Algorithms and protocols
|
|
- Nicholas Nichols
- 5 years ago
- Views:
Transcription
1 : Chapter 11 by David G. Messerschmitt : Algorithms and protocols by David G. Messerschmitt 1
2 Algorithm Specified sequence of steps that accomplish a designated task in a finite number of steps Representation: simple algorithm: flowchart complicated algorithm: program 3 Example: one turn at monopoly Start turn Throw dice Move token number of squares indicated on dice Move to jail square Yes Land on go to jail? No Finish turn Do not move; follow policies for square (like pay rent ) 4 2
3 Algorithm building blocks Start Start Start Decision Programming languages support these three building blocks Test Finish Finish Finish Sequence Selection Loop 5 Protocol Distributed algorithm realized by two or more modules to coordinate their actions or accomplish some shared task Module interoperability requires a protocol Prescribed order of method invocations Part of interface documentation 6 3
4 Monopoly players protocol Player 1 Player 2 One-turn algorithm This is a protocol interaction diagram Time 7 Application and infrastructure The application defines its own application-level protocols Internally, the network uses protocols to implement the services it provides 8 4
5 Three simple protocols One-way message: send-receive Two-way interaction: request-response Push: publish-subscribe 9 Client Server send receive request response subscribe responses Time 10 5
6 Example: HTTP ❶ User activates URL ❷ HTTP request HTTP client (browser) HTTP server ❹ Browser displays document (if HTML) or invokes helper application ❸ HTTP response (embedded document) HTML documents 11 Example: Stock trading Customer Customer wants to purchase 10 shares of MSFT if price is below $90 StockTrader What is application protocol? 12 6
7 : Locating things by David G. Messerschmitt Three ways of locating things Name Joe Bloe Address 1299 Hearst St, Berkeley, CA Reference Postmaster of Berkeley CA 14 7
8 Name Symbolic (character string) representation Easy for people to remember or guess Identifies but does not locate directly Distinction important for mobile entities Not unique: entities can have more than one name (called aliases) 15 Hierarchical names Hierarchy makes names easier to remember or guess Host domain names: info.sims.berkeley.edu designates administrative hierarchy File names: c:\my Documents\Docs\Resume.doc designates folder hierarchy 16 8
9 Address Route or path to entity is directly specified, or can be inferred Independent of who or what is locating entity Topological specification 17 Example Path from to is (1,2,2,2,1,1,1,1) Not an address, because it depends on starting point 18 9
10 Example (1,1) (1,2) (1,3) (1,4) (1,4) (2,1) (2,2) (2,3) (2,4) (2,5) Address of is (2,5) Route from can be inferred 19 Reference Abstract representation of an entity Interaction is with representation infrastructure arranges redirection to actual entity especially appropriate for things that move 20 10
11 Client Reference Server address 21 Name services 1. name 3. interaction 2. address or reference Name service 22 11
Software Development Pseudocode
Software Development Pseudocode Software Development: Pseudocode Task 1 Task 1 Students are graded out of 10 for assignments. A+ 10 A 9 B+ 8 B 7 C+ 6 C 5 D+ 4 D 3 E+ 2 E 1 Fail 0 This is the current pseudocode
More informationSystem Requirements... 1 Preparation for Installation... 2 Installation... 2 License Management... 4 Remarks... 7
ArtfulBits Push Message for Microsoft SharePoint Install Guide System Requirements... 1 Preparation for Installation... 2 Installation... 2 License Management... 4 Remarks... 7 System Requirements Operating
More informationALTIRIS Console 6.5 Overview
ALTIRIS Console 6.5 Overview Document Version: 1.0 The information contained in the Altiris Knowledgebase is subject to the Terms of Use as outlined at http://www.altiris.com/legal/termsofuse.asp. History
More informationCDN. Product Description. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 03 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationThe convergence of network computing and telecommunications
The convergence of network computing and telecommunications David G. Messerschmitt University of California at Berkeley Copyright 1997, David G. Messerschmitt 3/5/97 1 Terminology Applications Services
More informationStandardization. Class announcements. Today s Class. Scope of a standard. Purpose of a standard? ISM 50 - Business Information Systems
ISM 50 - Business Information Systems Lecture 14 Instructors: Mary Doyle, Geoff Ryder UC Santa Cruz May 18, 2009 Class announcements Wednesday (May 20th) Assignment 4 due Messerschmitt Ch 18 (493-512)
More informationElectronic Payment Systems (1) E-cash
Electronic Payment Systems (1) Payment systems based on direct payment between customer and merchant. a) Paying in cash. b) Using a check. c) Using a credit card. Lecture 24, page 1 E-cash The principle
More informationAct! Marketing Automation
Act! Marketing Automation A Guide to Getting Started Helping your business grow with marketing automation Act! Marketing Automation Getting Started Guide 2 Contents Page Page 8 Page 10 Page 11 Page 11
More informationRQs + PEs: More Servlets
RQs + PEs: More Servlets Advanced Topics in Java Khalid Azim Mughal khalid@ii.uib.no http://www.ii.uib.no/~khalid/atij/ Version date: 2006-09-04 ATIJ 1/7 REVIEW QUESTIONS - More Servlets 1. Explain the
More informationAPPLICATION ADMINISTRATOR GUIDE
APPLICATION ADMINISTRATOR GUIDE BrightSign Network Enterprise Edition Version 3.5 BrightSign, LLC. 16795 Lark Ave., Suite 200 Los Gatos, CA 95032 408-852-9263 www.brightsign.biz TABLE OF CONTENTS Introduction
More informationCisco Service Control Online Advertising Solution Guide: Behavioral. Profile Creation Using Traffic Mirroring, Release 4.0.x
CISCO SERVICE CONTROL SOLUTION GUIDE Cisco Service Control Online Advertising Solution Guide: Behavioral Profile Creation Using Traffic Mirroring, Release 4.0.x 1 Overview 2 Configuring Traffic Mirroring
More informationModel-View-Control Pattern for User Interactive Systems
Model-View-Control Pattern for User Interactive Systems In various forms and guises J. Scott Hawker p. 1 Contents Key Model-View-Control (MVC) concepts Web MVC UI Controller in MVC GRASP Application Controller
More informationEntrust Cloud Enterprise. Enrollment Guide
Entrust Cloud Enterprise Enrollment Guide Entrust Cloud Enterprise Enrollment Guide Document issue: 1.0 Copyright 2016 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of
More informationWriting Linear Functions
2- Writing Linear Functions Objectives Use slope-intercept form and point-slope form to write linear functions. Write linear functions to solve problems. Vocabulary Point-slope form Why learn this? When
More informationInternet+ Mobile Developer Starter Guide. Version 1.0
Internet+ Mobile Developer Starter Guide Version 1.0 1 Table of contents Table of contents... 2 What is it... 3 Overview... 3 Buyers Advantages... 3 Merchants Advantages... 3 How does it work?... 4 Overview...
More informationCS155b: E-Commerce. Lecture 8: February 1, TPSs and Content-Distribution Businesses
CS155b: E-Commerce Lecture 8: February 1, 2001 TPSs and Content-Distribution Businesses Security Technologies Encryption Symmetric Key Public Key Signature PKI Rights Management Time stamping Secure Containers
More informationIntroduction to Web Services & SOA
References: Web Services, A Technical Introduction, Deitel & Deitel Building Scalable and High Performance Java Web Applications, Barish Web Service Definition The term "Web Services" can be confusing.
More informationGeneXus for Smart Devices course - Architecture of Smart Device Applications
GeneXus for Smart Devices course - Architecture of Smart Device Applications The problem to solve is the construction of a backend for a real estate office, with a web section and another section for smart
More informationModern Systems Analysis and Design Sixth Edition. Jeffrey A. Hoffer Joey F. George Joseph S. Valacich
Modern Systems Analysis and Design Sixth Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Designing Distributed and Internet Systems Learning Objectives Define the key terms client/server architecture,
More informationSelling items that your customers can download
Selling items that your customers can download A users guide to using Reason8 to sell items that can be automatically downloaded. 1 19 th October 2005 Background If you are planning to sell items that
More informationOracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On
Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On Configuration Guide E84772-01 Last Update: Monday, October 09, 2017 Oracle Utilities Opower Energy Efficiency Web Portal -
More informationEnhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation
Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of
More informationNavigating the Pros and Cons of Structured Cabling vs. Top of Rack in the Data Center
Navigating the Pros and Cons of Structured Cabling vs. Top of Rack in the Data Center Executive Summary There is no single end-all cabling configuration for every data center, and CIOs, data center professionals
More informationUsing the Control Panel
Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox
More informationGetting Started with Online Payments
Getting Started with Online Payments Getting Started... 2 Steps for the Online Payment Process... 2 Step 1 Customer Visits Web Site... 2 Step 2 Redirected to Payment Center... 2 Step 3 Status Determined...
More information1. CyberCIEGE Advanced VPNs
1. CyberCIEGE Advanced VPNs CyberCIEGE is an information assurance (IA) training tool that illustrates computer and network security principles through simulation and resource management trade-offs. CyberCIEGE
More informationMicrosoft Expression Web Basics of Creating a Web Site
Information Technology Department Pyle Center 1204 Wilmington College Wilmington, OH 45177 (800) 341-9318, ext. 459 helpdesk@wilmington.edu Microsoft Expression Web Basics of Creating a Web Site The first
More informationIntroduction to Web Services & SOA
References: Web Services, A Technical Introduction, Deitel & Deitel Building Scalable and High Performance Java Web Applications, Barish Service-Oriented Programming (SOP) SOP A programming paradigm that
More informationIntegrated Security Context Management of Web Components and Services in Federated Identity Environments
Integrated Security Context Management of Web Components and Services in Federated Identity Environments Apurva Kumar IBM India Research Lab. 4, Block C Vasant Kunj Institutional Area, New Delhi, India-110070
More informationChapter 3. The Basics of Networking
Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles
More informationDomain Analysis. SWEN-261 Introduction to Software Engineering. Department of Software Engineering Rochester Institute of Technology.
Domain Analysis Die 2 played with Monopoly Game played on Board Count 2 takes turn defines a using location on SWEN-261 Introduction to Software Engineering Player 2..8 represents Piece Character 0..8
More information- Intranet, extranet, internet
Final Exam Review The final exam will cover all the material in the course with an emphasis on topicscovered in the last half of the class. Please review all topics on the midterm review guide in addition
More informationPrinciples of Software Construction: Objects, Design, and Concurrency
Principles of Software Construction: Objects, Design, and Concurrency Designing (sub-) systems Responsibility assignment Charlie Garrod Michael Hilton School of Computer Science 1 Administrivia Reading
More informationComplex or Simple Event Processing by David Luckham
Complex or Simple Event Processing by David Luckham Some people, I m told, get scared when they hear the word complex, as in Complex Event Processing (CEP). They want to hear simple event processing or
More informationAPPLICATION ADMINISTRATOR GUIDE
APPLICATION ADMINISTRATOR GUIDE BrightSign Network Enterprise Edition Version 4.2 BrightSign, LLC. 16780 Lark Ave., Suite B Los Gatos, CA 95032 408-852-9263 www.brightsign.biz TABLE OF CONTENTS Introduction
More informationOXE Free desktop Guide
OXE Free desktop Guide The below telephone screen examples are for a 4038/4068 handset, the Free Desktop IP- Touch Interface works in the same manner with a 4028 extension. The only difference is that
More informationSmart Bulk SMS & Voice SMS Marketing Script with 2-Way Messaging. Quick-Start Manual
Mobiketa Smart Bulk SMS & Voice SMS Marketing Script with 2-Way Messaging Quick-Start Manual Overview Mobiketa Is a full-featured Bulk SMS and Voice SMS marketing script that gives you control over your
More informationManipulating Web Application Interfaces a New Approach to Input Validation Testing. AppSec DC Nov 13, The OWASP Foundation
Manipulating Web Application Interfaces a New Approach to Input Validation Testing Felipe Moreno-Strauch AppSec DC Nov 13, 2009 felipe@wobot.org http://groundspeed.wobot.org The Foundation http://www.owasp.org
More informationInternet programming Lab. Lecturer Mariam A. Salih
Internet programming Lab. Lecturer Mariam A. Salih The Internet : The Internet is a worldwide network of computer systems through which information can be easily shared. Browsers : To view information
More informationHOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE
HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HIFIS Development Team May 16, 2014 Contents INTRODUCTION... 2 HIFIS 4 SYSTEM DESIGN... 3
More informationCOURSE 9 DESIGN PATTERNS
COURSE 9 DESIGN PATTERNS CONTENT Applications split on levels J2EE Design Patterns APPLICATION SERVERS In the 90 s, systems should be client-server Today, enterprise applications use the multi-tier model
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 3 Processes
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 3 Processes Context Switching Processor context: The minimal collection of values stored in the
More informationCommunicator. Conversion Tracking Implementation Guide February Conversion Tracking Implementation Guide
Conversion Tracking Implementation Guide Communicator Conversion Tracking Implementation Guide Version 1.0 A guide to implementing conversion tracking on your website covering a standard setup as well
More informationSoftware Installation Manual
Software Installation Manual Page 1 of 5 Hardware Requirements The ProxnetPro application is installed on a single, dedicated* Host PC, that will then provide Web Server access to any number of connected
More information(Python) Chapter 3: Repetition
(Python) Chapter 3: Repetition 3.1 while loop Motivation Using our current set of tools, repeating a simple statement many times is tedious. The only item we can currently repeat easily is printing the
More informationLarge-Scale Web Applications
Large-Scale Web Applications Mendel Rosenblum Web Application Architecture Web Browser Web Server / Application server Storage System HTTP Internet CS142 Lecture Notes - Intro LAN 2 Large-Scale: Scale-Out
More informationÖzgür ZEYDAN (PhD.)
Özgür ZEYDAN (PhD.) http://cevre.beun.edu.tr/zeydan/ Computer Network A group of computer systems and other computing hardware devices that are linked together through communication channels. Purpose:
More informationTHE LAUNCHER. Patcher, updater, launcher for Unity. Documentation file. - assetstore.unity.com/publishers/19358
THE LAUNCHER Patcher, updater, launcher for Unity. Documentation file Index: 1.What does the Launcher do? 2.Workflow 3.How to upload a build? 4.How to configure the launcher client? 1.What does the Launcher
More informationOrgPublisher 10 Architecture Overview
OrgPublisher 10 Architecture Overview Table of Contents OrgPublisher 10 Architecture Overview Table of Contents OrgPublisher Introduction... 3 Data Sources... 4 OrgPublisher Users... 4... 4 Client PC Requirements...
More informationUser Guide. Administration Portal. Release 6.9. For Customer Administrators
User Guide Administration Portal Release 6.9 For Customer Administrators Published: August 7, 2015 Table of Contents Table of Contents Introduction... 1 Contents of this Guide... 1 Intended Audience...
More informationObject Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 04 Date 2017-12-20 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationJ2EE Development. Course Detail: Audience. Duration. Course Abstract. Course Objectives. Course Topics. Class Format.
J2EE Development Detail: Audience www.peaksolutions.com/ittraining Java developers, web page designers and other professionals that will be designing, developing and implementing web applications using
More informationU of S Course Tools. Course Tools Basics and Building Content For Instructors
U of S Course Tools Course Tools Basics and Building Content For Instructors Fall, 2015 Background STEP U of S Course Tools The basic template for all courses contains basic tools, materials and options
More informationP2_L12 Web Security Page 1
P2_L12 Web Security Page 1 Reference: Computer Security by Stallings and Brown, Chapter (not specified) The web is an extension of our computing environment, because most of our daily tasks involve interaction
More informationGetting Started. January 2012 EAC Red Square Support
Getting Started January 2012 EAC Red Square Support 1300 137 161 Welcome to the Getting Started Guide This guide is designed to give you a brief overview of all the features available in the new Red Square
More informationInstructions for downloading paid media from BSO.org and playing paid media in the BSO Media Center Revised as of 12/23/2011
Instructions for downloading paid media from BSO.org and playing paid media in the BSO Media Center Revised as of 12/23/2011 DOWNLOADING MEDIA 1. Purchase Media Once you have completed your purchase, you
More informationChapter 7. The Application Layer. DNS The Domain Name System. DNS Resource Records. The DNS Name Space Resource Records Name Servers
DNS The Domain Name System Chapter 7 The Application Layer The DNS Name Space Resource Records Name Servers The DNS Name Space DNS Resource Records A portion of the Internet domain name space. (1) MX:
More informationPUSH services. Document revision 1.0 Date of Issue: 04 October 2018 Date of revision: 04 October Nick Palmer.
PUSH services Document revision 1.0 Date of Issue: 04 October 2018 Date of revision: 04 October 2018 Nick Palmer Product Manager Page 1 of 8 Table of Contents 1. Purpose... 3 2. Glossary of Terms... 3
More informationArcGIS Server and Portal for ArcGIS An Introduction to Security
ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context
More informationReusing and Sharing Data
Sitecore CMS 6.4 Reusing and Sharing Data Rev: 2013-09-13 Sitecore CMS 6.4 Reusing and Sharing Data Tips and Techniques for Developers Table of Contents Chapter 1 Reusing and Sharing Data... 3 1.1 Sharing
More informationPrivacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras
Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 12 Tutorial 3 Part 1 Twitter API In this tutorial, we will learn
More informationReusing and Sharing Data
Sitecore CMS 7.0 Reusing and Sharing Data Rev: 2013-09-13 Sitecore CMS 7.0 Reusing and Sharing Data Tips and Techniques for Developers Table of Contents Chapter 1 Reusing and Sharing Data... 3 1.1 Sharing
More informationHow Subscribers & Members Can Book Online
Bundaberg players Incorporated Subscribers and Members can now book online from our website www.theplayhousetheatre.org.au HOW: To book online you simply need to SIGN ON using your email address and a
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 2: More layering and the end-to-end principle. Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 Today in
More informationCommunity-of-Interest Multicast Cache Loading
Community-of-Interest Multicast Cache Loading Joe Touch Large-Scale Active Middleware Project USC/ISI Computer Networks Division Large-Scale Active Middleware (LSAM) September 3, 1997 1 of 27 ISI Web Research
More informationArchitecture. Outline. Review - Alibris. Announcements. What is Architecture? TIM 50 - Business Information Systems. How do you architect a solution?
Outline TIM 50 - Business Information Systems Lecture 10 Instructor: Terry Allen UC Santa Cruz 10/28/2011 Announcements Review Alibris Case Study Information Technology Student Presentations -Server Architecture
More informationSoftware as a Service (SaaS) Quick Start
Software as a Service (SaaS) Quick Start ** For Amazon Web Services Marketplace Sellers and Licensors only** v 1.1 Last updated March 1, 2018 The purpose of this document is to accelerate integrations
More informationAccessing Insurance Portal/PAS Job Aid Single Sign-On
Accessing Insurance Portal/PAS Job Aid Single Sign-On Getting Started with Insurance Portal and PAS - Create Desktop Shortcut and Single Sign-On Password Getting Started To Get Started with Insurance Portal
More informationIntel Authoring Tools for UPnP* Technologies
Intel Authoring Tools for UPnP* Technologies (Version 1.00, 05-07-2003) INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,
More informationR&D White Paper WHP 018. The DVB MHP Internet Access profile. Research & Development BRITISH BROADCASTING CORPORATION. January J.C.
R&D White Paper WHP 018 January 2002 The DVB MHP Internet Access profile J.C. Newell Research & Development BRITISH BROADCASTING CORPORATION BBC Research & Development White Paper WHP 018 Title J.C. Newell
More informationModel-View-Controller Patterns and Frameworks. MVC Context
Model-View-Controller Patterns and Frameworks MVC Context The purpose of many computer systems is to retrieve data from a data store and display it for the user. The user may then modify the data in keeping
More informationSEEM3490 Information Systems Management Lecture 03 Web Information System II
SEEM3490 Information Systems Management Lecture 03 Web Information System II Browsers! Today, we have many browsers!! Internet Explorer! Firefox! Safari! Opera! Chrome! More browsers means more difficult
More informationCisco Connected Mobile Experiences REST API Getting Started Guide, Release 10.2
Cisco Connected Mobile Experiences REST API Getting Started Guide, Release 10.2 First Published: August 12, 2016 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706
More informationGrandstream Networks, Inc. Captive Portal Authentication via Twitter
Grandstream Networks, Inc. Table of Content SUPPORTED DEVICES... 4 INTRODUCTION... 5 CAPTIVE PORTAL SETTINGS... 6 Policy Configuration Page... 6 Landing Page Redirection... 8 Pre-Authentication Rules...
More informationInformation Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1
Information Security message M one-way hash fingerprint f = H(M) 4/19/2006 Information Security 1 Outline and Reading Digital signatures Definition RSA signature and verification One-way hash functions
More informationAPPENDIX 1 EAI TOOLS
87 APPENDIX 1 EAI TOOLS A 1.1 WEBMETHODS COMPONENTS A 1.1.1 Integration Server The Integration Server Administrator is the utility we use to accomplish administrative tasks. It is used to monitor server
More informationAmazon WorkSpaces Application Manager. Administration Guide
Amazon WorkSpaces Application Manager Administration Guide Manager: Administration Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade
More informationWebSphere Proxy Server: On Demand Configuration and Cross-Cell Routing
Chapter 27 WebSphere Proxy Server: On Demand Configuration and Cross-Cell Routing WebSphere Proxy Server is a new type of server supported in WebSphere Application Server Network Deployment (ND) package
More informationIBM C IBM WebSphere Commerce V7 (FEP 7) Application Development. Download Full Version :
IBM C8010-725 IBM WebSphere Commerce V7 (FEP 7) Application Development Download Full Version : http://killexams.com/pass4sure/exam-detail/c8010-725 Answer: B QUESTION: 158 An application developer customized
More informationBusiness Process Document Fundamentals: Recognizing Universal Navigation Elements
Department Responsibility/Role File Name Version Document Generation Date 11/7/2007 Date Modified 11/7/2007 Last Changed by Status CS 8.9 Fundamentals Recognizing Universal Navigation Elements_BUSPROC.doc
More informationEllipse Web Services Overview
Ellipse Web Services Overview Ellipse Web Services Overview Contents Ellipse Web Services Overview 2 Commercial In Confidence 3 Introduction 4 Purpose 4 Scope 4 References 4 Definitions 4 Background 5
More informationVirtalinx Real Estate (VRE) Experience a Personal Presence at Any Place on the Globe!
Virtalinx Real Estate (VRE) Experience a Personal Presence at Any Place on the Globe! Virtalinx USER GUIDE Version 2.5.1 2014 Copyrights Reserved Virtalinx Contents 1. Getting Started... 4 1.1 Overview...
More informationOracle Utilities Opower Solution Extension Partner SSO
Oracle Utilities Opower Solution Extension Partner SSO Integration Guide E84763-01 Last Updated: Friday, January 05, 2018 Oracle Utilities Opower Solution Extension Partner SSO Integration Guide Copyright
More informationOutline. TIM 50 - Business Information Systems. Student Presentation More on Layering Student Presentation Components, Suppliers.
TIM 50 - Business Information Systems Lecture 13 Instructor: Terry Allen UC Santa Cruz 11/7/2011 Outline Announcements Modularity and Layering (continued) Student Presentation More on Layering Student
More informationTIM 50 - Business Information Systems
TIM 50 - Business Information Systems Lecture 13 Instructor: Terry Allen UC Santa Cruz 11/7/2011 Outline Announcements Modularity and Layering (continued) Student Presentation More on Layering Student
More informationAdvanced Lectures on knowledge Engineering
TI-25 Advanced Lectures on knowledge Engineering Client-Server & Distributed Objects Platform Department of Information & Computer Sciences, Saitama University B.H. Far (far@cit.ics.saitama-u.ac.jp) http://www.cit.ics.saitama-u.ac.jp/~far/lectures/ke2/ke2-06/
More informationExtensible standards and impact on technology switching costs. Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013
Extensible standards and impact on technology switching costs Mark Pecen, Sr. VP, BlackBerry Research and Advanced Technology September 2013 Agenda Why standardize? Impact of standardization on adoption
More informationDeployment Scenarios for Standalone Content Engines
CHAPTER 3 Deployment Scenarios for Standalone Content Engines This chapter introduces some sample scenarios for deploying standalone Content Engines in enterprise and service provider environments. This
More informationIntroduction to Software Engineering: Tools and Environments. Session 5. Oded Lachish
Introduction to Software Engineering: Tools and Environments Session 5 Oded Lachish Room: Mal 405 Visiting Hours: Wednesday 17:00 to 20:00 Email: oded@dcs.bbk.ac.uk Module URL: http://www.dcs.bbk.ac.uk/~oded/tools2012-2013/web/tools2012-2013.html
More information*:96 Overheads. Part 9: WebDAV, RSS, SOAP (Web applications), Bittorrent. HTTP Extensions for Distributed Authoring
Compendium eight page 179 *:96 Overheads Part 9:, RSS, SOAP (Web applications), Bittorrent More about this course about Internet application protocols can be found at URL: http://dsv.su.se/jpalme/internet-course/int-app-protkurs.html
More informationLinkedIn Sales Navigator for MS Dynamics 2016 and 365 Installation Guide
LinkedIn Sales Navigator for MS Dynamics 2016 and 365 Installation Guide The installation process will take less than 30 minutes The LinkedIn Sales Navigator for Microsoft Dynamics application (widget)
More informationChapter 2 Architectures. Software Architectures
Chapter 2 Architectures Software architectures of distributed systems System architectures of distributed systems 1 Software Architectures Software architecture describes how the software components are
More informationWebshop Plus! v Pablo Software Solutions DB Technosystems
Webshop Plus! v.2.0 2009 Pablo Software Solutions http://www.wysiwygwebbuilder.com 2009 DB Technosystems http://www.dbtechnosystems.com Webshos Plus! V.2. is an evolution of the original webshop script
More informationCS 451 Software Engineering
CS 451 Software Engineering Yuanfang Cai Room 104, University Crossings 215.895.0298 yfcai@cs.drexel.edu 1 Elaboration 2 Elaboration: Building the Analysis Model An analysis model provides a description
More informationMVC :: Understanding Controllers, Controller Actions, and Action Results
MVC :: Understanding Controllers, Controller Actions, and Action Results This tutorial explores the topic of ASP.NET MVC controllers, controller actions, and action results. After you complete this tutorial,
More informationUSER GUIDE. LitExtension: YAHOO STORE to Magento Migration Tool
USER GUIDE LitExtension: YAHOO STORE to Magento Migration Tool The essence of LitExtension products focuses on their friendliness to users, which means that every shopping cart owners, even who has little
More informationMoose for Java Enterprise Application
Moose for Java Enterprise Application Perin Fabrizio SCG - Software Composition Group Institut für Informatik und Angewandte Mathematik University of Bern, Switzerland 18/03/10 Revision History Date Ver.
More informationAdvanced Features of SmartGWT framework. Ladislav Mačkala IT director, Podsjetnik d.o.o
Advanced Features of SmartGWT framework Ladislav Mačkala IT director, Podsjetnik d.o.o About me 15+ years of experience in Java development and relational database design and implementation Holding B.Sc.
More informationDesign. The Aviators. Charles Chavez Dillon Postage Mark Malone. Version 3.0 March 13, 2014 CS 486
Design Version 3.0 March 13, 2014 CS 486 The Aviators Charles Chavez Dillon Postage Mark Malone Contents Introduction... 2 System Assumption... 3 Business Model... 3 Architectural Overview... 4 Module
More informationCANVAS BY INSTRUCTURE IOS GUIDE
CANVAS BY INSTRUCTURE IOS GUIDE This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License Table of Contents All Users...5 What do Canvas text (SMS) message notifications
More information