Risk. Systemystem. A SAS Datawarehouse on OpenVMS (AXP)

Size: px
Start display at page:

Download "Risk. Systemystem. A SAS Datawarehouse on OpenVMS (AXP)"

Transcription

1 Group Audit Department Project ICARUS Information Collecting Risk Andnd Uncovering Systemystem A Datawarehouse on OpenVMS (AXP) UBS Giampaolo Trenta Juni 98 / 1 The Group internal Audit department (GADE) of the Union Bank of Switzerland (UBS) GADE is a control instrument reporting directly to the president of the board of the directors. ICARUS was the project to implement a data warehouse The data warehouse is intended to support the work of the business auditor A new approach for auditing macro analysis rather than micro analysis Data on the warehouse are available for a longer period of time than on the production system Trend analyses and cross comparisons between periods are possible We want to use the data analysis capabilities of We already discovered interesting properties of rate deviations in 1

2 Data Delivery Trading Data (international) Swiss Data (national) New York London Zurich Geneva Lugano Tokyo Tokyo Hong Kong DECnet Data Warehouse on OpenVMS TCP/IP Singapore UBS Swiss Banking System ABACUS UBS Giampaolo Trenta Juni 98 / 2 We collect UBS trading data (Foreign Exchange) from around the globe We collect data from our Swiss banking system (ABACUS) Due to the sensitivity of the data we need strong security while also requiring flexibility Legacy aspects with a GADE application called IDA required DECnet support TCP/IP support is also required The system do not have to require intensive support The system must run as automatically as possible (management by exceptions) The system must deliver the best possible price/performance ratio All this aspects spoke for OpenVMS on Alpha AlphaServer4100/300 with 512MB RAM and 2x2GB and 8x4GB Disks Control level based on RAID capabilities (level 2 sysdisk, level 5 data disks) 2

3 mailbox detached OpenVMS process File Processing program process flow 3 get notification 3 read file ID 4 move file 5 enqueue loader 5 enqueue 6 process data loader 7 move file notify transmit data move file 7 move file data flow RCV DATA ARCH external influence internal influence UBS Giampaolo Trenta Juni 98 / 3 Data is delivered in form of ASCII files File transfer applications support the POSTPROCESSING Supported network protocols are TCP/IP and DECnet No matter the used protocol file processing schema is always the same The range of influence of the process delivering the data is keep as small as possible Only trusted processes and users are allowed to access the database The use of a mailbox eliminates the need for polling The post processing process performs an asynchronous write on the mailbox A detached process perform a synchronous read on the mailbox The same process submit the process running and the data loader program This introduces a convenient point to control execution namely a queue The queue is also used to serialize data loading jobs and avoid concurrent access The moving files (rename) can be considered an atomic operation 3

4 Data Loader Objective Data load is correct and complete or the target dataset has not been changed Problem No transaction processing and support and therefore no rollback in Strategie Data load into a WORK dataset if no errors occured then append the WORK dataset to the target dataset ASCII work dataset target dataset work dataset UBS Giampaolo Trenta Juni 98 / 4 Executed in batch mode The integrity of the database has the highest priority The loader has to deal with possible error conditions during parsing of the delivered files An administrative database with statistics on loaded data is also updated Database updates are conservative 4

5 Business Model Product FOREX ZHR GEN LUG NY HK TOK SIN LON Regions Switzerland Europe Americas Asia Pacific X X X X X X X X Divisions Private Banking Consumer & Corporate Investment Banking Asset Management X X X X X X X X UBS Giampaolo Trenta Juni 98 / 5 The business model has to be taken into consideration when organizing data The implementation model has to reflect the business model We have auditors assigned to regions or divisions Regional view and/or product view Both view must co-exists and be supported 5

6 Technical Implementation CH prg EU hardlink set file/enter=... xx USA warehouse data AS IB ZHR ACL identifier=mgr, access=rwed identifier=ib_usr, access=r adm PB identifier=ch_usr, access=r AM identifier=*, access=none OpenVMS CC UBS Giampaolo Trenta Juni 98 / 6 Every auditor is assigned to a fixed home directory All object accessible to him are directly accessible inside his subtree In order to avoid duplication of datasets we define hard links OpenVMS identifiers, based on access control lists, allow role based access control /SHARE and /CONNET strictly observe user-based OpenVMS access control Role-based access control rules on data don t need to be continuously maintained Identifiers granting and revoking is the only necessary administrative task 6

7 /CONNECT SA S VT TCP/IP VT Connection VMS Session SA S VT VT Connection SA S VT VT Connection VMS Session Client Server VMS Session VT = Virtuell Terminal UBS Giampaolo Trenta Juni 98 / 7 There are many possibilities to access the data stored on the server Behind /CONNECT on TCP/IP there is in fact a terminal based connection on client acts like a virtual terminal, driven by the events generated by the GUI This requires an OpenVMS interactive license for every concurrent client However, data on the server can be processed strictly on the server (remote execution functions) The authentication is performed directly by the OpenVMS login and passwords are sent in clear text The rel 7.0 will also have a spawner for OpenVMS (already available for UNIX and NT) Thus the client will connect via the spawner rather than the OpenVMS login Note that every client requires a dedicated server process 7

8 /SHARE TCP/IP socket communication ICARUS_SVR TCP/IP socket comm. TCP/IP socket communication Detached VMS Process executing ICARUS_SVR. Client Server UBS Giampaolo Trenta Juni 98 / 8 A /SHARE process can serve many clients concurrently Authentication is performed directly by the share process based on OpenVMS username/password There is no OpenVMS login (interactive/noninteractive) for users using /SHARE However, the OpenVMS context of the users is fully respected for access control Network access could be an issue since /SHARE makes libraries available over the network In reality good performance has been observed especially using sql 8

9 /SHARE Server Startup submit/user=icarus $run/detach/process=icarus_srv /uic =icarus/.. /priv =(nosame,netmbx,..) /error =icarus_srv_err.log /output =icarus_srv.log /input =icarus_srv.com sys$systemloginout.exe $ /LS=80 /LOG=ICARUS_SRV_.LOG /FULLSTIMER ICARUS_SRV. icarus_svr.com icarus_svr_startup.com required privbilegies for ICARUS NETMBX, TMPMBX, SYSNAM, AUDIT icarus_svr.sas %let TCPSEC=_SECURE_; %let AUTHENCR=REQUIRED; options comamid=tcp; proc server uavalid=yes oavalid=yes id=icarus; run; UBS Giampaolo Trenta Juni 98 / 9 The /SHARE process must be up and running to allow user connections Not like /CONNECT where dedicated user processes are created on the fly The /SHARE process is implemented as a detached OpenVMS process running the image and a program Requiring encrypted authentication 9

10 /SHARE vs /CONNECT /SHARE /CONNECT authentication based on OpenVMS Auth. Database encryption username/password no OpenVMS user processes (no OpenVms licenses) data on server processed strictly locally (remote processing) users can be locked on OpenVMS level full OpenVMS audit on users users can change their password full OpenVMS access control restricted security and audit on OpenVMS (e.g. disuser) OpenVMS password change? no remote processing functions network traffic could be an issue hidden terminal based connection scripting to build terminal session no spawner in the current 6.12 for OpenVMS OpenVms login with plaintext username/password every client session required OpenVMS license user could get DCL-prompt user can execute DCL-command UBS Giampaolo Trenta Juni 98 / 10 Both product strictly observe OpenVMS and fully implement access control 10

Data Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security

Data Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security T rusted Application Trusted System Trusted Network Physical Security System T echnology Data Warehouse P roject Filetransfer Access right just on the data transfer directories Mailbox L oadprocess Data

More information

IBM. Documentation. IBM Sterling Connect:Direct Process Language. Version 5.3

IBM. Documentation. IBM Sterling Connect:Direct Process Language. Version 5.3 IBM Sterling Connect:Direct Process Language IBM Documentation Version 5.3 IBM Sterling Connect:Direct Process Language IBM Documentation Version 5.3 This edition applies to Version 5 Release 3 of IBM

More information

Sysgem Enterprise Manager

Sysgem Enterprise Manager Sysgem Enterprise Manager Sysgem Enterprise Manager (SEM) The Sysgem Enterprise Manager (SEM) provides companies of all sizes with a simple, powerful tool for managing IT, auditing security, administering

More information

Migration of SAS Software From VMS to Windows NT : A Real Life Story

Migration of SAS Software From VMS to Windows NT : A Real Life Story Migration of Software From VMS to Windows NT : A Real Life Story Paul Gilbert & Steve Light at DataCeutics, Inc., John Scott Grainger at ClinTrials Research Introduction At ClinTrials Research, Inc. clinical

More information

CockpitMgr for OpenVMS

CockpitMgr for OpenVMS CockpitMgr for OpenVMS Johan Michiels Product Manager HP Belgium Today s speaker: Gerrit Woertman VSI VMS Ambassador CTO OpenVMS Business Generating Software (BGS) gerrit@bgsoftware.nl Some history. Why

More information

III Post Offices. Chapter 11, Creating a New Post Office, on page 143 Chapter 12, Managing Post Offices, on page 163.

III Post Offices. Chapter 11, Creating a New Post Office, on page 143 Chapter 12, Managing Post Offices, on page 163. III Post Offices Chapter 11, Creating a New Post Office, on page 143 Chapter 12, Managing Post Offices, on page 163 Post Offices 141 142 GroupWise 7 Administration Guide 11 Creating a New Post Office As

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

Application Security through a Hacker s Eyes James Walden Northern Kentucky University

Application Security through a Hacker s Eyes James Walden Northern Kentucky University Application Security through a Hacker s Eyes James Walden Northern Kentucky University waldenj@nku.edu Why Do Hackers Target Web Apps? Attack Surface A system s attack surface consists of all of the ways

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/

More information

OpenVMS Management Station Overview and Release Notes

OpenVMS Management Station Overview and Release Notes OpenVMS Management Station Overview and Release Notes September 2003 This document provides an overview of OpenVMS Management Station and describes how to get started using the software. This document

More information

Enterprise Case Study

Enterprise Case Study REUTERS / Stefano Rellandini Enterprise Case Study The Future of Your WAN Dimitrios Voutsinas Head of Network Design and Development About Thomson Reuters We are the leading source of intelligent information

More information

MCL-Collection Fast and Easy Applications Development

MCL-Collection Fast and Easy Applications Development MCL-Collection Fast and Easy Applications Development MCL TM -Collection is an integrated set of software tools from Symbol Technologies, Inc. that enables nonprogrammers to create and deploy single or

More information

SAS. Installation Guide Fifth Edition Intelligence Platform

SAS. Installation Guide Fifth Edition Intelligence Platform SAS Installation Guide Fifth Edition 9.1.3 Intelligence Platform The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS 9.1.3 Intelligence Platform: Installation

More information

IBM DB2 Query Patroller. Administration Guide. Version 7 SC

IBM DB2 Query Patroller. Administration Guide. Version 7 SC IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 Before using this information and the product it supports, be sure

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Build Operator Menu Multiple menu configuration control for the 5DX Auto UI

Build Operator Menu Multiple menu configuration control for the 5DX Auto UI Multiple menu configuration control for the 5DX Auto UI Application Note User Contributed Disclaimer This is not a legal document, however, this is user contributed software and as such may be outdated

More information

ProKitchenNet User s Guide ProKitchen Server Edition. Real View, LLC

ProKitchenNet User s Guide ProKitchen Server Edition. Real View, LLC ProKitchenNet User s Guide ProKitchen Server Edition Real View, LLC Table of Contents Introduction... 2 Why ProKitchenNet?... 2 ProKitchenNet Advantages:... 2 Hardware and Software Requirements... 3 ProKitchenNet

More information

Introduction to SQL 2000: Installation and Implementation. SQL Server Administration suite: course 1 of 4

Introduction to SQL 2000: Installation and Implementation. SQL Server Administration suite: course 1 of 4 Introduction to SQL 2000: Installation and Implementation SQL Server Administration suite: course 1 of 4 This class is designed for Beginner SQL/Prophet 21 (CC) Users who are responsible for SQL Administration

More information

Software Release Notes for XSS AD/SQL version 5.1.3

Software Release Notes for XSS AD/SQL version 5.1.3 Software Release Notes for XSS AD/SQL version 5.1.3 Support Information: Ensure Technologies Technical Support is available to provide any needed assistance. Please contact us at (734) 668-8800 or at support@ensuretech.com.

More information

III. Chapter 11, Creating a New Post Office, on page 155 Chapter 12, Managing Post Offices, on page 175. novdocx (en) 11 December 2007.

III. Chapter 11, Creating a New Post Office, on page 155 Chapter 12, Managing Post Offices, on page 175. novdocx (en) 11 December 2007. IIPost Offices Chapter 11, Creating a New Post Office, on page 155 Chapter 12, Managing Post Offices, on page 175 III Post Offices 153 154 GroupWise 7 Administration Guide 1Creating a New Post Office As

More information

SWIFT Overview. Association of International Bank Auditors. Amanda De Castro, Sales Services James Wills, Banking Initiatives, Standards

SWIFT Overview. Association of International Bank Auditors. Amanda De Castro, Sales Services James Wills, Banking Initiatives, Standards SWIFT Overview Association of International Bank Auditors Amanda De Castro, Sales Services James Wills, Banking Initiatives, Standards Agenda Alliance Access R 7.0 Relationship Management Application (RMA)

More information

Safeguarding Cardholder Account Data

Safeguarding Cardholder Account Data Safeguarding Cardholder Account Data Attachmate Safeguarding Cardholder Account Data CONTENTS The Twelve PCI Requirements... 1 How Reflection Handles Your Host-Centric Security Issues... 2 The Reflection

More information

Simplified Multi-Tenancy for Data Driven Personalized Health Research

Simplified Multi-Tenancy for Data Driven Personalized Health Research Simplified Multi-Tenancy for Data Driven Personalized Health Research Diego Moreno HPC Storage Specialist @ Scientific IT Services, ETH Zürich LAD 2018, Paris Agenda ETH Zurich and the Scientific IT Services

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

Commercial Bank Portal Multi-Factor Authentication Migration Guide

Commercial Bank Portal Multi-Factor Authentication Migration Guide Citibank N.A., Singapore Branch 18 September 2014 Commercial Bank Portal Multi-Factor Authentication Migration Guide Table of Contents 1. Introduction 2. Updating Email and Mailing Address 3. Activating

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Communications Access Methods for. SAS/CONNECT 9.2 and SAS/SHARE 9.2

Communications Access Methods for. SAS/CONNECT 9.2 and SAS/SHARE 9.2 Communications Access Methods for SAS/CONNECT 9.2 and SAS/SHARE 9.2 The correct bibliographic citation for this manual is as follows: SAS Institute Inc., 2009. Communications Access Methods for SAS/CONNECT

More information

RU-VPN2 - GlobalProtect Installation for Windows

RU-VPN2 - GlobalProtect Installation for Windows RU-VPN2 - GlobalProtect Installation for Windows Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU-VPN2, you will need to install and use client software

More information

Job Aid: LDAP or VMM Synch

Job Aid: LDAP or VMM Synch Job Aid: LDAP or VMM Synch Tivoli Service Request Manager, Change and Configuration Management Database, Asset Management for IT Document version 1.0 Copyright International Business Machines Corporation

More information

Immotec Systems, Inc. SQL Server 2008 Installation Document

Immotec Systems, Inc. SQL Server 2008 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

KYOCERA Net Viewer User Guide

KYOCERA Net Viewer User Guide KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation

More information

XDU On the Road. John Nitti Vice President Worldwide Sales and Marketing

XDU On the Road. John Nitti Vice President Worldwide Sales and Marketing XDU On the Road John Nitti Vice President Worldwide Sales and Marketing DocuLynx Inc. DocuLynx is a privately held, independent, IT software & ASP services company est. in 2004 in Omaha, Nebraska. DocuLynx

More information

Features Four popular platforms, same quality and ease of use

Features Four popular platforms, same quality and ease of use ISE is extending the boundaries of automated job scheduling with the only job scheduler for Windows NT/2000/XP OpenVMS, Tru64 UNIX and Linux. Each version incorporates ISE s unparalleled reputation in

More information

Ebook : Overview of application development. All code from the application series books listed at:

Ebook : Overview of application development. All code from the application series books listed at: Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop

More information

SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity.

SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity. SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity. Version 1.2 April 2017 Contents Overview... 3 BB-SFTP Functionality... 3 Bloomberg SFTP Connectivity

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp

NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp Installation Guide This guide provides a short introduction to the installation and initial configuration of NTP Software

More information

SDR Guide to Complete the SDR

SDR Guide to Complete the SDR I. General Information You must list the Yale Servers & if Virtual their host Business Associate Agreement (BAA ) in place. Required for the new HIPAA rules Contract questions are critical if using 3 Lock

More information

User Guide. Manual. User Guide. Date 10-January Version 2.0

User Guide. Manual. User Guide. Date 10-January Version 2.0 Manual Date 10-January-2017 Version 2.0 1 Contents 1 Authorization Box for Dynamics NAV... 3 1.1 Role Generator... 3 1.2 User Management... 3 1.3 SoD Monitoring... 3 1.4 Incident Management... 3 2 Settings

More information

Table of Contents Chapter 1: Migrating NIMS to OMS... 3 Index... 17

Table of Contents Chapter 1: Migrating NIMS to OMS... 3 Index... 17 Migrating from NIMS to OMS 17.3.2.0 User Guide 7 Dec 2017 Table of Contents Chapter 1: Migrating NIMS to OMS... 3 Before migrating to OMS... 3 Purpose of this migration guide...3 Name changes from NIMS

More information

Goverlan Remote Control v7 vs. Microsoft Remote Assistance

Goverlan Remote Control v7 vs. Microsoft Remote Assistance Product Comparison vs. SYNOPSIS and both offer remote access services for Windows platforms. This paper provides a feature comparison between these two products. Publication Information This document was

More information

WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures

WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures ASHNIK PTE LTD. White Paper WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures Date: 10/12/2014 Company Name: Ashnik Pte Ltd. Singapore By: Sandeep Khuperkar, Director

More information

Software Release Notes for XSS AD/SQL version 5.1.0

Software Release Notes for XSS AD/SQL version 5.1.0 Software Release Notes for XSS AD/SQL version 5.1.0 Support Information: Ensure Technologies Technical Support is available to provide any needed assistance. Please contact us at (734) 668-8800 or at support@ensuretech.com.

More information

UBS Data Center Efficiency Strategy

UBS Data Center Efficiency Strategy UBS Group Technology Public UBS Data Center Efficiency Strategy Steps in Efficiency, Automation leading to enabling the Cloud October 18, 2011 UBS one of the leading financial firms UBS draws on its 150-year

More information

GE Fanuc Intelligent Platforms

GE Fanuc Intelligent Platforms GE Fanuc Intelligent Platforms Vendor Statement for CERT CVE-2009-0216 CERT has reported vulnerabilities in ifix (versions PDE, 2.0, 2.2, 2.21, 2.5, 2.6, 3.0, 3.5, 4.0, 4.5, and 5.0). The vulnerabilities

More information

LMEdprs Operating & Technical Guide

LMEdprs Operating & Technical Guide LMEdprs Operating & Technical Guide May 2016 Please respond to: Market Surveillance +44 (0) 207 113 8203 LMEdprs Operating & Technical Guide Version 2.0 Table of Contents 1 Introduction... 4 2 Overview

More information

Interface Reference topics

Interface Reference topics McAfee Content Security Reporter 2.6.x Interface Reference Guide Interface Reference topics Edit Permission Set page (Permission Sets page) Specify Content Security Reporter permissions and grant user

More information

IC L17 Strategic Understanding using Symantec Protection Center Hands-On Lab

IC L17 Strategic Understanding using Symantec Protection Center Hands-On Lab IC L17 Strategic Understanding using Symantec Protection Center Hands-On Lab Description In this session, the attendee will have the opportunity to install SPC Enterprise, configure external data connections,

More information

Egress Switch Administration Panel

Egress Switch Administration Panel 1 COMMERCIAL IN CONFIDENCE Egress Switch Administration Panel User Guide Copyright 2017 Egress Software Technologies Ltd. All rights reserved. 2 COMMERCIAL IN CONFIDENCE Confidentiality Statement This

More information

The Google File System

The Google File System October 13, 2010 Based on: S. Ghemawat, H. Gobioff, and S.-T. Leung: The Google file system, in Proceedings ACM SOSP 2003, Lake George, NY, USA, October 2003. 1 Assumptions Interface Architecture Single

More information

An Introduction to Parallel Processing with the Fork Transformation in SAS Data Integration Studio

An Introduction to Parallel Processing with the Fork Transformation in SAS Data Integration Studio Paper 2733-2018 An Introduction to Parallel Processing with the Fork Transformation in SAS Data Integration Studio Jeff Dyson, The Financial Risk Group ABSTRACT The SAS Data Integration Studio job is historically

More information

Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked

Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked Secure Communications Stay-Linked Secure Communications Guide Page 1 Rev. 10.0.0 Dated: 04/26/10 Table

More information

Evaluating the migration of a SAS application from a VAX to a PC-based NT network Alan T. Pasquino, Pfizer, Inc. Don J. Fish, Pfizer, Inc.

Evaluating the migration of a SAS application from a VAX to a PC-based NT network Alan T. Pasquino, Pfizer, Inc. Don J. Fish, Pfizer, Inc. Evaluating the migration of a SAS application from a VAX to a PC-based NT network Alan T. Pasquino, Pfizer, Inc. Don J. Fish, Pfizer, Inc. Abstract: Over a period of several years, we have developed an

More information

Immotec Systems, Inc. SQL Server 2008 Installation Document

Immotec Systems, Inc. SQL Server 2008 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

Why trading firms choose... Connexus Voice. For Traders

Why trading firms choose... Connexus Voice. For Traders Why trading firms choose... Connexus Voice For Traders Intelligent SIP based Voice Services Financial traders need instant connectivity to their counterparties, and private Connexus Voice circuits provide

More information

CHAPTER 5 Macintosh: TCP/IP Access Method

CHAPTER 5 Macintosh: TCP/IP Access Method 69 CHAPTER 5 Macintosh: TCP/IP Access Method SAS Support for TCP/IP on Macintosh 69 Tasks That Are Common to SAS/CONNECT and SAS/SHARE 70 System and Software Requirements for SAS/CONNECT and SAS/SHARE

More information

Agenda. Future Sessions: Azure VMs, Backup/DR Strategies, Azure Networking, Storage, How to move

Agenda. Future Sessions: Azure VMs, Backup/DR Strategies, Azure Networking, Storage, How to move Onur Dogruoz Agenda Provide an introduction to Azure Infrastructure as a Service (IaaS) Walk through the Azure portal Help you understand role-based access control Engage in an overview of the calculator

More information

What Is a Communications Access Method? CHAPTER 1 Using Communications Access Methods

What Is a Communications Access Method? CHAPTER 1 Using Communications Access Methods 3 CHAPTER 1 Using Communications Access Methods What Is a Communications Access Method? 3 Types of Communications Access Methods 4 Program-to-Program Communications 4 Terminal-Based Communications 5 Making

More information

Introduction to the OpenVMS Operating Environment

Introduction to the OpenVMS Operating Environment 3 CHAPTER 1 Introduction to the OpenVMS Operating Environment Introduction 3 What Is the OpenVMS Operating Environment? 4 OpenVMS VAX and Alpha Platforms 4 Access to OpenVMS 4 Login Procedure 4 Files that

More information

Phishing Stories. Shaun Jones

Phishing Stories. Shaun Jones Phishing Stories Shaun Jones Agenda What is Phishing? Phishing Story I Intranets are actually pretty useful Phishing Story II Why do I need two factor auth Phishing Story III Everybody gets shells! What

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Tivoli Access Manager for Enterprise Single Sign-On

Tivoli Access Manager for Enterprise Single Sign-On Tivoli Access Manager for Enterprise Single Sign-On Version 6.0 Kiosk Adapter Installation and Setup Guide GC23-6353-00 Tivoli Access Manager for Enterprise Single Sign-On Version 6.0 Kiosk Adapter Installation

More information

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients

More information

Metasys System Extended Architecture Overview

Metasys System Extended Architecture Overview Technical Bulletin Issue Date March 31, 2003 Metasys System Extended Architecture Overview Metasys System Extended Architecture Overview...2 Introduction... 2 Key Concepts... 4 Metasys System Extended

More information

Leap Second Event Preparedness FIA Market Technology Division. May 14, 2015

Leap Second Event Preparedness FIA Market Technology Division. May 14, 2015 Leap Second Event Preparedness FIA Market Technology Division May 14, 2015 Today s Webinar The webinar will be recorded. The presentation will be available on the FIA website within the next 24 hours.

More information

Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading

Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading Presenters: John Ingram - British Gas Trading Ty Sapsford - OCS Consulting Plc

More information

SAS Integration Technologies Server Administrator s Guide

SAS Integration Technologies Server Administrator s Guide SAS 9.1.2 Integration Technologies Server Administrator s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS 9.1.2 Integration Technologies: Server Administrator

More information

maxecurity Product Suite

maxecurity Product Suite maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...

More information

Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents

Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Introduction... 2 High-Level Platform Architecture Diagram... 3 Zbi Production Environment... 4 Zbi Publishing Engine...

More information

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros

More information

Version 1.1 March 22, Secure Installation and Operation of Your WorkCentre 4250/4260

Version 1.1 March 22, Secure Installation and Operation of Your WorkCentre 4250/4260 Version 1.1 March 22, 2010 Secure Installation and Operation of Your WorkCentre 4250/4260 Secure Installation and Operation of Your WorkCentre 4250/4260 Purpose and Audience This document provides information

More information

Configuring WebConnect

Configuring WebConnect CHAPTER 6 WebConnect provides seamless integration between multiple internal and external web servers through a single URL. Making use of a single database and a customer-defined rollover sequence, WebConnect

More information

Full file at https://fratstock.eu

Full file at https://fratstock.eu CISSP Guide to Security Essentials, 2 nd Edition Solutions 2 1 CISSP Guide to Security Essentials, 2 nd Edition Chapter 2 Solutions Review Questions 1. The process of obtaining a subject s proven identity

More information

Windows Terminal Server Fact vs. Fiction Bernard Douthit & Jonathan Steel

Windows Terminal Server Fact vs. Fiction Bernard Douthit & Jonathan Steel FINDINGS Guidelines for Implementing OneWorld Technology J.D. EDWARDS RESULTS SERIES Implementing OneWorld Technology Windows Terminal Server Fact vs. Fiction Bernard Douthit & Jonathan Steel Technology

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

4TRESS AAA. Out-of-Band Authentication (SMS) and Juniper Secure Access Integration Handbook. Document Version 2.3 Released May hidglobal.

4TRESS AAA. Out-of-Band Authentication (SMS) and Juniper Secure Access Integration Handbook. Document Version 2.3 Released May hidglobal. 4TRESS AAA Out-of-Band Authentication (SMS) and Juniper Secure Access Integration Handbook Document Version 2.3 Released May 2013 hidglobal.com Table of Contents List of Figures... 3 1.0 Introduction...

More information

About the XenClient Enterprise Solution

About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution XenClient Enterprise is a distributed desktop virtualization solution that makes

More information

Installation Guide. Citrix License Server VPX v1.01

Installation Guide. Citrix License Server VPX v1.01 Installation Guide Citrix License Server VPX Installation Guide Citrix License Server VPX v1.01 This document provides step-by-step instructions for installing and running the Citrix License Server Appliance

More information

NetIQ Secure Configuration Manager Installation Guide. October 2016

NetIQ Secure Configuration Manager Installation Guide. October 2016 NetIQ Secure Configuration Manager Installation Guide October 2016 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted

More information

Xerox Device Data Collector 1.1 Security and Evaluation Guide

Xerox Device Data Collector 1.1 Security and Evaluation Guide Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation

More information

Hyper scale Infrastructure is the enabler

Hyper scale Infrastructure is the enabler Hyper scale Infrastructure is the enabler 100+ Datacenters across 34 Regions Worldwide US DoD West TBD US Gov Iowa West US California Central US Iowa South Central US Texas North Central US Illinois Canada

More information

KYOCERA Net Viewer 5.3 User Guide

KYOCERA Net Viewer 5.3 User Guide KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

CISI - International Introduction to Securities & Investment Study Support Training EUROPE MIDDLE EAST & NORTH AFRICA ASIA

CISI - International Introduction to Securities & Investment Study Support Training EUROPE MIDDLE EAST & NORTH AFRICA ASIA CISI - International Introduction to Securities & Investment Study Support Training About ISC & UIC Investment Studies Center (ISC) Contributing to the provision of promising national cadres, capable of

More information

File submissions to VINN and KRITA

File submissions to VINN and KRITA Date Page 2017-10-25 1 (10) Recipient: Respondents to VINN and KRITA File submissions to VINN and KRITA Summary This document briefly describes the VINN/KRITA solution for file submissions in the form

More information

NETCONF Client GUI. Client Application Files APPENDIX

NETCONF Client GUI. Client Application Files APPENDIX APPENDIX B The NETCONF client is a simple GUI client application that can be used to understand the implementation of the NETCONF protocol in Cisco E-DI. This appendix includes the following information:

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Installation Guide for Open VMS

Installation Guide for Open VMS Installation Guide for Open VMS IDL Version 5.4 September, 2000 Edition Copyright Research Systems, Inc. All Rights Reserved Restricted Rights Notice The IDL software program and the accompanying procedures,

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Null Service and Loopback Service Drivers Implementation Guide NetIQ Identity Manager. February 2018

Null Service and Loopback Service Drivers Implementation Guide NetIQ Identity Manager. February 2018 Null Service and Loopback Service Drivers Implementation Guide NetIQ Identity Manager February 2018 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use

More information

Copyright 2017 Softerra, Ltd. All rights reserved

Copyright 2017 Softerra, Ltd. All rights reserved Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service

More information

Internal Audit Report DATA CENTER LOGICAL SECURITY

Internal Audit Report DATA CENTER LOGICAL SECURITY Internal Audit Report DATA CENTER LOGICAL SECURITY Report No. SC 12 06 June 2012 David Lane Principal IT Auditor Jim Dougherty Principal Auditor Approved Barry Long, Director Internal Audit & Advisory

More information

Storage and File System

Storage and File System COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

VMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments

VMware  Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation

More information

UNIX Spawner Program. Starting the UNIX Spawner Program CHAPTER 36

UNIX Spawner Program. Starting the UNIX Spawner Program CHAPTER 36 479 CHAPTER 36 UNIX Spawner Program Starting the UNIX Spawner Program 479 Examples of Starting and Connecting to the UNIX Spawner Program 482 Ending the UNIX Spawner Program 483 Starting the UNIX Spawner

More information

EasyMorph Server Administrator Guide

EasyMorph Server Administrator Guide EasyMorph Server Administrator Guide Version 3.9.2 December, 24 th 2018 Table of Contents TABLE OF CONTENTS... 1 PREREQUISITES... 2 Memory requirements... 2 INSTALLATION... 2 License key... 3 SERVER SERVICE

More information

Automated Deployment Services

Automated Deployment Services Building Out the Enterprise Using Automated Deployment Services Automated Deployment Services (ADS), a component of the Microsoft Windows Server 2003 operating system, includes a new set of imaging tools

More information

Version Release Notes

Version Release Notes Version 6.19.02 Release Notes 1 Table of Contents What's new?... 4 Intellichecks (Performance. Operations, Security) + Trends... 4 Network Visualization... 4 Access Auditing... 5 CyberArk support... 5

More information

QuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired

QuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired Overview The Advanced Server for UNIX (ASU) software is a Tru64 UNIX layered application that provides seamless interoperability between systems running the Tru64 UNIX operating system software and systems

More information