Goal. Security Risk. Define what is security risk and what are its main constituencies: Chapter 3:

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Goal. Security Risk. Define what is security risk and what are its main constituencies: Chapter 3:"

Transcription

1 Fundamentals f Secure System Mdelling Springer, 2017 Chapter 3: Security Risk Raimundas Matulevičius University f Tartu, Estnia, Gal Define what is security risk and what are its main cnstituencies: Threat agent Attack methd Threat Vulnerability Event Impact 2

2 What is Security engineering? [Firesmith, 2003] Security engineering is cncerned with lwering the risk f intentinal unauthrized harm t valuable assets t level that is acceptable t the system s stakehlders by preventing and reacting t malicius harm, misuse, threats, and security risks. 3 Risk Analysis 1. Identify explicitly what system assets are targeted 2. Use explicit knwledge and previus expertise t characterize ptential vulnerabilities f the cnsidered system assets 3. Security analyst shuld impersnate himself as the threat agent (mtive, capabilities, means, pprtunities) 4. Attack methd shuld be explicitly stated including its majr steps 5. Elicit and state what is the impact f the defined risk event 6. Once all cmpnents are gathered state what is the risk 4

3 Risk Analysis 1. Identify explicitly what system assets are targeted 2. Use explicit knwledge and previus expertise t characterize ptential vulnerabilities f the cnsidered system assets 3. Security analyst shuld impersnate himself as the threat agent (mtive, capabilities, means, pprtunities) 4. Attack methd shuld be explicitly stated including its majr steps 5. Elicit and state what is the impact f the defined risk event 6. Once all cmpnents are gathered state what is the risk 5 Security Risk Management Dmain Mdel 6

4 Prcessing f Infrmatin Everything that IT des, reduces t six functins Capturing infrmatin Keybard, bar cde reader, digital camera Transmitting infrmatin Wired-, wireless-phne String infrmatin Hard disk, memry card, internet Retrieving infrmatin Frm any strage device Manipulating infrmatin Calculatins, cmbinatins f data Displaying infrmatin Mnitr, printer 7 8

5 Functinal Decmpsitin User interactin Interfacing and/r interacting with users Data/strage management String and management f applicatins r infrmatin Resurce management Resurce allcatin, glbal scheduling, prcess migratin, Dynamic cnfiguratin f active sftware cmpnents Distributin cntrl Cmpnent cllabratin Crdinatin f lcal/remte executin Synchrnizatin/cncurrency cntrl Cmmunicatin Netwrk cmmunicatin Addressing Address, identifier and/r name allcatin, distributin and discvery/lkup 9 Risk Analysis 1. Identify explicitly what system assets are targeted 2. Use explicit knwledge and previus expertise t characterize ptential vulnerabilities f the cnsidered system assets 3. Security analyst shuld impersnate himself as the threat agent (mtive, capabilities, means, pprtunities) 4. Attack methd shuld be explicitly stated including its majr steps 5. Elicit and state what is the impact f the defined risk event 6. Once all cmpnents are gathered state what is the risk 10

6 Security Risk Management Dmain Mdel 11 Security Risk Management Dmain Mdel Cmmn Vulnerabilities and Expsures: https://cve.mitre.rg/cve/ Natinal vulnerability database: https://nvd.nist.rg OWASP vulnerability database: https://www.wasp.rg/index.php/vulnerability 12

7 Seven Pernicius Kingdms 1. Input validatin and Representatin 2. API Abuse 3. Security Features 4. Time and State 5. Errr Handling 6. Cde Quality 7. Encapsulatin * Envirnment [Tsipenyuk et al., 2005] Input validatin and Representatin 2. API Abuse 3. Security Features 4. Time and State 5. Errr Handling 6. Cde Quality 7. Encapsulatin * Envirnment Caused by Meta-characters, alternate encding, numeric representatin Prblems result frm Lack f input validatin Representatin issues easy target ften-used pint f attack Resulting prblems Buffer verflws Crss-site scripting SQL injectin Cmmand injectin Setting Manipulatin String terminatin errr 14

8 1. Input validatin and Representatin 2. API Abuse An API is a cntract between a 3. caller Security and a callee Features 4. Time and State 5. Errr Handling 6. Cde Quality 7. Encapsulatin * Envirnment Caused by The callee failing t hnr its end f the cntract Case If a prgram fails t call chdir() after calling chrt(), it vilates the cntract that specifies hw t change the active rt directry in a secure fashin Resulting prblems Dangerus functins Often misused exceptin handling Unchecked return value Directry restrictin Input validatin and Representatin 2. API Abuse 3. Security Features 4. Time and State Sftware security is nt security sftware 5. Errr Handling 6. Cde Quality 7. Encapsulatin * Envirnment Caused by Incrrect implementatin Incrrect use f security features like Authenticity, Access cntrl, Cryptgraphy, Digital signatures, Resulting prblems Insecure randmness Missing access cntrl Passwrd management Privacy vilatin 16

9 1. Input validatin and Representatin 2. API Abuse 3. Security Features 4. Time and State Caused by Distributed cmputing Sharing state Multithreading A prgrammer s belief that everything happens in ne cntinuus sequence 5. Errr Handling 6. Cde Quality 7. Encapsulatin In rder fr mre than ne cmpnent t cmmunicate, state must be shared, * Envirnment and all that takes time Resulting prblems Deadlck Failure t begin a new sessin upn authenticatin Insecure temprary file File access race cnditin (TOCTOU) Input validatin and Representatin 2. API Abuse 3. Security Features 4. Time and State 5. Errr Handling Errrs and errr handling represent 6. a Cde class f Quality API 7. Encapsulatin Errrs related t errr handling are s cmmn that they deserve a special kingdm f their wn * Envirnment Caused by Unexpected input unexpected behaviur Cncept f exceptins in mdern prgramming languages Insecure use and handling f exceptins Resulting prblems Catch NullPinterExceptin Empty catch blck Overly-brad catch blck Overly brad thrw declaratin Unchecked return value 18

10 1. Input validatin and Representatin 2. API Abuse 3. Security Features 4. Time and State Caused by Lack f cmpliance with design Insecure cde is buggy cde Cde readability Cmplexity f cde vs. cmplexity the human brain is able t manage Frgetting t remve ld cde 5. Errr Handling 6. Cde Quality 7. Encapsulatin * Envirnment Resulting prblems Incnsistent implementatin Memry leak Obslete cde Underfined behaviur Uninitalised variable Unreleased resurce Use after free Input validatin and Representatin 2. API Abuse 3. Security Features 4. Time and State Caused by Lack f clear bundaries Between WebApp and system resurces Between validated and unvalidated data Between classes with varius methds Lack f attentin t trust mdels and trust bundaries 5. Errr Handling 6. Cde Quality 7. Encapsulatin * Envirnment Resulting prblems Cmparing classes by name Data leaking between users Leftver debug cde Mbile cde: nn-final public field Trust bundary vilatin 20

11 1. Input validatin and Representatin 2. API Abuse 3. Security Features 4. Time and State 5. Errr Handling 6. Cde Quality 7. Encapsulatin * Envirnment Caused by The sftware yu are develping running n a machine... with an perating systems and ther sftware quite pssibly cnnected t ther machines thrugh a netwrk all the stuff that is utside the cde but is still critical t the security f the created sftware Resulting prblems Miscnfiguratin issues Insecure cmpiler ptimisatin 21 Risk Analysis 1. Identify explicitly what system assets are targeted 2. Use explicit knwledge and previus expertise t characterize ptential vulnerabilities f the cnsidered system assets 3. Security analyst shuld impersnate himself as the threat agent (mtive, capabilities, means, pprtunities) 4. Attack methd shuld be explicitly stated including its majr steps 5. Elicit and state what is the impact f the defined risk event 6. Once all cmpnents are gathered state what is the risk 22

12 Threat agent [ben Othmane et al., 2014] 23 Characteristics f Threat agent [ben Othmane et al. 2014; Shstack 2014] Opprtunity time t perfrm a successful attack Mtivatin Curisity Persnal fame Persnal gain Natinal interest Legitimate Illegitimate Expertise Script kiddy Undergraduate Experts Specialist 24

13 Threat Agent Expertise [Shstack, 2014] Script kiddie Use the tls an applicatins created by thers N real system knwledge Fllw instructins and use different available tls Undergraduate Mstly use tls and applicatins ther write Can d minr mdificatin (t these tls) Lack skills t d anything mre than twist and adjust a few dials and settings Expert Supply tls and applicatins Write wrms and viruses Write applicatins that snp netwrks fr weaknesses Cnfrtable by wrking in kernel, reading prtcl traces Specialist Specialised training Access critical resurces D nt leave traces f their wrk Wrk carefully and methdically Snping and breaking cmputer is their jb 25 Characteristics f Threat agent [ben Othmane ET AL, 2014; Shstack, 2014] Natinal interest Spy Persnal gain Thief Persnal fame Vandal / Trespasser / Authr Curisity Vandal Authr Script Kiddy Undergraduate Expert Specialist 26

14 Risk Analysis 1. Identify explicitly what system assets are targeted? 2. Use explicit knwledge and previus expertise t characterize ptential vulnerabilities f the cnsidered system assets 3. Security analyst shuld impersnate himself as the threat agent (mtive, capabilities, means, pprtunities) 4. Attack methd shuld be explicitly stated including its majr steps 5. Elicit and state what is the impact f the defined risk event 6. Once all cmpnents are gathered state what is the risk 27 Security Risk Management Dmain Mdel 28

15 Security Risk Management Dmain Mdel 29 STRIDE (Micrsft) Spfing pretending t be smene/smething than intended Tampering mdifying smething n the disk/file/ netwrk/ memry Repudiatin claiming that smene did nt d smething r were nt respnsible Infrmatin disclsure prviding infrmatin t smene nt authrised t see it Denial f service absrbing resurces needed t prvide the service Elevatin f privileges allwing smene t d smething they are nt authrised t d 30

16 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins [Uzunv and Fernandez, 2014] 31 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Attacker attempts t fabricate r misuse identities in a system Examples Identity spfing Advantageus identity allcatin 32

17 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Threats t cmmunicatin between distributed cmpnents Examples Message secrecy vilatin Message integrity vilatin Message authenticity vilatin Traffic analysis, prtcl sniffing Cvert netwrk channel Sessin hijacking Sessin state pisning Rute pisning Message flding 33 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Threats t cmmunicatin between distributed cmpnents Examples Message secrecy vilatin Message integrity vilatin Message authenticity vilatin Traffic analysis, prtcl sniffing Cvert netwrk channel Sessin hijacking Sessin state pisning Rute pisning Message flding 34

18 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Threats t cmmunicatin between distributed cmpnents Examples Message secrecy vilatin Message integrity vilatin Message authenticity vilatin Traffic analysis, prtcl sniffing Cvert netwrk channel Sessin hijacking Sessin state pisning Rute pisning Message flding 35 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Threats t cmmunicatin between distributed cmpnents Examples Message secrecy vilatin Message integrity vilatin Message authenticity vilatin Traffic analysis, prtcl sniffing Cvert netwrk channel Sessin hijacking Sessin state pisning Messages in transit Rute pisning intercepted and their cntents read Message flding by an attacker intercepted and mdified, replaced, crrupted r simply deleted by an attacker 36

19 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Threats t cmmunicatin between distributed cmpnents Examples Message secrecy vilatin Message integrity vilatin Message authenticity vilatin Traffic analysis, prtcl sniffing Cvert netwrk channel Sessin hijacking Sessin state pisning Messages in transit Rute pisning intercepted and their cntents read Message flding by an attacker intercepted and mdified, replaced, crrupted r simply deleted by an attacker 37 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Threats t cmmunicatin between distributed cmpnents Examples Message secrecy vilatin Message integrity vilatin Message authenticity vilatin Traffic analysis, prtcl sniffing Cvert netwrk channel Sessin hijacking Sessin state pisning Secure Rute cmmunicatin pisning message Message flding encryptin message hashing, errr detectin cdes 38

20 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Threats specifically t the netwrk prtcls used fr cmmunicatin Examples Message replay Message reuse Prtcl field mdificatin Use f abnrmal packet size Use f abnrmal package sequencing Use f reserved prtcl packet 39 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Input data is manipulated by attacker fr sme malicius purpse Examples Injectin 40

21 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Stred data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Threats n strage data Examples Crruptin 41 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Extracting infrmatin frm a cmpnent r remtely, i.e., ver netwrk Examples Scanning (infrmatin gathering Prbing (vulnerability checking) Output infrmatin disclsure Data inference 42

22 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Impact accuntability attributes Examples Track erasing Repudiatin 43 Threats t (Distributed) System (first level threats) Identify Netwrk cmmunicatin Netwrk prtcl Passing illegal data Remte infrmatin inference Lss f accuntability Uncntrlled peratins Explits existing system functinality in ways that wuld nt nrmally be allwed (e.g., race cnditins, access t data) Examples Unauthrized access Invking unauthrized peratins Spfing privileged prcesses Unsafe cde executin Explitatin f tight cmpnent cupling Prcess verflw attack Expliting cncurrency flaws Resurce exhaustin Targeted prcess crashing 44

23 Security risk management prcess 45 Threats t Security Infrastructure (secnd level threats) Cryptgraphy Cuntermeasure design Cnfiguratin/ administratin Netwrk prtcl threats [Uzunv and Fernandez, 2014] 46

24 Threats t Security Infrastructure (secnd level threats) Cryptgraphy Cuntermeasure design Cnfiguratin/ administratin Netwrk prtcl threats Threats t cuntermeasures using cryptgraphy Examples Frging cryptgraphic credentials Abuse f weak algrithm Expliting vulnerable security prtcl Passwrd (guessing, brute frce, rainbw tables) 47 Threats t Security Infrastructure (secnd level threats) Cryptgraphy Cuntermeasure design Cnfiguratin/ administratin Netwrk prtcl threats Threats t the way certain cuntermeasures are (r may be) designed Examples Use f default credentials Bypassing cntrls Leveraging authrizatin mdel 48

25 Threats t Security Infrastructure (secnd level threats) Cryptgraphy Cuntermeasure design Cnfiguratin/ administratin Netwrk prtcl threats Threats related t cnfiguratin and/r administratin f the security system Examples Expliting bad plicies Unauthrized mdificatin f rights 49 Threats t Security Infrastructure (secnd level threats) Cryptgraphy Cuntermeasure design Cnfiguratin/ administratin Netwrk prtcl threats Als at the first level Threats applicable t secure prtcl design 50

26 Risk Analysis 1. Identify explicitly what system assets are targeted? 2. Use explicit knwledge and previus expertise t characterize ptential vulnerabilities f the cnsidered system assets 3. Security analyst shuld impersnate himself as the threat agent (mtive, capabilities, means, pprtunities) 4. Attack methd shuld be explicitly stated including its majr steps 5. Elicit and state what is the impact f the defined risk event 6. Once all cmpnents are gathered state what is the risk 51 Security Risk Management Dmain Mdel 52

27 Malicius sftware https://www.veracde.cm/blg/2012/10/cmmn-malware-types-cybersecurity-101/ Sftware used t cause harm t the cmputer Cmprmise cmputer functins Steal data Bypass access cntrls 53 Malicius sftware https://www.veracde.cm/blg/2012/10/cmmn-malware-types-cybersecurity-101/ Symptms: Increased CPU usage Slw cmputer r web brwser speeds Prblems cnnecting t netwrks Freezing r crashing Mdified r deleted files Appearance f strange files, prgrams, r desktp icns Prgrams running, turning ff, r recnfiguring themselves Strange cmputer behavir s/messages being sent autmatically and withut user s knwledge 54

28 Malicius sftware [https://www.veracde.cm/blg/2012/10/cmmn-malware-types-cybersecurity-101/] Symptms: Increased CPU usage Slw cmputer r web brwser speeds Adware Spyware Bt Prblems cnnecting t netwrks Freezing r crashing Mdified r deleted files Appearance Bug f strange files, prgrams, Wrm r desktp icns Ransmware Prgrams running, turning ff, r recnfiguring themselves Strange cmputer behavir Rtkit Trjan hrse Virus Spam s/messages being sent autmatically and withut user s knwledge 55 Malware types https://www.veracde.cm/blg/2012/10/cmmn-malware-types-cybersecurity-101/ Adware (advertising supprted sftware) autmatically delivers advertisements Pp-up ads n Websites Cme with spyware t track-user activities t steal infrmatin Spyware spy n user activity withut their knwledge activity mnitring cllecting keystrkes data harvesting (accunt infrmatin, lgins, financial data) 56

29 Malware types https://www.veracde.cm/blg/2012/10/cmmn-malware-types-cybersecurity-101/ Bt autmatically perfrm specific peratins used in btnets cllectins f cmputers t be cntrlled by third parties DDS spambts Bug A flaw that prduces an undesired utcme Security bugs are the mst severe type f bugs Attackers can bypass user authenticatin verride access privileges steal data 57 Malware types https://www.veracde.cm/blg/2012/10/cmmn-malware-types-cybersecurity-101/ Ransmware hlds a cmputer system captive while demanding a ransm restricts user access t the cmputer encrypting files lcking dwn the system and displaying messages t frce the user t pay the malware creatr Rtkit remtely access r cntrl a cmputer withut being detected remtely execute files access/steal infrmatin mdify system cnfiguratins alter sftware (especially security sftware that culd detect the rtkit) install cncealed malware cntrl the cmputer as part f a btnet 58

30 Malware types https://www.veracde.cm/blg/2012/10/cmmn-malware-types-cybersecurity-101/ Virus cpying itself and spreading t ther cmputers by attaching themselves t varius prgrams, executing cde when a user launches thse prgrams thrugh script files, dcuments, and crss-site scripting vulnerabilities in web apps used t steal infrmatin, mney harm hst cmputers and netwrks create btnets render advertisements Wrm spread ver cmputer netwrks by expliting perating system vulnerabilities harm t hst netwrks by cnsuming bandwidth and verlading web servers Have the ability t self-replicate and spread independently Wrms ften spread by sending mass s with infected attachments t users cntacts 59 Malware types https://www.veracde.cm/blg/2012/10/cmmn-malware-types-cybersecurity-101/ Trjan Hrse disguises itself as a nrmal file r prgram t trick users int dwnlading and installing malware can give a malicius party remte access nce an attacker has access t an infected cmputer t steal data install mre malware mdify files mnitr user activity use the cmputer in btnets Spam electrnic sending f mass unslicited messages , instant messages, texting, blgs, web frums, search engines, scial media it is very cmmn fr malware t spread thrugh spamming when infected cmputers (with viruses, wrms, ) are used t distribute spam messages cntaining mre malware 60

31 Risk Analysis 1. Identify explicitly what system assets are targeted? 2. Use explicit knwledge and previus expertise t characterize ptential vulnerabilities f the cnsidered system assets 3. Security analyst shuld impersnate himself as the threat agent (mtive, capabilities, means, pprtunities) 4. Attack methd shuld be explicitly stated including its majr steps 5. Elicit and state what is the impact f the defined risk event 6. Once all cmpnents are gathered state what is the risk 61 Define Risk Explicitly 62

32 Risk Mdelling Techniques KAOS extensins t security Gal mdelling Anti-mdels, Anti-gals and Anti-requirements Abuse frames Extensin f prblem frames Anti-requirements be fulfilled by a threat agent Attack trees Definitin and refinement f ptential attack 63 Summary 1. Identify explicitly what system assets are targeted 2. Use explicit knwledge and previus expertise t characterize ptential vulnerabilities f the cnsidered system assets 3. Security analyst shuld impersnate himself as the threat agent (mtive, capabilities, means, pprtunities) 4. Attack methd shuld be explicitly stated including its majr steps 5. Elicit and state what is the impact f the defined risk event 6. Once all cmpnents are gathered state what is the risk 64

CCNA Security v2.0 Chapter 1 Exam Answers

CCNA Security v2.0 Chapter 1 Exam Answers CCNA Security v2.0 Chapter 1 Exam Answers 1. What methd can be used t mitigate ping sweeps? using encrypted r hashed authenticatin prtcls installing antivirus sftware n hsts deplying antisniffer sftware

More information

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel NiceLabel LMS Installatin Guide fr Single Server Deplyment Rev-1702 NiceLabel 2017. www.nicelabel.cm 1 Cntents 1 Cntents 2 2 Architecture 3 2.1 Server Cmpnents and Rles 3 2.2 Client Cmpnents 3 3 Prerequisites

More information

CAMPBELL COUNTY GILLETTE, WYOMING

CAMPBELL COUNTY GILLETTE, WYOMING CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.

More information

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram

More information

ABELDent Platform Setup Conventions

ABELDent Platform Setup Conventions ABELDent Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELDent licensees and their hardware vendrs with the infrmatin that they will require

More information

Dolby Conference Phone Support Frequently Asked Questions

Dolby Conference Phone Support Frequently Asked Questions Dlby Cnference Phne Supprt Frequently Asked Questins Versin 1.0, 1 Intrductin This dcument prvides sme answers t frequently asked questins abut the Dlby Cnference Phne. Fr mre detailed infrmatin n any

More information

E-Lock Policy Manager White Paper

E-Lock Policy Manager White Paper White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...

More information

IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 8 Exam Answers 100% 2016 1. A user ntices that the data transfer rate fr the gigabit NIC in the user cmputer is much slwer than expected. What is a pssible cause fr the

More information

ABELMed Platform Setup Conventions

ABELMed Platform Setup Conventions ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require

More information

UML : MODELS, VIEWS, AND DIAGRAMS

UML : MODELS, VIEWS, AND DIAGRAMS UML : MODELS, VIEWS, AND DIAGRAMS Purpse and Target Grup f a Mdel In real life we ften bserve that the results f cumbersme, tedius, and expensive mdeling simply disappear in a stack f paper n smene's desk.

More information

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.

McGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55. Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and

More information

CCNA 1 v5.1 Practice Final Exam Answers %

CCNA 1 v5.1 Practice Final Exam Answers % CCNA 1 v5.1 Practice Final Exam Answers 2016 100% 1. Which term refers t a netwrk that prvides secure access t the crprate ffices by suppliers, custmers and cllabratrs? Internet intranet extranet extendednet

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician

More information

MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION

MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION MySabre API RELEASE NOTES MYSABRE API VERSION 2.1 (PART OF MYSABRE RELEASE 7.1) DECEMBER 02, 2006 PRODUCTION These release ntes pertain t the Prductin release fr MySabre Release 7.1 cntaining MySabre API

More information

Dynamic Storage (ECS)

Dynamic Storage (ECS) User Guide Dynamic Strage (ECS) Swisscm (Schweiz) AG 1 / 10 Cntent 1 Abut Dynamic Strage... 3 2 Virtual drive, the EMC CIFS-ECS Tl... 4 3 Amazn S3 Brwer... 6 4 Strage Gateway Appliance... 9 5 Amazn S3

More information

CSPN Security Target. PLC Simatic S range

CSPN Security Target. PLC Simatic S range CSPN Security Target PLC Simatic S7 1500 range Categry Industrial systems: prgrammable lgic cntrller Reference: CSPN-ST-Simatic-S7-1500-Range-1.01 Date: 2017/10/03 Internal cde: SIE009 Cpyright AMOSSYS

More information

Course 10262A: Developing Windows Applications with Microsoft Visual Studio 2010 OVERVIEW

Course 10262A: Developing Windows Applications with Microsoft Visual Studio 2010 OVERVIEW Curse 10262A: Develping Windws Applicatins with Micrsft Visual Studi 2010 OVERVIEW Abut this Curse In this curse, experienced develpers wh knw the basics f Windws Frms develpment gain mre advanced Windws

More information

Point-to-Point Encryption (P2PE)

Point-to-Point Encryption (P2PE) Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard

More information

CCNA Security v2.0 Chapter 2 Exam Answers

CCNA Security v2.0 Chapter 2 Exam Answers CCNA Security v2.0 Chapter 2 Exam Answers 1. An administratr defined a lcal user accunt with a secret passwrd n ruter R1 fr use with SSH. Which three additinal steps are required t cnfigure R1 t accept

More information

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu

More information

Common Language Runtime

Common Language Runtime Intrductin t.net framewrk.net is a general-purpse sftware develpment platfrm, similar t Java. Micrsft intrduced.net with purpse f bridging gap between different applicatins..net framewrk aims at cmbining

More information

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL

UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL UNIVERSITY OF MIAMI POLICY AND PROCEDURE MANUAL TITLE: Electrnic Data Prtectin and Encryptin REFERENCE: Refrmat CATEGORY: Infrmatin Technlgy PAGE: 1 SUPERSEDES: POL-UMIT- A175-014-01 APPROVER: David Ertel

More information

CCNA 1 Chapter 1 v5.03 Exam Answers 2016

CCNA 1 Chapter 1 v5.03 Exam Answers 2016 CCNA 1 Chapter 1 v5.03 Exam Answers 2016 1. A cmpany is cntemplating whether t use a client/server r a peer-t-peer netwrk. What are three characteristics f a peer-t-peer netwrk? (Chse three.) better security

More information

AutoRun. Updated 6/13/2006 JMM. WHAT IS? Self-Help using www. Google.com

AutoRun. Updated 6/13/2006 JMM. WHAT IS? Self-Help using www. Google.com AutRun AUTORUN gives yu a list f the prcesses that are running n yur cmputer t help yu chse which nes yu can turn ff (uncheck) safely. IF after reading the inf AutRun gives yu abut the running item, yu

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 6 2016 v5.1 Answers 100% 1. Which characteristic f the netwrk layer in the OSI mdel allws carrying packets fr multiple types f cmmunicatins amng many hsts? the de-encapsulatin f headers

More information

Performance testing. Test approach The below diagram illustrates the approach that is used for performance testing a Pega 7 application.

Performance testing. Test approach The below diagram illustrates the approach that is used for performance testing a Pega 7 application. The Pega Platfrm is different t the standard Java applicatin in a number f ways; hwever, the apprach t perfrmance testing and tuning Pega 7 is n different. There are a number f key cnsideratins that yu

More information

Tips For Customising Configuration Wizards

Tips For Customising Configuration Wizards Tips Fr Custmising Cnfiguratin Wizards ver 2010-06-22 Cntents Overview... 2 Requirements... 2 Applicatins... 2 WinSCP and Putty... 2 Adding A Service T An Existing Wizard... 3 Gal... 3 Backup Original

More information

Performance of usage of MindSphere depends on the bandwidth of your internet connection.

Performance of usage of MindSphere depends on the bandwidth of your internet connection. MindSphere MindAccess User Data Sheet MindAccess User prvides yu with an Accunt in rder t access the MindSphere Platfrm. This allws yu t cnfigure Assets and Users, access Applicatins and stre data. Such

More information

Log shipping is a HA option. Log shipping ensures that log backups from Primary are

Log shipping is a HA option. Log shipping ensures that log backups from Primary are LOG SHIPPING Lg shipping is a HA ptin. Lg shipping ensures that lg backups frm Primary are cntinuusly applied n standby. Lg shipping fllws a warm standby methd because manual prcess is invlved t ensure

More information

App Orchestration 2.6

App Orchestration 2.6 App Orchestratin 2.6 Terminlgy in App Orchestratin 2.6 Last Updated: July 8, 2015 Page 1 Terminlgy Cntents Elements f App Orchestratin... 3 Dmains... 3 Multi-Datacenter Deplyments... 4 Delivery Sites...

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack fr Systems Center Operatins Manager (SCOM) Cncepts Guide Versin 7.0 July 2015 1 Legal Ntices Warranty EView Technlgy makes n warranty f any kind with regard t this manual, including,

More information

These tasks can now be performed by a special program called FTP clients.

These tasks can now be performed by a special program called FTP clients. FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad

More information

Service Level Agreement

Service Level Agreement Service Level Agreement Infrastructure Supprt Service This Infrastructure Supprt Service Level Agreement ( SLA ) is incrprated int the Qute executed by TekLinks and Custmer fr Infrastructure Supprt Services

More information

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110

NCTA-Certified Cloud Technologist (NCT) Exam NCT-110 NCTA-Certified Clud Technlgist (NCT) Exam NCT-110 Exam Infrmatin Candidate Eligibility: The NCTA-Certified Clud Technlgist (NCT) exam requires n applicatin fee, supprting dcumentatin, nr ther eligibility

More information

User Guide. ACE Data Source. OnCommand Workflow Automation (WFA) Abstract PROFESSIONAL SERVICES

User Guide. ACE Data Source. OnCommand Workflow Automation (WFA) Abstract PROFESSIONAL SERVICES PROFESSIONAL SERVICES User Guide OnCmmand Wrkflw Autmatin (WFA) ACE Data Surce Prepared fr: ACE Data Surce - Versin 2.0.0 Date: Octber 2015 Dcument Versin: 2.0.0 Abstract The ACE Data Surce (ACE-DS) is

More information

Last Lecture. Start the Application Layer DNS. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q.

Last Lecture. Start the Application Layer DNS. SUNY at Buffalo; CSE 489/589 Modern Networking Concepts; Fall 2010; Instructor: Hung Q. Last Lecture Start the Applicatin Layer DNS SUNY at Buffal; CSE 489/589 Mdern Netwrking Cncepts; Fall 2010; Instructr: Hung Q. Ng 1 This Lecture SMTP SUNY at Buffal; CSE 489/589 Mdern Netwrking Cncepts;

More information

Wave IP 4.5. CRMLink Desktop User Guide

Wave IP 4.5. CRMLink Desktop User Guide Wave IP 4.5 CRMLink Desktp User Guide 2015 by Vertical Cmmunicatins, Inc. All rights reserved. Vertical Cmmunicatins and the Vertical Cmmunicatins lg and cmbinatins theref and Vertical ViewPint, Wave Cntact

More information

Course 6368A: Programming with the Microsoft.NET Framework Using Microsoft Visual Studio 2008

Course 6368A: Programming with the Microsoft.NET Framework Using Microsoft Visual Studio 2008 Curse 6368A: Prgramming with the Micrsft.NET Framewrk Using Micrsft Visual Studi 2008 5 Days Abut this Curse This five-day, instructr-led curse prvides an intrductin t develping n-tier applicatins fr the

More information

Aloha Offshore SDLC Process

Aloha Offshore SDLC Process Alha Sftware Develpment Life Cycle Alha Offshre SDLC Prcess Alha Technlgy fllws a sftware develpment methdlgy that is derived frm Micrsft Slutins Framewrk and Ratinal Unified Prcess (RUP). Our prcess methdlgy

More information

AT&T Corporate Voice Mail Unified Messaging (CVM-UM) Quick Start

AT&T Corporate Voice Mail Unified Messaging (CVM-UM) Quick Start AT&T Crprate Vice Mail Unified Messaging (CVM-UM) Quick Start 2011 AT&T Intellectual Prperty. All rights reserved. AT&T the lg and all ther AT&T marks cntained herein are trademarks f AT&T Intellectual

More information

LiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017

LiveEngage and Microsoft Dynamics Integration Guide Document Version: 1.0 September 2017 LiveEngage and Micrsft Dynamics Integratin Guide Dcument Versin: 1.0 September 2017 Cntents Intrductin... 3 Step 1: Sign Up... 3 CRM Widget Signing Up... 3 Step 2: Cnfiguring the CRM Widget... 4 Accessing

More information

CyCop FAQ For Internal Use Only. CyCop Frequently Asked Questions

CyCop FAQ For Internal Use Only. CyCop Frequently Asked Questions CyCp FAQ Fr Internal Use Only CyCp Frequently Asked Questins Questin What are the cre Feature Sets fr CyCp? Features Security Prfessinal Tracking and Supervisin Incident, Facility Inspectins and Daily

More information

Planning, installing, and configuring IBM CMIS for Content Manager OnDemand

Planning, installing, and configuring IBM CMIS for Content Manager OnDemand Planning, installing, and cnfiguring IBM CMIS fr Cntent Manager OnDemand Cntents IBM CMIS fr Cntent Manager OnDemand verview... 4 Planning fr IBM CMIS fr Cntent Manager OnDemand... 5 Prerequisites fr installing

More information

Dell Wyse Device Manager (WDM)

Dell Wyse Device Manager (WDM) Dell Wyse Device Manager (WDM) Versin 5.0 Maintenance Release 1.1 (MR1.1)- fr WDM Wrkgrup Editin Release Ntes Cntents Release Type and Definitin... 3 Versin... 3 Release Date... 3 Previus Versin... 3 Imprtance...

More information

CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led

CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: www.inf-trek.cm CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER Curse 10964B; Duratin: 5 Days; Instructr-led WHAT YOU WILL LEARN This curse

More information

Operating systems. Module 7 IPC (Interprocess communication) PART I. Tami Sorgente 1

Operating systems. Module 7 IPC (Interprocess communication) PART I. Tami Sorgente 1 Operating systems Mdule 7 IPC (Interprcess cmmunicatin) PART I Tami Srgente 1 INTERPROCESS COMMUNICATION Prcesses within a system may be independent r cperating Cperating prcess can affect r be affected

More information

IT Essentials (ITE v6.0) Chapter 7 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 7 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 7 Exam Answers 100% 2016 1. Hw many devices can a Bluetth device cnnect t simultaneusly? 127 7 10 24 5 2. A device has an IPv6 address f 2001:0DB8:75a3:0214:0607:1234:aa10:ba01

More information

CCNA course contents:

CCNA course contents: CCNA curse cntents: Prerequisites: The knwledge and skills that yu must have befre attending this curse are as fllws: Basic cmputer literacy Windws navigatin skills Basic Internet usage skills Fundamental

More information

CLIENT. Corporation. Hosting Services. August 24, Marc Gray Flywire Technology CLIENT. 104 West Candler St Winder, GA

CLIENT. Corporation. Hosting Services. August 24, Marc Gray Flywire Technology CLIENT. 104 West Candler St Winder, GA CLIENT Crpratin Hsting Services August 24, 2011 PRESENTED TO: PRESENTED BY: Marc Gray Flywire Technlgy CLIENT 104 West Candler St Winder, GA 30680 770-771-5299 Marc@ flywiretechnlgy.cm TABLE OF CONTENTS

More information

Maximo Reporting: Maximo-Cognos Metadata

Maximo Reporting: Maximo-Cognos Metadata Maxim Reprting: Maxim-Cgns Metadata Overview...2 Maxim Metadata...2 Reprt Object Structures...2 Maxim Metadata Mdel...4 Metadata Publishing Prcess...5 General Architecture...5 Metadata Publishing Prcess

More information

COMPLETE ENDPOINT DEFENSE INTEGRATING PROTECTION, DETECTION, RESPONSE AND REMEDIATION IN A SINGLE SOLUTION

COMPLETE ENDPOINT DEFENSE INTEGRATING PROTECTION, DETECTION, RESPONSE AND REMEDIATION IN A SINGLE SOLUTION Cerrand las grietas en la detección del malware Adaptive Defense 360 Find the answers, slve the prblem COMPLETE ENDPOINT DEFENSE INTEGRATING PROTECTION, DETECTION, RESPONSE AND REMEDIATION IN A SINGLE

More information

SpiraPlan & SpiraTeam Version Control Integration User Guide Inflectra Corporation

SpiraPlan & SpiraTeam Version Control Integration User Guide Inflectra Corporation SpiraPlan & SpiraTeam Versin Cntrl Integratin User Guide Inflectra Crpratin Date: June 4th, 2017 Cntents 1. Intrductin... 1 2. Integrating with Subversin... 2 3. Integrating with Perfrce... 7 4. Integrating

More information

CCNA 1 Chapter v5.1 Answers 100%

CCNA 1 Chapter v5.1 Answers 100% CCNA 1 Chapter 5 2016 v5.1 Answers 100% 1. What happens t runt frames received by a Cisc Ethernet switch? The frame is drpped. The frame is returned t the riginating netwrk device. The frame is bradcast

More information

OATS Registration and User Entitlement Guide

OATS Registration and User Entitlement Guide OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t

More information

Imagine for MSDNAA Student SetUp Instructions

Imagine for MSDNAA Student SetUp Instructions Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS

More information

Service Description Safecom Secure Mail Relay Version 3.5

Service Description Safecom Secure Mail Relay Version 3.5 Service Descriptin Safecm Secure Mail Relay Versin 3.5 2006 Telecm NZ Ltd Cmmercial in Cnfidence CONTENTS 1 INTRODUCTION... 3 2 SERVICE DEFINITION... 3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...

More information

SOLA and Lifecycle Manager Integration Guide

SOLA and Lifecycle Manager Integration Guide SOLA and Lifecycle Manager Integratin Guide SOLA and Lifecycle Manager Integratin Guide Versin: 7.0 July, 2015 Cpyright Cpyright 2015 Akana, Inc. All rights reserved. Trademarks All prduct and cmpany names

More information

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in this

More information

Qlik Sense Mobile February 2018 (version 1.3.1) release notes

Qlik Sense Mobile February 2018 (version 1.3.1) release notes Release Ntes Qlik Sense Mbile February 2018 (versin 1.3.1) release ntes qlik.cm Table f Cntents Overview 3 What s new in Qlik Sense Mbile February 2018? 3 Cmpatibility 3 Bug fixes 4 Qlik Sense Mbile February

More information

Operating systems. Module 15 kernel I/O subsystem. Tami Sorgente 1

Operating systems. Module 15 kernel I/O subsystem. Tami Sorgente 1 Operating systems Mdule 15 kernel I/O subsystem Tami Srgente 1 SWAP SPACE MANAGEMENT Swap space can be defined as a temprary strage lcatin that is used when system s memry requirements exceed the size

More information

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices

HPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices HPE LadRunner Best Practices Series LadRunner 12.50 Upgrade Best Practices Dcument publicatin date: Nvember 2015 Cntents 1. Intrductin... 3 Overview... 3 Audience... 3 2. Preparatin... 3 Backup assets...

More information

Hands-on Windows Azure Application Architecture & Development (3 days)

Hands-on Windows Azure Application Architecture & Development (3 days) Benjamin Day Cnsulting, Inc. 17 Rberts St #2 Brkline, MA 02445 617-645-0188 http://benday.cm Hands-n Windws Azure Applicatin Architecture & Develpment (3 days) D yu really want t run yur wn data center?

More information

Oracle MICROS Tablet 700 Series

Oracle MICROS Tablet 700 Series Oracle MICROS Tablet 700 Series Security Guide E86335-02 December 2017 Cpyright 2017, Oracle and/r its affiliates. All rights reserved. This sftware and related dcumentatin are prvided under a license

More information

Cisco Smart Software Manager satellite

Cisco Smart Software Manager satellite Data Sheet Cisc Smart Sftware Manager satellite Last Updated: May 12, 2017 Overview Cisc Smart Sftware Manager satellite is a cmpnent f Cisc Smart Licensing. It wrks in cnjunctin with Cisc Smart Sftware

More information

CCNA Voice ICOMM: (4 Day Course)

CCNA Voice ICOMM: (4 Day Course) CCNA Vice 640-461 ICOMM: (4 Day Curse) The CCNA Vice certificatin cnfirms that yu have the required skill set fr specialised jb rles in vice technlgies such as vice technlgies administratr, vice engineer,

More information

Design Patterns. Collectional Patterns. Session objectives 11/06/2012. Introduction. Composite pattern. Iterator pattern

Design Patterns. Collectional Patterns. Session objectives 11/06/2012. Introduction. Composite pattern. Iterator pattern Design Patterns By Võ Văn Hải Faculty f Infrmatin Technlgies HUI Cllectinal Patterns Sessin bjectives Intrductin Cmpsite pattern Iteratr pattern 2 1 Intrductin Cllectinal patterns primarily: Deal with

More information

INTRODUCTION THE NETWORK

INTRODUCTION THE NETWORK INTRODUCTION The purpse f this dcument is t prvide an understanding f Internet Slutins' Acceptable Use Plicy. This plicy serves t define the accepted behaviur f users n Internet Slutins' (IS) netwrk. This

More information

Release Customer Concierge (CC5000/CCHUB1) Software Release Notes. Enterprise Visibility and Mobility Data Capture Solutions.

Release Customer Concierge (CC5000/CCHUB1) Software Release Notes. Enterprise Visibility and Mobility Data Capture Solutions. Custmer Cncierge (CC5000/CCHUB1) Sftware Release Ntes Release 1.3.0.25 Enterprise Visibility and Mbility Data Capture Slutins July 24, 2017 Cncierge Sftware Release Ntes 1.3.0.25 fr CC5000-10 and CCHUB

More information

Aras Innovator 8.1 Document #: Last Modified: 4/4/2007. Copyright 2007 Aras Corporation All Rights Reserved.

Aras Innovator 8.1 Document #: Last Modified: 4/4/2007. Copyright 2007 Aras Corporation All Rights Reserved. Aras Innvatr Service Usage Instructins Aras Innvatr 8.1 Dcument #: 8.1.09202006 Last Mdified: 4/4/2007 Aras Crpratin ARAS CORPORATION Cpyright 2007 All rights reserved Aras Crpratin Heritage Place 439

More information

BMC Remedyforce Integration with Bomgar Remote Support

BMC Remedyforce Integration with Bomgar Remote Support BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their

More information

CIM System Virtualization Model

CIM System Virtualization Model DMTF Server Management Wrking Grup CIM System Virtualizatin Mdel Steve Hand DMTF System Virtualizatin Partitining and Clustering Wrkgrup (SVPC) Symantec Thanks t Rn Gering, C-Chair SVPC, Distinguished

More information

CNS-220-1I: Citrix NetScaler Essentials and Traffic Management

CNS-220-1I: Citrix NetScaler Essentials and Traffic Management CNS-220-1I: Citrix NetScaler Essentials and Traffic Management Overview Designed fr students with little r n previus NetScaler experience, this curse is best suited fr individuals wh will be deplying r

More information

SmartPass User Guide Page 1 of 50

SmartPass User Guide Page 1 of 50 SmartPass User Guide Table f Cntents Table f Cntents... 2 1. Intrductin... 3 2. Register t SmartPass... 4 2.1 Citizen/Resident registratin... 4 2.1.1 Prerequisites fr Citizen/Resident registratin... 4

More information

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager Trubleshting Citrix- Published Resurces Cnfiguratin in VMware Identity Manager VMware Identity Manager A U G U S T 2 0 1 7 V1 Table f Cntents Overview... 1 Supprted Versins f Cmpnents... 1 Prerequisites...

More information

Deploying a distributed application with OpenStack

Deploying a distributed application with OpenStack Deplying a distributed applicatin with OpenStack In this lab yu will perfrm tw exercises. Each exercise (task) specifies ne r mre deliverables t prduce. Cllect all the deliverables in ne single cmpressed

More information

Chapter 1 Introduction. What is a Design Pattern? Design Patterns in Smalltalk MVC

Chapter 1 Introduction. What is a Design Pattern? Design Patterns in Smalltalk MVC Chapter 1 Intrductin Designing bject-riented sftware is hard, and designing reusable bject-riented sftware is even harder. It takes a lng time fr nvices t learn what gd bject-riented design is all abut.

More information

Deploy Your First Cloud Foundry App to Any Cloud Foundry Service Provider

Deploy Your First Cloud Foundry App to Any Cloud Foundry Service Provider Deply Yur First Clud Fundry App t Any Clud Fundry Service Prvider cludwrkshp.rg/cludfundry Presenter: Dave Nielsen Clud Cmputing Evangelist @davenielsen May 2015 Dave Nielsen dnielsen@gmail.cm twitter.cm/davenielsen

More information

Patch Management Policy

Patch Management Policy Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:

More information

Launching Xacta 360 Marketplace AMI Guide June 2017

Launching Xacta 360 Marketplace AMI Guide June 2017 Launching Xacta 360 Marketplace AMI Guide June 2017 Tels Crpratin 2017. All rights reserved. U.S. patents Ns. 6,901,346; 6,980,927; 6,983,221; 6,993,448; and 7,380,270. Xacta is a registered trademark

More information

REST; WebSocket (RFC 6455)

REST; WebSocket (RFC 6455) REST; WebScket (RFC 6455) Web Oriented Technlgies and Systems Prf. Michele Ruta Master s Degree Curse in Cmputer Engineering - (A.Y. 2016/2017) REST REST = Representatinal State Transfer. Anther architectural

More information

CXA-206-1I Citrix XenApp 6.5 Administration

CXA-206-1I Citrix XenApp 6.5 Administration CXA-206-1I Citrix XenApp 6.5 Administratin Citrix XenApp 6.5 Administratin training curse prvides the fundatin necessary fr administratrs t effectively centralize and manage applicatins in the datacenter

More information

EcoStruxure for Data Centers FAQ

EcoStruxure for Data Centers FAQ EcStruxure fr Data Centers FAQ Revisin 1 by Patrick Dnvan Executive summary EcStruxure TM fr Data Centers is Schneider Electric s IT-enabled, pen, interperable system architecture fr data centers. This

More information

File Share Navigator Online

File Share Navigator Online File Share Navigatr Online User Guide Service Pack 7 Issued September 2017 Table f Cntents What s New in this Guide... 4 Abut File Share Navigatr Online... 5 Cmpnents f File Share Navigatr Online... 5

More information

CSE 3320 Operating Systems Deadlock Jia Rao

CSE 3320 Operating Systems Deadlock Jia Rao CSE 3320 Operating Systems Deadlck Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Race cnditins Mutual exclusin and critical regins Tw simple appraches

More information

Retrieval Effectiveness Measures. Overview

Retrieval Effectiveness Measures. Overview Retrieval Effectiveness Measures Vasu Sathu 25th March 2001 Overview Evaluatin in IR Types f Evaluatin Retrieval Perfrmance Evaluatin Measures f Retrieval Effectiveness Single Valued Measures Alternative

More information

Firmware Upgrade Wizard v A Technical Guide

Firmware Upgrade Wizard v A Technical Guide Firmware Upgrade Wizard v4.1.1 A Technical Guide Nvember 2015 Intrductin The Firmware Upgrade Wizard prvides the fllwing features: It supprts upgrading the firmware n designated devices, see Supprted devices.

More information

Release Customer Concierge (CC ) Software Release Notes. Enterprise Visibility and Mobility Data Capture Solutions.

Release Customer Concierge (CC ) Software Release Notes. Enterprise Visibility and Mobility Data Capture Solutions. Custmer Cncierge (CC5000-10) Sftware Release Ntes Release 1.3.0.14 Enterprise Visibility and Mbility Data Capture Slutins April 11, 2016 Cpyright This dcument cntains prprietary and cnfidential infrmatin

More information

CNS-222-1I: NetScaler for Apps and Desktops

CNS-222-1I: NetScaler for Apps and Desktops CNS-222-1I: NetScaler fr Apps and Desktps Overview Designed fr students with little r n previus NetScaler, NetScaler Gateway r Unified Gateway experience, this curse is best suited fr individuals wh will

More information

IDEAL ADMINISTRATION 2018

IDEAL ADMINISTRATION 2018 System requirements: Windws NT, Windws XP, Windws Vista, Windws 2000, Windws 2003 Server, Windws 2008 Server, Windws 7, Windws 8, Windws 10, Windws 2012 Server, Windws 2016 Server. Cmpatible with 32 bit

More information

HP Project and Portfolio Management Center

HP Project and Portfolio Management Center HP Prject and Prtfli Management Center Sftware Versin: 9.32 Security Guide Dcument Release Date: Octber 2015 Sftware Release Date: Octber 2015 Legal Ntices Warranty The nly warranties fr HP prducts and

More information

Secure File Transfer Protocol (SFTP) Interface for Data Intake User Guide

Secure File Transfer Protocol (SFTP) Interface for Data Intake User Guide Secure File Transfer Prtcl (SFTP) Interface fr Data Intake User Guide Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 SFTP Access t FINRA... 2 SFTP

More information

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS

OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SUBMISSIONS FOR FLORIDA: SYSTEM FUNCTIONS OASIS SYSTEM FUNCTIONS... 2 ESTABLISHING THE COMMUNICATION CONNECTION... 2 ACCESSING THE OASIS SYSTEM... 3 SUBMITTING OASIS DATA FILES... 5 OASIS INITIAL

More information

CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel

CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel CS510 Cncurrent Systems Class 2 A Lck-Free Multiprcessr OS Kernel The Synthesis kernel A research prject at Clumbia University Synthesis V.0 ( 68020 Uniprcessr (Mtrla N virtual memry 1991 - Synthesis V.1

More information

CSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao

CSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao CSE 3320 Operating Systems Cmputer and Operating Systems Overview Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Overview Recap f last class What is an perating system?

More information

SANsymphony Installation and Getting Started Guide. November 7, 2016

SANsymphony Installation and Getting Started Guide. November 7, 2016 SANsymphny Installatin and Getting Started Guide Nvember 7, 2016 www.datacre.cm This dcument is the prperty f DataCre Sftware. It is intended slely as an aid fr installing and cnfiguring Strage Virtualizatin

More information

CET: Interactive Media Requirements Gathering Questionnaire

CET: Interactive Media Requirements Gathering Questionnaire CET: Interactive Media Requirements Gathering Questinnaire 1. Purpse What is the verall purpse f this prject? What is the general prblem that yu are trying t slve with this prject? Are users struggling

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questins Versin 10-21-2016 Cpyright 2014-2016 Aviatrix Systems, Inc. All rights reserved. Aviatrix Clud Gateway What can it d fr me? Aviatrix Clud Gateway prvides an end t end secure netwrk

More information

CA CMDB Connector for z/os

CA CMDB Connector for z/os PRODUCT SHEET: CA CMDB CONNECTOR FOR Z/OS CA CMDB Cnnectr fr z/os CA CMDB Cnnectr fr z/os discvers mainframe cnfiguratin items (CIs) and enables ppulatin f that infrmatin int the CA CMDB repsitry. Designed

More information