Risk. Systemystem. A SAS Datawarehouse on OpenVMS (AXP)
|
|
- Prudence Brown
- 5 years ago
- Views:
Transcription
1 Group Audit Department Project ICARUS Information Collecting Risk Andnd Uncovering Systemystem A Datawarehouse on OpenVMS (AXP) UBS Giampaolo Trenta Juni 98 / 1 The Group internal Audit department (GADE) of the Union Bank of Switzerland (UBS) GADE is a control instrument reporting directly to the president of the board of the directors. ICARUS was the project to implement a data warehouse The data warehouse is intended to support the work of the business auditor A new approach for auditing macro analysis rather than micro analysis Data on the warehouse are available for a longer period of time than on the production system Trend analyses and cross comparisons between periods are possible We want to use the data analysis capabilities of We already discovered interesting properties of rate deviations in 1
2 Data Delivery Trading Data (international) Swiss Data (national) New York London Zurich Geneva Lugano Tokyo Tokyo Hong Kong DECnet Data Warehouse on OpenVMS TCP/IP Singapore UBS Swiss Banking System ABACUS UBS Giampaolo Trenta Juni 98 / 2 We collect UBS trading data (Foreign Exchange) from around the globe We collect data from our Swiss banking system (ABACUS) Due to the sensitivity of the data we need strong security while also requiring flexibility Legacy aspects with a GADE application called IDA required DECnet support TCP/IP support is also required The system do not have to require intensive support The system must run as automatically as possible (management by exceptions) The system must deliver the best possible price/performance ratio All this aspects spoke for OpenVMS on Alpha AlphaServer4100/300 with 512MB RAM and 2x2GB and 8x4GB Disks Control level based on RAID capabilities (level 2 sysdisk, level 5 data disks) 2
3 mailbox detached OpenVMS process File Processing program process flow 3 get notification 3 read file ID 4 move file 5 enqueue loader 5 enqueue 6 process data loader 7 move file notify transmit data move file 7 move file data flow RCV DATA ARCH external influence internal influence UBS Giampaolo Trenta Juni 98 / 3 Data is delivered in form of ASCII files File transfer applications support the POSTPROCESSING Supported network protocols are TCP/IP and DECnet No matter the used protocol file processing schema is always the same The range of influence of the process delivering the data is keep as small as possible Only trusted processes and users are allowed to access the database The use of a mailbox eliminates the need for polling The post processing process performs an asynchronous write on the mailbox A detached process perform a synchronous read on the mailbox The same process submit the process running and the data loader program This introduces a convenient point to control execution namely a queue The queue is also used to serialize data loading jobs and avoid concurrent access The moving files (rename) can be considered an atomic operation 3
4 Data Loader Objective Data load is correct and complete or the target dataset has not been changed Problem No transaction processing and support and therefore no rollback in Strategie Data load into a WORK dataset if no errors occured then append the WORK dataset to the target dataset ASCII work dataset target dataset work dataset UBS Giampaolo Trenta Juni 98 / 4 Executed in batch mode The integrity of the database has the highest priority The loader has to deal with possible error conditions during parsing of the delivered files An administrative database with statistics on loaded data is also updated Database updates are conservative 4
5 Business Model Product FOREX ZHR GEN LUG NY HK TOK SIN LON Regions Switzerland Europe Americas Asia Pacific X X X X X X X X Divisions Private Banking Consumer & Corporate Investment Banking Asset Management X X X X X X X X UBS Giampaolo Trenta Juni 98 / 5 The business model has to be taken into consideration when organizing data The implementation model has to reflect the business model We have auditors assigned to regions or divisions Regional view and/or product view Both view must co-exists and be supported 5
6 Technical Implementation CH prg EU hardlink set file/enter=... xx USA warehouse data AS IB ZHR ACL identifier=mgr, access=rwed identifier=ib_usr, access=r adm PB identifier=ch_usr, access=r AM identifier=*, access=none OpenVMS CC UBS Giampaolo Trenta Juni 98 / 6 Every auditor is assigned to a fixed home directory All object accessible to him are directly accessible inside his subtree In order to avoid duplication of datasets we define hard links OpenVMS identifiers, based on access control lists, allow role based access control /SHARE and /CONNET strictly observe user-based OpenVMS access control Role-based access control rules on data don t need to be continuously maintained Identifiers granting and revoking is the only necessary administrative task 6
7 /CONNECT SA S VT TCP/IP VT Connection VMS Session SA S VT VT Connection SA S VT VT Connection VMS Session Client Server VMS Session VT = Virtuell Terminal UBS Giampaolo Trenta Juni 98 / 7 There are many possibilities to access the data stored on the server Behind /CONNECT on TCP/IP there is in fact a terminal based connection on client acts like a virtual terminal, driven by the events generated by the GUI This requires an OpenVMS interactive license for every concurrent client However, data on the server can be processed strictly on the server (remote execution functions) The authentication is performed directly by the OpenVMS login and passwords are sent in clear text The rel 7.0 will also have a spawner for OpenVMS (already available for UNIX and NT) Thus the client will connect via the spawner rather than the OpenVMS login Note that every client requires a dedicated server process 7
8 /SHARE TCP/IP socket communication ICARUS_SVR TCP/IP socket comm. TCP/IP socket communication Detached VMS Process executing ICARUS_SVR. Client Server UBS Giampaolo Trenta Juni 98 / 8 A /SHARE process can serve many clients concurrently Authentication is performed directly by the share process based on OpenVMS username/password There is no OpenVMS login (interactive/noninteractive) for users using /SHARE However, the OpenVMS context of the users is fully respected for access control Network access could be an issue since /SHARE makes libraries available over the network In reality good performance has been observed especially using sql 8
9 /SHARE Server Startup submit/user=icarus $run/detach/process=icarus_srv /uic =icarus/.. /priv =(nosame,netmbx,..) /error =icarus_srv_err.log /output =icarus_srv.log /input =icarus_srv.com sys$systemloginout.exe $ /LS=80 /LOG=ICARUS_SRV_.LOG /FULLSTIMER ICARUS_SRV. icarus_svr.com icarus_svr_startup.com required privbilegies for ICARUS NETMBX, TMPMBX, SYSNAM, AUDIT icarus_svr.sas %let TCPSEC=_SECURE_; %let AUTHENCR=REQUIRED; options comamid=tcp; proc server uavalid=yes oavalid=yes id=icarus; run; UBS Giampaolo Trenta Juni 98 / 9 The /SHARE process must be up and running to allow user connections Not like /CONNECT where dedicated user processes are created on the fly The /SHARE process is implemented as a detached OpenVMS process running the image and a program Requiring encrypted authentication 9
10 /SHARE vs /CONNECT /SHARE /CONNECT authentication based on OpenVMS Auth. Database encryption username/password no OpenVMS user processes (no OpenVms licenses) data on server processed strictly locally (remote processing) users can be locked on OpenVMS level full OpenVMS audit on users users can change their password full OpenVMS access control restricted security and audit on OpenVMS (e.g. disuser) OpenVMS password change? no remote processing functions network traffic could be an issue hidden terminal based connection scripting to build terminal session no spawner in the current 6.12 for OpenVMS OpenVms login with plaintext username/password every client session required OpenVMS license user could get DCL-prompt user can execute DCL-command UBS Giampaolo Trenta Juni 98 / 10 Both product strictly observe OpenVMS and fully implement access control 10
Data Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security
T rusted Application Trusted System Trusted Network Physical Security System T echnology Data Warehouse P roject Filetransfer Access right just on the data transfer directories Mailbox L oadprocess Data
More informationIBM. Documentation. IBM Sterling Connect:Direct Process Language. Version 5.3
IBM Sterling Connect:Direct Process Language IBM Documentation Version 5.3 IBM Sterling Connect:Direct Process Language IBM Documentation Version 5.3 This edition applies to Version 5 Release 3 of IBM
More informationSysgem Enterprise Manager
Sysgem Enterprise Manager Sysgem Enterprise Manager (SEM) The Sysgem Enterprise Manager (SEM) provides companies of all sizes with a simple, powerful tool for managing IT, auditing security, administering
More informationMigration of SAS Software From VMS to Windows NT : A Real Life Story
Migration of Software From VMS to Windows NT : A Real Life Story Paul Gilbert & Steve Light at DataCeutics, Inc., John Scott Grainger at ClinTrials Research Introduction At ClinTrials Research, Inc. clinical
More informationCockpitMgr for OpenVMS
CockpitMgr for OpenVMS Johan Michiels Product Manager HP Belgium Today s speaker: Gerrit Woertman VSI VMS Ambassador CTO OpenVMS Business Generating Software (BGS) gerrit@bgsoftware.nl Some history. Why
More informationIII Post Offices. Chapter 11, Creating a New Post Office, on page 143 Chapter 12, Managing Post Offices, on page 163.
III Post Offices Chapter 11, Creating a New Post Office, on page 143 Chapter 12, Managing Post Offices, on page 163 Post Offices 141 142 GroupWise 7 Administration Guide 11 Creating a New Post Office As
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationApplication Security through a Hacker s Eyes James Walden Northern Kentucky University
Application Security through a Hacker s Eyes James Walden Northern Kentucky University waldenj@nku.edu Why Do Hackers Target Web Apps? Attack Surface A system s attack surface consists of all of the ways
More informationKASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
More informationOpenVMS Management Station Overview and Release Notes
OpenVMS Management Station Overview and Release Notes September 2003 This document provides an overview of OpenVMS Management Station and describes how to get started using the software. This document
More informationEnterprise Case Study
REUTERS / Stefano Rellandini Enterprise Case Study The Future of Your WAN Dimitrios Voutsinas Head of Network Design and Development About Thomson Reuters We are the leading source of intelligent information
More informationMCL-Collection Fast and Easy Applications Development
MCL-Collection Fast and Easy Applications Development MCL TM -Collection is an integrated set of software tools from Symbol Technologies, Inc. that enables nonprogrammers to create and deploy single or
More informationSAS. Installation Guide Fifth Edition Intelligence Platform
SAS Installation Guide Fifth Edition 9.1.3 Intelligence Platform The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2006. SAS 9.1.3 Intelligence Platform: Installation
More informationIBM DB2 Query Patroller. Administration Guide. Version 7 SC
IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 Before using this information and the product it supports, be sure
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationBuild Operator Menu Multiple menu configuration control for the 5DX Auto UI
Multiple menu configuration control for the 5DX Auto UI Application Note User Contributed Disclaimer This is not a legal document, however, this is user contributed software and as such may be outdated
More informationProKitchenNet User s Guide ProKitchen Server Edition. Real View, LLC
ProKitchenNet User s Guide ProKitchen Server Edition Real View, LLC Table of Contents Introduction... 2 Why ProKitchenNet?... 2 ProKitchenNet Advantages:... 2 Hardware and Software Requirements... 3 ProKitchenNet
More informationIntroduction to SQL 2000: Installation and Implementation. SQL Server Administration suite: course 1 of 4
Introduction to SQL 2000: Installation and Implementation SQL Server Administration suite: course 1 of 4 This class is designed for Beginner SQL/Prophet 21 (CC) Users who are responsible for SQL Administration
More informationSoftware Release Notes for XSS AD/SQL version 5.1.3
Software Release Notes for XSS AD/SQL version 5.1.3 Support Information: Ensure Technologies Technical Support is available to provide any needed assistance. Please contact us at (734) 668-8800 or at support@ensuretech.com.
More informationIII. Chapter 11, Creating a New Post Office, on page 155 Chapter 12, Managing Post Offices, on page 175. novdocx (en) 11 December 2007.
IIPost Offices Chapter 11, Creating a New Post Office, on page 155 Chapter 12, Managing Post Offices, on page 175 III Post Offices 153 154 GroupWise 7 Administration Guide 1Creating a New Post Office As
More informationSWIFT Overview. Association of International Bank Auditors. Amanda De Castro, Sales Services James Wills, Banking Initiatives, Standards
SWIFT Overview Association of International Bank Auditors Amanda De Castro, Sales Services James Wills, Banking Initiatives, Standards Agenda Alliance Access R 7.0 Relationship Management Application (RMA)
More informationSafeguarding Cardholder Account Data
Safeguarding Cardholder Account Data Attachmate Safeguarding Cardholder Account Data CONTENTS The Twelve PCI Requirements... 1 How Reflection Handles Your Host-Centric Security Issues... 2 The Reflection
More informationSimplified Multi-Tenancy for Data Driven Personalized Health Research
Simplified Multi-Tenancy for Data Driven Personalized Health Research Diego Moreno HPC Storage Specialist @ Scientific IT Services, ETH Zürich LAD 2018, Paris Agenda ETH Zurich and the Scientific IT Services
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationCommercial Bank Portal Multi-Factor Authentication Migration Guide
Citibank N.A., Singapore Branch 18 September 2014 Commercial Bank Portal Multi-Factor Authentication Migration Guide Table of Contents 1. Introduction 2. Updating Email and Mailing Address 3. Activating
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationCommunications Access Methods for. SAS/CONNECT 9.2 and SAS/SHARE 9.2
Communications Access Methods for SAS/CONNECT 9.2 and SAS/SHARE 9.2 The correct bibliographic citation for this manual is as follows: SAS Institute Inc., 2009. Communications Access Methods for SAS/CONNECT
More informationRU-VPN2 - GlobalProtect Installation for Windows
RU-VPN2 - GlobalProtect Installation for Windows Use RU-VPN2 for a secure connection to Ryerson's Administrative system via the Internet. To use RU-VPN2, you will need to install and use client software
More informationJob Aid: LDAP or VMM Synch
Job Aid: LDAP or VMM Synch Tivoli Service Request Manager, Change and Configuration Management Database, Asset Management for IT Document version 1.0 Copyright International Business Machines Corporation
More informationImmotec Systems, Inc. SQL Server 2008 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationKYOCERA Net Viewer User Guide
KYOCERA Net Viewer User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationEkran System v Program Overview
Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation
More informationXDU On the Road. John Nitti Vice President Worldwide Sales and Marketing
XDU On the Road John Nitti Vice President Worldwide Sales and Marketing DocuLynx Inc. DocuLynx is a privately held, independent, IT software & ASP services company est. in 2004 in Omaha, Nebraska. DocuLynx
More informationFeatures Four popular platforms, same quality and ease of use
ISE is extending the boundaries of automated job scheduling with the only job scheduler for Windows NT/2000/XP OpenVMS, Tru64 UNIX and Linux. Each version incorporates ISE s unparalleled reputation in
More informationEbook : Overview of application development. All code from the application series books listed at:
Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop
More informationSFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity.
SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity. Version 1.2 April 2017 Contents Overview... 3 BB-SFTP Functionality... 3 Bloomberg SFTP Connectivity
More informationHikCentral V1.3 for Windows Hardening Guide
HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote
More informationNTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp
NTP Software Defendex (formerly known as NTP Software File Auditor) for NetApp Installation Guide This guide provides a short introduction to the installation and initial configuration of NTP Software
More informationSDR Guide to Complete the SDR
I. General Information You must list the Yale Servers & if Virtual their host Business Associate Agreement (BAA ) in place. Required for the new HIPAA rules Contract questions are critical if using 3 Lock
More informationUser Guide. Manual. User Guide. Date 10-January Version 2.0
Manual Date 10-January-2017 Version 2.0 1 Contents 1 Authorization Box for Dynamics NAV... 3 1.1 Role Generator... 3 1.2 User Management... 3 1.3 SoD Monitoring... 3 1.4 Incident Management... 3 2 Settings
More informationTable of Contents Chapter 1: Migrating NIMS to OMS... 3 Index... 17
Migrating from NIMS to OMS 17.3.2.0 User Guide 7 Dec 2017 Table of Contents Chapter 1: Migrating NIMS to OMS... 3 Before migrating to OMS... 3 Purpose of this migration guide...3 Name changes from NIMS
More informationGoverlan Remote Control v7 vs. Microsoft Remote Assistance
Product Comparison vs. SYNOPSIS and both offer remote access services for Windows platforms. This paper provides a feature comparison between these two products. Publication Information This document was
More informationWHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures
ASHNIK PTE LTD. White Paper WHITE PAPER NGINX An Open Source Platform of Choice for Enterprise Website Architectures Date: 10/12/2014 Company Name: Ashnik Pte Ltd. Singapore By: Sandeep Khuperkar, Director
More informationSoftware Release Notes for XSS AD/SQL version 5.1.0
Software Release Notes for XSS AD/SQL version 5.1.0 Support Information: Ensure Technologies Technical Support is available to provide any needed assistance. Please contact us at (734) 668-8800 or at support@ensuretech.com.
More informationUBS Data Center Efficiency Strategy
UBS Group Technology Public UBS Data Center Efficiency Strategy Steps in Efficiency, Automation leading to enabling the Cloud October 18, 2011 UBS one of the leading financial firms UBS draws on its 150-year
More informationGE Fanuc Intelligent Platforms
GE Fanuc Intelligent Platforms Vendor Statement for CERT CVE-2009-0216 CERT has reported vulnerabilities in ifix (versions PDE, 2.0, 2.2, 2.21, 2.5, 2.6, 3.0, 3.5, 4.0, 4.5, and 5.0). The vulnerabilities
More informationLMEdprs Operating & Technical Guide
LMEdprs Operating & Technical Guide May 2016 Please respond to: Market Surveillance +44 (0) 207 113 8203 LMEdprs Operating & Technical Guide Version 2.0 Table of Contents 1 Introduction... 4 2 Overview
More informationInterface Reference topics
McAfee Content Security Reporter 2.6.x Interface Reference Guide Interface Reference topics Edit Permission Set page (Permission Sets page) Specify Content Security Reporter permissions and grant user
More informationIC L17 Strategic Understanding using Symantec Protection Center Hands-On Lab
IC L17 Strategic Understanding using Symantec Protection Center Hands-On Lab Description In this session, the attendee will have the opportunity to install SPC Enterprise, configure external data connections,
More informationEgress Switch Administration Panel
1 COMMERCIAL IN CONFIDENCE Egress Switch Administration Panel User Guide Copyright 2017 Egress Software Technologies Ltd. All rights reserved. 2 COMMERCIAL IN CONFIDENCE Confidentiality Statement This
More informationThe Google File System
October 13, 2010 Based on: S. Ghemawat, H. Gobioff, and S.-T. Leung: The Google file system, in Proceedings ACM SOSP 2003, Lake George, NY, USA, October 2003. 1 Assumptions Interface Architecture Single
More informationAn Introduction to Parallel Processing with the Fork Transformation in SAS Data Integration Studio
Paper 2733-2018 An Introduction to Parallel Processing with the Fork Transformation in SAS Data Integration Studio Jeff Dyson, The Financial Risk Group ABSTRACT The SAS Data Integration Studio job is historically
More informationWireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked
Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked Secure Communications Stay-Linked Secure Communications Guide Page 1 Rev. 10.0.0 Dated: 04/26/10 Table
More informationEvaluating the migration of a SAS application from a VAX to a PC-based NT network Alan T. Pasquino, Pfizer, Inc. Don J. Fish, Pfizer, Inc.
Evaluating the migration of a SAS application from a VAX to a PC-based NT network Alan T. Pasquino, Pfizer, Inc. Don J. Fish, Pfizer, Inc. Abstract: Over a period of several years, we have developed an
More informationImmotec Systems, Inc. SQL Server 2008 Installation Document
SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor
More informationWhy trading firms choose... Connexus Voice. For Traders
Why trading firms choose... Connexus Voice For Traders Intelligent SIP based Voice Services Financial traders need instant connectivity to their counterparties, and private Connexus Voice circuits provide
More informationCHAPTER 5 Macintosh: TCP/IP Access Method
69 CHAPTER 5 Macintosh: TCP/IP Access Method SAS Support for TCP/IP on Macintosh 69 Tasks That Are Common to SAS/CONNECT and SAS/SHARE 70 System and Software Requirements for SAS/CONNECT and SAS/SHARE
More informationAgenda. Future Sessions: Azure VMs, Backup/DR Strategies, Azure Networking, Storage, How to move
Onur Dogruoz Agenda Provide an introduction to Azure Infrastructure as a Service (IaaS) Walk through the Azure portal Help you understand role-based access control Engage in an overview of the calculator
More informationWhat Is a Communications Access Method? CHAPTER 1 Using Communications Access Methods
3 CHAPTER 1 Using Communications Access Methods What Is a Communications Access Method? 3 Types of Communications Access Methods 4 Program-to-Program Communications 4 Terminal-Based Communications 5 Making
More informationIntroduction to the OpenVMS Operating Environment
3 CHAPTER 1 Introduction to the OpenVMS Operating Environment Introduction 3 What Is the OpenVMS Operating Environment? 4 OpenVMS VAX and Alpha Platforms 4 Access to OpenVMS 4 Login Procedure 4 Files that
More informationPhishing Stories. Shaun Jones
Phishing Stories Shaun Jones Agenda What is Phishing? Phishing Story I Intranets are actually pretty useful Phishing Story II Why do I need two factor auth Phishing Story III Everybody gets shells! What
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationTivoli Access Manager for Enterprise Single Sign-On
Tivoli Access Manager for Enterprise Single Sign-On Version 6.0 Kiosk Adapter Installation and Setup Guide GC23-6353-00 Tivoli Access Manager for Enterprise Single Sign-On Version 6.0 Kiosk Adapter Installation
More informationCOS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy
Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients
More informationMetasys System Extended Architecture Overview
Technical Bulletin Issue Date March 31, 2003 Metasys System Extended Architecture Overview Metasys System Extended Architecture Overview...2 Introduction... 2 Key Concepts... 4 Metasys System Extended
More informationLeap Second Event Preparedness FIA Market Technology Division. May 14, 2015
Leap Second Event Preparedness FIA Market Technology Division May 14, 2015 Today s Webinar The webinar will be recorded. The presentation will be available on the FIA website within the next 24 hours.
More informationStrategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading
Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading Presenters: John Ingram - British Gas Trading Ty Sapsford - OCS Consulting Plc
More informationSAS Integration Technologies Server Administrator s Guide
SAS 9.1.2 Integration Technologies Server Administrator s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS 9.1.2 Integration Technologies: Server Administrator
More informationmaxecurity Product Suite
maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...
More informationZumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents
Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Introduction... 2 High-Level Platform Architecture Diagram... 3 Zbi Production Environment... 4 Zbi Publishing Engine...
More informationAN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP
AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros
More informationVersion 1.1 March 22, Secure Installation and Operation of Your WorkCentre 4250/4260
Version 1.1 March 22, 2010 Secure Installation and Operation of Your WorkCentre 4250/4260 Secure Installation and Operation of Your WorkCentre 4250/4260 Purpose and Audience This document provides information
More informationConfiguring WebConnect
CHAPTER 6 WebConnect provides seamless integration between multiple internal and external web servers through a single URL. Making use of a single database and a customer-defined rollover sequence, WebConnect
More informationFull file at https://fratstock.eu
CISSP Guide to Security Essentials, 2 nd Edition Solutions 2 1 CISSP Guide to Security Essentials, 2 nd Edition Chapter 2 Solutions Review Questions 1. The process of obtaining a subject s proven identity
More informationWindows Terminal Server Fact vs. Fiction Bernard Douthit & Jonathan Steel
FINDINGS Guidelines for Implementing OneWorld Technology J.D. EDWARDS RESULTS SERIES Implementing OneWorld Technology Windows Terminal Server Fact vs. Fiction Bernard Douthit & Jonathan Steel Technology
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server
More information4TRESS AAA. Out-of-Band Authentication (SMS) and Juniper Secure Access Integration Handbook. Document Version 2.3 Released May hidglobal.
4TRESS AAA Out-of-Band Authentication (SMS) and Juniper Secure Access Integration Handbook Document Version 2.3 Released May 2013 hidglobal.com Table of Contents List of Figures... 3 1.0 Introduction...
More informationAbout the XenClient Enterprise Solution
About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution XenClient Enterprise is a distributed desktop virtualization solution that makes
More informationInstallation Guide. Citrix License Server VPX v1.01
Installation Guide Citrix License Server VPX Installation Guide Citrix License Server VPX v1.01 This document provides step-by-step instructions for installing and running the Citrix License Server Appliance
More informationNetIQ Secure Configuration Manager Installation Guide. October 2016
NetIQ Secure Configuration Manager Installation Guide October 2016 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted
More informationXerox Device Data Collector 1.1 Security and Evaluation Guide
Xerox Device Data Collector 1.1 Security and Evaluation Guide 2009 Xerox Corporation. All rights reserved. Xerox, WorkCentre, Phaser and the sphere of connectivity design are trademarks of Xerox Corporation
More informationHyper scale Infrastructure is the enabler
Hyper scale Infrastructure is the enabler 100+ Datacenters across 34 Regions Worldwide US DoD West TBD US Gov Iowa West US California Central US Iowa South Central US Texas North Central US Illinois Canada
More informationKYOCERA Net Viewer 5.3 User Guide
KYOCERA Net Viewer. User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationCISI - International Introduction to Securities & Investment Study Support Training EUROPE MIDDLE EAST & NORTH AFRICA ASIA
CISI - International Introduction to Securities & Investment Study Support Training About ISC & UIC Investment Studies Center (ISC) Contributing to the provision of promising national cadres, capable of
More informationFile submissions to VINN and KRITA
Date Page 2017-10-25 1 (10) Recipient: Respondents to VINN and KRITA File submissions to VINN and KRITA Summary This document briefly describes the VINN/KRITA solution for file submissions in the form
More informationNETCONF Client GUI. Client Application Files APPENDIX
APPENDIX B The NETCONF client is a simple GUI client application that can be used to understand the implementation of the NETCONF protocol in Cisco E-DI. This appendix includes the following information:
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationInstallation Guide for Open VMS
Installation Guide for Open VMS IDL Version 5.4 September, 2000 Edition Copyright Research Systems, Inc. All Rights Reserved Restricted Rights Notice The IDL software program and the accompanying procedures,
More informationMessage Networking 5.2 Administration print guide
Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do
More informationNull Service and Loopback Service Drivers Implementation Guide NetIQ Identity Manager. February 2018
Null Service and Loopback Service Drivers Implementation Guide NetIQ Identity Manager February 2018 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
More informationCopyright 2017 Softerra, Ltd. All rights reserved
Copyright 2017 Softerra, Ltd. All rights reserved Contents Introduction Security Considerations Installation Configuration Uninstallation Automated Bulk Enrollment Troubleshooting Introduction Adaxes Self-Service
More informationInternal Audit Report DATA CENTER LOGICAL SECURITY
Internal Audit Report DATA CENTER LOGICAL SECURITY Report No. SC 12 06 June 2012 David Lane Principal IT Auditor Jim Dougherty Principal Auditor Approved Barry Long, Director Internal Audit & Advisory
More informationStorage and File System
COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationVMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments
VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation
More informationUNIX Spawner Program. Starting the UNIX Spawner Program CHAPTER 36
479 CHAPTER 36 UNIX Spawner Program Starting the UNIX Spawner Program 479 Examples of Starting and Connecting to the UNIX Spawner Program 482 Ending the UNIX Spawner Program 483 Starting the UNIX Spawner
More informationEasyMorph Server Administrator Guide
EasyMorph Server Administrator Guide Version 3.9.2 December, 24 th 2018 Table of Contents TABLE OF CONTENTS... 1 PREREQUISITES... 2 Memory requirements... 2 INSTALLATION... 2 License key... 3 SERVER SERVICE
More informationAutomated Deployment Services
Building Out the Enterprise Using Automated Deployment Services Automated Deployment Services (ADS), a component of the Microsoft Windows Server 2003 operating system, includes a new set of imaging tools
More informationVersion Release Notes
Version 6.19.02 Release Notes 1 Table of Contents What's new?... 4 Intellichecks (Performance. Operations, Security) + Trends... 4 Network Visualization... 4 Access Auditing... 5 CyberArk support... 5
More informationQuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired
Overview The Advanced Server for UNIX (ASU) software is a Tru64 UNIX layered application that provides seamless interoperability between systems running the Tru64 UNIX operating system software and systems
More information