EMC ViPR. Controller REST API Developer Guide. Version
|
|
- Russell Gaines
- 6 years ago
- Views:
Transcription
1 EMC ViPR Version Controller REST API Developer Gide
2 Copyright EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate as of its pblication date. The information is sbject to change withot notice. The information in this pblication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this pblication, and specifically disclaims implied warranties of merchantability or fitness for a particlar prpose. Use, copying, and distribtion of any EMC software described in this pblication reqires an applicable software license. EMC², EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other contries. All other trademarks sed herein are the property of their respective owners. For the most p-to-date reglatory docment for yor prodct line, go to EMC Online Spport ( For docmentation on EMC Data Domain prodcts, go to the EMC Data Domain Spport Portal ( EMC Corporation Hopkinton, Massachsetts In North America EMC ViPR Controller REST API Developer Gide
3 CONTENTS Chapter 1 Getting Started with the ViPR Controller REST API 7 Welcome to the ViPR Controller REST API... 8 ViPR REST API access...8 API Ports... 8 Identifying resorces...9 Controller API athentication overview... 9 Bilding an API sper ser Athentication and cookies...11 Athentication redirects...12 Logot...15 Whoami Proxyser Using proxyser to rn a controller REST API script Destroying a proxy token...17 Chapter 2 Setting Up a Single Tenant Environment 19 Single Tenancy vs Mltitenancy...20 Adding sers to the provider tenant with athentication providers Adding an athentication provider Changing the ser mapping in the provider tenant Assigning roles to a tenant...23 Chapter 3 Athorization 25 Athorization overview...26 Virtal data center roles Tenant roles ACLs...29 Virtal array and virtal pool ACLs Examples: Virtal array and virtal pool ACL APIs Project ACLs Examples: Project ACL APIs Examples: Changing a project's owner Chapter 4 ViPR REST API Resorces 35 ViPR services overview System resorces...38 System resorces: virtal array System resorces: virtal pool System resorces: networks and network systems API review: storage systems Tenant and project resorces Chapter 5 Setting Up a Mlti-tenant Environment 51 Prereqisites for creating mltiple tenants Example format: XML Configring mltiple tenants with the REST API...52 EMC ViPR Controller REST API Developer Gide 3
4 CONTENTS Chapter 6 Common Operations 59 Blk operations...60 Searching API resorces...61 Tagging API resorces Tracking asynchronos operations Deactivating, or decommissioning, resorces...63 Chapter 7 Setting Up a Virtal Data Center 65 Setting p the virtal data center...66 Example format: JSON Adding a storage system Registering network systems Registering a RecoverPoint protection system...68 Host Registering hosts and assigning initiators and IP interfaces...70 Setting p the virtal array Setting p the virtal pool Creating a project for a tenant Chapter 8 Managing File Systems and Snapshots 91 File system Creating a file system Expanding a file share Exporting a file system Unexporting a file share Deleting a file system export Deleting a file system Snapshot Creating a file system snapshot Exporting a file system snapshot Restoring a file system snapshot Unexporting a file system snapshot Deleting a file system snapshot Chapter 9 Managing Volmes 111 Create block volme Exporting a volme to a host Creating a block volme snapshot Deleting a block volme snapshot Unexporting a volme from a host Deleting a block volme Chapter 10 Managing Hosts 125 Host API Overview Adding and discovering a Windows host Windows clsters Adding and discovering a LINUX host Adding and discovering a vcenter Server Examples: Accessing vcenter resorces EMC ViPR Controller REST API Developer Gide
5 CONTENTS Chapter 11 Discovering Storage Systems 137 Registering and discovering physical storage systems in VNX Block and VMAX Registering and discovering a VPLEX Registering and discovering an Isilon storage system Registering and discovering a NetApp storage system Registering and discovering a VNX File storage system Chapter 12 User Interface Services 145 Catalog, Services, Orders, and Approvals Accessing UI services UI Services response formats Approval reqests Approving or rejecting Retrieving a list of pending approvals URL notification Asset options Upstream vales Execting a service Service catalog Service descriptors Field descriptors Field validation Type field vales Tracking orders Chapter 13 Error Codes and HTML Retrn Codes 161 Error code descriptions HTTP retrn codes EMC ViPR Controller REST API Developer Gide 5
6 CONTENTS 6 EMC ViPR Controller REST API Developer Gide
7 CHAPTER 1 Getting Started with the ViPR Controller REST API This chapter contains the following topics. Welcome to the ViPR Controller REST API... 8 ViPR REST API access...8 Identifying resorces...9 Controller API athentication overview... 9 Logot...15 Whoami Proxyser Getting Started with the ViPR Controller REST API 7
8 Getting Started with the ViPR Controller REST API Welcome to the ViPR Controller REST API ViPR REST API access The ViPR Controller REST API describes the programmatic interfaces that allow yo to create, read, pdate, and delete resorces in a ViPR data center. This gide shold be sed in conjnction with the ViPR REST API Reference, which contains a comprehensive description of all ViPR resorces, and the REST API calls that manage them. This gide assmes that yo have ViPR installed. For information on installing ViPR, refer to the EMC ViPR Installation and Configration Gide. The ViPR REST API is accessible sing any web browser or programming platform that can isse HTTP reqests. For example, after yo log into ViPR, yo cold type the following URL into a browser to retrieve the crrent ser's tenant. Reqest GET HTTP 200 "name": "Provider Tenant", "id": "rn:storageos:tenantorg:d61d9fa ef-85d3- c40b6de2c72f:", "link":, "href": "/tenants/ rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:" <ViPR_VIP> is the IP address or flly qalified domain name (FQDN) of the pblic virtal IP address of yor ViPR vapp. Port 4443 is the HTTP port sed for REST client access to many services on the ViPR virtal appliance. Other REST services are accessed throgh port 443. (See API Ports on page 8.) To isse POST, PUT, and DELETE HTTP reqests from a web browser, yo need browser plgins, sch as Internet Explorer's httpanalyzer. Most major browsers, sch as Firefox and Chrome, have a poster plgin that will allow yo to call HTTP commands directly from yor browser. Yo can also access the REST API sing scripting platforms sch as crl and perl. EMC also provides a Java client that wraps the ViPR Controller REST API calls in a set of Java classes. API Ports The ViPR Controller REST API ses two different ports. The following table show the services available on each of the two ports sed by the ViPR REST API. 8 EMC ViPR Controller REST API Developer Gide
9 Getting Started with the ViPR Controller REST API REST API Service Port Description ViPR API 4443 (HTTPS) Send ViPR REST API calls to port 4443 to manage resorces controlled by the following services: Block services (volmes, consistency grops, snapshots, exports) File services (file systems, snapshots) Compter services (clster, host, host discovery, ip interface, initiators, vcenter data center, vcenter Virtal Data Center services (block virtal pools, file virtal pools, networks, Storage systems, storage pools, and others.) Tenant and Project services ViPR UI Services API 443 (HTTPS) Send ViPR REST API calls to port 443 to manage the following resorces: Approvals Asset options Catalog Exection window Orders Schema Identifying resorces Each ViPR managed storage resorce is niqely identified by an ID that is generated by ViPR when it is created. A URN is a Uniform Resorce Name. The URN for a resorce is a niqe identifier for the resorce and cannot be changed. To find the URN of a particlar resorce, yo can se the GET resorce_url/blk API call, which gives yo a list of all the URNs of a given resorce class. Then yo can se the URNs obtained from this GET call and se them in the payload of the POST resorce_url/blk call to obtain more detailed information abot the specified resorces. See Blk Operations on page 60 for more information on how to retrieve URNs and details associated with a given resorce URN. Controller API athentication overview Before yo call any ViPR Controller REST API, yo mst sccessflly athenticate a ser. Clients pass secrity credentials to ViPR sing Basic HTTP Athentication. All API reqests are delivered over secre sockets (https). ViPR accepts secrity credentials, and ses them to athenticate the ser against LDAP or Active Directory. Yo can login to ViPR by calling this API: Identifying resorces 9
10 Getting Started with the ViPR Controller REST API Reqest GET ViPR challenges the ser with a dialog box. Enter the name of the ser in the User Name field, and the password of the ser in the Password field. The ViPR API is always accessed over secre sockets, so se HTTPS instead of HTTP. ViPR_VIP is the IP address or Flly Qalified Domain Name(FQDN) of the virtal IP of the ViPR vapp. Use port 4443 for logging in to ViPR with the API. With some application development platforms, yo can pass in ser credentials withot interacting with the ViPR login dialog box. For example, this crl command allows yo to log in as the root ser with a password of ChangeThis: crl <ViPR_VIP>:4443/login - "root:changethis" -k where <ViPR_VIP> is Pblic IP Address>. Note Bilding an API sper ser The <ViPR_VIP> token is sed throghot this docmentation. The ser with which yo log in to ViPR mst have access to the ViPR resorces yo want to manage. It may be convenient to bild a general-prpose sper ser with wide access to ViPR to rn yor API scripts. The root ser is a bilt-in ser in ViPR. It is commonly sed for initial ViPR setp, and can be sed by a Controller REST API application as a sper ser. The root ser has the following roles: SECURITY_ADMIN SYSTEM_ADMIN SYSTEM_MONITOR TENANT_ADMIN SYSTEM_AUDITOR In some data centers, the root ser may be rendered navailable by yor data center administrator. Yo can assign the roles sed by root to a standard LDAP ser by calling the following REST calls: PUT <ViPR_VIP>:4443/tenants/id/role-assignments PUT <ViPR_VIP>:4443/vdc/role-assignments To call either of these APIs, yo need to be athenticated as a ser with the SECURITY_ADMIN role. Athorization on page 25 contains a fll description of the ser roles yo can assign in a ViPR environment. Setting p a single tenant environment on page 19 contains a fll description of setting p ViPR sers and tenants, and assigning roles to those sers. 10 EMC ViPR Controller REST API Developer Gide
11 Getting Started with the ViPR Controller REST API Athentication and cookies Athentication with cookies Athentication withot cookies ViPR ses a token-based athentication system for all its pblic API calls. Once a ser is athenticated against ViPR, an athentication token is retrned and can be sed to athenticate the ser in sbseqent calls. Athentication tokens expire after eight hors or after two hors of idle time. Once expired, the token is internally destroyed and any attempt to call an API with that token retrns an HTTP 401 code. This code indicates yo need to login and athenticate again to obtain a new token. Yo can retrieve and se athentication tokens by: Reading the X-SDS-AUTH-TOKEN HTTP header from a sccessfl athentication reqest and copying that header into any sbseqent reqest. Saving the X-SDS-AUTH-TOKEN cookie from a sccessfl athentication reqest and sending that cookie along in sbseqent reqests. This example shows how to se athentication tokens by reading the X-SDS-AUTH-TOKEN http header from a sccessfl athentication reqest, copying that information into a cookie, then passing the cookie in a sbseqent reqest. The examples here are written in crl and formatted for readability. crl -L --location-trsted -k - "root:password" -c cookiefile -v In this example, yo specify the?sing-cookies=tre parameter to indicate that yo want to receive cookies in addition to the normal HTTP header. This crl command saves the athentication token to a file named cookiefile in the crrent directory. The next command passes the cookie with the athentication token throgh the -b switch, and retrns the ser's tenant information. crl -k -b cookiefile -v <?xml version="1.0" encoding="utf-8" standalone="yes"?> <tenant_info><name>provider Tenant</name> <link href="/tenants/ rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:" rel="self"/> <id>rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:</ id> </tenant_info> This example shows how to se athentication tokens by reading the X-SDS-AUTH-TOKEN http header from a sccessfl athentication reqest and copying that header into a sbseqent reqest. This example does not se cookies. The examples here are written in crl and formatted for readability. crl -L --location-trsted -k - "root:changeme" -v > GET /login HTTP/1.1 > Athorization: Basic cm9vddpdagfz2vnzq== > User-Agent: crl/ (i386-pc-win32) libcrl/ OpenSSL/ 0.9.8t zlib/1.2.5 > Host: :4443 > Accept: */* Athentication and cookies 11
12 Getting Started with the ViPR Controller REST API > < HTTP/ OK < Date: Te, 26 Nov :18:25 GMT < Content-Type: application/xml < Content-Length: 93 < Connection: keep-alive < X-SDS-AUTH-TOKEN: BAAcQ0xOd3g0MjRCUG4zT3NJdnNMlAvQTFYblNrPQMAUAQADTEzODU0OTQ4NzYzNTICAA EABQA5dXJ OnN0b3JhZ2VvczpUb2tlbjo2MjIxOTcyZS01NGUyLTRmNWQtYWZjOC1kMGE3ZDJmZDU3Mm U6AgAC0A8= < <?xml version="1.0" encoding="utf-8" standalone="yes"?> <loggedin> <ser>root</ser> </loggedin> * Connection #0 to host left intact * Closing connection #0 * SSLv3, TLS alert, Client hello (1): This exectes a GET on the /login resorce. The - option indicates the ser of basic athentication header. The ser designation mst be inclded in the reqest. Upon sccessfl athentication, a HTTP 200 code is retrned as well as the X-SDS-AUTH-TOKEN header containing the encoded token. The token can then be passed back in the next API call. Yo can copy the X-SDS-AUTH- TOKEN contents and pass it to the next reqest throgh crl's -H switch. crl -k -H "X-SDS-AUTH-TOKEN: BAAcOHZLaGF4MTl3eFhpY0czZ0tWUGhJV2xreUE4PQMAUAQADTEzODU0OTQ4NzYzNTICAA EABQA5dXJ OnN0b3JhZ2VvczpUb2tlbjpkYzc3ODU3Mi04NWRmLTQ2YjMtYjgwZi05YTdlNDFkY2QwZD g6agac0a8=" Athentication redirects <?xml version="1.0" encoding="utf-8" standalone="yes"?> <tenant_info> <name>provider Tenant</name>\ <link href="/tenants/ rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:" rel="self"/> <id>rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:</ id> </tenant_info> If yo try to access a ViPR REST resorce withot a valid token, ViPR will isse an HTTP 302 redirect code. An HTTP 302 redirect code incldes the URL of the athentication resorce, appended with a service= parameter that indicates where to be redirected after sccessfl athentication. It also incldes a signatre parameter to prevent forgery on the service= parameter. 12 EMC ViPR Controller REST API Developer Gide
13 Getting Started with the ViPR Controller REST API Handling athentication redirects withot sing cookies This example shows what to do when yo athenticate with an invalid secrity token or no token. This example does not se cookies. The examples in this section are written in crl. In this example, the initial reqest for the crrent ser's tenant retrns an HTTP 302 error. Note the following: The X-SDS-AUTH-TOKEN header has to be copied into each reqest. The X-SDS-AUTH-TOKEN header is a cstom HTTP header. If yo are not sing cookies, HTTP clients that se the atomatically follow redirects option need to disable it. Atomatically following redirects wold mean the client follows all HTTP 302 responses withot copying the cstom header. This reslts in an athentication failre. Procedre 1. Reqest the crrent ser's tenant. Reqest crl -k "<ViPR_VIP>:4443/tenant" -v GET /tenants HTTP/1.1 User-Agent: crl/ (i386-pc-win32) libcrl/ OpenSSL/ 0.9.8t zlib/1.2.5 Host: :4443 Accept: */* HTTP/ Fond Date: Wed, 27 Nov :30:13 GMT Content-Length: 0 Connection: keep-alive Location: <ViPR_VIP>/login?service=LocationString 2. Perform a GET against the location in the response body. Reqest crl -k "<ViPR_VIP>:4443/login?service=LocationString -v HTTP/ Unathorized WWW-Athenticate: basic realm="vipr" 3. Present basic athentication credentials to the URL retrned in step 1. Reqest crl -k "<ViPR_VIP>:4443/login?service=LocationString -v - "root:changeme" On sccessfl athentication, yo see another 302 code, this time redirecting yo to the original service. The athentication token is also in the HTTP header or cookie (depending on whether?sing-cookies=tre appeared in the original reqest). GET /login?service=locationstring HTTP/1.1 > Athorization: Basic cm9vddpdagfz2vnzq== > User-Agent: crl/ (i386-pc-win32) libcrl/ OpenSSL/ 0.9.8t zlib/1.2.5 > Host: :4443 > Accept: */* > < HTTP/ Fond Athentication redirects 13
14 Getting Started with the ViPR Controller REST API Athentication redirects sing cookies < Date: Wed, 27 Nov :53:28 GMT < Content-Type: application/xml < Content-Length: 0 < Connection: keep-alive < Location: < X-SDS-AUTH-TOKEN: Token_String 4. Access the location, making sre to spply either the cookie or the http header. Reqest crl -k <ViPR_VIP>:4443/tenant?ath-redirected -H "X-SDS-AUTH-TOKEN:token_text" <?xml version="1.0" encoding="utf-8" standalone="yes"?> <tenant_info> <name>provider Tenant</name> <link href="/tenants/ rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:" rel="self"/> <id>rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:</ id> </tenant_info> Using cookies, yo can atomatically following redirects. The following crl example allows access to the API resorce by passing credentials to it: Reqest crl -k "<ViPR_VIP>:4443/tenant?sing-cookies=tre" - "root:changeme" -c cookie1 -b cookie1 -L -v HTTP 302 In this example, crl's -L option indicates that we want to follow redirects. Body GET /tenant?sing-cookies=tre HTTP/1.1 Athorization: Basic cm9vddpdagfz2vnzq== User-Agent: crl/ (i386-pc-win32) libcrl/ OpenSSL/0.9.8t zlib/1.2.5 Host: :4443 Accept: */* Cookie: X-SDS-AUTH- TOKEN=BAAcVlM5TkkwdnRvUFBJbXJkbzVqSzB3azZBQ0VnPQMAUAQADTEzODU0OTQ4NzYz NTICAAEABQA5dXJOnN0b3JhZ2VvczpUb2tlbjo3OGM4ODljOS1hZTE5LTQ2NTgtODYxNS 00ZDk5YTY xnwvmotu6agac0a8= HTTP/ OK Date: Wed, 27 Nov :57:12 GMT Content-Type: application/xml Content-Length: 276 Connection: keep-alive <?xml version="1.0" encoding="utf-8" standalone="yes"?> <tenant_info> <name>provider Tenant</name> <link href="/tenants/rn:storageos:tenantorg:d61d9fa ef-85d3- c40b6de2c72f:" rel="self"/> <id>rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:</id> </tenant_info> 14 EMC ViPR Controller REST API Developer Gide
15 Getting Started with the ViPR Controller REST API Logot The logot API ends a session. A given ser is allowed a maximm of 100 concrrent athentication tokens. Past this limit, the system refses any new connection for this ser ntil tokens free p. They can free p by expiring natrally, or by explicitly calling this URI: If yo have mltiple sessions rnning simltaneosly, this URI forces the termination of all tokens related to the crrent ser. GET <ViPR_VIP>:4443/logot?force=tre An example logot reqest follows. Reqest GET: <ViPR_VIP>:4443/logot X-SDS-AUTH-TOKEN:Ath_Token Pass in the header or cookie with the athentication token to logot. HTTP 200 Whoami A ViPR ser can view their own ser name, tenant association, and roles sing the whoami API call. Reqest GET <ViPR_VIP>:4443/ser/whoami HTTP 200 GET /ser/whoami <ser> <common_name>root</common_name> <distingished_name>root</distingished_name> <roles> <role>system_auditor</role> <role>security_admin</role> <role>system_admin</role> <role>system_monitor</role> <role>tenant_admin</role> </roles> <sbtenant_roles/> <tenant> rn:storageos:tenantorg:7985d df-bba1-29d6a873f811: </tenant> </ser> This example shows the whoami otpt for the Root ser. Root is associated with the tenant indicated in the <tenant> field. Root has the roles listed in the <roles> field. Logot 15
16 Getting Started with the ViPR Controller REST API Proxyser Becase standard ViPR secrity tokens expire after 8 hors, ViPR provides a special ser ID that can rn a Controller REST API script on a schedle withot having to repeatedly log in. For example, yo might set p a script to check particlar file services every 12 hors, and take appropriate action in the presence of certain conditions. The proxy token featre allows a ser to retrieve a persistent secrity token from ViPR, then pass that token to a special ser called proxyser, who rns the script. The proxyser is a bilt-in ser in ViPR. This ser has the PROXY_USER role, and is the only ViPR ser that can have that role. The proxyser cannot perform any secrity-related operations. For example, a proxy ser cannot register an athentication provider, or do role assignments for a ser. The proxyser is best sed for monitoring and provisioning operations. Using proxyser to rn a controller REST API script ViPR provides a way to rn a Controller REST API script on a schedle withot having to repeatedly log in. For example, yo might set p a script to check particlar file services every 12 hors, and take appropriate action in the presence of certain conditions. The examples in this section are written in crl, and formatted for readability. Before yo begin Yo mst have a ser from yor LDAP repository mapped to a tenant in ViPR. Note Bilt-in sers, sch as root, can also se proxy tokens. Procedre 16 EMC ViPR Controller REST API Developer Gide 1. Log in to ViPR. crl -k <ViPR_VIP>:4443/login?sing-cookies -c cookie2 - "myuser@mycompany.com:changethis" ViPR delivers a standard ViPR athentication token. (This token has an 8 hor timeot.) 2. Retrieve yor ser s proxy token. Each ViPR ser has one and only one proxy token. crl -k <ViPR_VIP>:4443/proxytoken -b cookie2 -v GET /proxytoken HTTP/1.1 User-Agent: crl/ (i386-pc-win32) libcrl/ OpenSSL/ 0.9.8t zlib/1.2.5 Host: :4443 Accept: */* Cookie: X-SDS-AUTH-TOKEN=Token_Text HTTP/ OK Date: Wed, 27 Nov :05:02 GMT Content-Type: application/xml Content-Length: 0 Connection: keep-alive X-SDS-AUTH-PROXY-TOKEN: Token_Text The ser's proxy token is contained in the header X-SDS-AUTH-PROXY-TOKEN. 3. Schedle yor script to rn say, once every 12 hors. Yo can se standard schedling software provided by yor platform operating system to do this. For example, CRON is available for most LINUX workstations.
17 Getting Started with the ViPR Controller REST API Destroying a proxy token 4. Pass the proxy token - X-SDS-AUTH-PROXY-TOKEN - for yor ser to the proxyser. How yo do this is specific to yor application. One method is to save the token to a file that is accessible by the proxyser. 5. The proxyser logs in, and ses the LDAP ser s proxy token to rn the schedled script as that ser. For example, if vipr_ser passes a proxy token to proxyser, proxyser can rn vipr_ser s script as vipr_ser sing vipr_ser s proxy token. The proxy token does not age ot. The script can rn repeatedly for an indefinite period of time. A proxy token does not expire, bt it can be destroyed by the ser who created it, or by a ViPR SECURITY_ADMIN. The examples in this section are written in crl, and formatted for readability. To destroy yor own proxy token, call: crl -k "<ViPR_VIP>:4443/logot?force=tre&proxytokens=tre" -b cookie1 -v GET /logot?force=tre&proxytokens=tre HTTP/1.1 User-Agent: crl/ (i386-pc-win32) libcrl/ OpenSSL/0.9.8t zlib/1.2.5 Host: :4443 Accept: */* Cookie: X-SDS-AUTH-TOKEN=Token_Text HTTP/ OK Date: Wed, 27 Nov :49:06 GMT Content-Type: application/xml Content-Length: 95 Connection: keep-alive <?xml version="1.0" encoding="utf-8" standalone="yes"?> <LoggedOt> <ser>root</ser> </LoggedOt> To destroy another ser s proxy token, call: crl -k "<ViPR_VIP>:4443/logot? force=tre&proxytokens=tre&sername=vipr_user" -b cookie1 -v Destroying a proxy token 17
18
19 CHAPTER 2 Setting Up a Single Tenant Environment This chapter contains the following topics. Single Tenancy vs Mltitenancy...20 Adding sers to the provider tenant with athentication providers Setting Up a Single Tenant Environment 19
20 Setting Up a Single Tenant Environment Single Tenancy vs Mltitenancy ViPR atomatically incldes a provider tenant. Tenants allow yo to separate grops of sers and give those grops access to different resorces in yor data center. In some environments, a single tenant is all that is reqired to manage yor data center. In other environments, yo may need mltiple tenants. For example, if yo are a service provider, a mlti-tenant environment may be necessary to separate sers and protect their data. This chapter describes how to se athentication providers to map LDAP sers into the ViPR provider tenant. For information on bilding a mlti-tenant environment with the ViPR REST API, see Setting p a Mlti-tenant Environment on page 51. Adding sers to the provider tenant with athentication providers Adding an athentication provider Athentication providers are added to ViPR to allow sers from Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) v3 compliant servers to athenticate sers and allows those sers to participate in ViPR operations. The first athentication provider yo add to ViPR maps sers from Active Directory or LDAP into the provider tenant. Once an athentication provider is registered, tenants can be configred to restrict access to a sbset of sers and grops obtained from the provider. For example, if an athentication provider is created for domain mycompany.com, the provider tenant can be configred to only accept sers from this domain by adding a tenant ser mapping to it. User mappings for a tenant can be as simple as a single domain name, or as complex as a combination of domain names, grop names and specific ser attribtes fond in the LDAP/AD schema. Yo can se athentication providers to create mlti-tenancy environments where yo create two or more grops of sers, and give those grops access to different resorces in yor data center. Setting p a Mlti-tenant Environment on page 51 describes the API calls reqired to set p a mlti-tenant environment. An athentication provider defines a set of LDAP or Active Directory sers who are initially assigned to the provider tenant. Each of those sers has access to ViPR resorces according to the roles and ACLs assigned to the provider tenant. Before yo begin In this example, yo login as the root ser. By defalt, the root ser has the Secrity Administrator (SECURITY_ADMIN) role on the entire virtal data center. The root ser is allowed to add an athentication provider for the mycompany.com domain. Procedre 1. Login to ViPR as the root ser and obtain an athentication token that can then be sed in sbseqent ViPR API calls. Reqest GET <ViPR_VIP>:4443/login?sing-cookies Provide credentials to satisfy the athentication challenge. 20 EMC ViPR Controller REST API Developer Gide
21 Setting Up a Single Tenant Environment HTTP 200 X-SDS-AUTH-TOKEN:Token_Text <loggedin> <ser>root</ser> </loggedin> 2. POST an athentication provider for the mycompany.com domain. Reqest POST <ViPR_VIP>:4443/vdc/admin/athnproviders 'Content-Type': 'application/xml', 'X-SDS-AUTH-TOKEN': 'Token_Text', 'ACCEPT': 'application/xml' <athnprovider_create> <server_rls> <server_rl>ldap:// </server_rl> </server_rls> <domains> <domain>sanity.local</domain> </domains> <grop_whitelist_vales> <grop_whitelist_vale>*admin*</grop_whitelist_vale> <grop_whitelist_vale>*test*</grop_whitelist_vale> </grop_whitelist_vales> <mode>ad</mode> <name>ad configration2</name> <description>ad configration2</description> <disable>no</disable> <manager_dn>cn=administrator,cn=users,dc=mycompany,dc=com</ manager_dn> <manager_password>p@ssw0rd</manager_password> <search_base>cn=users,dc=mycompany,dc=com</search_base> <search_filter>serprincipalname=%</search_filter> <search_scope>subtree</search_scope> <grop_attribte>cn</grop_attribte> </athnprovider_create> The ViPR Installation and Configration Gide has more information abot the meaning of each athentication provider parameter. HTTP 200 <athnprovider> <creation_time> </creation_time> <id>rn:storageos:athnprovider:0555dc65-598f-4dea-951ad9f5b2b61c5e:</id> <inactive>false</inactive> <link href="/vdc/admin/athnproviders/ rn:storageos:athnprovider:0555dc65-598f-4dea-951a-d9f5b2b61c5e:" rel="self"/> <name>ad configration2</name> <tags/> <description>ad configration2</description> <disable>false</disable> <domains> <domain>mycompany.com</domain> </domains> <grop_attribte>cn</grop_attribte> <grop_whitelist_vales> <grop_whitelist_vale>*admin*</grop_whitelist_vale> <grop_whitelist_vale>*test*</grop_whitelist_vale> </grop_whitelist_vales> <manager_dn>cn=administrator,cn=users,dc=mycompany,dc=com</ manager_dn> <mode>ad</mode> Adding an athentication provider 21
22 Setting Up a Single Tenant Environment <search_base>cn=users,dc=mycompany,dc=com</search_base> <search_filter>serprincipalname=%</search_filter> <search_scope>subtree</search_scope> <server_rls> <server_rl>ldap:// </server_rl> </server_rls> </athnprovider> Changing the ser mapping in the provider tenant In this example, yo modify the provider tenant to inclde a sbset of sers from the domain mycompany.com. Before yo begin Follow the instrctions in the topic Adding an athentication provider on page 20 to set p an athentication provider. This example ses the same athentication token as that procedre. Headers are hidden for brevity. In this example, yo modify the provider tenant to only map sers from the grops AdminUsers and TestUsers in the domain mycompany.com. Users in the domain mycompany.com that are not members of the AdminUsers and TestUsers grops will no longer be mapped into the provider tenant. Modify the provider tenant by sending a PUT reqest to the resorce PUT <ViPR_VIP>:4443/tenants/tenant_rn where tenant_rn is the URN ID of the tenant. In this example, yo athenticate as root and are modifying the provider tenant. Procedre 1. Obtain the URN ID of the provider tenant. The following API call retrns the crrent ser's tenant. The crrent ser is root. Reqest GET <ViPR_VIP>:4443/tenant HTTP 200 GET /tenant 22 EMC ViPR Controller REST API Developer Gide <tenant_info> <name>provider Tenant</name> <link href="/tenants/ rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:" rel="self"/> <id>rn:storageos:tenantorg:d61d9fa ef-85d3- c40b6de2c72f:</id> </tenant_info> 2. Use that URN ID to access the provider tenant and modify it, adding the desired ser mapping. Reqest PUT <ViPR_VIP>:4443/tenants/Tenant_URN <tenant_pdate> <name>provider Tenant</name> <ser_mapping_changes> <add> <ser_mapping> <domain>mycompany.com</domain> <grops> <grop>testusers</grop> <grop>adminusers</grop>
23 Setting Up a Single Tenant Environment Assigning roles to a tenant </grops> </ser_mapping> </add> </ser_mapping_changes> </tenant_pdate> HTTP 200 <tenant> <creation_time> </creation_time> <id>rn:storageos:tenantorg:d61d9fa ef-85d3- c40b6de2c72f:</id> <inactive>false</inactive> <link href="/tenants/ rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:" rel="self"/> <name>provider Tenant</name> <tags/> <description>root Provider Tenant</description> <ser_mappings> <ser_mapping> <attribtes/> <domain>mycompany.com</domain> <grops> <grop>testusers</grop> <grop>adminusers</grop> </grops> </ser_mapping> </ser_mappings> </tenant> For the mapping to be valid, AdminUsers and TestUsers need to be available to ViPR throgh the white list parameter of the athentication provider that this tenant ses. The *Admin* and *Test* expressions (see Adding an athentication provider on page 20) make this possible. Once an athentication provider is available and sers can be mapped to a tenant, roles can be assigned to sers and grops. For example, the Tenant Administrator (TENANT_ADMIN) role can be assigned to a ser. This allows that ser to perform administrative tasks on the tenant, sch as looking at the tenant information. It also allows that ser to assign roles to other sers within the tenant. Assigning the Tenant Administrator role to an Active Directory ser By assigning the TENANT_ADMIN role to a ser, yo allow that ser to perform administrative tasks on the tenant, sch as looking at the tenant information. Before yo begin Yo mst be logged in as a ser with the SECURITY_ADMIN role. The tenantadmin@mycompany.com ser is a valid AD ser who is part of a grop called AdminUsers. This ser is eligible to be TENANT_ADMIN becase the tenant lists AdminUsers as one of the acceptable grops for ser mapping. Procedre 1. Call the following API to apply the role assignment to tenantadmin@mycompany.com. Reqest PUT <ViPR_URL>:4443/tenants/tenant_URN/role-assignments.json Assigning roles to a tenant 23
24 Setting Up a Single Tenant Environment "add": ["sbject_id": "tenantadmin@mycompany.com", "role": ["TENANT_ADMIN"]] where tenant_urn is the ID of the ViPR tenant to which yo are applying the role assignment. The following API retrns the URIs of all tenants known to ViPR. GET <ViPR_URL>:4443/tenants/blk HTTP 200 "link":"rel":"self","href":"/tenants/tenant_urn/roleassignments" "role_assignments": [ "role": ["TENANT_ADMIN"],"sbject_id":"tenantadmin@mycompany.com" "role":["tenant_admin"],"sbject_id":"root" ] 2. To test ot that tenantadmin@mycompany.com has TENANT_ADMIN privileges in this tenant, login with that ser and reqest role assignment information for the provider tenant. Reqest GET <ViPR rl>:4443/login.json - tenantadmin@mycompany.com:password HTTP 200 X-SDS-AUTH-TOKEN:Token_text "ser":"tenantadmin@mycompany.com" Reqest GET <ViPR_URL>:4443/tenants/Privider_Tenant_URI/roleassignments.json X-SDS-AUTH-TOKEN:Token_text HTTP 200 "link":"rel":"self","href":"/tenants/ rn:storageos:tenantorg:d082a5b faf-9e62-ae1c989f1995:/roleassignments" "role_assignments": [ "role": ["TENANT_ADMIN"],"sbject_id":"tenantadmin@mycompany.com" "role":["tenant_admin"],"sbject_id":"root" ] 24 EMC ViPR Controller REST API Developer Gide
25 CHAPTER 3 Athorization This chapter contains the following topics. Athorization overview...26 Virtal data center roles Tenant roles ACLs...29 Virtal array and virtal pool ACLs Project ACLs Athorization 25
26 Athorization Athorization overview Virtal data center roles Athorization in ViPR is controlled by roles and Access Control Lists (ACLs). There are two types of roles (virtal data center roles and tenant level roles), and different types of ACLs. Virtal data center roles are scoped to the entire ViPR virtal data center. Note that they can only be assigned to sers and grops that belong to the top level provider tenant. These roles define what the ser can do at the virtal data center level. The virtal data center level roles are: Secrity Administrator System Administrator System Monitor System Aditor A ser with a Secrity Administrator role can assign roles to sers. In the example below, a Secrity Administrator assigns the Secrity Admin role to a ser with a sbject_id of sername@mycompany.com. Reqest: PUT <ViPR_VIP>/vdc/role-assignments Reqest body <role_assignment_change> <add> <role>security_admin</role> <sbject_id>sername@mycompany.com</sbject_id> </add> </role_assignment_change> HTTP 200 <role_assignments_create> <role_assignment> <role>system_admin</role> <sbject_id>sername@mycompany.com</sbject_id> </role_assignment> <role_assignment> <role>system_auditor</role> <role>security_admin</role> <role>system_monitor</role> <role>system_admin</role> <sbject_id>sername@mycompany.com</sbject_id> </role_assignment> <link href="/vdc/role-assignments" rel="self"/> </role_assignments_create> The following table lists the athorized actions for each ViPR virtal data center level role. Virtal Data Center- Athorized Actions Level Role - - Secrity Administrator Manages the athentication provider configration for the ViPR virtal data center to identify and athenticate sers. Athentication 26 EMC ViPR Controller REST API Developer Gide
27 Athorization Virtal Data Center- Athorized Actions Level Role - - providers are configred to add specified sers into ViPR sing existing Active Directory/Lightweight Directory Access Protocol (AD/ LDAP) ser acconts/domains. Assigns roles and project ACLs to sers or grops. Configres ACLs for virtal arrays and virtal pools to control which tenants may se them. Restores access to tenants and projects, if needed. (For example, in the event that the Tenant Administrator locks himself/herself ot, the Secrity Administrator can reset ser roles to restore access.) Changes ViPR virtal data center properties. Shts down/reboots/restarts ViPR services. Manages ViPR virtal data center software and license pdates. System Administrator Sets p the physical storage infrastrctre of the ViPR virtal data center and carves the physical storage into two types of virtal resorces: virtal arrays and virtal pools. Athorized actions inclde: Adding physical storage resorces into ViPR sch as arrays, ports, pools, switches, and networks. Creating virtal pools; defining storage capabilities and assigning physical storage pools to virtal pools. Creating virtal arrays; partitioning storage into discrete pods of compte, network, and storage resorces to control file system/ volme/object pathing throgh SAN/IP networks. Sets p object storage in the ViPR virtal data center; this incldes creating the object virtal pool and data stores, assigning an IP network to the Object Data Service, and assigning an object namespace to the tenant. Configres Access Control Lists (ACLs) for virtal arrays and virtal pools to control which tenants may se them. Manages the ViPR virtal data center resorces that are not managed by tenants. Retrieves ViPR virtal data center stats and health information. Retrieves blk event and statistical records for the ViPR virtal data center. System Monitor Has read-only access to all resorces in the ViPR virtal data center. Retrieves blk event and statistical records for the ViPR virtal data center. Does not have visibility into secrity-related resorces, sch as athentication providers, ACLs, and role assignments. Retrieves ViPR virtal data center stats and health information. System Aditor Has read-only access to the ViPR virtal data center adit logs. Virtal data center roles 27
28 Athorization Tenant roles Tenant roles are scoped to the tenant in which the assignment is made. Tenant Administrator, Tenant Approver, and Project Administrator are tenant-level roles. Tenant roles can be assigned to sers/grops from the corresponding tenant. These roles define what the ser can do at the tenant level. The tenant level roles are: Tenant Administrator Tenant Approver Project Administrator A ser with a Secrity Admin or Tenant Admin role can assign roles to sers within a tenant. The URL indicates the tenant. In the following example, a Secrity or Tenant Administrator with access to the tenant assigns a Tenant Administrator role to a ser with a sbject ID of ser@mycompany.com. PUT: <ViPR rl>:4443/tenants/<tenant rn>/role-assignments.json Reqest body: "add": ["sbject_id": "ser@mycompany.com", "role": ["TENANT_ADMIN"]] : HTTP 200 The following table lists the athorized actions for each ViPR tenant-level role. Tenant-Level Role Athorized Actions - - Tenant Administrator Creates tenants nder the provider tenant (in a mlti-tenant environment). (In a single-tenant enterprise private clod environment, there is jst the provider tenant and the Tenant Administrator(s) has access to all projects.) Maps AD/LDAP sers into their tenant to define who can log into the tenant. Creates, modifies, and deletes projects in their tenant. Manages resorces in the tenant's projects. Configres ACLs for projects and the Service Catalog in their tenant. Assigns roles to tenant sers. (Can assign Tenant Administrator or Project Administrator roles to other sers.) Tenant Approver Approves or rejects Service Catalog orders in their tenant. Views all approval reqests in their tenant. Project Administrator Creates projects in their tenant, getting an OWN ACL on the created project. 28 EMC ViPR Controller REST API Developer Gide
29 Athorization ACLs An Access Control List (ACL) is a list of permissions attached to a ViPR resorce that specifies which tenants are athorized to access that resorce as well as what operations are allowed on that resorce. ACLs can be assigned to the following ViPR resorces: Block virtal pool File virtal pool Projects Virtal arrays Note Only Project ACLs are managed throgh the ViPR ser interface. Other ACLs mst be managed sing the API. For each virtal array, virtal pool, or project resorce, there is a limit of 100 ACLs. In other words, there is a maximm of 100 ser/grop assignments for projects and 100 tenant assignments for a virtal array or virtal pool. Virtal array and virtal pool ACLs At creation time, virtal arrays and virtal pools are pblic. They are accessible to all tenants. A System or Secrity Administrator can assign an ACL to a virtal pool or virtal array to restrict them to be sed by specified tenants. The ACL permission associated with virtal arrays and pools is of the type USE. If a specific tenant has a USE ACL on a virtal pool, this means that all the sers who are mapped to that tenant will be allowed to se that virtal pool in their provisioning operations. All newly created virtal arrays and pools will have an empty ACL. The System or Secrity Administrator is responsible for managing the ACL. If no ACLs are set, the virtal arrays and pools remain accessible to the provider tenant and all other tenants in the ViPR system. For virtal pools and virtal arrays, yo cannot assign an ACL to a ser (sbject ID) or grop. Only tenants can be assigned ACLs for these resorces. The following table shows the APIs that allow a system or secrity administrator to modify ACLs for virtal arrays and virtal pools. Note that there are separate API calls for file and block virtal pools. API Description - - GET /block/vpools/id/acl Show ACL assignment for block store virtal pool. PUT /block/vpools/id/acl GET /file/vpools/id/acl PUT /file/vpools/id/acl GET /vdc/varrays/id/acl Add or remove block store virtal pool ACL entries. Show ACL entries for file store VirtalPool. Add or remove ACL entries from file store VirtalPool. Show VirtalArray ACL Virtal Array. ACLs 29
30 Athorization API Description - - PUT /vdc/varrays/id/acl Add or remove ACL for VirtalArray Virtal Array. Examples: Virtal array and virtal pool ACL APIs The examples in this section show some commonly-sed APIs for managing virtal array and virtal pool ACLs. Virtal array: Assigning the USE ACL to a tenant The following example shows how to give a tenant privileges to se a virtal array. If no ACL exists on the virtal array, all tenants have access to it. Reqest PUT rn:storageos:virtalarray:f49f6e36-0fe d116204d86:/acl <acl_assignment_changes> <add> <privilege>use</privilege> <tenant>rn:storageos:tenantorg:7985d dfbba1-29d6a873f811:</tenant> </add> </acl_assignment_changes> : HTTP 200 <acl_assignments> <acl_assignment> <privilege>use</privilege> <tenant>rn:storageos:tenantorg:7985d dfbba1-29d6a873f811:</tenant> </acl_assignment> </acl_assignments> Virtal array: Removing the USE ACL from a tenant Reqest PUT rn:storageos:virtalarray:f49f6e36-0fe d116204d86:/acl <acl_assignment_changes> <remove> <privilege>use</privilege> <tenant>rn:storageos:tenantorg:7985d dfbba1-29d6a873f811:</tenant> </remove> </acl_assignment_changes> : HTTP 200 <acl_assignments/> Virtal pool: Assigning the USE ACL to a tenant The following example shows how to give a tenant privileges to se a virtal pool. If no ACL exists on the virtal pool, all tenants have access to it. 30 EMC ViPR Controller REST API Developer Gide
31 Athorization Reqest PUT <ViPR_VIP>/file/vpools/rn:storageos:VirtalPool: fcf2e f11-9e8d3e7e7fa9:/acl <acl_assignment_changes> <add> <privilege>use</privilege> <tenant>rn:storageos:tenantorg:d61d9fa ef-85d3- c40b6de2c72f:</tenant> </add> </acl_assignment_changes> : HTTP 200 <acl_assignments> <acl_assignment> <privilege>use</privilege> <tenant>rn:storageos:tenantorg:d61d9fa ef-85d3- c40b6de2c72f:</tenant> </acl_assignment> </acl_assignments> Project ACLs A Tenant Administrator can access all projects for their tenant. Project Administrators can only access projects that they own. The ACL permissions associated with projects are listed in the following table. The project ACLs can be created or modified by a Tenant Administrator, a Secrity Administrator, or a project owner. Project owners are assigned the OWN ACL. The ser that creates the project is the owner of that project nless they, or a tenant administrator, transfers ownership of that project to another ser. The defalt ACL behavior of a project is different from the defalt ACL behavior of a Virtal Array or Virtal Pool. Whereas, the defalt ACL for a Virtal Array or Virtal Pool enables anyone to se them, the defalt ACL for the Project prevents all bt the Tenant Admin, Secrity Admin, or Project owner from sing it. For other sers or grops to se a project, that ser or grop mst be explicitly added to the ACL for that project. Project ACL Description - - ALL The ser can perform create, read, pdate, and delete (CRUD) operations on file systems, volmes, snapshots, exports, and bckets within the project. BACKUP OWN The ser has read-only access to volmes, file systems and bckets in the project. The ser can create, delete, and export snapshots for volmes and file systems in the project. The ser with the OWN ACL is the project owner. A project owner can do all of the following: Perform CRUD operations on project resorces. Set ACLs on the project. Transfer ownership of the project to another ser. Delete the project. Set project properties, sch as the project name and owner. Project ACLs 31
32 Athorization Project ACL Description - - ANY The ANY ACL appears in the EMC ViPR REST API Reference Gide. It means "any ser that has either the BACKUP or ALL ACL". Examples: Project ACL APIs Newly created projects will have an empty ACL. The Tenant Administrator or the project owner is responsible for managing the ACL. The examples in this section show some commonly-sed APIs for managing project ACLs. Get the ACLs for a project Reqest GET /projects/project_urn/acl <acl_assignments> <acl_assignment> <privilege>all</privilege> <sbject_id>jordab@sanity.local</sbject_id> </acl_assignment> <acl_assignment> <privilege>backup</privilege> <sbject_id>jordab2@sanity.local</sbject_id> </acl_assignment> </acl_assignments> Assigning the USE ACL to a ser The following example sets the project ACL sing a ser's sbject_id. A sbject_id or grop can be assigned the ALL or BACKUP permission. Reqest PUT <ViPR_VIP>/projects/<project rn>/acl <acl_assignment_changes> <add> <privilege>all</privilege> <sbject_id>jordab2@sanity.local</sbject_id> </add> </acl_assignment_changes> HTTP 200 <acl_assignments> <acl_assignment> <privilege>all</privilege> <sbject_id>jordab@sanity.local</sbject_id> </acl_assignment> <acl_assignment> <privilege>all</privilege> <privilege>backup</privilege> <sbject_id>jordab2@sanity.local</sbject_id> </acl_assignment> </acl_assignments> 32 EMC ViPR Controller REST API Developer Gide
33 Athorization Examples: Changing a project's owner The example in this section shows how to change the owner of a project. The OWN ACL is assigned to a project's creator, giving that ser ownership rights to that project. A tenant admin, a project admin or the project's owner can reassign the ownership of the project to another ser. Checking the owner of a project The ser that owns the project is displayed in the <owner> field of the project resorce. Here, the ser jordab@sanity.local is displayed as the project owner. GET /projects/project_rn <project> <creation_time> </creation_time> <id>rn:storageos:project:2c4d5503-a d a08e4bd3ee3:</id> <inactive>false</inactive> <link href="/projects/rn:storageos:project:2c4d5503- a d a08e4bd3ee3:" rel="self"/> <name>project1</name> <tags/> <owner>jordab@sanity.local</owner> <tenant> <id>rn:storageos:tenantorg:d61d9fa ef-85d3- c40b6de2c72f:</id> <link href="/tenants/ rn:storageos:tenantorg:d61d9fa ef-85d3-c40b6de2c72f:" rel="self"/> </tenant> </project> Changing the owner of a project This example changes the ownership of the project shown in the previos example to jordab2@sanity.local. Note that this is done by changing the owner attribte of the project, rather than throgh an ACL call. Reqest PUT /projects/project_urn <project_pdate> <owner>jordab2@sanity.local</owner> </project_pdate> HTTP 200 Examples: Changing a project's owner 33
EMC ViPR. User Guide. Version
EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate
More informationEMC AppSync. User Guide. Version REV 01
EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication
More informationLocal Run Manager. Software Reference Guide for MiSeqDx
Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880
More informationEMC M&R (Watch4net ) Installation and Configuration Guide. Version 6.4 P/N REV 02
EMC M&R (Watch4net ) Version 6.4 Installation and Configration Gide P/N 302-001-045 REV 02 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished September, 2014 EMC believes
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationEMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03
EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.
More informationWhat s New in AppSense Management Suite Version 7.0?
What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,
More informationIllumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY
Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of
More informationDistributed Systems Security. Authentication Practice - 2. Prof. Steve Wilbur
Distribted Systems Secrity Athentication Practice - 2 Prof. Steve Wilbr s.wilbr@cs.cl.ac.k MSc in Data Commnications Networks and Distribted Systems, UCL Lectre Objectives Examine X.509 as a practical
More informationContent Content Introduction
Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server
More informationEMC NetWorker Module for SAP
EMC NetWorker Modle for SAP Version 8.2 Installation Gide P/N 302-000-390 REV 02 Copyright 2009-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Agst, 2014 EMC believes the information
More informationMembership Library in DPDK Sameh Gobriel & Charlie Tai - Intel DPDK US Summit - San Jose
Membership Library in DPDK 17.11 Sameh Gobriel & Charlie Tai - Intel DPDK US Smmit - San Jose - 2017 Contribtors Yipeng Wang yipeng1.wang@intel.com Ren Wang ren.wang@intel.com John Mcnamara john.mcnamara@intel.com
More informationComputer User s Guide 4.0
Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements
More informationEMC ViPR Controller. User Interface Tenants, Projects, Security, Users, and Multisite Configuration Guide. Version 3.
EMC ViPR Controller Version 3.6 User Interface Tenants, Projects, Security, Users, and Multisite Configuration Guide 302-003-710 01 Copyright 2015-2017 Dell Inc. or its subsidiaries. All rights reserved.
More informationGigaset M34 USB Ya-LBA / englisch / A31008-M403-R / cover_front.fm / User Manual
User Manal Contents Contents For yor safety.............................. 4 Notes on the operating instrctions....................................... 4 Safety precations.....................................................
More informationL EGAL NOTICES. ScanSoft, Inc. 9 Centennial Drive Peabody, MA 01960, United States of America
L EGAL NOTICES Copyright 2002 by ScanSoft, Inc. All rights reserved. No part of this pblication may be transmitted, transcribed, reprodced, stored in any retrieval system or translated into any langage
More informationDPDK s Best Kept Secret: Micro-benchmarks. M Jay DPDK Summit - San Jose 2017
DPDK s Best Kept Secret: Micro-benchmarks M Jay Mthrajan.Jayakmar@intel.com DPDK Smmit - San Jose 2017 Legal Information Optimization Notice: Intel s compilers may or may not optimize to the same degree
More informationDoctor Web. All rights reserved
Enterprise Site 2004-2009 Doctor Web. All rights reserved This docment is the property of Doctor Web. No part of this docment may be reprodced, pblished or transmitted in any form or by any means for any
More informationAnalog Telephones. User Guide. BusinessPhone Communication Platform
Analog Telephones BsinessPhone Commnication Platform User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select Graphics > Properties and make
More informationLocal Run Manager Generate FASTQ Analysis Module
Local Rn Manager Generate FASTQ Analysis Modle Workflow Gide For Research Use Only. Not for se in diagnostic procedres. Overview 3 Set Parameters 3 Analysis Methods 5 View Analysis Reslts 5 Analysis Report
More informationNortel DECT Handset 4025 User Guide
DECT 4025 Nortel DECT Handset 4025 User Gide Revision history Revision history October 2005 Standard 2.00. This docment is p-issed to spport Nortel Commnication Server 1000 Release 4.5. Febrary 2005 Standard
More informationUnit Testing with VectorCAST and AUTOSAR
Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs
More informationLDAP Configuration Guide
LDAP Configration Gide Content Content LDAP directories on Gigaset phones............................................... 3 Configration.....................................................................
More informationdss-ip Manual digitalstrom Server-IP Operation & Settings
dss-ip digitalstrom Server-IP Manal Operation & Settings Table of Contents digitalstrom Table of Contents 1 Fnction and Intended Use... 3 1.1 Setting p, Calling p and Operating... 3 1.2 Reqirements...
More informationIsilon OneFS. Version Administration Guide
Isilon OneFS Version 7.0.1 Administration Gide Pblished December, 2012 Copyright 2001-2012 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication
More informationEllucian ODS9.0 Upgrade Migrating from OWB to ODI. Amir Saleem Centennial College May 17, 2017
Ellcian ODS9.0 Upgrade Migrating from OWB to ODI Amir Saleem Centennial College May 17, 2017 Topics OWB Spport Oracle Data Integrator (ODI) ODI Architectre Upgrade paths General Gideline for ODS infrastrctre
More informationEMC ViPR Controller. User Interface Tenants, Projects, Security, Users, and Multisite Configuration Guide. Version 3.
EMC ViPR Controller Version 3.0 User Interface Tenants, Projects, Security, Users, and Multisite Configuration Guide 302-002-707 01 Copyright 2015-2016 EMC Corporation. All rights reserved. Published in
More informationRequirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems
Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements
More informationDialog 4106 Basic/Dialog 4147 Medium
Analog Telephones for MD110 and MX-ONE Telephony System User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select Graphics > Properties and
More informationCS 153 Design of Operating Systems
CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today
More informationMiniSeq. System Guide. For Research Use Only. Not for use in diagnostic procedures. Document # v02 Material # March 2018
MiniSeq System Gide Docment # 1000000002695 v02 Material # 20014309 March 2018 For Research Use Only. Not for se in diagnostic procedres. ILLUMINA PROPRIETARY MiniSeq System Gide This docment and its contents
More informationStandard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH
8029HEPTA DataCenter Standard Becase every fraction of a second conts network synchronization reqiring minimm space hopf Elektronik GmbH Nottebohmstraße 41 58511 Lüdenscheid Germany Phone: +49 (0)2351
More informationBIS - Basic Package V4.6
Engineered Soltions BIS - Basic Package V4.6 BIS - Basic Package V4.6 www.boschsecrity.com The Bilding Integration System (BIS) BIS is a flexible, scalable secrity and safety management system that can
More informationEMC ViPR Controller. Service Catalog Reference Guide. Version REV 02
EMC ViPR Controller Version 3.5 Service Catalog Reference Guide 302-003-279 REV 02 Copyright 2013-2019 EMC Corporation All rights reserved. Published February 2019 Dell believes the information in this
More informationContent Safety Precaution... 4 Getting started... 7 Input method... 9 Using the Menus Use of USB Maintenance & Safety...
STAR -1- Content 1. Safety Precation... 4 2. Getting started... 7 Installing the cards and the Battery... 7 Charging the Battery... 8 3. Inpt method... 9 To Shift Entry Methods... 9 Nmeric and English
More informationAccess Professional Edition 2.1
Engineered Soltions Access Professional Edition 2.1 Access Professional Edition 2.1 www.boschsecrity.com Compact access control based on Bosch s innovative AMC controller family Integrated Video Verification
More informationBIS - Basic package V4.3
Engineered Soltions BIS - Basic package V4.3 BIS - Basic package V4.3 www.boschsecrity.com Integration of Bosch and third party systems throgh deployment of OPC All relevant information in one ser interface
More informationEMC Storage Monitoring and Reporting
EMC Storage Monitoring and Reporting Version 4.0 Upgrading to ViPR SRM P/N 302-002-733 REV 03 Copyright 2016 EMC Corporation. All rights reserved. Published in the USA. Published September 2016 EMC believes
More informationIntroduction to Windows Server Copyright 2018 NY SYSTEMS INC.
Introdction to Windows Server 2008 1 Learning Objectives Identify the key featres of each Windows Server 2008 edition Understand client systems that can be sed with Windows Server 2008 Identify important
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationEMC ViPR Controller. Integration with VMAX and VNX Storage Systems Guide. Version REV 01
EMC ViPR Controller Version 2.3 Integration with VMAX and VNX Storage Systems Guide 302-002-075 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in USA. Published July, 2015 EMC
More informationAN A. GPON Optical Network Terminal. Product Manual. Version: A/1. FiberHome Telecommunication Technologies Co., Ltd.
AN5506-01-A GPON Optical Network Terminal Prodct Manal Version: A/1 FiberHome Telecommnication Technologies Co., Ltd. April 2017 Thank yo for choosing or prodcts. We appreciate yor bsiness. Yor satisfaction
More informationBIS - Basic Package V4.4
Engineered Soltions BIS - Basic Package V4.4 BIS - Basic Package V4.4 www.boschsecrity.com Integration of Bosch and third party systems via open interfaces and SDK All relevant information in one ser interface
More informationAbout This Manual Copyright Copyright 2017 ZTE CORPORATION All rights reserved. Notice Disclaimer
User Manal 1 Abot This Manal Thank yo for choosing this ZTE mobile device. In order to keep yor device in its best condition, please read this manal and keep it for ftre reference. Copyright Copyright
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationNextSeq 550. System Guide. For Research Use Only. Not for use in diagnostic procedures. Document # v04 May 2018 ILLUMINA PROPRIETARY
NextSeq 550 System Gide Docment # 15069765 v04 May 2018 For Research Use Only. Not for se in diagnostic procedres. ILLUMINA PROPRIETARY NextSeq 550 System Gide This docment and its contents are proprietary
More informationDSCS6020: SQLite and RSQLite
DSCS6020: SQLite and RSQLite SQLite History SQlite is an open sorce embedded database, meaning that it doesn t have a separate server process. Reads and writes to ordinary disk files. The original implementation
More informationUSER S GUIDE: SPRINT RELAY CUSTOMER PROFILE
USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE www.mysprintrelay.com/login n Log-in Go to www.mysprintrelay.com/login. If yo don t have a sername or password, click the gray men btton Cstomer New Profile/Call
More informationIMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING
International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING
More informationBIS - Basic package V4.2
Engineered Soltions BIS - Basic package V4.2 BIS - Basic package V4.2 www.boschsecrity.com Integration of Bosch and third party systems throgh deployment of OPC All relevant information in one ser interface
More informationElastic Cloud Storage (ECS)
Elastic Cloud Storage (ECS) Version 3.1 Administration Guide 302-003-863 02 Copyright 2013-2017 Dell Inc. or its subsidiaries. All rights reserved. Published September 2017 Dell believes the information
More informationSecure Biometric-Based Authentication for Cloud Computing
Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr
More informationHP 9000 Series 300 Computers. Using and Administering NFS Services
HP 9000 Series 300 Compters Using and Administering NFS Services Using and Administering NFS Services HP 9000 Series 300 FJ/o- HEWLETT ~all PACKARD Manal Part Nmber: 50969-90001 Printed in U.S.A., Janary
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 8: Threads Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Processes P1 P2 Recall that Bt OS A process
More informationBIS - Access Engine (ACE)
Engineered Soltions BIS - Access Engine (ACE) BIS - Access Engine (ACE) www.boschsecrity.com Sophisticated access control with direct alarm management Seamless integration and interaction with video, fire,
More informationMiSeq. System Guide. For Research Use Only. Not for use in diagnostic procedures. Document # v04 Material # July 2018
MiSeq System Gide Docment # 15027617 v04 Material # 20024228 Jly 2018 ILLUMINA PROPRIETARY MiSeq System Gide This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"),
More informationEMC Storage Monitoring and Reporting
EMC Storage Monitoring and Reporting Version 4.1 Upgrading to ViPR SRM P/N 302-003-744 REV 01 Copyright 2017 Dell Inc. or its subsidiaries All rights reserved. Published July 2017 Dell believes the information
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationCAPL Scripting Quickstart
CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming
More informationCOPYRIGHTED MATERIAL. Recording Macros and Getting Started with VBA. Part 1
Part 1 Recording Macros and Getting Started with VBA Chapter 1: Recording and Rnning Macros in the Office Applications Chapter 2: Getting Started with the Visal Basic Editor Chapter 3: Editing Recorded
More informationMVM-BVRM Video Recording Manager v2.21
Video MVM-BVRM Video Recording Manager v2.21 MVM-BVRM Video Recording Manager v2.21 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability
More informationDIVAR IP U. Video DIVAR IP U.
Video DIVAR IP 6000 2U DIVAR IP 6000 2U RAID-5 protected (standard configration), all-in-one recording soltion for p to 128 channels Pre-installed, pre-configred IP storage soltion with p to 32 TB storage
More informationEnhanced Memory Management
Enhanced Memory Management DPDK Smmit - San Jose 2017 #DPDKSmmit Challenges The world is changing Adapt to varying application reqirements Performance, Secrity, Footprint, Robstness? Native, Containers,
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationVirtuOS: an operating system with kernel virtualization
VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design
More informationEMC ViPR Controller. Ingest Services for Existing Environments Guide. Version REV 01
EMC ViPR Controller Version 3.5 Ingest Services for Existing Environments Guide 302-003-280 REV 01 Copyright 2013-2016 EMC Corporation. All rights reserved. Published in the USA. Published October 2016
More informationLTC 8600 Series Allegiant Matrix/Control Systems - Modular
Video 86 Series Allegiant Matrix/Control Systems - Modlar 86 Series Allegiant Matrix/Control Systems - Modlar www.boschsecrity.com 128 Camera by 16 monitor switching Modlar constrction Powerfl alarm handling
More informationDIVAR IP U. Video DIVAR IP U.
Video DIVAR IP 6000 3U DIVAR IP 6000 3U www.boschsecrity.com RAID-5 protected (standard configration), all-in-one recording soltion for p to 128 channels Pre-installed, pre-configred IP storage soltion
More informationHow to Request Space through the Call for Programs Students. Center for Student Involvement Northeastern University
How to Reqest Space throgh the Call for Programs Stdents Center for Stdent Involvement Northeastern University 2017-2018 BEFORE YOU BEGIN Check to make sre that yo can access NUSSO via MyNEU Only the President,
More informationDialog 3185 and 3185MW
Analog Telephones for MD110 Commnication System User Gide Cover Page Graphic Place the graphic directly on the page, do not care abot ptting it in the text flow. Select Graphics > Properties and make the
More informationConfiguring the Oracle Database with VERITAS Software and EMC Storage for Optimal Scalability, Mangeability, and Performance
Configring the Oracle Database with VERITAS Software and EMC Storage for Optimal Scalability, Mangeability, and Performance Table of Contents I. Introdction II. Storage Topics III. Configring Oracle Database
More informationMaking Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution
Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationDialog 4106 Basic/Dialog 4147 Medium
Analog Telephones for MX-ONE Telephony Server User Gide Grafik af dem Deckblatt Platzieren Sie die Grafik direkt af der Seite nd nicht im Textflss. Wählen Sie Grafik > Eigenschaften, nd nehmen Sie die
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationPutting the dynamic into software security testing
Ptting the dynamic into software secrity testing Detecting and Addressing Cybersecrity Isses V1.1 2018-03-05 Code ahead! 2 Atomated vlnerability detection and triage + = 3 How did we get here? Vector was
More informationiseq 100 Sequencing System Guide For Research Use Only. Not for use in diagnostic procedures. Document # v04 October 2018
iseq 100 Seqencing System Gide October 2018 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal
More informationvhost-user-scsi: offloading virtio-scsi to userspace
vhost-ser-scsi: offloading virtio-scsi to serspace Felipe Franciosi (AHV Engineering, Ntanix) Jim Harris (SPDK Architect, Intel) 27 October 2017 Disclaimer This presentation and the accompanying oral commentary
More informationDIVAR IP U. Video DIVAR IP U.
Video DIVAR IP 7000 3U DIVAR IP 7000 3U www.boschsecrity.com RAID-5 protected (standard configration), all-in-one video management soltion for p to 128 channels Ot-of-the-box IP video management soltion
More informationHow to Request Space through the Call for Programs Students. Center for Student Involvement Northeastern University
How to Reqest Space throgh the Call for Programs Stdents Center for Stdent Involvement Northeastern University 2018-2019 BEFORE YOU BEGIN Check to make sre that yo can access NUSSO via MyNortheastern Only
More informationVRM Video Recording Manager v3.0
Video VRM Video Recording Manager v3.0 VRM Video Recording Manager v3.0 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability Used with
More information6 Using Bookmarks Using Saved Pages Advanced Features
Overview... - Yahoo! Keitai... -3 Connecting to Yahoo! Keitai... -3 PC Site Browser... -5 PC Site Browser... -5 Connecting to PC Websites... -5 Page Operations... -8 Navigating Pages... -8 Jmping to Next
More informationFeatures. ICMS Integrated Corrosion Management System
ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion
More informationEMC VSI for VMware vsphere Web Client
EMC VSI for VMware vsphere Web Client Version 6.9.2 Product Guide 302-000-051 REV 13 Copyright 2013-2016 EMC Corporation. All rights reserved. Published in the USA. Published June 2016 EMC believes the
More informationOverview of Security Support in Vector Tools
Overview of Secrity Spport in Vector Tools Secrity Manager V0.2 2017-09-22 Agenda Motivation Challenges Secrity Manager Otlook 2 Motivation Secrity protects Featres and Bsiness Models Secrity Goals: Integrity
More informationEXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION
EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationTAKING THE PULSE OF ICT IN HEALTHCARE
ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless
More informationVector Logger Cloud. VECTOR GB Ltd Conference, 28th Sept, 2017 V
Vector Logger Clod VECTOR GB Ltd Conference, 28th Sept, 2017 V1.0 2017-09-27 Agenda Challenges Vector Logger Clod Secrity Aspects Data Acqisition Policy Conclsion 2 Vector Logger Clod Challenges Growing
More informationHistory Slicing: Assisting Code-Evolution Tasks
History Slicing: Assisting Code-Evoltion Tasks Francisco Servant Department of Informatics University of California, Irvine Irvine, CA, U.S.A. 92697-3440 fservant@ics.ci.ed James A. Jones Department of
More informationIoT-Cloud Service Optimization in Next Generation Smart Environments
1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Midterm Review Midterm in class on Friday (May 4) Covers material from arch spport to deadlock Based pon lectre material and modles of the book indicated on
More informationSystem Software Release Notes
Syste Software Release Notes Release: MOS 4.3.6-GA Deceber 2012 Part Nber: 010-00894 This Release Note spports Messaging Operating Syste (MOS) release 4.3.6-GA and higher releases ntil replaced by a newer
More informationDIVAR IP Video DIVAR IP Remote viewing via Video Security App and Video Security Client from Bosch
Video DIVAR IP 5000 DIVAR IP 5000 www.boschsecrity.com Remote viewing via Video Secrity App and Video Secrity Client from Bosch Flly featred video recording soltion for p to 32 channels Ot-of-the-box IP
More informationCANoe/CANalyzer New Features
CANoe/CANalyzer New Featres Version 11.0 V1.0 2018-04-10 Agenda Release Information General Diagnostics Testing (CANoe only) VT System AMD/XCP (CANoe only) Scope Sensor CAN / CAN FD Ethernet LIN Car2x
More information(2, 4) Tree Example (2, 4) Tree: Insertion
Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:
More informationGETTING STARTED WITH THE MINIMED 640G INSULIN PUMP
GETTING STARTED WITH THE MINIMED 640G INSULIN PUMP TABLE OF CONTENTS Section 1: Getting Started...3 Getting Started with the MiniMed 640G Inslin Pmp... 3 1.1 Pmp Mechanics and the Delivery of Inslin...
More informationDIVAR IP U. Video DIVAR IP U.
Video DIVAR IP 7000 2U DIVAR IP 7000 2U www.boschsecrity.com RAID-5 protected (standard configration), all-in-one video management soltion for p to 128 channels Ot-of-the-box IP video management soltion
More informationDSA E-Series (E bay)
Video DSA E-Series (E2800 12-bay) DSA E-Series (E2800 12-bay) www.boschsecrity.com Scale-p network storage soltion: controller nit with 12 internal HDDs expandable via state-of-theart SAS interface-connected
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More information