Design document for content delivery tool Brahaspati 1
|
|
- Gordon Goodwin
- 5 years ago
- Views:
Transcription
1 Design document for content delivery tool Brahaspati 1 Y.N.Singh, A. Roy, Vijay Singh, A.P.Das, Aloukik Khuntia August 23, Guru of Devas
2 Abstract Design and development of platform independent, scalable, multi-server software system to conduct online courses and to delivery offline course material in variety of forms over a LAN and internet. This design document gives design goals and various design decisions and details of the system. Copyright (c) 2002 ETRG,IIT Kanpur. All Rights Reserved. Redistribution and use of this and other document, source and binary files in the Distribution of this software Brahaspati in any forms, with or without modification, is permitted provided that the following conditions are met: Redistributions must retain the above copyright notice, this list of conditions and the following disclaimer. Redistribution must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/ or other materials provided with the distribution. THIS SOFTWARE AND THE ACCOMPANYING DOCUMENTS ARE PROVIDED AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PAR- TICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ETRG OR ITS CONTRIB- UTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHER- WISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
3 Contents 1 Objectives What is to be achieved in long run? introduction Description of functionalities Authorization, authentication and access control Authentication Authorization XML document archiving, version control and publishing Archiving, and version control Publishing Profile customisation course area Interaction tools Study tools and evaluation tools Search Engines and Course specific calendar Log and users information at various points Issues Involved Naming System for files Document Authoring tools architecture Overall proposed system architecture Model View Controller View Implementation Functional Description Authentication in multiserver architecture Implementation Details The Web Application Server Session Tracking Data Storage System segments and interaction between them Authentication segment Psuedocode for methods
4 Chapter 1 Objectives 1.1 What is to be achieved in long run? This system should provide the online university. It should have users classified as students, instructors, tutors, deans etc.. The instructor can post lecture notes, learning material, which can be accessed by authorised students. The class members can interact and do academic discussion by various means. Live classroom session with interaction should be possible. There should be self evaluation mechanism to monitor the progress. It should be possible to conduct the examination and thereafter evaluation to certify the students. 1.2 introduction The software is proposed to be server side software providing access to user using web browser interface. In future, the server which uses the APIs generated out of this effort, as well as specific client will be built. Then the user need to have only client software. Also, client version which can run as applet will be built. The important features of the proposed software are Multiserver software system scalable platform indepedent The functionalities to be given in this system are as follows. Authorization, authentication and access control for each access to system. XML document archiving with version control and publishing. User screen customization Interaction tools: chat, whiteboard, , instant messaging, discussion boards. Log and users accounting information at various points; scripts to process the logs (management). Study tools (students presentation) and evaluation tools (quizzes and self test). 3
5 Search engine (course local and site global), calendars for time management for students and instructors. News and advertisement tinkers at the users screen. The software system can be broken down into the components on the basis of functionality and desirable features. There are many issues involved such as. Naming system for files. Document authoring tools 4
6 Chapter 2 Description of functionalities 2.1 Authorization, authentication and access control Authentication This is accomplished through the use of a shared secret. The shared secret is something both the server and the client know. The authentication data contains sufficient information to specify to which domain the user belongs Authorization After authentication, if the user is found to be genuine his profile information is accessible from a table in database. This includes registration number (user ID), apart from other personal information. The registration number now becomes our key for finding what can be accessed by the user. Each course is considered a resource. All the files in the directory heirarchy below a node are part of the resource owning the node, unless the node have access control list. In that the any subdirectories will have access list decided by the access list of node. There will be four type of access control related files which should be maintained. File 1 This is single global file. It will contain list as shown below. user1 resource1, resource2, resource3 user2 resource1, resource2, resource4 File 2 This is also single global file. It will contain list as shown below. user1 group1, group2, group3 user2 group2, group4, group5 File 3 This is also single global file. It will also cotain the list as shown below. group1 user1, user2, user3 grpup2 user2, user4, user5 File 4 This is one file for each resource. It will also cotain the list as shown below. group1 access permissions grpup2 access permissions The allowed permission can be read, write, execute, backup, restore. Various informations can be stored in mysql database. These are described below. Profile: This table has the fields User ID, password, registration no., first name, last name, address, ID, phone number. 5
7 Access Control Access control is implemented at the system level. For example whenever an instructor uploads a file in a particular course, this file s access control will determine that it can be modified only by the instructor/ administrator. 2.2 XML document archiving, version control and publishing Archiving, and version control The material can be uploaded by instructor. The instructor can upload the material with a switch option enabling or disabling version control. We are planning to use CVS (concurrent versioning system) implementation in java (Slide) to do the version control. It is possible that more than one person can modify the content and then accept the changes to create final copy Publishing The archived course material has to be published in some standard format. For this we need some mechanism by which the content is transformed to the desired format which can be interpreted by the browser. Desired format for publishing will be xml. But publishing in html will also be supported. At the time of publishing, all the local reference will not be converted to reference to appropriate servlet with appropriate parameter. Only the copying of appropriate files from the CVS repository to publish area will be done. This is done by allowing the browser to send path parameter attached to to servlet name as if servlet name is the directory. Since the directory servlet name does not exist and only servlet can access the filename passed as parameter, no direct access is possible. This will make all the access via servlet keeping the system secure. 2.3 Profile customisation When a user is authorized in a particular domain (due to multiple server architecture, there is a domain associated with each server.) customized interface is generated for him. This interface is customized for this particular user according to the customization profile obtained. All the profiles, configuration information can be put in XML format. But for our development, we are keeping it with LDAPserver. This customized interface will generate the user desktop. The desktop will contain 1. Common calendar - same calendar will also be visible in each course contents page which is available after entering into a course. for students, the calendar will provide the appointment information, things to do list, planned activities for the day. The student can do personal entries. for instructor, the similar things will be provided. Additionally, he will be able to make entries for all the people registered in his course. 2. News - news area will contain the latest news update loaded by the site administrator. News and advertisement tinkers at the users screen There should be news relevant to the users which will be flashed on the users screen from time to time. This will include latest news on e-learning and things related to a particular course. If there is any important announcement from the administrator this can be flashed to the user screen. 3. Mail notifier - Will notify the arrival of new . On clicking the general mail utility will be accessed. 6
8 2.4 course area Various functionalities will be needed once a user logs into the course area Interaction tools We are planning to support chat, whiteboard,instant messaging (asynchronous) and (synchronous) for providing interactivity among instructor and student groups.offline storage of chat sessions and whiteboard discussions will be supported to help learners analyse interaction as latter stage Study tools and evaluation tools Study tools help the students and the instructors to learn new domains by self study and presentation. These include tools like student presentation. Evaluation tools help the students evaluate their performance during the process of learning. Evaluation tools include methods like quizzes, self tests etc Search Engines and Course specific calendar The users page should include search engine. The search engine has the option of searching a particular course depending on the key words provided during search. There should also be facility for searching a document in the web. The course specific calendar will not be there. Instead the links to user specific calendar tool will be provided. The user will have the facility of scheduling his work for a particular day. The user can edit or delete the entries to his calendar. 2.5 Log and users information at various points The log information about various users at various points should be stored in log files. This information should include time duration for which the user remained logged on.the amount of bytes (from course contents) downloaded by user. 7
9 Chapter 3 Issues Involved 3.1 Naming System for files As the whole system is developed for a distributed multi-server model there is need to have a unique naming scheme so that a name resolution implementation can be achieved. This can be achieved using several techniques. One way is to use the Andrew File System which provides for a distributed file system over a network. 3.2 Document Authoring tools We need a document authoring tool for authoring XML documents. This will provide the instructors with an interface to author their course material in XML form. This course material can then be archived on the server. 8
10 Chapter 4 architecture 4.1 Overall proposed system architecture The fig 4.1 shows the overall conecptualized system architecture. Initial target is to build single server system. Please go through the whole document to find what is to implemented and what not be in initial target implementation. 4.2 Model View Controller View Implementation The view functionality will be implemented using Velocity, which is a template engine. It takes in the templates written using velocity template language (*.vm). The assignment of values to various tags is done. The tag value pairs and templates are processed and html page is given out by velocity, which is passed to httpserver for onward transmission to browser. Velocity will provide a template service that will allow web applications to be developed according to a true MVC (model view controller) model (meaning that web page designers can focus solely on creating a well-designed site, and programmers can focus solely on writing top-notch code.). Before presentation on the screen, a template need to be processed (shown in Fig. 4.2) In addition, there will be different kind of templates for displays at different kind of browsers (e.g., netscape, lynx, wml browser, voicexml browsers etc.). In other words the templates will be selected according to the capabilities of the browsers. This need to be implemented by defining another template selection layer between view and controller (see Fig This capability will be built in the second version.) In first version only one set of templates will be used. The content published in some standard format will be transformed to the desired display format which can be interpreted by the browser. The possible display formats can be WML Html VoiceXML 9
11 Figure 4.1: System Architecture Figure 4.2: Velocity as view implementation 10
12 Figure 4.3: Template selection according to browser 11
13 Chapter 5 Functional Description This is proposed functional description for multiserver architecture. implementation) comm ctrlr is not implemented.) In first phase (single server 5.1 Authentication in multiserver architecture The authentication information repository contains information such as Login name which includes domain name and password. Authentication module at server A (see Fig.??) first determine if the user is local or from other domain. If the user is local, the authentication information is retrieved from local LDAP/ database/ file (We have used LDAP for this purpose.) In case, user is from other domain, authentication information about user is retrieved from remote site. In this case the authentication module at server A now sends a request for authentication using communication controller to communication controller in remote domain to which user actually belongs. This request is received by communication controller at site B. This module accesses the LDAP/ database/ file and find the authentication information. Then it sends back the information (Login ID, Domain name, password) to site A s comm ctrlr. Which in turn gives result of querry to calling servlet. In case the login is authenticated, then the flag that session is active, in local or remote database as the case may be is set. This will be used to disallow multiple sessions using same login name. 12
14 Chapter 6 Implementation Details 6.1 The Web Application Server In order to run servlets and JSP we need a servlet engine. The servlet engine has to be coupled with the web server to provide the full functional capability of a web application server. For this we have chosen Apache HTTP server and Tomcat servlet engine 6.2 Session Tracking HTTP is a state less protocol, so we need to keep track of the user session using session tracking techniques. Some of the techniques commonly used are the following. 1. Persistent cookies 2. SSL 3. URL rewriting 4. Hidden form fields. After analyzing the pros and cons of SSL and persistent cookies mechanism it was agreed that session tracking should be implemented using persistent cookies mechanism. The password information will be sent to the server using digest authentication mechanism. 6.3 Data Storage Data about the users profile and customization information can be stored in a relational database, XML file or in a directory service like LDAP. A directory service is a special type of database that is designed to be read very quickly through various indexing, caching, and disk access techniques. Directory services also presume a specialized set of search services as opposed to RDBMS system like Oracle or Microsoft SQL server which allow us a more generalized set of querying services. The Light-weight Directory Access Protocol (LDAP) (developed in the early 1990s as a standard directory protocol) defines how clients should access data on the server. It does not specify how the data should be stored on the server. However LDAP can become a front-end to any type of data store. Because of this most popular directory services including NIS, NDS, Active Directory and even Windows NT domains implement an LDAP front-end of some type. At the moment, we have decided to use mysql based user profile. For all the other configuration information, we have decided to use xml format. As a consequence, following configuration files are 13
15 Figure 6.1: Various segment of the system needed. mysqlconf.xml- It stored the URL of mysql Server alongwith the login and password to access mysql server. metadata will be maintained in metadata file format (xml) in each directory in course area. main configuration file - telling about the courses (resources) and whhere they reside on the file system. student s configuration file - contains what was the last accessed page in each course. - contains student s preferences for GUI. course configuration file - What tools are available to students and instructors. Access control files (see 2.1.2) messages.xml - contains the messages which are displayed on the screen. 6.4 System segments and interaction between them The figure 6.1 show the various segement which need to be implemented. Also how the control flow will happen between them is also shown. The segment shown in green will be implemented for the first release. 14
16 Figure 6.2: Servlets needed for Authentication module Authentication segment The figure 6.2 show the servlets to be implemented for Authentication segment. The psuedocode for the Login is as follows login.txt Copyright (C) 2002 Y.N.Singh, Ambika, Aloukik will invoke - desktop servlet Invoked from - main.view try { Verify the login-password Authenticator.verify() } catch (on failure gives LoginFailureException){ try { get user name. Authenticator.getUserName() } catch ( NoUserNameException ){ set message = Invalide username Messages.getMessg() Invoke main view } set message=username+get authentication failure messg. Messages.getMessg() invoke main view. } Check for any previous Session. if there is old session clear old session // // The lower one to used for the time being. Display to user that there was an old session which is cleared by system. // This is what is desired to be implemented. get the of the user from database. Authenticator.get (userid) send mail to user that duplicate session were tried, contact admin for password modification if needed. MailAgent.sendMail(String , String messg) // create new session, set loginid in session object set expiry time on no activity. Store the (loginid, Start time) in log redirect to desktopservlet. 15
17 Figure 6.3: obects needed by Login servlet The Fig. 6.3 shows the objects used by Login servlet. The psuedo codes for methods for classes are shown in next section. 6.5 Psuedocode for methods 16
StorageGRID Webscale NAS Bridge Management API Guide
StorageGRID Webscale NAS Bridge 2.0.3 Management API Guide January 2018 215-12414_B0 doccomments@netapp.com Table of Contents 3 Contents Understanding the NAS Bridge management API... 4 RESTful web services
More informationUser Manual. Date Aug 30, Enertrax DAS Download Client
EnertraxDL - DAS Download Client User Manual Date Aug 30, 2004 Page 1 Copyright Information Copyright 2004, Obvius Holdings, LLC. All rights reserved. Redistribution and use in source and binary forms,
More informationExplaining & Accessing the SPDX License List
Explaining & Accessing the SPDX License List SOFTWARE PACKAGE DATA EXCHANGE Gary O Neall Source Auditor Inc. Jilayne Lovejoy ARM August, 2014 Copyright Linux Foundation 2014 1 The SPDX License List 2 The
More informationMagicInfo Express Content Creator
MagicInfo Express Content Creator MagicInfo Express Content Creator User Guide MagicInfo Express Content Creator is a program that allows you to conveniently create LFD content using a variety of templates.
More informationUser Manual for Video Codec
User Manual for Video Codec CONTENTS OF THIS DOCUMENT This document contains the following sections: 1 Overview 2 System Requirements 3 Language Support 4 Installing the Software jdk installation jmf installation
More informationPRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program )
PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT
More informationOpen Source Used In TSP
Open Source Used In TSP 3.5.11 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.
More informationEpic. Epic Systems. Deployment Guide
Epic Systems Deployment Guide VERSION: 1.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are
More informationDHIS 2 Android User Manual 2.22
DHIS 2 Android User Manual 2.22 2006-2016 DHIS2 Documentation Team Revision 1925 Version 2.22 2016-11-23 11:33:56 Warranty: THIS DOCUMENT IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
More informationPRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program )
PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT
More informationMoodle. Moodle. Deployment Guide
Moodle Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
More informationNokia Client Release Notes. Version 2.0
Nokia Email Client Release Notes Version 2.0 Published June 9, 2008 COPYRIGHT Copyright 1997-2008 Nokia Corporation. All rights reserved. Nokia, Nokia Connecting People, Intellisync, and Intellisync logo
More informationProgressBar Abstract
Doc type here 1(21) ProgressBar Abstract The WireFlow progressbar module is an easy way to add progress bars to an application. It is easy to customize the look of the displayed progress window, since
More informationCarbonite Server Backup Portal 8.6. Administration Guide
Carbonite Server Backup Portal 8.6 Administration Guide 2018 Carbonite, Inc. All rights reserved. Carbonite makes no representations or warranties with respect to the contents hereof and specifically disclaims
More informationAdobe Connect. Adobe Connect. Deployment Guide
Deployment Guide VERSION: 1.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationDocumentation Roadmap for Cisco Prime LAN Management Solution 4.2
Documentation Roadmap for Cisco Prime LAN Thank you for purchasing Cisco Prime LAN Management Solution (LMS) 4.2. This document provides an introduction to the Cisco Prime LMS and lists the contents of
More informationMigration Tool. Migration Tool (Beta) Technical Note
Migration Tool (Beta) Technical Note VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo
More informationTWAIN driver User s Guide
4037-9571-05 TWAIN driver User s Guide Contents 1 Introduction 1.1 System requirements...1-1 2 Installing the TWAIN Driver 2.1 Installation procedure...2-1 To install the software...2-1 2.2 Uninstalling...2-1
More informationiwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP)
iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP) June 11, 2015 Chapter 1 Files This section describes the files iwrite utilizes. 1.1 report files An iwrite report consists
More informationPreface. Audience. Cisco IOS Software Documentation. Organization
This preface describes the audience, organization, and conventions of this publication, and provides information on how to obtain related documentation. Cisco documentation and additional literature are
More informationCarbonite Server Backup Portal 8.5. Administration Guide
Carbonite Server Backup Portal 8.5 Administration Guide 2018 Carbonite, Inc. All rights reserved. Carbonite makes no representations or warranties with respect to the contents hereof and specifically disclaims
More informationPageScope Box Operator Ver. 3.2 User s Guide
PageScope Box Operator Ver. 3.2 User s Guide Box Operator Contents 1 Introduction 1.1 System requirements...1-1 1.2 Restrictions...1-1 2 Installing Box Operator 2.1 Installation procedure...2-1 To install
More informationANZ TRANSACTIVE MOBILE for ipad
ANZ TRANSACTIVE MOBILE for ipad CORPORATE CASH AND TRADE MANAGEMENT ON THE GO QUICK REFERENCE GUIDE April 2016 HOME SCREEN The home screen provides immediate visibility of your favourite accounts and transactions
More informationColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions
ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions Date Generated: 2018/09/10 Apache Tomcat ID: 306 Apache Foundation and Contributors This product includes software
More informationEcma International Policy on Submission, Inclusion and Licensing of Software
Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being
More informationAccuTerm 7 Internet Edition Connection Designer Help. Copyright Schellenbach & Assoc., Inc.
AccuTerm 7 Internet Edition Connection Designer Help Contents 3 Table of Contents Foreword 0 Part I AccuTerm 7 Internet Edition 6 1 Description... 6 2 Connection... Designer 6 3 Internet... Client 6 4
More informationDAP Controller FCO
Release Note DAP Controller 6.61.0790 System : Business Mobility IP DECT Date : 20 December 2017 Category : General Release Product Identity : DAP Controller 6.61.0790 Queries concerning this document
More informationLoadMaster VMware Horizon (with View) 6. Deployment Guide
LoadMaster VMware Horizon (with View) 6 Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the
More informationHYDRODESKTOP VERSION 1.4 QUICK START GUIDE
HYDRODESKTOP VERSION 1.4 QUICK START GUIDE A guide to using this free and open source application for discovering, accessing, and using hydrologic data February 8, 2012 by: Tim Whiteaker Center for Research
More informationDHIS 2 Android User Manual 2.23
DHIS 2 Android User Manual 2.23 2006-2016 DHIS2 Documentation Team Revision 2174 2016-11-23 11:23:21 Version 2.23 Warranty: THIS DOCUMENT IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
More informationGoldSim License Portal A User s Guide for Managing Your GoldSim Licenses
GoldSim License Portal A User s Guide for Managing Your GoldSim Licenses Copyright GoldSim Technology Group LLC, 1998-2016. All rights reserved. GoldSim is a registered trademark of GoldSim Technology
More informationIETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009
IETF TRUST Legal Provisions Relating to IETF Documents February 12, 2009 Effective Date: February 15, 2009 1. Background The IETF Trust was formed on December 15, 2005, for, among other things, the purpose
More informationInstalling AudioLinux (Alternative way with GUI)
Installing AudioLinux (Alternative way with GUI) By Maarten van Druten Version 1.0 6 September 2017 Disclaimer: THIS SOFTWARE INSTALLATION MANUAL IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES,
More informationNetApp SolidFire Element OS. Setup Guide. Version March _A0
NetApp SolidFire Element OS Setup Guide Version 10.2 March 2018 215-12911_A0 doccomments@netapp.com Table of Contents 3 Contents SolidFire system overview... 4 Configuring a storage node... 5 Configuring
More informationRSA Two Factor Authentication
RSA Two Factor Authentication Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
More informationAdministrator s Guide Report Central v2.7
Administrator s Guide Report Central v2.7 Copyright 2006-2008 Websense, Inc. All rights reserved. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published March 10, 2008 Printed
More informationDHIS2 Android user guide 2.26
DHIS2 Android user guide 2.26 2006-2016 DHIS2 Documentation Team Revision HEAD@02efc58 2018-01-02 00:22:07 Version 2.26 Warranty: THIS DOCUMENT IS PROVIDED BY THE AUTHORS ''AS IS'' AND ANY EXPRESS OR IMPLIED
More informationAnybus Wireless Bridge Ethernet Bluetooth Access Point Product Guide
Anybus Wireless Bridge Ethernet Bluetooth Access Point Product Guide Document Revision Document number: 1 Release: November 21, 2014 Document version: 1 General This document is a product guide defining
More informationIETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008
IETF TRUST Legal Provisions Relating to IETF Documents Approved November 6, 2008 Effective Date: November 10, 2008 1. Background The IETF Trust was formed on December 15, 2005, for, among other things,
More informationNTLM NTLM. Feature Description
Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered
More informationEcma International Policy on Submission, Inclusion and Licensing of Software
Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being
More informationAbout This Guide. and with the Cisco Nexus 1010 Virtual Services Appliance: N1K-C1010
This guide describes how to use Cisco Network Analysis Module Traffic Analyzer 4.2 (NAM 4.2) software. This preface has the following sections: Chapter Overview, page xvi Audience, page xvii Conventions,
More informationStatic analysis for quality mobile applications
Static analysis for quality mobile applications Julia Perdigueiro MOTODEV Studio for Android Project Manager Instituto de Pesquisas Eldorado Eric Cloninger Product Line Manager Motorola Mobility Life.
More informationSplunk. Splunk. Deployment Guide
Deployment Guide VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks
More informationLGR Toolset (beta) User Guide. IDN Program 24 October 2017
LGR Toolset (beta) User Guide IDN Program 24 October 2017 1 Introduction to LGR Toolset (beta) Label Generation Rulesets (LGRs) specify metadata, code point repertoire, variant rules and Whole Label Evaluation
More informationCluster and SVM Peering Express Guide
ONTAP 9 Cluster and SVM Peering Express Guide December 2017 215-11182_E0 doccomments@netapp.com Updated for ONTAP 9.3 Table of Contents 3 Contents Deciding whether to use this guide... 4 Prerequisites
More informationQuarkXPress Server Manager 8.0 ReadMe
QuarkXPress Server Manager 8.0 ReadMe CONTENTS Contents QuarkXPress Server Manager 8.0 ReadMe...3 What's New in QuarkXPress Server Manager 8...4 Deprecated features, new stubs, and deploying SDK classes...4
More informationSmall Logger File System
Small Logger File System (http://www.tnkernel.com/) Copyright 2011 Yuri Tiomkin Document Disclaimer The information in this document is subject to change without notice. While the information herein is
More informationEdge Security Pack (ESP)
Edge Security Pack (ESP) VERSION: 1.2 UPDATED: SEPTEMBER 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 22 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..
More informationDistinction Import Module User Guide. DISTINCTION.CO.UK
Distinction Import Module User Guide. Distinction Import Module. Licence: Copyright (c) 2018, Distinction Limited. All rights reserved. Redistribution and use in source and binary forms, with or without
More informationLabVIEW Driver. User guide Version
LabVIEW Driver User guide Version 1.0.0 2016 Table of Contents Version History...3 Copyright...4 Software License...5 Operational Safety...6 Warranty and Support...7 Introduction...8 Requirements...9 How
More informationOracle Plug-in Version 6.85 for Microsoft Windows User s Guide
Oracle Plug-in Version 6.85 for Microsoft Windows User s Guide Published: September 13 th, 2011 Revision: This manual is updated for Version 6.85 Software Version: 6.85 (March, 2011) Copyright 1997-2011.
More informationSMS2CMDB Project Summary v1.6
SMS2CMDB Project Summary v1.6 Project Abstract SMS2CMDB provides the capability to integrate Microsoft Systems Management Server (MS- SMS) data with BMC Atrium CMDB (Atrium CMDB) and the BMC Remedy Asset
More informationCopyright PFU LIMITED 2016
-------------------------------------------------------- PaperStream Capture Lite 1.0.1 README File -------------------------------------------------------- Copyright PFU LIMITED 2016 This file contains
More informationGoldSim License Server Activation Utility Installation and Basic Use
GoldSim License Server Activation Utility Installation and Basic Use Copyright GoldSim Technology Group LLC, 1998-2019. All rights reserved. GoldSim is a registered trademark of GoldSim Technology Group
More informationGrouper UI csrf xsrf prevention
Grouper UI csrf xsrf prevention Wiki Home Download Grouper Grouper Guides Community Contributions Developer Resources Grouper Website This is in Grouper 2.2 UI. btw, Ive heard this does not work with IE8.
More informationopenresty / encrypted-session-nginx-module
1 of 13 2/5/2017 1:47 PM Pull requests Issues Gist openresty / encrypted-session-nginx-module Watch 26 127 26 Code Issues 7 Pull requests 1 Projects 0 Wiki Pulse Graphs encrypt and decrypt nginx variable
More informationCopyright PFU LIMITED
-------------------------------------------------------- PaperStream Capture 1.0.12 README File -------------------------------------------------------- Copyright PFU LIMITED 2013-2015 This file contains
More informationTheGreenBow VPN Client ios User Guide
www.thegreenbow.com TheGreenBow VPN Client ios User Guide Property of TheGreenBow 2018 Table of Contents 1 Presentation... 3 1.1 TheGreenBow VPN Client... 3 1.2 TheGreenBow VPN Client main features...
More informationSametime Links 3.1 Toolkit
Sametime Links 3.1 Toolkit Community Services API Developer s Guide and Reference Copyright and Trademark Information Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL
More informationHALCoGen TMS570LS31x Help: example_sci_uart_9600.c
Page 1 of 6 example_sci_uart_9600.c This example code configures SCI and transmits a set of characters. An UART receiver can be used to receive this data. The scilin driver files should be generated with
More informationWatch 4 Size v1.0 User Guide By LeeLu Soft 2013
Watch 4 Size v1.0 User Guide By LeeLu Soft 2013 Introduction Installation Start using W4S Selecting a folder to monitor Setting the threshold Setting actions Starting the monitor Live Log Using monitor
More informationDenkh XML Reporter. Web Based Report Generation Software. Written By Scott Auge Amduus Information Works, Inc.
Denkh XML Reporter Web Based Report Generation Software Written By Scott Auge sauge@amduus.com Page 1 of 13 Table of Contents License 3 What is it? 4 Basic Software Requirements 5 Basic Report Designer
More informationMigrating Performance Data to NetApp OnCommand Unified Manager 7.2
Technical Report Migrating Performance Data to NetApp OnCommand Unified Manager 7.2 Dhiman Chakraborty, Yuvaraju B, Tom Onacki, NetApp March 2018 TR-4589 Version 1.2 Abstract NetApp OnCommand Unified Manager
More informationControl4/HomeKit Appliance User Manual. User Manual. June Version Varietas Software, LLC.
Control4/HomeKit Appliance User Manual User Manual June 2017 Version 1.0.3 Varietas Software, LLC http://www.varietassoftware.com/control4 i Control4/HomeKit Appliance Quick Start Document Revisions Date
More informationOne Identity Starling Two-Factor Desktop Login 1.0. Administration Guide
One Identity Starling Two-Factor Desktop Login 1.0 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More information[The BSD License] Copyright (c) Jaroslaw Kowalski
Software used by portions of this application require the following license statement: [The BSD License] Copyright (c) 2004-2011 Jaroslaw Kowalski jaak@jkowalski.net All rights reserved. Redistribution
More informationSkyPilot OS Installation: Fedora Core 5
SkyPilot OS Installation: Fedora Core 5 PN 671-00024-01 2006 SkyPilot Networks, Inc. All rights reserved This publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose.
More informationWLprinter Web-to-local print solution Version 0.9
WLprinter Web-to-local print solution Version 0.9 Tekki October 7, 2010 Contents 1 Introduction 2 1.1 What is WLprinter?.............................. 2 1.2 System requirements..............................
More informationxxxx xxxx xxxx xxxx xxxx xxxx xxxx xxxx Android Calendar Syn (http://github.com/mukesh4u/android-calendar-sync/), Apache License 2.0 Android NDK (https://developer.android.com/tools/sdk/ndk/index.html),
More informationUS Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
Service Data Objects (SDO) DFED Sample Application README Copyright IBM Corporation, 2012, 2013 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract
More informationWHITE PAPER. Good Mobile Intranet Technical Overview
WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet
More informationHouseLink HL-10E. Installation and Operation Manual Modbus TCP and XML
HouseLink HL-10E Installation and Operation Manual Modbus TCP and XML HouseLink HL-10E 4/25/2018 Table of Contents Installation Overview... 3 Components... 3 BinTrac Indicator... 3 Load Cell Bracket...
More informationJPdfBookmarks Manual. by Flaviano Petrocchi
JPdfBookmarks Manual by Flaviano Petrocchi JPdfBookmarks Manual 1 Introduction 3 Installation and Uninstallation 4 Linux Instructions 4 Debian Instructions 6 Windows Instructions 6 Universal Archive Instructions
More informationSystem Log NextAge Consulting Pete Halsted
System Log NextAge Consulting Pete Halsted 110 East Center St. #1035 Madison, SD 57042 pete@thenextage.com www.thenextage.com www.thenextage.com/wordpress Table of Contents Table of Contents BSD 3 License
More informationCA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5
CA SiteMinder Federation Manager Guide: Legacy Federation r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationHYDRODESKTOP VERSION 1.1 BETA QUICK START GUIDE
HYDRODESKTOP VERSION 1.1 BETA QUICK START GUIDE A guide to help you get started using this free and open source desktop application for discovering, accessing, and using hydrologic data. September 15,
More informationJD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide. for the Oracle Application Server
JD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide for the Oracle Application Server April 2006 JD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide Copyright 2006, Oracle.
More informationD3.5 Mockups of the CROWD4ROADS mobile app
CROWD4ROADS CROWD sensing and ride sharing FOR ROAD Sustainability Project Number: 687959 D3.5 Mockups of the CROWD4ROADS mobile app Lead Beneficiary: Nature/Dissemination Level: Work Package/Task: Editor:
More informationSkyPilot EMS Installation
SkyPilot EMS Installation 671-00004-01 Rev B 2006 SkyPilot Networks, Inc. All rights reserved This publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose. Product
More informationOracle Plug-in for Windows Agent 7.2 User Guide
Oracle Plug-in for Windows Agent 7.2 User Guide Revision: This manual has been updated for Version 7.2 for Windows (February 2013). Software Version: 7.20 for Windows 2013 The software manufacturer makes
More informationNetApp Cloud Volumes Service for AWS
NetApp Cloud Volumes Service for AWS AWS Account Setup Cloud Volumes Team, NetApp, Inc. March 29, 2019 Abstract This document provides instructions to set up the initial AWS environment for using the NetApp
More informationCB-RBE231 PRODUCT GUIDE
CB-RBE231 PRODUCT GUIDE Document Revision Document number: 8486926 Release: Mar 28, 2012 12:40 Document version: 3 Copyright 2012 AB. The contents of this document can be changed by AB without prior notice
More informationVMware vcenter Log Insight Manager. Deployment Guide
VMware vcenter Log Insight Manager Deployment Guide VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies
More informationFujitsu ScandAll PRO V2.1.5 README
-------------------------------------------------------- Fujitsu ScandAll PRO V2.1.5 README -------------------------------------------------------- Copyright PFU Limited 2007-2017 This file contains information
More informationPerformance Characterization of ONTAP Cloud in Azure with Application Workloads
Technical Report Performance Characterization of ONTAP Cloud in NetApp Data Fabric Group, NetApp March 2018 TR-4671 Abstract This technical report examines the performance and fit of application workloads
More informationFile Servant User Manual
File Servant User Manual Serve files over FTP and HTTP - at the snap of a finger! File Servant is free software (see copyright notice below). This document was last revised Monday 28 February 2011. Creator:
More informationNokia Intellisync Mobile Suite Client Guide. S60 Platform, 3rd Edition
Nokia Intellisync Mobile Suite Client Guide S60 Platform, 3rd Edition Published May 2008 COPYRIGHT Copyright 1997-2008 Nokia Corporation. All rights reserved. Nokia, Nokia Connecting People, Intellisync,
More informationSonicWALL CDP 2.1 Agent Tool User's Guide
COMPREHENSIVE INTERNET SECURITY b SonicWALL CDP Series Appliances SonicWALL CDP 2.1 Agent Tool User's Guide SonicWALL CDP Agent Tool User s Guide Version 2.0 SonicWALL, Inc. 1143 Borregas Avenue Sunnyvale,
More informationRAVENNA-2-SAP Converter Installation + Operation Guide
RAVENNA-2-SAP Converter Installation + Operation Guide Version 1.0 September 2016 RAVENNA-2-SAP Converter Guide 1 Table of Contents: 1 LEGAL 3 1.1 LICENSE 3 1.2 DISCLAIMER 3 2 INTRODUCTION 4 2.1 BACKGROUND
More informationNovell Audit 2.0 Administration Guide. novdocx (ENU) 10 August Novell Audit ADMINISTRATION GUIDE.
Novell Audit 2.0 Administration Guide Novell Audit 2.0 July 14, 2006 ADMINISTRATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or
More informationNetApp AltaVault Cloud-Integrated Storage Appliances
Technical Report NetApp AltaVault Cloud-Integrated Storage Appliances Solution Deployment: AltaVault with EMC NetWorker Christopher Wong, NetApp November 2017 TR-4425 Abstract This solution deployment
More informationData Deduplication Metadata Extension
Data Deduplication Metadata Extension Version 1.1c ABSTRACT: This document describes a proposed extension to the SNIA Cloud Data Management Interface (CDMI) International Standard. Publication of this
More informationThe Cron service allows you to register STAF commands that will be executed at a specified time interval(s).
Cron Service User's Guide Version 1.2.6 Last updated: March 29, 2006 Overview The Cron service allows you to register STAF commands that will be executed at a specified time interval(s). Note that Cron
More informationopenresty / array-var-nginx-module
1 of 6 2/17/2015 11:20 AM Explore Gist Blog Help itpp16 + openresty / array-var-nginx-module 4 22 4 Add support for array variables to nginx config files 47 commits 1 branch 4 releases 2 contributors array-var-nginx-module
More informationOpen Source Used In Cisco Configuration Professional for Catalyst 1.0
Open Source Used In Cisco Configuration Professional for Catalyst 1.0 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on
More informationSORRENTO MANUAL. by Aziz Gulbeden
SORRENTO MANUAL by Aziz Gulbeden September 13, 2004 Table of Contents SORRENTO SELF-ORGANIZING CLUSTER FOR PARALLEL DATA- INTENSIVE APPLICATIONS... 1 OVERVIEW... 1 COPYRIGHT... 1 SORRENTO WALKTHROUGH -
More informationQuest vworkspace. What s New. Version 7.5
Quest vworkspace What s New Version 7.5 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright. The software described in this
More informationIntellisync Mobile Suite Client Guide. S60 3rd Edition Platform
Intellisync Mobile Suite Client Guide S60 3rd Edition Platform Published July 2007 COPYRIGHT 2007 Nokia. All rights reserved. Rights reserved under the copyright laws of the United States. RESTRICTED RIGHTS
More informationFUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.
FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document
More information