Adobe Marketing Cloud Data Workbench Metrics, Dimensions, and Filters

Size: px
Start display at page:

Download "Adobe Marketing Cloud Data Workbench Metrics, Dimensions, and Filters"

Transcription

1 Adobe Marketing Cloud Data Workbench Metrics, Dimensions, and Filters

2 Contents Data Workbench Metrics, Dimensions, and Filters...3 Expanding Metrics, Dimensions, and Filters...4 Dimension Types...5 Baseline Profiles...7 Traffic Profile Dimensions...8 Value Profile Metrics...11 Value Profile Dimensions...11 Marketing Profile Dimensions...11 Third-Party Licenses...13 Last updated 1/31/2017 Data Workbench Metrics, Dimensions, and Filters

3 Data Workbench Metrics, Dimensions, and Filters 3 Data Workbench Metrics, Dimensions, and Filters Metrics, dimensions, and filters provide a framework within which calculations are made about the data processed into a data workbench dataset. The results of the calculations defined using this framework are shown in workspaces, dashboards, reports, or other outputs. In short, any number that you see in or from an application is the result of a query of a dataset that involves a metric, a dimension, and a filter. At the most basic level, a metric describes what is being calculated from and about the dataset, a dimension breaks down the data in the dataset into categories, and a filter describes a selected portion or subset of the data in the dataset. When the Data Workbench Server processes data to create a dataset, dimensions of the data are created and then updated on an ongoing basis as new data is read and processed by the server. Metrics and filters are calculated from these dimensions of data. Caution: If you redefine an internal metric, the system will behave unexpectedly because of the wrong value. Your reports will not generate unless a metric reads 100%. It is recommended that you do not change metric definitions. An Example Imagine a dataset that contains information about all of the people in the world. This dataset contains, at a minimum, all of the people in the world and their ages. A useful metric to calculate from this dataset would be Average Age. Evaluating this metric would result in one number: the average age of the world s population. Adding a dimension to the dataset makes this information more useful and manageable. If the dataset also contains each person s country of residence, defining a Country dimension would provide a way to segment the people into groups for each country in the world. Evaluating the Average Age metric over the Country dimension would result in a list of numbers, one for each country, each representing the average age of the people in that country. The application of a filter (or selection filter) in a metric formula can give more detailed information or allow the definition of a new metric based on existing metrics and dimensions. Evaluating the Average Age metric with a filter of where country equals Sweden results in one number: the average age of people in Sweden. A metric based on this filter could be Swedish Average Age. For example: Swedish_Average_Age=Average_Age[country = Sweden ] How Metrics, Dimensions, and Filters Relate In general, evaluating a metric over a dimension results in that metric being evaluated for each dimension element (or element). In the example above, the Country dimension has an element for each country of the world. Evaluating Average Age over Country would yield the average age for each of the elements (countries), including the element Sweden. It is important to note that when you evaluate a metric over a dimension, you will receive the same numerical result for a specific dimension element regardless of whether you evaluate that metric for the whole dimension or you define a filter corresponding to that specific dimension element. Using the previous example, when looking for the average age of people in Sweden, either of the following methods would yield identical results:

4 Data Workbench Metrics, Dimensions, and Filters 4 Evaluate the Average Age metric over the Country dimension and then look at the number for the dimension element Sweden. Evaluate the Average Age metric with a filter of people in Sweden (expressed as Average_Age[Country='Sweden']). Filters are syntactical expressions that reference one or more dimensions and dimension elements. As you saw in the above example, using the expression [dimension=element] is an easy way to specify a filter. It is just as easy to apply such a filter to define a new metric using an expression such as New_Metric=Metric[Filter]. Such a filter can be used to define a new metric based on a specific dimension element. To use the above example, Average_Age[Country='Sweden'] specifies a metric for the average age of people in Sweden. If we were to give this metric a name, such as Swedish_Average_Age, we could use it in other calculations as a metric. For example, evaluating Swedish_Average_Age/Average_Age would result in a single number: the ratio of the average age of people in Sweden to that of people in the rest of the world. If the dataset with information about all of the people in world also includes a dimension Eye Color, the expression Swedish_Average_Age[Eye_Color='green'] would result in the average age of Swedes with green eyes. You might also obtain this same result without using an intermediate metric definition by applying a different filter: Average_Age[Country='Sweden' AND Eye_Color='green']. In this case, the AND operator specifies a filter expression using two other basic filter expressions. Expanding Metrics, Dimensions, and Filters Data workbench enables you to create new metrics, filters, and dimensions to expand the information available through an application or to easily customize the definitions in the application to meet your needs. The open-ended nature of metrics, dimensions, and filters enables you to answer more questions as you add new metrics and dimensions. Newly defined metrics can be evaluated over existing dimensions, and, similarly, existing metrics can be evaluated over newly defined dimensions. Newly defined metrics also can be used as input in other metrics. Because metrics are built on the client side (that is, their construction does not require dataset processing), they have a minimal impact on system performance. You can increase your analysis capabilities by constructing many levels of metrics. For more information about the syntax used to manipulate metrics, dimensions, and filters, see language syntax.

5 Dimension Types 5 Dimension Types Several types of dimensions are available in the data workbench server. As such, it is important to know the dimension type when using a dimension to create metrics, filters, or derived dimensions. Insight Server can create and maintain the following types of dimensions: Dimension Types Countable A dimension type in which the number of elements in the dimension can be counted by the system. Countable dimensions must be derived from other Countable dimensions. Countable dimensions can be parents of other dimensions or children of other countable dimensions. Examples:,, Page View, Booking, and Order. A dimension that has a one-to-many relationship with a parent countable dimension. A simple dimension can be thought of as representing a property of elements of its parent dimension. Example: Referrer is a simple dimension with a parent of the dimension. Each can have only one Referrer (their first HTTP referrer), but many s might have the same Referrer. Therefore the Referrer is one-to-many with the dimension. Numeric A dimension that has ordered, numerical values and a one-to-many relationship with a parent countable dimension. A numeric dimension can be thought of as representing a numeric property of elements of its parent dimension. Numeric dimensions are often used to define sum metrics. Example: The numeric dimension Revenue defines the revenue, in dollars, for each. Each has a single amount of revenue, but any number of s might have the same revenue, so Revenue is one-to-many with. A metric Revenue might be defined as sum(_revenue, ), giving the total amount of revenue for the selected s. Many-to-Many A dimension that has a many-to-many relationship with a parent countable dimension. A many-to-many dimension can be thought of as representing a set of values for each element of its parent dimension. A many-to-many dimension is equivalent to an (anonymous) countable dimension with its parent and a dimension with a parent of the anonymous countable dimension. Example: The many-to-many dimension Search Phrase has a parent of. Each can use zero or more Search Phrases, and a Search Phrase can be used in any number of s. Denormal A dimension that has a one-to-one relationship with a parent Countable dimension. The element names of the denormal dimension can carry information about the corresponding elements of the parent dimension. A denormal dimension can be thought of as storing an arbitrary string value for each element of the parent. Denormal dimensions can be used with Insight Server s segment export capability to output details about a subset or segment of a countable dimension. In addition, denormal dimensions can be referenced

6 Dimension Types 6 Dimension Types in metric formulas and worksheet visualizations and can be used (with certain restrictions) to define filters. Example: The denormal dimension Address has a parent of. Each has an Address, and each element of the Address dimension is associated with a single. Even if two visitors have the same address, their addresses will be different elements of the Address dimension. A Segment Export can reference the Address dimension to output the Address of each visitor in a Segment. Time A dimension that enables you to create a set of periodic or absolute local time dimensions (such as Day, Day of Week, Hour, Hour of Day, and so on) based on a timestamp field that you specify. When defining time dimensions, you also can choose a day other than Monday to be used as the start of a week by specifying the Week Start Day parameter. Example: The time dimension Time has parent of. Therefore, the dimension defines a set of time dimensions (Day, Day of Week, Hour, Hour of Day, Month, and Week) whose elements correspond to the times at which visitors sessions on the site began. Derived Derived dimensions, rather than being defined in the dataset configuration based on the data being processed, are defined in the profile based on other dimensions or metrics. Many derived dimensions are created automatically to drive different types of visualizations. Example, when a user builds a site or process map, Insight Server silently creates a Prefix dimension. Others, such as the reporting time dimensions, are defined by files in the Dimensions directory of a profile.

7 Baseline Profiles 7 Baseline Profiles A set of standard profiles for each application has been created to allow for one or more of the profiles to be installed at any given time. These baseline profiles include the definitions of standard metrics, dimensions, filters, reports, workspaces, and dashboards. Adobe continuously updates these profiles and makes them available to its licensees through its Software Support program. Additionally, users of Adobe applications can define additional profiles and use them with or instead of the profiles provided by Adobe. The profile management system allows the overriding of a profile s configurations by higher level profiles. This feature should be used by users or administrators who want to override any of the definitions incorporated in these profiles after they are installed. Installing new releases of these profiles will overwrite any prior versions. As a result, any changes made to these profiles directly would be overwritten when the new profiles are installed. Profiles for vertical markets or specific types of companies or industries also may be available from Adobe ClientCare. The following are descriptions of the baseline profiles: The Base profile includes configuration files that ship with Insight Server. The Base profile should not be modified by the user or Administrator. Any alterations made in the Base profile are subject to being overwritten when Adobe releases a next version of Insight Server or other software application. The Traffic profile includes a set of fundamental metrics, dimensions, and filters for web analytics. It also includes template workspaces, reports, and dashboards that facilitate the analysis of, reporting on, and general understanding of overall Internet site activity trends and patterns. This profile functions out-of the box with a baseline installation of Site. The Value profile includes a set of metrics and dimensions and template workspaces, reports, and dashboards associated with the built-in Site business value and conversion model. This profile allows users to identify value events on the site and associate a monetary value to those events. This profile expands your site analysis capabilities by providing a Business Value Model, an advanced method for measuring and tracking the amount of value generated by your site. Value events and their relative value are defined through a simple drag and drop interface within Site. Site uses these definitions to calculate the business value generated by each session, and this information is used in turn to define metrics such as value, value events, conversion, and so on. These metrics enables you to answer questions such as: What is the most profitable path through the site? What referrer or campaign has generated the most value? What is the average number of purchases on the site per day? (How many value events occur per day on average?) After you have defined a Business Value Model in Site, you can use the Value metrics and dimensions in your analysis. The Marketing profile includes set of metrics and dimensions and template workspaces, reports, and dashboards associated with analysis of Internet marketing campaigns, including search analysis and extended referrer analysis. Adobe also provides the following optional profiles to use: The IP Geo-location profile includes dimensions and layer files related to the analysis of visitors locations based on IP geo-location data provided to Adobe by Quova, Inc., and incorporated into data workbench. The IP Geo-intelligence profile includes dimensions and layer files related to the analysis of visitor s locations based on IP geo-intelligence data provided to Adobe by Digital Envoy, Inc., and incorporated into data workbench. For information about the IP-Geo-location and IP Geo-intelligence profiles, contact your Adobe support personnel. The following sections describe the metrics and dimensions defined in each of the baseline profiles.

8 Baseline Profiles 8 Traffic Profile Dimensions The Traffic profile contains the following dimensions to help identify visitor actions. The dimensions in the following table are defined in the transformation dataset include files in the Traffic\Dataset\Transformation directory. Name Type Level Day The day of the first log entry of the session. Day of Week The day of week of the first log entry of a session. Exact Page Duration (Hidden) Numeric Page View The duration in milliseconds of page view as measured by subtracting the time of the next page view from the time of that page view. The exact duration of the last page view in a session is always 0. Hour The hour of the first log entry of a session. Hour of Day The hour of day of the first log entry of a session. Month The month of the first log entry of a session. Page View Countable A log entry or Event Data Record satisfying the Page View Condition. Referrer The second level domain of the referrer of the first log entry of the session (or None if it is an internal referrer domain). Countable A period of related contiguous activity by a. It is delimited by a 30-minute period of inactivity and an external referrer domain or a maximum 48-hour Duration. Both of those timeouts and the set of domains that are considered internal can be configured in the Transformation.cfg file. URI Page View The URI stem of a page view. The URI dimension can be redefined using the ReplaceURI, PrependURI, and AppendURI transformations.

9 Baseline Profiles 9 Name Type Level Countable N/A A unique value of x-trackingid. Usually corresponds to a unique browser if persistent cookies are used. The x-trackingid can be otherwise based on IP number or some other unique identifier such as x.509 common name. Week The week of the first log entry of a session. The dimensions in the following table are defined in the Dimension directory of the Traffic profile: Dimension Type Level Browser The type of user agent used by the visitor, including the version number (for example, MSIE 6.0.) Browser Type The type of user agent used by the visitor (for example, MSIE). Search Engine FIRST ROW The first search engine in a visitor s session when a visitor has searched from a named search engine. Next URI Derived (ShiftDim based on URI dimension) Page View The URI of the next URI after the currently selected URI. This derived dimension is used to conduct analysis about what visitors do next after any given URI. Onetime vs Repeat Derived (SegmentDim based on Repeat s and One-time s metrics) The type of visitor: one-time or repeat. One-time visitors have had only one session on the site, while repeat visitors have had more than one session. Page Derived (RenameDim based on URI dimension) Page View The name of each page visited during a session. Initially, each page s name is the same as the URI but can be changed for easier interpretation. Referrer Inherited from the built-in Referrer dimension The second level domain name of the web site that first referred a session to the site (as supplied by the visitor s browser.) Search Phrase FIRST ROW The first search phrase in a visitor s session as passed on by a search engine when a visitor has searched from a named search engine. Search Term Many-to-Many Each search term as passed on by a search engine when a visitor has a search referrer click-through from a named search engine.

10 Baseline Profiles 10 Dimension Type Level Duration Derived (MetricDim based on Exact Page Duration metric) The duration of a session in 30-second increments. Number The number of times a visitor has visited the site. For example, first-time visitors have a Number of 1, second-time visitors have a Number of 2, etc. Page Views Derived (MetricDim based on Page Views metric) The number of page views in a session. For example, selecting 3 in the Page Views dimension would select all sessions with exactly 3 page views. Search Engine The second level domain name of the first web site that is a named search engine that referred a visitor to the site during a session (as supplied by the visitor s browser.) Time Dimensions The hour, day, hour of day, week, day of week, month, quarter or year in which a began. Time Reporting Dimensions Derived (LastN and Rename dimensions based on built-in time dimensions) Dimensions including Days Ago, Days of Last Month, Days of Last Week, Days of This Month, Days of This Week, Hours of Today, Hours of Yesterday, Last 12 Months, Last 2 Months, Last 2 Weeks, Last 24 Hours, Last 3 Months, Last 4 Weeks, Last 6 Months, Last 7 Days, Last 7 Days and Today, Last 8 Weeks, Last 9 Months, Last Month, Last Week, Months Ago, This Month, This Week, This and Last 14 Days, This and Last 6 Months, This and Last 8 Weeks, Today, Today Reporting, Today and Last 30 Days, Weeks Ago and Yesterday provide a convenient way to build a Workspace or Report which always shows a portion of data in the Dataset. Each is based upon when a session began. URI Inherited from the built-in Dimension URI Page View The URI of each page viewed. Page Views Derived (MetricDim based on Page Views metric) The number of page views to date for a visitor. For example, selecting 3 in the Page Views dimension would select all visitors with exactly 3 page views across all of their sessions. Referrer Inherited from the built-in dimension Referrer The second level domain name of the web site that first referred a to the site for their first session (as supplied by the visitor s browser).

11 Baseline Profiles 11 Value Profile Metrics Metric Formula Level Conversion s[not _Value=#0]/s The percentage of sessions which generated business value (as defined by the Business Value Model). Pct of Value Value/total(Value) The percentage of overall value that was generated from the selected set of sessions. Value sum(_value, )*0.01 The total business value generated, in dollars (as defined by the Business Value Model). Value Events s[not _Value=#0] The count of sessions that generated business value (as defined by the Business Value Model). Value Events per (Value_Events/s) by The average number of sessions for each visitor that generated business value (as defined by the Business Value Model). Value per (Value/s) by The average business value generated, in dollars, by each visitor. Value Profile Dimensions Dimension Type Level Value Derived (MetricDim based on Value metric) The value of the session as defined by the Business Value Model. Value Segment Derived (MetricDim based on Value metric) The total value that a visitor has generated in all their sessions. The default increment used for each segment of value is $50, but can be changed. Marketing Profile Dimensions The Campaign dimension is defined in the Site Marketing profile to provide campaign analysis capabilities. Dimension Type Level Campaign Renamed FIRST ROW operation The campaign identifier extracted from a value in the visitor s first request.

12 Baseline Profiles 12 Samples of Custom Marketing Profile Dimensions You can incorporate additional dimensions of data for further analysis. These dimensions are added by incorporating additional information into the stream of data that is collected for analysis. For example, the following table contains some of the custom marketing dimensions that have been added in deployments for customers in various industries: Dimension (Custom) Campaign Date Campaign Detail Campaign Segment Campaign Type Marketing Campaign Detail Marketing Campaign Owner Marketing Campaign Source Marketing Campaign Type PPC Campaign Detail Parses the campaign date (first value) from campaign query strings. Collects the value string attached to the campaign query string variable. Parses the campaign segment (third value) from campaign query strings. Parses the campaign type (second value) from campaign query strings. Collects the value string attached to marketing campaign query string variables. Parses the campaign owner (fourth value) from marketing campaign query strings. Parses the campaign source (first value) from marketing campaign query strings. Parses the campaign type (second value) from marketing campaign query strings. Collects the value string attached to the ppc query string variable.

13 Third-Party Licenses 13 Third-Party Licenses Apache Xerces: This product includes software developed by the Apache Software Foundation ( Copyright (c) 2002 The Apache Software Foundation, all rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The end-user documentation included with the redistribution, if any, must include the following acknowledgment: This product includes software developed by the Apache Software Foundation ( Alternately, this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally appear. 4. The names Xerces and Apache Software Foundation must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact 5. Products derived from this software may not be called Apache, nor may Apache appear in their name, without prior written permission of the Apache Software Foundation. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. OpenSSL Toolkit: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( Copyright (c) The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( 4. The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org 5. Products derived from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project. 6. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

14 Third-Party Licenses 14 This product includes cryptographic software written by Eric Young Copyright (C) Eric Young All rights reserved. This package is an SSL implementation written by Eric Young The implementation was written so as to conform with Netscape s SSL. This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes cryptographic software written by Eric Young (eay@cryptsoft.com) The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic related. 4. This product includes software written by Tim Hudson (tjh@cryptsoft.com). THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Liblzf: This software uses, in a modified form, the LZF compression library. Copyright (c) 2000 Marc Alexander Lehmann pcg@goof.com. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. PCRE: Copyright (c) University of Cambridge. Permission is granted to anyone to use this software for any purpose on any computer system, and to redistribute it freely, subject to the following restrictions: 1. This software is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 2. The origin of this software must not be misrepresented, either by explicit claim or by omission. In practice, this means that if you use PCRE in software which you distribute to others, commercially or otherwise, you must put a sentence like this Regular expression

15 Third-Party Licenses 15 support is provided by the PCRE library package, which is open source software, written by Philip Hazel, and copyright by the University of Cambridge, England. Somewhere reasonably visible in your documentation and in any relevant files or online help data or similar. A reference to the ftp site for the source, that is, to ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/ should also be given in the documentation. 3. Altered versions must be plainly marked as such, and must not be misrepresented as being the original software. Truerand: Truerand is based on code by D. P. Mitchell. Truerand was modified by Matt Blaze 7/95, 11/96. Truerand is Version 2.1. This is completely unsupported software. The authors of this software are Don Mitchell and Matt Blaze. Copyright (c) 1995, 1996 by AT&T. Permission to use, copy, and modify this software without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software. This software may be subject to United States export controls. THIS SOFTWARE IS BEING PROVIDED AS IS, WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHORS NOR AT&T MAKE ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. libjpeg: The authors make NO WARRANTY or representation, either express or implied, with respect to this software, its quality, accuracy, merchantability, or fitness for a particular purpose. This software is provided AS IS, and you, its user, assume the entire risk as to its quality and accuracy. This software is copyright (C) , Thomas G. Lane. All Rights Reserved except as specified below. Permission is hereby granted to use, copy, modify, and distribute this software (or portions thereof) for any purpose, without fee, subject to these conditions: (1) If any part of the source code for this software is distributed, then this README file must be included, with this copyright and no-warranty notice unaltered; and any additions, deletions, or changes to the original files must be clearly indicated in accompanying documentation. (2) If only executable code is distributed, then the accompanying documentation must state that this software is based in part on the work of the Independent JPEG Group. (3) Permission for use of this software is granted only if the user accepts full responsibility for any undesirable consequences; the authors accept NO LIABILITY for damages of any kind. These conditions apply to any software derived from or based on the IJG code, not just to the unmodified library. If you use our work, you ought to acknowledge us. Permission is NOT granted for the use of any IJG author's name or company name in advertising or publicity relating to this software or products derived from it. This software may be referred to only as the Independent JPEG Group's software. We specifically permit and encourage the use of this software as the basis of commercial products, provided that all warranty or liability claims are assumed by the product vendor. libtiff 3.5.7: Copyright (c) Sam Leffler. Copyright (c) Silicon Graphics, Inc. Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that: (i) the above copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may not be used in any advertising or publicity relating to the software without the specific, prior written permission of Sam Leffler and Silicon Graphics. THE SOFTWARE IS PROVIDED AS-IS AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Bzip: This program, bzip2 and associated library libbzip2, are copyright (C) Julian R Seward. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this

16 Third-Party Licenses 16 list of conditions and the following disclaimer. 2. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 3. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Julian Seward, Cambridge, UK. jseward@acm.org. bzip2/libbzip2 version of 30 December 2001 Libpng: COPYRIGHT NOTICE, DISCLAIMER, and LICENSE: Libpng versions 1.0.7, July 1, 2000, through 1.2.3, May 21, 2002, are Copyright (c) Glenn Randers-Pehrson, and are distributed according to the same disclaimer and license as libpng with the following individuals added to the list of Contributing Authors, Simon-Pierre Cadieux, Eric S. Raymond and Gilles Vollant. There is no warranty against interference with your enjoyment of the library or against infringement. There is no warranty that our efforts or the library will fulfill any of your particular purposes or needs. This library is provided with all faults, and the entire risk of satisfactory quality, performance, accuracy, and effort is with the user. Libpng versions 0.97, January 1998, through 1.0.6, March 20, 2000, are Copyright (c) 1998, 1999, 2000 Glenn Randers-Pehrson. Libpng is distributed according to the same disclaimer and license as libpng-0.96, with the following individuals added to the list of Contributing Authors: Tom Lane, Glenn Randers-Pehrson, and Willem van Schaik. Libpng versions 0.89, June 1996, through 0.96, May 1997, are Copyright (c) 1996, 1997 Andreas Dilger Distributed according to the same disclaimer and license as libpng-0.88, with the following individuals added to the list of Contributing Authors: John Bowler, Kevin Bracey, Sam Bushell, Magnus Holmgren, Greg Roelofs, and Tom Tanner. Libpng versions 0.5, May 1995, through 0.88, January 1996, are Copyright (c) 1995, 1996 Guy Eric Schalnat, Group 42, Inc. For the purposes of this copyright and license, Contributing Authors is defined as the following set of individuals: Andreas Dilger, Dave Martindale, Guy Eric Schalnat, Paul Schmidt and Tim Wegner. The PNG Reference Library is supplied AS IS. The Contributing Authors and Group 42, Inc. disclaim all warranties, expressed or implied, including, without limitation, the warranties of merchantability and of fitness for any purpose. The Contributing Authors and Group 42, Inc. assume no liability for direct, indirect, incidental, special, exemplary, or consequential damages, which may result from the use of the PNG Reference Library, even if advised of the possibility of such damage. Permission is hereby granted to use, copy, modify, and distribute this source code or portions hereof, for any purpose, without fee, subject to the following restrictions: 1. The origin of this source code must not be misrepresented. 2. Altered versions must be plainly marked as such and must not be misrepresented as being the original source. 3. This Copyright notice may not be removed or altered from any source or altered source distribution. The Contributing Authors and Group 42, Inc. specifically permit, without fee, and encourage the use of this source code as a component to supporting the PNG file format in commercial products. If you use this source code in a product, acknowledgment is not required but would be appreciated. STLPort: Boris Fomitchev grants End User a non-exclusive, non-transferable, royalty-free license to use STLport and its documentation without fee. By downloading, using, or copying STLport or any portion thereof, End User agrees to abide by the intellectual property laws and all other applicable laws of the United States of America, and to all of the terms and conditions of this Agreement. End User shall maintain the following copyright and permission notices on STLport sources and its documentation unchanged: Copyright 1999, 2000 Boris Fomitchev. This material

17 Third-Party Licenses 17 is provided as is, with absolutely no warranty expressed or implied. Any use is at your own risk. Permission to use or copy this software for any purpose is hereby granted without fee provided the above notices are retained on all copies. Permission to modify the code and to distribute modified code is granted, provided the above notices are retained, and a notice that the code was modified is included with the above copyright notice. The End User may distribute binaries compiled with STLport (whether original or modified) without any royalties or restrictions. The End User may distribute original or modified STLport sources, provided that: The conditions indicated in the above permission notice are met; The following copyright notices are retained when present, and conditions provided in accompanying permission notices are met: Copyright 1994 Hewlett-Packard Company; Copyright 1996,97 Silicon Graphics Computer Systems, Inc.; Copyright 1997 Moscow Center for SPARC Technology; Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Hewlett-Packard Company makes no representations about the suitability of this software for any purpose. It is provided as is without express or implied warranty. Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Silicon Graphics makes no representations about the suitability of this software for any purpose. It is provided as is without express or implied warranty. Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Moscow Center for SPARC Technology makes no representations about the suitability of this software for any purpose. It is provided as is without express or implied warranty. Zlib: (c) Jean-loup Gailly and Mark Adler. This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. GDAL Library: (c) 2000 Frank Warmerdam. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the Software ), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. NetRatings, Inc.: Adobe, Inc., grants End User a limited, non-exclusive sublicense under the NetRatings Patents solely for the use by End User of the licensed Software Applications. End User expressly acknowledges and agrees that the sublicense granted under this Agreement does not permit the End User to aggregate Video Stream Data (as defined below) from multiple sources for resale or distribution to third parties. Video Stream Data is defined as audience measurement data relating to the exposure to, or viewership of, video streams (including, without limitation, television and/or IPTV content, sports content, news content, movies and commercials). For purposes of this license,

18 Third-Party Licenses 18 NetRatings Patents shall mean the following Patent/Publication Numbers: US Patents - 5,675,510; 6,115,680; 6,108,637; US ; 5,796,952; 6,138,155; 6,643,696; 6,763,386; US ; and US ; Australia: AU701813; AU735285; and AU727170; Brazil - BR and BR ; Canada - CA ; CA ; and CA ; EP - EP ; EP ; EP ; EP ; and EP ; Japan - JP and JP ; Mexico - MX193614; Norway - NO ; WO - WO ; WO ; and WO ; China - CN ; CN ; CN ; CN ; and CN ; Denmark -DK870234; Germany - DE ; Spain ES ; Israel - IL131871; Korea - KR341110; and New Zealand - NZ HTML Snapshot: Effective this 14 day of January, 2005, Guangming Software, an entity formed and located in the People's Republic of China ("Licensor") grants the following rights and licenses to Adobe, Inc. f/k/a Adobe, Inc. ("Adobe"): Licensor, as the sole owner of the rights and title to the source code of "HTML Snapshot," hereby grants Adobe a perpetual royalty-free, non-exclusive license to use the source code and object code of Licensor's "HTML Snapshot" software product. Licensor grants Adobe the right to use the licensed source code of "HTML Snapshot": (1) to create derivative works thereof and therefrom and to modify it as needed; (2) in combination with Adobe' other proprietary source code; and (3) to redistribute, sub-license or otherwise make available to, or permit the use of, such licensed source code and object code to those third parties which license Adobe proprietary software applications. Licensor grants no other rights in the source code of "HTML Snapshot" except the rights expressly granted hereunder. Licensor retains all rights, title and ownership of the source code of "HTML Snapshot." Licensor authorizes Adobe to deposit the source code of "HTML Snapshot" with an independent third party software escrow agent along with the source code of its own proprietary software applications upon the request of Adobe' customers who have licensed its proprietary software applications. Notwithstanding the foregoing, in the event the source code of "HTML Snapshot" by such independent third party escrow agent is released to a licensee of Adobe, such third party customer shall be contractually restricted from using the source code of "HTML Snapshot" for the purposes of creating any derivative works therefrom or from distributing such source code to any third parties. Licensor prohibits Adobe from using the licensed source code of "HTML Snapshot" to release a product that is competitive with "HTML Snapshot." Licensor is providing the source code license of "HTML Snapshot" "AS IS." LICENSOR EXPRESSLY DISCLAIMS ANY WARRANTY, WHETHER EXPRESS OR IMPLIED. ADOBE USE OF THE SOURCE CODE LICENSE OF "HTML SNAPSHOT" SHALL BE AT ITS OWN RISK. LICENSOR AND ITS EMPLOYEES, AGENTS AND REPRESENTATIVES EXPRESSLY DISCLAIM ANY LIABILITY FOR LOSS OF DATA, DAMAGES, LOSS OF PROFITS OR ANY OTHER KIND OF LOSS ARISING FROM OR RELATING TO ADOBE USE OF THE SOURCE CODE LICENSE OF "HTML SNAPSHOT." MD5: Copyright (C) 1999, 2000, 2002 Aladdin Enterprises. All rights reserved. This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. StdString: COPYRIGHT: 1999 Joseph M. O'Leary. This code is free. Use it anywhere you want. Rewrite it, restructure it, whatever. Please don't blame me if it makes your $30 billion dollar satellite explode in orbit. If you redistribute it in any form, I'd appreciate it if you would leave this notice here.

TL Aggro may contain libpng, zlib, and FreeType. The license for libpng, zlib, and FreeType, respectively, follow.

TL Aggro may contain libpng, zlib, and FreeType. The license for libpng, zlib, and FreeType, respectively, follow. TL Aggro may contain libpng, zlib, and FreeType. The license for libpng, zlib, and FreeType, respectively, follow. ********License agreement for libpng library******** This copy of the libpng notices is

More information

VMware vcenter Log Insight Manager. Deployment Guide

VMware vcenter Log Insight Manager. Deployment Guide VMware vcenter Log Insight Manager Deployment Guide VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Epic. Epic Systems. Deployment Guide

Epic. Epic Systems. Deployment Guide Epic Systems Deployment Guide VERSION: 1.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are

More information

Open Source Used In TSP

Open Source Used In TSP Open Source Used In TSP 3.5.11 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.

More information

Moodle. Moodle. Deployment Guide

Moodle. Moodle. Deployment Guide Moodle Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

Splunk. Splunk. Deployment Guide

Splunk. Splunk. Deployment Guide Deployment Guide VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

Adobe Connect. Adobe Connect. Deployment Guide

Adobe Connect. Adobe Connect. Deployment Guide Deployment Guide VERSION: 1.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered trademarks

More information

LoadMaster VMware Horizon (with View) 6. Deployment Guide

LoadMaster VMware Horizon (with View) 6. Deployment Guide LoadMaster VMware Horizon (with View) 6 Deployment Guide VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the

More information

Packet Trace Guide. Packet Trace Guide. Technical Note

Packet Trace Guide. Packet Trace Guide. Technical Note Packet Trace Guide Technical Note VERSION: 2.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

This code is released under the libpng license (See LICENSE, below)

This code is released under the libpng license (See LICENSE, below) libpng version 1.4.3 - June 26, 2010 Copyright (c) 1998-2010 Glenn Randers-Pehrson (Version 0.96 Copyright (c) 1996, 1997 Andreas Dilger) (Version 0.88 Copyright (c) 1995, 1996 Guy Eric Schalnat, Group

More information

RSA Two Factor Authentication

RSA Two Factor Authentication RSA Two Factor Authentication Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Migration Tool. Migration Tool (Beta) Technical Note

Migration Tool. Migration Tool (Beta) Technical Note Migration Tool (Beta) Technical Note VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

Preface. Audience. Cisco IOS Software Documentation. Organization

Preface. Audience. Cisco IOS Software Documentation. Organization This preface describes the audience, organization, and conventions of this publication, and provides information on how to obtain related documentation. Cisco documentation and additional literature are

More information

NTLM NTLM. Feature Description

NTLM NTLM. Feature Description Feature Description VERSION: 6.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

MagicInfo Express Content Creator

MagicInfo Express Content Creator MagicInfo Express Content Creator MagicInfo Express Content Creator User Guide MagicInfo Express Content Creator is a program that allows you to conveniently create LFD content using a variety of templates.

More information

KEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide

KEMP Driver for Red Hat OpenStack. KEMP LBaaS Red Hat OpenStack Driver. Installation Guide KEMP LBaaS Red Hat OpenStack Driver Installation Guide VERSION: 2.0 UPDATED: AUGUST 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

Documentation Roadmap for Cisco Prime LAN Management Solution 4.2

Documentation Roadmap for Cisco Prime LAN Management Solution 4.2 Documentation Roadmap for Cisco Prime LAN Thank you for purchasing Cisco Prime LAN Management Solution (LMS) 4.2. This document provides an introduction to the Cisco Prime LMS and lists the contents of

More information

About This Guide. and with the Cisco Nexus 1010 Virtual Services Appliance: N1K-C1010

About This Guide. and with the Cisco Nexus 1010 Virtual Services Appliance: N1K-C1010 This guide describes how to use Cisco Network Analysis Module Traffic Analyzer 4.2 (NAM 4.2) software. This preface has the following sections: Chapter Overview, page xvi Audience, page xvii Conventions,

More information

Ecma International Policy on Submission, Inclusion and Licensing of Software

Ecma International Policy on Submission, Inclusion and Licensing of Software Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being

More information

Ecma International Policy on Submission, Inclusion and Licensing of Software

Ecma International Policy on Submission, Inclusion and Licensing of Software Ecma International Policy on Submission, Inclusion and Licensing of Software Experimental TC39 Policy This Ecma International Policy on Submission, Inclusion and Licensing of Software ( Policy ) is being

More information

Bar Code Discovery. Administrator's Guide

Bar Code Discovery. Administrator's Guide Bar Code Discovery Administrator's Guide November 2012 www.lexmark.com Contents 2 Contents Overview...3 Configuring the application...4 Configuring the application...4 Configuring Bar Code Discovery...4

More information

PageScope Box Operator Ver. 3.2 User s Guide

PageScope Box Operator Ver. 3.2 User s Guide PageScope Box Operator Ver. 3.2 User s Guide Box Operator Contents 1 Introduction 1.1 System requirements...1-1 1.2 Restrictions...1-1 2 Installing Box Operator 2.1 Installation procedure...2-1 To install

More information

TWAIN driver User s Guide

TWAIN driver User s Guide 4037-9571-05 TWAIN driver User s Guide Contents 1 Introduction 1.1 System requirements...1-1 2 Installing the TWAIN Driver 2.1 Installation procedure...2-1 To install the software...2-1 2.2 Uninstalling...2-1

More information

IBM. Licensed Program Specifications. IBM Infoprint Transforms to AFP Version 2 Release 4 for z/os Product Number 5655-N60

IBM. Licensed Program Specifications. IBM Infoprint Transforms to AFP Version 2 Release 4 for z/os Product Number 5655-N60 IBM Licensed Program Specifications IBM Infoprint Transforms to AFP Version 2 Release 4 for z/os Product Number 5655-N60 IBM Infoprint Transforms to AFP for z/os transforms documents to Advanced Function

More information

DAP Controller FCO

DAP Controller FCO Release Note DAP Controller 6.40.0412 FCO 2016.046 System : Business Mobility IP DECT Date : 30 June 2016 Category : Maintenance Product Identity : DAP Controller 6.40.0412 Queries concerning this document

More information

DAP Controller FCO

DAP Controller FCO Release Note DAP Controller 6.61.0790 System : Business Mobility IP DECT Date : 20 December 2017 Category : General Release Product Identity : DAP Controller 6.61.0790 Queries concerning this document

More information

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009 IETF TRUST Legal Provisions Relating to IETF Documents February 12, 2009 Effective Date: February 15, 2009 1. Background The IETF Trust was formed on December 15, 2005, for, among other things, the purpose

More information

Hyper-V - Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

Hyper-V - Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 5.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc..

More information

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008 IETF TRUST Legal Provisions Relating to IETF Documents Approved November 6, 2008 Effective Date: November 10, 2008 1. Background The IETF Trust was formed on December 15, 2005, for, among other things,

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Product version: 10.2 Document date: September 2012 Contents 1 Before you begin...3 2 Install Sophos Endpoint Security and Control...4 3 Configure

More information

TheGreenBow VPN Client ios User Guide

TheGreenBow VPN Client ios User Guide www.thegreenbow.com TheGreenBow VPN Client ios User Guide Property of TheGreenBow 2018 Table of Contents 1 Presentation... 3 1.1 TheGreenBow VPN Client... 3 1.2 TheGreenBow VPN Client main features...

More information

JD Edwards World User Reserved Information. Version A9.2

JD Edwards World User Reserved Information. Version A9.2 JD Edwards World User Reserved Information Version A9.2 Revised June 30, 2009 Copyright Notice Copyright 2009, Oracle. All rights reserved. Trademark Notice Oracle is a registered trademark of Oracle Corporation

More information

Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics

Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics Additional License Authorizations for HPE OneView for Microsoft Azure Log Analytics Product Use Authorizations This document provides Additional License Authorizations for HPE OneView for Microsoft Azure

More information

Trimble. ecognition. Release Notes

Trimble. ecognition. Release Notes Trimble ecognition Release Notes Trimble Documentation: ecognition 8.9 Release Notes Imprint and Version Document Version 8.9 Copyright 2013 Trimble Germany GmbH. All rights reserved. This document may

More information

Configuring Real Servers for DSR

Configuring Real Servers for DSR Configuring Real Servers for DSR VERSION: 1.1 UPDATED: JULY 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 20 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..

More information

LoadMaster Clustering

LoadMaster Clustering Introduction LoadMaster Clustering Feature Description VERSION: 9.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

Edge Security Pack (ESP)

Edge Security Pack (ESP) Edge Security Pack (ESP) VERSION: 1.2 UPDATED: SEPTEMBER 2013 Copyright 2002-2013 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 22 Copyright Notices Copyright 2002-2013 KEMP Technologies, Inc..

More information

Conettix Universal Dual Path Communicator B465

Conettix Universal Dual Path Communicator B465 Conettix Universal Dual Path Communicator B465 en Release Notes Conettix Universal Dual Path Communicator Table of contents en 3 Table of contents 1 Introduction 4 1.1 Requirements 4 2 Version 2.00.000

More information

Simba Cassandra ODBC Driver with SQL Connector

Simba Cassandra ODBC Driver with SQL Connector Simba Cassandra ODBC Driver with SQL Connector Last Revised: March 26, 2013 Simba Technologies Inc. Copyright 2012-2013 Simba Technologies Inc. All Rights Reserved. Information in this document is subject

More information

Juniper Networks Steel-Belted Radius Carrier

Juniper Networks Steel-Belted Radius Carrier Juniper Networks Steel-Belted Radius Carrier Installation Guide Release 8.3.0 Modified: 2017-03-07 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

JD Edwards World EDI Error Notification. Version A9.2

JD Edwards World EDI Error Notification. Version A9.2 JD Edwards World EDI Error Notification Version A9.2 Revised June 8, 2009 Copyright Notice Copyright 2009, Oracle. All rights reserved. Trademark Notice Oracle is a registered trademark of Oracle Corporation

More information

Lotus G Instant Messaging and Web Conferencing Directory and Database Access Toolkit. Developer s Guide. Version 6.5.1

Lotus G Instant Messaging and Web Conferencing Directory and Database Access Toolkit. Developer s Guide. Version 6.5.1 Lotus Instant Messaging and Web Conferencing Directory and Database Access Toolkit Version 6.5.1 Developer s Guide G210-1728-00 Copyright and Trademark Information Disclaimer THE INFORMATION CONTAINED

More information

End User License Agreement

End User License Agreement End User License Agreement Kyocera International, Inc. ( Kyocera ) End User License Agreement. CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS ( AGREEMENT ) BEFORE USING OR OTHERWISE ACCESSING THE SOFTWARE

More information

Introduction. The Win32 OpenSSL Installation Group hopes that you enjoy this software and get many years of use out of it!

Introduction. The Win32 OpenSSL Installation Group hopes that you enjoy this software and get many years of use out of it! Introduction Welcome to the Win32 OpenSSL Installation Project. This project is designed to make it easy for Windows developers to get OpenSSL binaries (DLLs) installed and enable programmers to quickly

More information

This section describes new Polycom QDX 6000 hardware.

This section describes new Polycom QDX 6000 hardware. PLEASE NOTE 4.0.1 UPGRADE DEPENDENCY: Customers who used data pass through in 4.0 will need to use a new cable after the upgrade. The part number for the new Data Pass-Through cable is 2457-32892-001.

More information

Copyright PFU LIMITED

Copyright PFU LIMITED -------------------------------------------------------- PaperStream Capture 1.0.12 README File -------------------------------------------------------- Copyright PFU LIMITED 2013-2015 This file contains

More information

SDN Adaptive Load Balancing. Feature Description

SDN Adaptive Load Balancing. Feature Description SDN Adaptive Load Balancing Feature Description VERSION: 5.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

LoadMaster VMware Horizon Access Point Gateway

LoadMaster VMware Horizon Access Point Gateway LoadMaster VMware Horizon Access Point Gateway Deployment Guide VERSION: 1.0 UPDATED: OCTOBER 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

CA File Master Plus. Release Notes. Version

CA File Master Plus. Release Notes. Version CA File Master Plus Release Notes Version 9.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

LoadMaster for Azure (Marketplace Classic Interface)

LoadMaster for Azure (Marketplace Classic Interface) LoadMaster for Azure (Marketplace Classic Interface) Feature Description VERSION: 8.0 UPDATED: OCTOBER 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

MS Lync MS Lync Deployment Guide

MS Lync MS Lync Deployment Guide MS Lync 2013 Deployment Guide VERSION: 7.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

Hadoop Connector Configuration Guide

Hadoop Connector Configuration Guide Configuration Guide CUSTOMER Document Version: 1.1 2018-04-05 Typographic Conventions Type Style Example Example EXAMPLE Example Example EXAMPLE Description Words or characters quoted from the

More information

Open Source Used In Cisco Configuration Professional for Catalyst 1.0

Open Source Used In Cisco Configuration Professional for Catalyst 1.0 Open Source Used In Cisco Configuration Professional for Catalyst 1.0 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on

More information

MS Skype for Business. Microsoft Skype for Business Deployment Guide

MS Skype for Business. Microsoft Skype for Business Deployment Guide Microsoft Skype for Business 2015 Deployment Guide VERSION: 7.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Supported and Interoperable Devices and Softwares for the Cisco Secure Access Control System 5.2

Supported and Interoperable Devices and Softwares for the Cisco Secure Access Control System 5.2 Supported and Interoperable Devices and Softwares for the Cisco Secure Access Control System 5.2 Revised: March 11, 2013 The Cisco Secure Access Control System Release 5.2, hereafter referred to as ACS,

More information

This file includes important notes on this product and also the additional information not included in the manuals.

This file includes important notes on this product and also the additional information not included in the manuals. --- fi Series PaperStream IP driver 1.42 README file --- Copyright PFU LIMITED 2013-2016 This file includes important notes on this product and also the additional information not included in the manuals.

More information

Fujitsu ScandAll PRO V2.1.5 README

Fujitsu ScandAll PRO V2.1.5 README -------------------------------------------------------- Fujitsu ScandAll PRO V2.1.5 README -------------------------------------------------------- Copyright PFU Limited 2007-2017 This file contains information

More information

Panasonic Audio Player 2 User Guide

Panasonic Audio Player 2 User Guide Panasonic Audio Player 2 User Guide ASIO is a trademark and software of Steinberg Media Technologies GmbH. Overview Panasonic Audio Player 2 is simple GUI audio player software for Windows and Mac OS with

More information

SkyPilot OS Installation: Fedora Core 5

SkyPilot OS Installation: Fedora Core 5 SkyPilot OS Installation: Fedora Core 5 PN 671-00024-01 2006 SkyPilot Networks, Inc. All rights reserved This publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose.

More information

WatchGuard Firebox X Edge User Guide. Firebox X Edge - Firmware Version 7.0

WatchGuard Firebox X Edge User Guide. Firebox X Edge - Firmware Version 7.0 WatchGuard Firebox X Edge User Guide Firebox X Edge - Firmware Version 7.0 Certifications and Notices FCC Certification This appliance has been tested and found to comply with limits for a Class A digital

More information

Supported and Interoperable Devices and Software for Cisco Secure Access Control System 5.4

Supported and Interoperable Devices and Software for Cisco Secure Access Control System 5.4 Supported and Interoperable Devices and Software for Cisco Secure Access Control System 5.4 Revised: January 30, 2014 The Cisco Secure Access Control System Release 5.4, hereafter referred to as ACS, works

More information

MSDE Copyright (c) 2001, Microsoft Corporation. All rights reserved.

MSDE Copyright (c) 2001, Microsoft Corporation. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file,

More information

JD Edwards EnterpriseOne Date Utility

JD Edwards EnterpriseOne Date Utility JD Edwards EnterpriseOne Date Utility June 2010 JD Edwards EnterpriseOne Date Utility Releases Xe thru 9.0 Copyright Notice Copyright 2010, Oracle and/or its affiliates. All rights reserved. Trademark

More information

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0

Quick Start Guide. BlackBerry Workspaces app for Android. Version 5.0 Quick Start Guide BlackBerry Workspaces app for Android Version 5.0 Published: 2017-01-22 SWD-20170122060917401 Contents Overview... 4 Browse workspaces, folders, and files... 5 Create new workspaces,

More information

Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3)

Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3) Intel Stress Bitstreams and Encoder (Intel SBE) 2017 AVS2 Release Notes (Version 2.3) Overview Changes History Installation Package Contents Known Limitations Attributions Legal Information Overview The

More information

TERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties.

TERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties. TERMS OF USE Effective Date: January 1, 2015 To review material modifications and their effective dates scroll to the bottom of the page. 1.Parties. The parties to these Terms of Use are you, and the owner

More information

Sonic ESB Configuration and Management Guide

Sonic ESB Configuration and Management Guide Sonic ESB Configuration and Management Guide Aurea Sonic ESB Configuration and Management Guide 2013 Copyright 2013 Aurea, Inc. All Rights Reserved. These materials and all Aurea Software, Inc. software

More information

Cover Page. Video Manager User Guide 10g Release 3 ( )

Cover Page. Video Manager User Guide 10g Release 3 ( ) Cover Page Video Manager User Guide 10g Release 3 (10.1.3.3.0) March 2007 Video Manager User Guide, 10g Release 3 (10.1.3.3.0) Copyright 2007, Oracle. All rights reserved. Contributing Authors: Bruce Silver

More information

Technics Audio Player User Guide

Technics Audio Player User Guide Technics Audio Player User Guide Overview Technics Audio Player is simple GUI audio player software for Windows and Mac OS with high-resolution audio data processing capabilities. When connected to Technics

More information

This file includes important notes on this product and also the additional information not included in the manuals.

This file includes important notes on this product and also the additional information not included in the manuals. --- fi Series PaperStream IP driver 1.30 README file --- Copyright PFU LIMITED 2013-2015 This file includes important notes on this product and also the additional information not included in the manuals.

More information

Crypto Application. version 1.2

Crypto Application. version 1.2 Crypto Application version 1.2 The Erlang/OTP SSL application includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). Copyright (c) 1998-2002 The OpenSSL

More information

Enterprise Payment Solutions. Scanner Installation April EPS Scanner Installation: Quick Start for Remote Deposit Complete TM

Enterprise Payment Solutions. Scanner Installation April EPS Scanner Installation: Quick Start for Remote Deposit Complete TM Enterprise Payment Solutions Complete TM Portions of this software: Copyright 2004-2013 Apache Software Foundation Copyright 2005 Paul Querna Copyright 2008 Marc Gravell Copyright 2000-2007 Niels Provos

More information

Copyright PFU LIMITED 2016

Copyright PFU LIMITED 2016 -------------------------------------------------------- PaperStream Capture Lite 1.0.1 README File -------------------------------------------------------- Copyright PFU LIMITED 2016 This file contains

More information

Bar Code Discovery. Administrator's Guide

Bar Code Discovery. Administrator's Guide Bar Code Discovery Administrator's Guide September 2016 www.lexmark.com Contents 2 Contents Overview... 3 Optimizing bar code detection...4 Optimizing bar code detection...4 Configuring the application...5

More information

Terms of Use. Changes. General Use.

Terms of Use. Changes. General Use. Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED

More information

File and Data Management

File and Data Management IC-CAP 201301 January 2013 File and Data Management Agilent Technologies, Inc 2000-2013 3501 Stevens Creek Blvd, Santa Clara, CA 95052 USA No part of this documentation may be reproduced in any form or

More information

QuarkXPress Server Manager 8.0 ReadMe

QuarkXPress Server Manager 8.0 ReadMe QuarkXPress Server Manager 8.0 ReadMe CONTENTS Contents QuarkXPress Server Manager 8.0 ReadMe...3 What's New in QuarkXPress Server Manager 8...4 Deprecated features, new stubs, and deploying SDK classes...4

More information

Novell Audit 2.0 Administration Guide. novdocx (ENU) 10 August Novell Audit ADMINISTRATION GUIDE.

Novell Audit 2.0 Administration Guide. novdocx (ENU) 10 August Novell Audit ADMINISTRATION GUIDE. Novell Audit 2.0 Administration Guide Novell Audit 2.0 July 14, 2006 ADMINISTRATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or

More information

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Service Data Objects (SDO) DFED Sample Application README Copyright IBM Corporation, 2012, 2013 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract

More information

XEP-0099: IQ Query Action Protocol

XEP-0099: IQ Query Action Protocol XEP-0099: IQ Query Action Protocol Iain Shigeoka mailto:iain@jivesoftware.com xmpp:smirk@jabber.com 2018-11-03 Version 0.1.1 Status Type Short Name Deferred Standards Track Not yet assigned Standardizes

More information

Packaging Preflight for Adobe Illustrator User Manual

Packaging Preflight for Adobe Illustrator User Manual Packaging Preflight for Adobe Illustrator 16.1 User Manual 07-2017 Packaging Preflight for Adobe Illustrator Contents 1. Copyright Notice...3 1.1 Third party license information... 4 2. About Packaging

More information

User Guide. Calibrated Software, Inc.

User Guide. Calibrated Software, Inc. User Guide Calibrated Software, Inc. Copyright 2008 Calibrated Software, Inc. All rights reserved. www.calibratedsoftware.com Your rights to the software are governed by the accompanying Software License

More information

Installing the Shrew Soft VPN Client

Installing the Shrew Soft VPN Client Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program )

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program ) PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Application Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT

More information

AhnLab Software License Agreement

AhnLab Software License Agreement AhnLab Software License Agreement IMPORTANT - READ CAREFULLY BEFORE USING THE SOFTWARE. This AhnLab Software License Agreement (this "Agreement") is a legal agreement by and between you and AhnLab, Inc.

More information

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program )

PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program ) PRODUCT SPECIFIC LICENSE TERMS Sybase Enterprise Portal Version 5 Enterprise Edition ( Program ) IN ADDITION TO THE LICENSE TERMS SET OUT IN THE SYBASE LICENSE AGREEMENT, THE FOLLOWING ADDITIONAL OR DIFFERENT

More information

Distributed Intelligent Capture. Integration Guide

Distributed Intelligent Capture. Integration Guide Distributed Intelligent Capture Integration Guide July 2014 www.lexmark.com Contents 2 Contents Overview... 3 Getting started... 4 Understanding the integration process... 4 Configuring the engines...

More information

RELEASE NOTES. Trimble ecognition Suite. Version July

RELEASE NOTES. Trimble ecognition Suite. Version July RELEASE NOTES Trimble ecognition Suite Version 9.2.1 July.2016 www.ecognition.com 1 Trimble Documentation ecognition 9.2 Release Notes Imprint and Version Document Version 9.2.1 Copyright 2016 Trimble

More information

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS

MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS MERIDIANSOUNDINGBOARD.COM TERMS AND CONDITIONS Introduction This document sets forth the terms and conditions ("Terms and Conditions") governing your use of the MeridianHealth.com Web site ("Web Site")

More information

MarkLogic Server. Common Criteria Evaluated Configuration Guide. MarkLogic 6 September, 2012

MarkLogic Server. Common Criteria Evaluated Configuration Guide. MarkLogic 6 September, 2012 Common Criteria Evaluated Configuration Guide 1 MarkLogic 6 September, 2012 Last Revised: 6.0-4, July, 2013 Copyright 2013 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents

More information

iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP)

iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP) iwrite technical manual iwrite authors and contributors Revision: 0.00 (Draft/WIP) June 11, 2015 Chapter 1 Files This section describes the files iwrite utilizes. 1.1 report files An iwrite report consists

More information

TERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT

TERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT TERMS & CONDITIONS www.karnevalkings.com (the "Site") is a website and online service owned and operated by the ViisTek Media group of companies (collectively known as "Karnevalkings.com", "we," "group",

More information

Cover Page. Site Studio Tutorial Setup Guide 10g Release 3 ( )

Cover Page. Site Studio Tutorial Setup Guide 10g Release 3 ( ) Cover Page Site Studio Tutorial Setup Guide 10g Release 3 (10.1.3.3.0) March 2007 Site Studio Tutorial Setup Guide, 10g Release 3 (10.1.3.3.0) Copyright 2007, Oracle. All rights reserved. Contributing

More information

Trimble. ecognition. Release Notes

Trimble. ecognition. Release Notes Trimble ecognition Release Notes Trimble Documentation: ecognition 9.0 Release Notes Imprint and Version Document Version 9.0 Copyright 2014 Trimble Germany GmbH. All rights reserved. This document may

More information

Dynamic VDP for Adobe Illustrator 18. User Guide

Dynamic VDP for Adobe Illustrator 18. User Guide Dynamic VDP for Adobe Illustrator 18 User Guide 09-2018 Contents 1. Copyright Notice...4 1.1. Third party license information... 5 2. Dynamic VDP Overview...17 3. How to convert a static design to variable

More information

ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions

ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions ColdFusion Builder 3.2 Third Party Software Notices and/or Additional Terms and Conditions Date Generated: 2018/09/10 Apache Tomcat ID: 306 Apache Foundation and Contributors This product includes software

More information

JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference

JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference JP1 Version 11 JP1/Automatic Job Management System 3 - Definition Assistant Description, Operator's Guide and Reference 3021-3-B25-20(E) Notices Relevant program products For details about the applicable

More information

INCLUDING MEDICAL ADVICE DISCLAIMER

INCLUDING MEDICAL ADVICE DISCLAIMER Jordan s Guardian Angels Terms and Conditions of Use INCLUDING MEDICAL ADVICE DISCLAIMER Your use of this website and its content constitutes your agreement to be bound by these terms and conditions of

More information

ArtPro User Guide

ArtPro User Guide 16.1 User Guide 01-2018 Contents 1. Introduction...6 1.1 Copyright Notice...6 1.1.1 Third party license information... 7 1.2 Installation...18 1.3 1.4 1.5 1.6 1.7 Licensing...18 What's New in 16.1.1...

More information

Health Checking. Health Checking. Feature Description

Health Checking. Health Checking. Feature Description Feature Description VERSION: 1.0 UPDATED: JULY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information