printers
More informations390 zlinux at Citi Presented by Doctor P. Robinson June 5, 2013 Hillgang Citi Managing zlinux in a Heterogenous Enterprise
s390 zlinux at Citi Presented by Doctor P. Robinson June 5, 2013 Hillgang Biography: Doctor P. Robinson Sr. Infrastructure Tech Specialist / SME 17 years with Citi Over 40 years in Operation and System
More informationSafeNet Authentication Service for Your Business Introducing Strong Authentication as-a-service. Marko Bobinac PreSales Engineer CEE, Russia & CIS
SafeNet Authentication Service for Your Business Introducing Strong Authentication as-a-service Marko Bobinac PreSales Engineer CEE, Russia & CIS Agenda SafeNet introduction Introduction to Authentication
More informationCUSTOMER CONTROL PANEL... 2 DASHBOARD... 3 HOSTING &
Table of Contents CUSTOMER CONTROL PANEL... 2 LOGGING IN... 2 RESET YOUR PASSWORD... 2 DASHBOARD... 3 HOSTING & EMAIL... 4 WEB FORWARDING... 4 WEBSITE... 5 Usage... 5 Subdomains... 5 SSH Access... 6 File
More informationSystem Programming. Introduction to computer networks
Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer
More informationEDAMIS. The naming convention For 1. Datasets, 2. Dataset occurrences
EDAMIS The naming convention For 1. Datasets, 2. Dataset occurrences This document covers the 2 possible levels of names related to datasets: 1. Dataset: mainly used in EDAMIS components (Dataset inventory,
More informationOracle 10g and IPv6 IPv6 Summit 11 December 2003
Oracle 10g and IPv6 IPv6 Summit 11 December 2003 Marshal Presser Principal Enterprise Architect Oracle Corporation Agenda Oracle Distributed Computing Role of Networking IPv6 Support Plans Early IPv6 Implementations
More informationCloud Services. Introduction
Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient
More informationNetBackup Collection Quick Start Guide
NetBackup Collection Quick Start Guide This whitepaper is intended for IT professionals, IT managers, and IT personnel responsible for the planning, setup, and/or administration of Veritas Information
More informationAssignment #2. Csci4211 Spring Due on March 6th, Notes: There are five questions in this assignment. Each question has 10 points.
Assignment #2 Csci4211 Spring 2017 Due on March 6th, 2017 Notes: There are five questions in this assignment. Each question has 10 points. 1. (10 pt.) Design and describe an application-level protocol
More informationFrom Human Machine Interface to Web Machine Interface
From Human Machine Interface to Web Machine Interface - Innovation of HMI - July, 2016 Ver. 2.0-1 - All Rights Reserved. Web Machine Interface offers two services to all V9 series below: VPN remote access
More informationLECTURE WK4 NETWORKING
LECTURE WK4 NETWORKING Workbook and Quiz Workbook o Due in WK5 o Must hand in a hard copy to the tutor as well as an online submission Quiz o In the practical class o 30mins to complete the quiz o Short,
More informationBetter Translation Technology. XTM Connect Change Control for GIT (backend version)
Better Translation Technology XTM Connect Change Control for GIT (backend version) Documentation for XTM Connect Change Control for GIT. Published by XTM International Ltd. Copyright XTM International
More informationLecture 2. Computer Networks Models. Network Models 1-1
Lecture 2 Computer Networks Models Network Models 1-1 Agenda Introduction to the Internet Reference Models for Computer Networks The OSI Model The TCP/IP Model Network Models 1-2 Announcements Bonus -
More informationSmart Call Home Deploying thetransport Gateway on Cisco Unified Computing System and Red Hat Linux
Deployment Guide Smart Call Home Deploying thetransport Gateway on Cisco Unified Computing System and Red Hat Linux Deployment Guide For further information, questions and comments please contact ask-smart-services@cisco.com
More informationChapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web
Chapter Topics Chapter 7: Computer Networks, the Internet, and the World Wide Web CS10051: Intro. to Computer Science Kent State University History of the Internet History of the World Wide Web Internet
More informationClearswift Hosting Options
Clearswift Hosting Options Frequently Asked Questions White paper V0.2 January 2016 Clearswift 2016 www.clearswift.com Contents 1. Overview 3 1.1 Why is Clearswift offering a hosting option? 3 1.2 Can
More informationMainframe Networking 101 Share Session 15422
Mainframe Networking 101 Share Session 15422 6 Laura Knapp WW Business Consultant Laurak@aesclever.com ipv6hawaii@outlook.com 06/23/2014 Applied Expert Systems, Inc. 2014 1 Agenda Requirements for Communication
More informationValidation report transmission guide for SBS Structural Business Statistics
EUROPEAN COMMISSION EUROSTAT Directorate G: Global business statistics Unit G-2: Structural Business Statistics and global value chains Validation report transmission guide for SBS Structural Business
More informationWAM!NET Submission Icons. Help Guide. March 2015
WAM!NET Submission Icons Help Guide March 2015 Document Contents 1 Introduction...2 1.1 Submission Option Resource...2 1.2 Submission Icon Type...3 1.2.1 Authenticated Submission Icons...3 1.2.2 Anonymous
More informationContents Overview... 5 Upgrading Primavera Gateway... 7 Using Gateway Configuration Utilities... 9
Gateway Upgrade Guide for On-Premises Version 17 August 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Upgrading Primavera Gateway... 7 Prerequisites... 7 Upgrading Existing Gateway Database...
More informationCCNA 1 Chapter 10 v5.0 Exam Answers 2013
CCNA 1 Chapter 10 v5.0 Exam Answers 2013 1 Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) physical
More informationTowards Transparent Integration of Heterogeneous Cloud Storage Platforms
Towards Transparent Integration of Heterogeneous Cloud Storage Platforms Ilja Livenson*, Erwin Laure KTH PDC livenson@kth.se * Presenter Outline Motivation and problem Our approach CDMI-Proxy Status and
More informationMainframe Networking 101 Share Session. Junie Sanders Kevin Manweiler -
Mainframe Networking 101 Share Session 6 Junie Sanders jrsandler@cisco.com Kevin Manweiler - kmanweil@cisco.com 2 Agenda Requirements for Communication What are Networking Architectures? Networking Architectures
More informationX.25 Substitution. Maintaining X.25 services over a fully supported NGN/IP infrastructure. The Challenge. How it Works. Solution
Substitution Maintaining services over a fully supported NGN/ infrastructure The Challenge Legacy services such as are still in use worldwide for a range of applications. Over the years, many customers
More informationThe WAP Roadmap. Short Term Goals for WAP
The WAP Roadmap Authors: Alastair Angwin, WAP Specification Committee / IBM UK Laboratories (alastair_angwin@uk.ibm.com) Bill Coan, WAP Specification Committee / AT&T Wireless Services / Global Operators
More informationBlackBerry UEM Configuration Guide
BlackBerry UEM Configuration Guide 12.9 2018-11-05Z 2 Contents Getting started... 7 Configuring BlackBerry UEM for the first time... 7 Configuration tasks for managing BlackBerry OS devices... 9 Administrator
More informationWHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution
WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been
More informationChapter 3 Protocols and the TCP/IP Suite
Chapter 3 Protocols and the TCP/IP Suite 3.1 The Need for a Protocol Architecture need for a standard communication tasks by layers architecture peer protocol: a set of rules or conventions to exchange
More informationObjectives. Connecting with Computer Science 2
Objectives Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar with Internet-related protocols Understand how the TCP/IP protocols relate to the Internet
More informationChapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Chapter 2: Application Layer Our goals: conceptual, implementation
More informationUpdating the Client Access URL using IBM Traveler Server. OPEN MIC WEBCAST March 22, 2017 Alvin John Marron L2 Software Engineer IBM Traveler
Updating the Client Access URL using IBM Traveler Server OPEN MIC WEBCAST March 22, 2017 Alvin John Marron L2 Software Engineer IBM Traveler AGENDA: Overview Why use HTTPS instead of HTTP? Required Components
More informationEndian Hotspot main features
Endian Hotspot main features Service Customization Freely configurable home page after successful login Completely customizable welcome page and printed user information through a user friendly visual
More informationPacket Switching, Layer Models and Protocol Suites
Packet Switching, Layer Models and Protocol Suites Course Code CCE 211 Course Title Data Communication Asst. Prof. Md Samsuzzaman, Ph.D. sobuzcce@cse.pstu.ac.bd http://www.cse.pstu.ac.bd/sobuzcse Computer
More informationAbout This Document 3. Overview 3. System Requirements 3. Installation & Setup 4
About This Document 3 Overview 3 System Requirements 3 Installation & Setup 4 Step By Step Instructions 5 1. Login to Admin Console 6 2. Show Node Structure 7 3. Create SSO Node 8 4. Create SAML IdP 10
More informationApplied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.
Applied IT Security System Security Dr. Stephan Spitz Stephan.Spitz@de.gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System
More informationMonitoring a Sun ONE Messaging Server
CHAPTER 16 Monitoring a Sun ONE Messaging Server Monitoring your systems and the Sun ONE Messaging Server software that comprises your email infrastructure is an important part of the overall management
More informationNetworking and TCP/IP. John Kalbach November 8, 2004
Networking and TCP/IP John Kalbach kalbach@psu.edu November 8, 2004 Topology Bus Ethernet, Wireless Star ATM, Switched Ethernet, Gigabit Ethernet Ring Token Ring, FDDI DS Digital Signals Speeds DS 0 64Kbs
More informationVMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationCourse 10972B: Administering the Web Server (IIS) Role of Windows Server
Course 10972B: Administering the Web Server (IIS) Role of Windows Server Course Outline Module 1: Understanding and Installing Internet Information Services In this module, you will learn about the infrastructure
More informationInstalling MySQL Subscriber Database
CHAPTER 2 This chapter describes how the optional MySQL subscriber database is installed for use with the Cisco SIP Proxy Server. An installation script, install_mysql_db, is used. This script only runs
More informationLecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2016, Networks II Agenda Introduction to networking architecture Historical
More informationConnecting with Computer Science Chapter 5 Review: Chapter Summary:
Chapter Summary: The Internet has revolutionized the world. The internet is just a giant collection of: WANs and LANs. The internet is not owned by any single person or entity. You connect to the Internet
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationWay2mint SMS Mobile Terminate (MT) API Guide for HTTP / HTTPS
Way2mint SMS Mobile Terminate (MT) API Guide for HTTP / HTTPS 10/1/2009 Way2mint Services Prepared by: Mohit Jaswani Copyright Way2mint Services The content of this document are copyright and remain the
More informationComputer Communication & Networks / Data Communication & Computer Networks Week # 03
Computer Communication & Networks / Data Communication & Computer Networks Week # 03 M.Nadeem Akhtar CS & IT Department The University of Lahore Email: nadeem.akhtar@cs.uol.edu.pk URL-https://sites.google.com/site/nadeemuolcsccn/home
More informationSDMX GLOBAL CONFERENCE
SDMX GLOBAL CONFERENCE PARIS 2009 EUROSTAT SDMX REGISTRY (Francesco Rizzo, Bengt-Åke Lindblad - Eurostat) 1. Introduction The SDMX initiative (Statistical Data and Metadata exchange) is aimed at developing
More informationNetwork Architecture Models
School of Business Eastern Illinois University Network Architecture Models (September 8, 2009) Abdou Illia, Fall 2009 Learning Objectives 2 Discuss the OSI reference Model Discuss the Internet Model Compare
More informationEGI-InSPIRE. GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies. Sergio Maffioletti
EGI-InSPIRE GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies Sergio Maffioletti Grid Computing Competence Centre, University of Zurich http://www.gc3.uzh.ch/
More informationWhy IPv6? Roque Gagliano LACNIC
Why IPv6? Roque Gagliano LACNIC Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Agenda Initial Concepts. IPv6 History. What is IPv6? Planning IPv6. Some initial concepts. IPv6 is the
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.8 April 2017 Last modified: July 17, 2017 2017 Nasuni Corporation All Rights Reserved Document Information Testing Disaster
More informationConnecting Enterprise Systems to WebSphere Application Server
Connecting Enterprise Systems to WebSphere Application Server David Currie Senior IT Specialist Introduction Many organisations have data held in enterprise systems with non-standard interfaces There are
More informationOUTCOME OF THE 3 RD MEETING OF TARGET CONSOLIDATION CONTACT GROUP (TCCG)
05 June 2018 OUTCOME OF THE 3 RD MEETING OF TARGET CONSOLIDATION CONTACT GROUP (TCCG) 24 April 2018 09:30 to 17:00 held at the premises of the European Central Bank, Sonnemannstraße 20, meeting room MB
More information