A-2 Administration and Security Glossary

Size: px
Start display at page:

Download "A-2 Administration and Security Glossary"

Transcription

1 Appendix A Glossary This glossary defines some of the Process Commander terms system and background processing, authentication and authorization, process management, organization structure, and user interface configuration terms.

2 A-2 Administration and Security Glossary A abstract class access group access role activity agent application rule assignment authentication authorization A class that supports the definition of classes. An instance cannot be created for an abstract class. Abstract class names end with a hyphen (-). Compare with concrete class. Coordinates a user s access rights. Access groups are assigned to operator IDs. They specify the application and which parts of that application a user has access to. Assigned to individual users through access groups to modify user access to applications. A Java program, compiled and executed at runtime that performs a specific action in memory or against a database. Process Commander includes a standard set of activities for routers, assignments, and utilities. Analogous to a method in Java or a function in C. A background process, executing at set intervals or times as an internal thread on the server. Agents periodically monitor conditions and perform processing as necessary. Process Commander includes three standard agents. Defines a group of RuleSets that make up an application and orders the RuleSets according to their dependencies on each other. You assign application rules to access groups. An object that records the temporary condition of an unresolved work object. The condition requires a user or an external system to act on a work object for it to progress through the flow. At runtime assignments appear on worklists and workbasket lists. The process of determining the identity of a new user or requestor of services. Log-in is an authentication process. Authentication can be performed internally by Process Commander, externally (for example, by an LDAP server), or by a custom authentication activity. The process of determining the access rights of a user after authentication. Authorization involves access roles and access groups, and is always performed by Process Commander.

3 Administration and Security Glossary A-3 B BLOB (Binary Large OBject) BPM BRE See storage stream. Acronym for Business Process Management. Acronym for Business Rule Engine. C class class group Clipboard concrete class connector correspondence The definition for a type of object, or instance, in a Process Commander application. Class rules are instances of Rule-Obj-Class. They are similar to Java classes. A set of similar classes mapped to one database table, making database queries more efficient. Most commonly used to group subclasses of the Work- base class, and to define work pools for applications. A structured server memory object specific to each connected user, organized into named pages. Each page represents an individual or aggregated object, and consists of a set of tag-data pairs. Do not confuse with the operating system clipboard. A class that can have instances. Compare with abstract class. A programmatic component that defines and implements an interface between Process Commander, acting as a client, and an external system, acting as a server. Implemented through connector rules. Defines templates, such as preconfigured form letters, that can draw on the values of properties in the database to produce specific pieces of correspondence. A rule of type Rule-Obj-Corr.

4 A-4 Administration and Security Glossary D data object dependency network directed inheritance division F flow flow action G gadget guest A saved instance of a Process Commander class that inherits from the Data- base class. For example, access groups are data objects. A set of rules that share properties. Type of classification that enables a class to inherit characteristics directly from a specified class, which can be anywhere in the hierarchy. Analogous to Java subclassing. Compare with pattern inheritance. The middle level of the standard three-level Process Commander hierarchy. The organizational structure affects security, management reports and statistics, and the applications visible to users in that organization when they log in. Stored as instances of the Data-Admin- OrgDivision class. See also organization and organization unit. A rule containing steps that represent a business process. Flows specify how work objects are initiated and proceed through the process to completion. Flows can make decisions, execute activities, and perform assignments. A rule that implements a choice for users as an interim or final disposition of an assignment they are processing. See section. An unauthenticated user. See authentication.

5 Administration and Security Glossary A-5 I inheritance instance K keys Defining one class as based, with possible changes and additions, on another class. Process Commander supports both pattern inheritance (based on class names) and directed inheritance. A durable, potentially permanent, representation of a concrete class, stored as a row or record in the PegaRULES database. A page in the clipboard corresponds to an instance. An instance consists of property values, some of which form a unique key to the instance. Every rule instance and data instance defined through a form has one to three key parts. For a data instance, the keys in combination uniquely identify the instance within a class. For a rule, the keys uniquely identify the instance within a RuleSet, version, circumstance, and other qualifiers L layout listener lookup list M method, activity model model user The arrangement of items on a portal for a specific type of user. A background Java thread that monitors a TCP/IP port, a mailbox, a message queue, or a directory for arriving messages or files. See SmartPrompt. A primitive, atomic operation that can be performed by one step of an activity (of type Rule-Obj-Activity) or a parse structured rule (of type Rule-Parse-Structured). Do not confuse with a Java method. Defines initial values for properties of a specific class. A rule of type Rule-Obj-Model. Analogous to a Java constructor. An operator ID (Data-Admin-Operator-ID) used as a template for users who are authenticated externally.

6 A-6 Administration and Security Glossary N navigation panel node O operator organization organization unit P page pattern inheritance prconfig.xml file The left side of a portal. See also workspace. A server system on which Process Commander is running. In a multiple node Process Commander system, all nodes must have the same version of Process Commander installed, have the same system name, and share the same PegaRULES database. A Process Commander user. An instance of Data-Admin-Operator-ID. The top level of the standard three-level Process Commander hierarchy. The organizational structure affects security, management reports, and statistics, and the applications visible to users in that organization when they log in. Stored as instances of the Data-Admin- Organization class. See also division and organization unit. The bottom level of the standard three-level Process Commander hierarchy. The organizational structure affects security, management reports and statistics, and the applications visible to users in that organization when they log in. Stored as instances of the Data-Admin- OrgUnit class. See also division and organization. A clipboard page is a representation in memory of the properties (stored as name-value pairs) of an individual or aggregated object. The class inherits characteristics from its parent class; the default for inheritance. The name of the parent class is a prefix portion of the name of the class. Compare with directed inheritance. Each Process Commander instance (node) has a configuration file named prconfig.xml that holds the configuration settings for an installation. The file is loaded on startup and is used by the startup process to determine information about the system. For example, the location of the PegaRULES database, which database driver to use to connect to it, and so on.

7 Administration and Security Glossary A-7 PegaRULES database PegaRULES engine portal prerequisite RuleSet primary key privilege process flow production level property PRServlet PRSOAPServlet pulse, system The database used by your Process Commander system. The name most commonly used for the PegaRULES Process Commander business rules engine. The appearance of the Process Commander user interface is based on several factors that are coordinated by portal rules. Portal rules specify skins, gadgets, menus, and toolbars, all of which provide the HTML or XML that renders Process Commander interface. A RuleSet that provides rules upon which another RuleSet depends. A database record element that uniquely identifies the record in the database. An access control element associated with a class and an access role. A rule of type Rule-Access-Privilege. Privileges offer finer tuning of access control than do access roles. To have access to a privilege, a user must have at least one of the access roles that grant access to the privilege in an access role list. The association between access roles and privileges is established in object access rules (Rule-Access-Role- Obj). See flow. A value from 1 to 5 that represents the purpose of the Process Commander system environment, from experimental to production. Data; the attributes of an instance. Property values are stored within a page in the clipboard. Properties can contain scalar values, other pages, subscripted arrays of other properties, or named properties in a group. Analogous to a Java variable. The main Process Commander servlet. PRServlet provides the Process Commander user interface, the browser-based interface to the Process Commander engine. The Process Commander servlet that listens for SOAP requests. A message periodically sent to the nodes of a Process Commander system to synchronize individual node rule caches. It is implemented through an agent activity in the PegaRULES agent.

8 A-8 Administration and Security Glossary R requestor rule rules assembly rule cache rule form rule resolution rule resolution cache RuleSet Java objects that represent individual users or external systems that connect to Process Commander. Requestor data instances define the types of requestors that can access Process Commander and determine the applications, access roles, and starting activities executed when the requestor connects. A piece of business logic that defines how a business decision is made or how a business process is carried out; an instance of a class that derives from the class Rule-. Rules are constructed using rule forms, stored in XML format in a PegaRULES database, and converted to Java at runtime. The process of generating Java classes during runtime and caching them for later use. An internal cache of compiled rules where the Java classes compiled during rules assembly reside. The rule cache is specific to a given user. Also called the instance cache. An HTML-based form used in Process Commander to create and modify a rule. The algorithm Process Commander uses to determine the best or most appropriate rule version to apply in a particular situation. An internal cache that maintains sufficient information regarding rules and their versions to determine the applicable rule to be compiled during rules assembly. Specific to a given user. A group of related object classes, workflows, and business rules. Process Commander includes four foundation RuleSets.

9 Administration and Security Glossary A-9 S schema section service service level SmartPrompt standard access controls standard privilege storage stream System Management application Defines the table and column structure of a database. Tables and views in the relational database schema become visible through instances of Data-Admin-DB-Table. Also called a gadget, this is a rectangular area on a screen containing a control that a user can interact with. For example, the worklist area of the user s portal is implemented through a gadget.sections are instances of the Data-Gadget class. A programmatic component that defines and implements an interface between an external application, acting as a client, and a Process Commander system, acting as a server. Implemented through an appropriate service rule. See also connector. Also called a service-level agreement, or SLA for short, a rule that defines goals and deadlines that indicate the expected or targeted turnaround time for an assignment or time to resolve a work object. A text box, available on many forms, that makes a dynamic selection list available for fast user data entry. A blue triangle in the lower right corner identifies SmartPrompt text boxes. Privileges provided with Process Commander that use methods to act on a rule or instance. A set of privileges defined for the Work- class to control flow processing. Properties defined in user application subclasses, or properties in Workor Assign- subclasses that do not appear as exposed columns in the database, are stored as storage streams in the pzpvstream column. The data type of this column in blob. Process Commander is instrumented with JMX mbeans that provide information about the way the system is running. The System Management application is a separate Web application that provides an interface to the Process Commander mbeans.

10 A-10 Administration and Security Glossary T timeout U user utility W workbasket workflow work group worklist work object work party work pool work space Authentication timeout is the period of time a requestor can remain inactive before the user it represents must provide user credentials again. Set in access groups. Requestor timeout is the period of time a requestor can remain inactive before it is destroyed. Set in the prconfig.xml file. Someone who uses Process Commander. Information about a user is stored in an operator ID (Data-Admin-Operator-ID). An activity that updates a work object but requires neither user interaction nor input. Contains a group of work objects awaiting processing. See also worklist. See flow. Identifies a manager, contacts, and workbasket for a specified group. A group of assignments for one user. See also workbasket. The representation of an individual task that needs to be done. Work objects are collected in workbaskets. A person, organization, or other actor who can be the recipient of or other correspondence about a work object. A class group containing the work objects for an application. The right side of the Process Commander user interface.

Chapter 2 Getting Started

Chapter 2 Getting Started Chapter 2 Getting Started Process Commander is a business process management solution that combines a patented enterprise rules engine with tools for developing, deploying, and evolving enterprise-wide

More information

Chapter 5 Managing the Data

Chapter 5 Managing the Data Chapter 5 Managing the Data The data stored in your PegaRULES database includes instances of rule, data, work, assignment, and all the other classes present in your Process Commander system. This chapter

More information

Chapter 2 Introduction

Chapter 2 Introduction Chapter 2 Introduction PegaRULES Process Commander applications are designed to complement other systems and technologies that you already have in place for doing work. The Process Commander integration

More information

Pegasystems PEGACSSA. PRPC v5.5 Certified Senior System Architect. Download Full Version :

Pegasystems PEGACSSA. PRPC v5.5 Certified Senior System Architect. Download Full Version : Pegasystems PEGACSSA PRPC v5.5 Certified Senior System Architect Download Full Version : https://killexams.com/pass4sure/exam-detail/pegacssa QUESTION: 161 The customer wants to rollback a recently deployed

More information

EXAM BLUEPRINT PRPC Certified System Architect

EXAM BLUEPRINT PRPC Certified System Architect EXAM BLUEPRINT PRPC Certified System Architect White Paper Copyright 2011 Pegasystems Inc., Cambridge, MA All rights reserved. This document describes products and services of Pegasystems Inc. It may contain

More information

System Management Application

System Management Application System Management Application SMA Reference Guide Version 6.2 Copyright 2011 Pegasystems Inc., Cambridge, MA All rights reserved. This document describes products and services of Pegasystems Inc. It may

More information

CA IdentityMinder. Glossary

CA IdentityMinder. Glossary CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

Griffin Training Manual

Griffin Training Manual Griffin Training Manual Grif-WebI Orientation Class For View Only Users Alumni Relations and Development The University of Chicago Table of Contents Chapter 1: Defining & Accessing Web Intelligence...

More information

PEGACSSA

PEGACSSA PEGACSSA Passing Score: 800 Time Limit: 0 min Exam A QUESTION 1 A user's access group has two roles listed.? RoleA and RoleB (in that order).? RoleA has the "Open Instances of Data-Admin-Operator-ID" set

More information

Real Application Security Administration

Real Application Security Administration Oracle Database Real Application Security Administration Console (RASADM) User s Guide 12c Release 2 (12.2) E85615-01 June 2017 Real Application Security Administration Oracle Database Real Application

More information

Content Publisher User Guide

Content Publisher User Guide Content Publisher User Guide Overview 1 Overview of the Content Management System 1 Table of Contents What's New in the Content Management System? 2 Anatomy of a Portal Page 3 Toggling Edit Controls 5

More information

Distributed Multitiered Application

Distributed Multitiered Application Distributed Multitiered Application Java EE platform uses a distributed multitiered application model for enterprise applications. Logic is divided into components https://docs.oracle.com/javaee/7/tutorial/overview004.htm

More information

IaaS Configuration for vcloud Director

IaaS Configuration for vcloud Director vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites Oracle Database Real Application Security Administration 12c Release 1 (12.1) E61899-04 May 2015 Oracle Database Real Application Security Administration (RASADM) lets you create Real Application Security

More information

Pega Knowledge Management

Pega Knowledge Management Pega Knowledge Management 7.1 USER GUIDE Copyright 2014 Pegasystems Inc., Cambridge, MA All rights reserved. This document describes products and services of Pegasystems Inc. It may contain trade secrets

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

MARKETING. Pega Marketing. Upgrade Guide 7.4

MARKETING. Pega Marketing. Upgrade Guide 7.4 MARKETING Pega Marketing Upgrade Guide 7.4 2018 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights reserved. All other

More information

SMA Standard Tools. System Management Application Reference Guide. PegaRULES Process Commander V6.1

SMA Standard Tools. System Management Application Reference Guide. PegaRULES Process Commander V6.1 SMA Standard Tools System Management Application Reference Guide PegaRULES Process Commander V6.1 Copyright 2010 Pegasystems Inc., Cambridge, MA All rights reserved. This document describes products and

More information

IaaS Configuration for vcloud Director

IaaS Configuration for vcloud Director vcloud Automation Center 6.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Vendor: Pegasystems. Exam Code: PEGACSSA_V6.2. Exam Name: Certified Senior System Architect (CSSA) Exam. Version: Demo

Vendor: Pegasystems. Exam Code: PEGACSSA_V6.2. Exam Name: Certified Senior System Architect (CSSA) Exam. Version: Demo Vendor: Pegasystems Exam Code: PEGACSSA_V6.2 Exam Name: Certified Senior System Architect (CSSA) Exam Version: Demo Question No : 1 Which of the following is a RuleSet versioning practice that is prevented

More information

Big Java Late Objects

Big Java Late Objects Big Java Late Objects Horstmann, Cay S. ISBN-13: 9781118087886 Table of Contents 1. Introduction 1.1 Computer Programs 1.2 The Anatomy of a Computer 1.3 The Java Programming Language 1.4 Becoming Familiar

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

VMware Horizon Cloud Service on Microsoft Azure Administration Guide

VMware Horizon Cloud Service on Microsoft Azure Administration Guide VMware Horizon Cloud Service on Microsoft Azure Administration Guide Modified on 03 APR 2018 VMware Horizon Cloud Service VMware Horizon Cloud Service on Microsoft Azure 1.5 You can find the most up-to-date

More information

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide You can find the most up-to-date technical

More information

Mozy. Administrator Guide

Mozy. Administrator Guide Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

Teamcenter 11.1 Systems Engineering and Requirements Management

Teamcenter 11.1 Systems Engineering and Requirements Management SIEMENS Teamcenter 11.1 Systems Engineering and Requirements Management Systems Architect/ Requirements Management Project Administrator's Manual REQ00002 U REQ00002 U Project Administrator's Manual 3

More information

Pega Underwriting for Insurance

Pega Underwriting for Insurance PEGA OPERATIONS Pega Underwriting for Insurance IMPLEMENTATION GUIDE 7.31 2017 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks,

More information

Working with PDF Forms and Documents. PegaRULES Process Commander 5.1

Working with PDF Forms and Documents. PegaRULES Process Commander 5.1 Working with PDF Forms and Documents PegaRULES Process Commander 5.1 Copyright 2006 Pegasystems Inc., Cambridge, MA All rights reserved. This document describes products and services of Pegasystems Inc.

More information

Pega Agile Studio. Upgrade Guide 7.4

Pega Agile Studio. Upgrade Guide 7.4 Pega Agile Studio Upgrade Guide 7.4 2018 Pegasystems Inc., Cambridge, MA. All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights reserved. All other trademarks

More information

Cisco TelePresence Management Suite Provisioning Extension

Cisco TelePresence Management Suite Provisioning Extension Cisco TelePresence Management Suite Provisioning Extension Deployment Guide Cisco TMSPE 1.0 Cisco TMS 13.2 Cisco VCS X7.1, X7.2 D14941 06 October 2012 Contents Introduction 6 Cisco TMSPE versus Cisco TMS

More information

Griffin Training Manual Grif-WebI Introduction (For Analysts)

Griffin Training Manual Grif-WebI Introduction (For Analysts) Griffin Training Manual Grif-WebI Introduction (For Analysts) Alumni Relations and Development The University of Chicago Table of Contents Chapter 1: Defining WebIntelligence... 1 Chapter 2: Working with

More information

BEAWebLogic. Portal. Overview

BEAWebLogic. Portal. Overview BEAWebLogic Portal Overview Version 10.2 Revised: February 2008 Contents About the BEA WebLogic Portal Documentation Introduction to WebLogic Portal Portal Concepts.........................................................2-2

More information

Oracle BI 11g R1: Build Repositories

Oracle BI 11g R1: Build Repositories Oracle University Contact Us: 02 6968000 Oracle BI 11g R1: Build Repositories Duration: 5 Days What you will learn This course provides step-by-step procedures for building and verifying the three layers

More information

ImageNow Interact for Microsoft SharePoint Installation, Setup, and User Guide

ImageNow Interact for Microsoft SharePoint Installation, Setup, and User Guide ImageNow Interact for Microsoft SharePoint Installation, Setup, and User Guide Version: 6.6.x Written by: Product Documentation, R&D Date: ImageNow and CaptureNow are registered trademarks of Perceptive

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

Coveo Platform 7.0. Oracle UCM Connector Guide

Coveo Platform 7.0. Oracle UCM Connector Guide Coveo Platform 7.0 Oracle UCM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing market

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

vcloud Usage Meter 3.6 User's Guide vcloud Usage Meter 3.6

vcloud Usage Meter 3.6 User's Guide vcloud Usage Meter 3.6 vcloud Usage Meter 3.6 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates. If you

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Hosting RESTful APIs. Key Terms:

Hosting RESTful APIs. Key Terms: Hosting RESTful APIs This use case describes how to host RESTful APIs for consumption by external callers. This enables an application to expose business processes based on a given endpoint definition.

More information

Administrator's Guide

Administrator's Guide Administrator's Guide EPMWARE Version 1.0 EPMWARE, Inc. Published: July, 2015 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Pega High Availability

Pega High Availability PEGA 7 PLATFORM Pega 7.3.1 High Availability ADMINISTRATION GUIDE 2017 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

ForeScout Open Integration Module: Data Exchange Plugin

ForeScout Open Integration Module: Data Exchange Plugin ForeScout Open Integration Module: Data Exchange Plugin Version 3.2.0 Table of Contents About the Data Exchange Plugin... 4 Requirements... 4 CounterACT Software Requirements... 4 Connectivity Requirements...

More information

IBM Maximo Asset Management Version 7 Release 6. Developing Applications

IBM Maximo Asset Management Version 7 Release 6. Developing Applications IBM Maximo Asset Management Version 7 Release 6 Developing Applications Note Before using this information and the product it supports, read the information in Notices on page 115. This edition applies

More information

Test On Line: reusing SAS code in WEB applications Author: Carlo Ramella TXT e-solutions

Test On Line: reusing SAS code in WEB applications Author: Carlo Ramella TXT e-solutions Test On Line: reusing SAS code in WEB applications Author: Carlo Ramella TXT e-solutions Chapter 1: Abstract The Proway System is a powerful complete system for Process and Testing Data Analysis in IC

More information

Using the VMware vrealize Orchestrator Client

Using the VMware vrealize Orchestrator Client Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Vector Issue Tracker and License Manager - Administrator s Guide. Configuring and Maintaining Vector Issue Tracker and License Manager

Vector Issue Tracker and License Manager - Administrator s Guide. Configuring and Maintaining Vector Issue Tracker and License Manager Vector Issue Tracker and License Manager - Administrator s Guide Configuring and Maintaining Vector Issue Tracker and License Manager Copyright Vector Networks Limited, MetaQuest Software Inc. and NetSupport

More information

VMware Horizon Cloud Service on Microsoft Azure Administration Guide

VMware Horizon Cloud Service on Microsoft Azure Administration Guide VMware Horizon Cloud Service on Microsoft Azure Administration Guide VMware Horizon Cloud Service VMware Horizon Cloud Service on Microsoft Azure 1.4 You can find the most up-to-date technical documentation

More information

IBM Records Manager Version 8.5. Designing a DoD Compliant Solution

IBM Records Manager Version 8.5. Designing a DoD Compliant Solution IBM Records Manager Version 8.5 Designing a DoD 5015.02 Compliant Solution IBM Records Manager Version 8.5 Designing a DoD 5015.02 Compliant Solution Note Before using this information and the product

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

DOT NET Syllabus (6 Months)

DOT NET Syllabus (6 Months) DOT NET Syllabus (6 Months) THE COMMON LANGUAGE RUNTIME (C.L.R.) CLR Architecture and Services The.Net Intermediate Language (IL) Just- In- Time Compilation and CLS Disassembling.Net Application to IL

More information

Document Management System GUI. v6.0 User Guide

Document Management System GUI. v6.0 User Guide Document Management System GUI v6.0 User Guide Copyright Copyright HelpSystems, LLC. All rights reserved. www.helpsystems.com US: +1 952-933-0609 Outside the U.S.: +44 (0) 870 120 3148 IBM, AS/400, OS/400,

More information

X100 ARCHITECTURE REFERENCES:

X100 ARCHITECTURE REFERENCES: UNION SYSTEMS GLOBAL This guide is designed to provide you with an highlevel overview of some of the key points of the Oracle Fusion Middleware Forms Services architecture, a component of the Oracle Fusion

More information

Revision History Overview Feature Summary Knowledge Management Policy Automation Platform Agent Browser Workspaces Agent Browser Desktop Automation

Revision History Overview Feature Summary Knowledge Management Policy Automation Platform Agent Browser Workspaces Agent Browser Desktop Automation TABLE OF CONTENTS Revision History 3 Overview 3 Feature Summary 3 Knowledge Management 5 Implement Sitemap XML in Web Collection Crawling 5 Searchable Product Tags 5 Policy Automation 5 Integration Cloud

More information

Configuring SAP Targets and Runtime Users

Configuring SAP Targets and Runtime Users CHAPTER 4 Before you can create or run processes in your SAP environment, you must create the targets on which the processes will run. Targets are used to define specific environments where activities,

More information

Nintex Forms 2010 Help

Nintex Forms 2010 Help Nintex Forms 2010 Help Last updated: Monday, April 20, 2015 1 Administration and Configuration 1.1 Licensing settings 1.2 Activating Nintex Forms 1.3 Web Application activation settings 1.4 Manage device

More information

Pega Predictive Diagnostic Cloud Security

Pega Predictive Diagnostic Cloud Security Pega Predictive Diagnostic Cloud Security A Technical Brief Build for Change Table Of Contents I. Introduction... 3 II. Data Sent to Pega PDC... 3 A. Alerts... 3 B. Parameter Page... 4 C. Database Alerts...

More information

Oracle Utilities Smart Grid Gateway Adapter for Itron OpenWay

Oracle Utilities Smart Grid Gateway Adapter for Itron OpenWay Oracle Utilities Smart Grid Gateway Adapter for Itron OpenWay User's Guide Release 2.1.0 Service Pack 2 E41627-02 April 2014 Oracle Utilities Smart Grid Gateway Adapter for Itron OpenWay User's Guide Release

More information

Connect the Appliance to a Cisco Cloud Web Security Proxy

Connect the Appliance to a Cisco Cloud Web Security Proxy Connect the Appliance to a Cisco Cloud Web Security Proxy This chapter contains the following sections: How to Configure and Use Features in Cloud Connector Mode, on page 1 Deployment in Cloud Connector

More information

Pega Foundation for Financial Services

Pega Foundation for Financial Services Pega Foundation for Financial Services ACCOUNTING GUIDE 7.32 2017 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights reserved.

More information

J2EE: Best Practices for Application Development and Achieving High-Volume Throughput. Michael S Pallos, MBA Session: 3567, 4:30 pm August 11, 2003

J2EE: Best Practices for Application Development and Achieving High-Volume Throughput. Michael S Pallos, MBA Session: 3567, 4:30 pm August 11, 2003 J2EE: Best Practices for Application Development and Achieving High-Volume Throughput Michael S Pallos, MBA Session: 3567, 4:30 pm August 11, 2003 Agenda Architecture Overview WebSphere Application Server

More information

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7 DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1

More information

Product Documentation. ER/Studio Portal. User Guide 2nd Edition. Version 2.0 Published January 31, 2013

Product Documentation. ER/Studio Portal. User Guide 2nd Edition. Version 2.0 Published January 31, 2013 Product Documentation ER/Studio Portal User Guide 2nd Edition Version 2.0 Published January 31, 2013 2013 Embarcadero Technologies, Inc. Embarcadero, the Embarcadero Technologies logos, and all other Embarcadero

More information

Pega Knowledge. Implementation Guide

Pega Knowledge. Implementation Guide Implementation Guide 2018 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights reserved. All other trademarks or service

More information

Bonita Workflow. Development Guide BONITA WORKFLOW

Bonita Workflow. Development Guide BONITA WORKFLOW Bonita Workflow Development Guide BONITA WORKFLOW Bonita Workflow Development Guide BSOA Workflow v3.0 Software January 2007 Copyright Bull SAS Table of Contents Chapter 1. Overview... 11 1.1 Role of

More information

Coveo Platform 7.0. Yammer Connector Guide

Coveo Platform 7.0. Yammer Connector Guide Coveo Platform 7.0 Yammer Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing market conditions,

More information

TIBCO LiveView Web Getting Started Guide

TIBCO LiveView Web Getting Started Guide TIBCO LiveView Web Getting Started Guide Contents Introduction... 1 Prerequisites... 1 Installation... 2 Installation Overview... 2 Downloading and Installing for Windows... 3 Downloading and Installing

More information

vcloud Director Administrator's Guide

vcloud Director Administrator's Guide vcloud Director 5.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Getting Started. In this chapter, you will learn: 2.1 Introduction

Getting Started. In this chapter, you will learn: 2.1 Introduction DB2Express.book Page 9 Thursday, August 26, 2004 3:59 PM CHAPTER 2 Getting Started In this chapter, you will learn: How to install DB2 Express server and client How to create the DB2 SAMPLE database How

More information

Web Publisher User Guide

Web Publisher User Guide Web Publisher User Guide Version 5.3 SP4 December 2006 Copyright 1994-2006 EMC Corporation. All rights reserved. Table of Contents Preface... 15 Chapter 1 Introduction... 17 What is Web Publisher?... 17

More information

MARKETING. Pega Marketing. Installation Guide 7.4

MARKETING. Pega Marketing. Installation Guide 7.4 MARKETING Pega Marketing Installation Guide 7.4 2018 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights reserved. All

More information

Business Insight Authoring

Business Insight Authoring Business Insight Authoring Getting Started Guide ImageNow Version: 6.7.x Written by: Product Documentation, R&D Date: August 2016 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,

More information

ForeScout Extended Module for Advanced Compliance

ForeScout Extended Module for Advanced Compliance ForeScout Extended Module for Advanced Compliance Version 1.2 Table of Contents About Advanced Compliance Integration... 4 Use Cases... 4 Additional Documentation... 6 About This Module... 6 About Support

More information

IBM Security Identity Manager Version Administration Topics

IBM Security Identity Manager Version Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics ii IBM Security Identity Manager Version 6.0.0.5: Administration

More information

EPM Live 2.2 Configuration and Administration Guide v.os1

EPM Live 2.2 Configuration and Administration Guide v.os1 Installation Configuration Guide EPM Live v2.2 Version.01 April 30, 2009 EPM Live 2.2 Configuration and Administration Guide v.os1 Table of Contents 1 Getting Started... 5 1.1 Document Overview... 5 1.2

More information

IBM FileNet Business Process Framework Version 4.1. Explorer Handbook GC

IBM FileNet Business Process Framework Version 4.1. Explorer Handbook GC IBM FileNet Business Process Framework Version 4.1 Explorer Handbook GC31-5515-06 IBM FileNet Business Process Framework Version 4.1 Explorer Handbook GC31-5515-06 Note Before using this information and

More information

Symantec Endpoint Virtualization 6.1 SP8 Release Notes

Symantec Endpoint Virtualization 6.1 SP8 Release Notes Chapter 1 Symantec Endpoint Virtualization 6.1 SP8 Release Notes This chapter includes the following topics: About Symantec Endpoint Virtualization About 6.1 SP8 What's new in 6.1 SP8 Supported platforms

More information

Microsoft MB Microsoft CRM Extending MS CRM 1.2 with.net.

Microsoft MB Microsoft CRM Extending MS CRM 1.2 with.net. Microsoft MB2-228 Microsoft CRM Extending MS CRM 1.2 with.net http://killexams.com/exam-detail/mb2-228 Answer: A, C QUESTION: 140 Which of the following statements are true for Microsoft CRM object dependencies?

More information

IBM Security Identity Manager Version Glossary IBM

IBM Security Identity Manager Version Glossary IBM IBM Security Identity Manager Version 7.0.1.3 Glossary IBM IBM Security Identity Manager Version 7.0.1.3 Glossary IBM ii IBM Security Identity Manager Version 7.0.1.3: Glossary Table of contents Glossary..............

More information

EMC SourceOne for Microsoft SharePoint Version 6.7

EMC SourceOne for Microsoft SharePoint Version 6.7 EMC SourceOne for Microsoft SharePoint Version 6.7 Administration Guide P/N 300-012-746 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011

More information

Globalbrain Administration Guide. Version 5.4

Globalbrain Administration Guide. Version 5.4 Globalbrain Administration Guide Version 5.4 Copyright 2012 by Brainware, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Pega Foundation for Healthcare

Pega Foundation for Healthcare Pega Foundation for Healthcare COMMON CODES SOLUTION BUSINESS CASE USE CASE GUIDE 7.31 2017 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered

More information

Administration Guide

Administration Guide Administration Guide 10/31/2016 Blackbaud NetCommunity 7.1 Administration US 2016 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,

More information

BIG-IP Analytics: Implementations. Version 12.1

BIG-IP Analytics: Implementations. Version 12.1 BIG-IP Analytics: Implementations Version 12.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles...5 Overview: Collecting

More information

Portal Express 6 Overview

Portal Express 6 Overview Portal Express 6 Overview WebSphere Portal Express v6.0 1 Main differences between Portal Express and Portal 6.0 Built with the same components as Portal 6.0.0.1 BPC is the only missing piece Supports

More information

HP Intelligent Management Center SOM Administrator Guide

HP Intelligent Management Center SOM Administrator Guide HP Intelligent Management Center SOM Administrator Guide Abstract This guide contains comprehensive conceptual information for network administrators and other personnel who administrate and operate the

More information

SmartPlant Foundation 4.x Introduction and Administration I

SmartPlant Foundation 4.x Introduction and Administration I Table of Contents Table of Contents - 2 SmartPlant Foundation 4.x Introduction and Administration I SmartPlant Foundation 4.x Introduction and Administration I Table of Contents - 3 1. SmartPlant Architecture

More information

Java J Course Outline

Java J Course Outline JAVA EE - J2SE - CORE JAVA After all having a lot number of programming languages. Why JAVA; yet another language!!! AND NOW WHY ONLY JAVA??? CHAPTER 1: INTRODUCTION What is Java? History Versioning The

More information

Page 1

Page 1 Java 1. Core java a. Core Java Programming Introduction of Java Introduction to Java; features of Java Comparison with C and C++ Download and install JDK/JRE (Environment variables set up) The JDK Directory

More information

SharePoint 2013 Power User

SharePoint 2013 Power User SharePoint 2013 Power User Course 55028; 2 Days, Instructor-led Course Description This SharePoint 2013 Power User training class is designed for individuals who need to learn the fundamentals of managing

More information

ECM-VNA Convergence Connector

ECM-VNA Convergence Connector ECM-VNA Convergence Connector Installation and Setup Guide Version: 1.0.x Written by: Product Knowledge, R&D Date: September 2016 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International

More information

ADMINISTRATOR PORTAL MANUAL

ADMINISTRATOR PORTAL MANUAL ADMINISTRATOR PORTAL MANUAL TABLE OF CONTENTS SIGNING IN... 5 HOME SCREEN... 6 GENERAL SETTINGS... 7 WORKING HOURS TAB... 9 HOLIDAYS TAB... 11 Shortened hours for the Holidays... 12 Holiday Message...

More information

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

ACS 5.x: LDAP Server Configuration Example

ACS 5.x: LDAP Server Configuration Example ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using

More information

Oracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0

Oracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 Oracle Enterprise Manager System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 E24476-01 October 2011 The System Monitoring Plug-In for Oracle Unified Directory extends Oracle

More information