Software Requirement Specification
|
|
- Neil Bruce
- 5 years ago
- Views:
Transcription
1 Software Requirement Specification Publish/Subscribe System Group-03 Atul Jangra 2010CS50277 Dushyant Behl 2010CS50282 Shantanu 2010CS50295 Utkarsh 2010CS
2 1. Introduction Table of Content 1.1 Purpose Motivation Scope Glossary Overview Overall Description 2.1 Product Perspective System Interface User interface Hardware Interface Software Interface Communication Interfaces Memory Constraints Operations Product Functions Context Diagram Use Case Diagram Application Features User Characteristics Constraints Assumptions and Dependencies Specific Requirements 3.1 External interface Terminal Client Interface User Management Interface Account Creation Functional Requirements System Management System Monitoring Account Creation Account Removal Session Creation/Authorisation Message Sending Performance Requirements Logical Database Requirements
3 3.6 Design Constraints Software System Attributes Reliability Availability Security Maintainability Portability Organising Specific Requirements
4 1.0. Introduction 1.1. Purpose The purpose of this document is to present a detailed description of a publish/subscribe system,. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, the constraints under which it must operate and how the system will react to external stimuli. This document is intended for both the stakeholders and the developers of the system Motivation of Project As the number of mobile devices is increasing, the number of users expressing interest in pub-sub system is increasing. To deal with the ever increasing demand of the users, a robust middleware software system is required which would be capable of handling the large number of users and, capable of scaling horizontally to keep the service cost effective Scope of Project This software system will be a middleware system for providing the pub-sub service. It will be designed to deliver published content to the users who have subscribed to it. The system will use a unique identification such as username to identify the users on terminal servers and then push content to the devices affiliated with that username. This project will enable users to get access to content which is according to their interest as well as it provides a platform to content publishers for reaching users. The project aims at developing this middleware independent of the operating system platform. The middleware is concerned with the content delivery aspect to the subscribers Glossary Java NIO: Java New I/O, usually called NIO, is a collection of Java programming language APIs that offer features for intensive I/O operations Pub/Sub: A publish subscribe system that delivers messages to a large group of users subscribed to a particular topic Middleware: Middleware is computer software that connects software components or some people and their applications Admin User: Administrator of the system 4
5 Terminal User: The subscribing user who will receive the messages and broadcast messages to specific rooms with permissions 1.5. Overview The next chapter, the Overall Description section, of this document gives an overview of the functionality of our system. It describes the informal requirements and is used to establish a context for the technical requirements specification in the next chapter. The third chapter, Requirements Specification, of this document is written primarily for the developers and describes in technical terms the details of the functionality of the system. Both sections of the document describe the same software system in its entirety, But are intended for different audiences and thus use different language Overall Description 2.1 Product Perspective This publish-subscribe pattern based middleware system relies on Java NIO API for implementation. This system will be used by enterprises for a variety of purposes such as data-push services, pub/sub broadcast services or any other service which needs multicasting messages to millions of users simultaneously. The system can simultaneously be used for a chat type application, where users would want to send real time text-based messages to each other. The system will be a layered-clustered environment capable of scaling each layer individually as depicted in the following schematic: 5
6 Figure 1: Schematic for the server design System Interface The system being developed will consist of the software application that will be running on the virtual/real hardware. The user of this system will need to follow the following steps: Arrange the desired hardware for the server system in the three layers, virtual or real. Connect the hardware together in an overlay network. Run the Java based programs on the terminal, data forwarding, and the data processing layers. Use an admin machine to monitor the working of the server system. 6
7 User Interface The primary user of this system will be the middleware administrator who will monitor the system s working and hence the user interface would be consist of the following. Options to view the live throughput across different data layers. Interface to view data throughput, connection counts and load monitoring for all the servers. Option to monitor a particular server periodically and also to take down a server in maintenance mode. Interface to replace a particular server with another server. Interface to add/remove new set of servers to a particular layer. Interface to control the connections of a server in any layer to the servers of the other layers Hardware Interface The Hardware involved in this system will be a set of real or virtual servers. This system will be compatible with virtual hardware services such as Amazon EC2 instances Software Interface The system has software interfaces spread across different layers of the system. The servers in different layers will be running software developed in JAVA on Linux based operating system. The administrator shall have a web based monitoring system so as to monitor the server system of Communication Interface The system will need a variety of communication interfaces: Communication between various parts of the clustered environment. This will be using TCP sockets to maintain the necessary communication. Communication of the system with the various users. More precisely, connection of the terminal server layer (Figure 1) with the users. This connection will be created by using java.net.serversocket and java.net.socket from the Java NIO API and will also be based on TCP sockets. 7
8 Memory Constraints Terminal Servers: The terminal nodes requires connecting to a target of over 1 Million clients simultaneously and hence the memory consumed in establishing connection to the clients must not be large so as to prevent overflowing the memory limit of the system. Data Processing/Data Forwarding Servers: The nodes in these layers should be memory efficient in such a way so as to handle maximum connections for the same memory limit. The memory limit here should be kept low so as to prevent the systems from thrashing. Admin End: The Administrator system will be running a simple web server for helping in management of the system, which will not be memory intensive and hence no specific memory requirements for this Operations 1. Terminal User Operations Create a new account - The user should be able to link existing third party accounts with his existing account, or create a new account in, using username and password as credentials. Manage Sessions - The user should be able to disconnect any existing session remotely, if he can t logout from the session from the Terminal Client. Authorize Persistent Socket - The user has to authorize himself on starting a new connection on a terminal server, using a service name, with his secret key (OAuth 2, in case of third party authorization). The user with this secret key must be already registered on the system. Send Message - The user can send message to another user, or a pub/sub room (if he has publishing permissions for the room). 2. Administrative User Operations Add a new server - Add a server instance in any layer on the already deployed system. Replace a server - Replace an existing server in the deployment for upgrading with zero-downtime. Get traffic information on any server Get number of clients connected on any terminal server 2.2. Product Functions The system aims to be a pub/sub system, and an XML based chat system at the same time. Any client that is connected on a terminal server is guaranteed to receive both types of messages, message published in rooms that he is subscribed to, 8
9 and messages sent to him directly. The client can have multiple simultaneous sessions, so that any message that is sent to him is received on all devices connected using his credentials Context Diagram Figure
10 Use Case Diagram: Figure Figure
11 Application Features: Terminal User The user can create a new account, or connect using a third party account like Twitter, Facebook or Google. The user can send messages to a specific user. The user can subscribe to various rooms which will be listed on the client-side application. The user can sign in using one of multiple third party accounts registered with his username. Admin Interface User The user can view the live throughput across different data layers. The user can view data throughput, and connection counts for all the servers. The user can monitor a particular server periodically and also to take down a server in maintenance mode. The user can replace a particular server with another server. The user can add/remove new set of servers to a particular layer.4 The user can control the connections of a server in any layer to the servers of the other layers User Characteristics The user in our system will be the System administrator of the enterprise using this system. This the user is required to know some basic shell scripting, networking and should be able to monitor the load of different servers used in the clustered environment. 2.4 Constraints The major constraints in this project would be the availability of hardware. Decent amount of hardware is needed for the testing of. 2.5 Assumptions and Dependencies We are assuming that the user will be able to tweak his Linux kernel to allow maximum number of sockets that can be created from the Machine. The software also depends on Java NIO APIs. If the API is modified then the developer will have to edit the software to make it compatible with the latest API. 11
12 3.0. Specific Requirements 3.1. External Interface The system has three primary interfaces - Terminal Clients - The users of the pub/sub system who will maintain a persistent socket connection to the deployed system. Any message that needs to be sent to the group of subscribed users, and / or a single user will have to be sent on this persistent socket connection. User Management Interface - This is a set of web APIs in system, through which new users may be registered, a particular user may manage sessions, a user may be unregistered, etc. Administrative Interface - The system will provide an administrative web interface, through which the administrator of the deployed system, will be able to manually change specific layer configurations, and also adjust parameters for individual servers, like maximum users to be connected to a particular server, etc Terminal Client Interface Authorization - Whenever a new user connects with the Terminal Client through a TCP socket, it is required to authorize itself for being able to send and receive any messages. The server will provide an XML interface that the Terminal Client will use for authorizing the socket connection. The server will authorize the Terminal Client on the credentials sent by the Terminal Client. Once a Terminal Client is authorized, the server will add that particular connection to the set of online connections associated a user, and any messages sent for this user will also be forwarded on this socket connection. Receiving Multicast Messages - The server will accept messages for subscription rooms by room administrators, through the terminal client s TCP socket. Every message that is received by the server should contain the target message room, or the usernames of target users. If the message is supposed to be sent to a room, the server checks if the sender has permissions to publish to a room, otherwise if the message is targeted to a set of users, the server checks if the sender has permissions to send to the targeted recipients, and then forwards the message. Sending Multicast Messages - The server will queue up the messages targeted for a specified username. If one or more Terminal Client instances associated with the username are connected, the message is immediately forwarded to the user on the Terminal Client socket connection. If no instance of a Terminal Client is connected for that particular user then the message may get stored in the 12
13 database temporarily (only if the message is directly targeted for the user, and not targeted for a room) User Management Interface User Registration - Any new user of the application will be prompted to create a new profile or login using any existing Gmail / Facebook / twitter account. The server will receive requests for registering the user and adding him to the database of existing users. Manage Session - A user may wish to log in (using the Gmail / Facebook / twitter account he registered with) and end existing user sessions. The server system will abruptly close the Terminal Client TCP socket on receiving such a request. Remove Account - The system will also provide APIs to allow the user to remove an account. When the user wishes to remove the account, the server will make him authorize again for security purposes Administrative Interface Connect Terminal Server System to Data Processing Server - The Administrative Web Interface will provide an option to add a Data Processing Server to the Terminal Server, so that the terminal server can load balance incoming traffic in Terminal Server Layer. Connect Data Processing Server to Data Forwarding Server - The interface will provide an option to connect a Data Forwarding Server with a Data Processing Server, so that the data processing server can forward the message body, after authorization, and finding specific Terminal Servers to which the message data is to be forwarded. Connect Data Forwarding Server to another Data Forwarding Server - The administrator should be able to connect different data forwarding servers with each other so that they may be able to send a message from any single terminal server to any other terminal server. 13
14 3.2. Functional Requirements Use Case: System Management: Introduction: Allow the system administrator to manage the system. This includes upgrading a particular server with another server, add/remove new set of servers to any layer and controlling the connections of a server in any layer to servers of the next layer. Actors: System Admin. Pre-Conditions: Administrator must be logged in to the web-based management system of. Post-Conditions: The action specified by the admin is performed and the system state is updated accordingly. Basic Flow: Action starts when the administrator issues a request. If the admin requests to upgrade a server then will start the node upgrade process which will acknowledge the admin after process completion accordingly. If the admin requests to add/remove new set of nodes to any layer then will ensure the process completion with proper acknowledgement. If the admin requests to reorder the connection of a node with other nodes in the next layer then also will ensure the connection reordering with proper acknowledgement Use Case: System Monitoring: Introduction: Allow the system administrator to monitor the state of the system. This includes monitoring any server / layer etc. Actors: System Admin. Pre-Conditions: Administrator must be logged in to the web-based management system of. Post-Conditions: The data asked by the system admin is provided to him through the same web-based interface. Basic Flow: Action starts when the administrator issues a request. 14
15 The data asked by the admin about any server / layer is passed on to the admin through the web based monitoring system. 15
16 3.2.3 Use Case: Account Creation: Introduction: Allow the terminal user to create a new account with. Actors: Terminal User. Pre-Conditions: None. Post-Conditions: A new user account would be registered with. Basic Flow: Action starts when a new user wants to create an account with. The Terminal user issues a request to create a new account with with user credentials. adds the new user to the registered users database. acknowledges the user that a new account has been created. Alternate Flow: User Already Registered If the user is already registered with the system send the user acknowledgement that the account is already registered with system state unchanged. Registration failure If the registration fails in between due to any reason then will tell the user about registration failure and simply ask him to register again Use Case: Account Removal: Introduction: Allow an already registered terminal user to delete account from. Actors: Terminal User. Pre-Conditions: User should be already registered with. Post-Conditions: The user account should be deleted from. Basic Flow: Action starts when a new user wants to delete his account from. The Terminal user issues a request to delete his account from. asks the user for user credentials to verify the actual user. The User provides the asked user credentials to verify his/her account. authenticates the user and delete his account from the system. 16
17 Alternate Flow: User Not Registered If the user is not registered with the system the authentication will fail and will send the acknowledgement that the account is not registered with leaving system state unchanged. Account deletion failure If the account deletion process fails in between due to any reason then will tell the user about process failure and simply ask him to restart the process again. Figure Use Case: Session Creation/Authorization Introduction: This use case corresponds to the creation of a new session by an already registered user. Actors: Terminal User. Pre-Conditions: User should be already registered with. Post-Conditions: A new user session would be established with the system. Basic Flow: Action starts when a new user wants to connect to. 17
18 The Terminal user issues a request to create a new session with. asks the user for user credentials to verify the actual user. The User provides the asked user credentials to verify his/her account. authenticates the user and establishes a new session with the system by creating a new TCP connection with the user through one of the terminal servers. Alternate Flow: User Not Registered If the user is not registered with the system the authentication will fail and will send the acknowledgement that the account is not registered with leaving system state unchanged. Session creation failure If the session creation fails in between due to any other reason then will close the sockets opened to connect to the user to free any stale used resources Use Case: Messaging Sending: Introduction: Allow the terminal user to send a message to another user registered on, or a publishing room in. Actors: Terminal Users. Pre-Conditions: The User sending the message should be connected to a terminal server, and authorized on the server. Post-Conditions: The message sent by the user will be delivered to intended recipients. If the recipient is offline the message is saved for room targeted messages, otherwise discarded for direct user messages. Basic Flow: Action starts when a connected user sends a message to be broadcast on a room. The Terminal User sends a message, along with the intended target. checks if the sender is authorized to publish the message in the given room, and publishes the message in the room accordingly. Alternate Flow: Intended target is another user checks if the sender has permissions to send the message to the intended recipient user, and sends the direct message accordingly. Intended target is not present will discard the message altogether. 18
19 Figure Performance Requirements Number of Users: Each terminal node is targeted to connect to 1 Million number of end users and maintain a persistent TCP connection to each user. Minimizing Latency: should also ensure that the latency between sending and receiving message through this system should be minimum, no matter how many recipients. Maximizing Throughput: should ensure maximum throughput through each of the nodes in the system, i.e. the data flow through each node should be maximized keeping latency as small as possible. Upgrading Nodes: should also ensure zero downtime upgrade for every node in the system. 3.4 Logical Database Requirements 19
20 For the process of authorisation at the terminal server, we need to store the user ID and the corresponding secret key for all the registered users. When a new user is registered, we need to add to database the new user ID and its secret key. For a particular user, we need to create columns for the different accounts which user could be using with our system. For each account, we need to store the login credential, which may be of following forms: Username and password in case of a simple account(not using OAuth). Username, appid, and secret authorisation key in case of services which using OAuth 2.0 such as Google, Facebook, and Twitter. For the case, when the user is not connected to the terminal server, we may need to store the message that is needed to be sent. The information about all the devices connected to a specific account is also needed to be stored in a database. The internal information about the different server will be stored. This will include the IP address of different machines, category (Terminal server, data forwarding layer, Data processing layer), and virtual ID of the machine. The message history of each room will also be saved in a database. Message history storage will not be done on the system in case of the direct messages. In this case, the history will be saved on the client side, so that it is available to the user. A table for different rooms will also be present. This table will contain all the necessary room-related information such as room administration, room members, room status messages, etc. 3.5 Design Constraints Not applicable 3.6 Software System Attributes Reliability Any message that is sent to the user has to be necessarily received by the user (provided that the user is connected). If the user is not connected then he may only receive the messages published to rooms instead of direct messages sent to him. 20
21 3.6.2 Availability The terminal users are supposed to maintain a persistent TCP socket connection with Terminal Servers, and the servers may receive messages to broadcast at any time. So, the complete system must be up and running always. Any upgrades to the system should have zero downtime Security The system must make sure that the users who are broadcasting messages to the rooms have publishing permissions for the room. If the user is sending a direct message to another user, he must have permissions to send direct messages to that user Maintainability The system has to provide an administrative interface so the layers can be connected with each other. The system should also allow upgrading with minimum downtime (for Terminal Servers), and zero downtime for other servers Portability Portability is not a requirement of this system, as the system is to be deployed once on any machine that can support Java Organizing specific requirements Not applicable. 21
Oracle WebLogic Server 12c: Administration I
Oracle WebLogic Server 12c: Administration I Duration 5 Days What you will learn This Oracle WebLogic Server 12c: Administration I training teaches you how to install and configure Oracle WebLogic Server
More informationSecurity Guide Zoom Video Communications Inc.
Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the best video, audio, and wireless
More informationNIELSEN API PORTAL USER REGISTRATION GUIDE
NIELSEN API PORTAL USER REGISTRATION GUIDE 1 INTRODUCTION In order to access the Nielsen API Portal services, there are three steps that need to be followed sequentially by the user: 1. User Registration
More informationInstant Messaging Compliance for the IM and Presence Service, Release 12.0(1)
Instant Messaging Compliance for the IM and Presence Service, Release 12.0(1) First Published: 2017-08-17 Last Modified: 2017-11-30 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationJIRA Integration Guide
JIRA Integration Guide 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationProduct Specification. Design Team C, COMP 410 Spring 2016
Product Specification Design Team C, COMP 410 Spring 2016 1. Introduction 1.1. Purpose This document defines the high level specifications and architecture of our system as well as the interactions between
More informationInformation Security Policy
Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated
More informationSoftware Design Description Report
2015 Software Design Description Report CodeBenders Haldun Yıldız 1819663 Onur Aydınay 1819002 Deniz Can Yüksel 1819697 Ali Şihab Akcan 1818871 TABLE OF CONTENTS 1 Overview... 3 1.1 Scope... 3 1.2 Purpose...
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationkalmstrom.com Business Solutions
Contents 1 INTRODUCTION... 2 1.1 LANGUAGES... 2 1.2 REQUIREMENTS... 2 2 THE SHAREPOINT SITE... 3 2.1 PERMISSIONS... 3 3 CONVERTED E-MAILS AND SHAREPOINT TICKETS... 4 3.1 THE CONVERTED E-MAIL... 4 3.2 THE
More informationSolace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery
Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Java Message Service (JMS) is a standardized messaging interface that has become a pervasive part of the IT landscape
More informationFIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE
FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE Table of Contents Introduction... 2 Architecture Overview... 2 Supported Browser Versions and Technologies... 3 Firewalls and Login Sessions...
More informationPexip Infinity and Amazon Web Services Deployment Guide
Pexip Infinity and Amazon Web Services Deployment Guide Contents Introduction 1 Deployment guidelines 2 Configuring AWS security groups 4 Deploying a Management Node in AWS 6 Deploying a Conferencing Node
More informationDeploying OAuth with Cisco Collaboration Solution Release 12.0
White Paper Deploying OAuth with Cisco Collaboration Solution Release 12.0 Authors: Bryan Morris, Kevin Roarty (Collaboration Technical Marketing) Last Updated: December 2017 This document describes the
More informationAdministrator Guide Administrator Guide
AutobotAI account setup process with AWS account linking In order to provide AWS account access to autobotai skill, It has to be configured in https://autobot.live portal. Currently only one account can
More informationEquitrac Integrated for Océ
Equitrac Integrated for Océ 1.2 Setup Guide 2014 Equitrac Integrated for Océ Setup Guide Document History Revision Date Revision List November 2, 2012 Updated for Equitrac Office/Express version 4.2.5
More informationIntegrated for Océ Setup Guide
Integrated for Océ Setup Guide Version 1.2 2016 OCE-20160914 Equitrac Integrated for Océ Setup Guide Document History Revision Date September 14, 2016 Revision List New supported devices/card reader web
More informationGetting Started Guide. VMware NSX Cloud services
VMware NSX Cloud services You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback
More informationBMC FootPrints 12 Integration with Remote Support
BMC FootPrints 12 Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are
More informationStreamSets Control Hub Installation Guide
StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in
More informationDeveloping Solutions for Google Cloud Platform (CPD200) Course Agenda
Developing Solutions for Google Cloud Platform (CPD200) Course Agenda Module 1: Developing Solutions for Google Cloud Platform Identify the advantages of Google Cloud Platform for solution development
More informationDeveloping Enterprise Cloud Solutions with Azure
Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course
More informationPASSPORTAL PLUGIN DOCUMENTATION
Contents Requirements... 2 Install or Update Passportal Plugin Solution Center... 3 Configuring Passportal Plugin... 5 Client mapping... 6 User Class Configuration... 7 About the Screens... 8 Passportal
More informationEquitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation
Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012
More informationAuthors: Rostislav Pinski, Dmitry Kaganov, Eli Shtein, Alexander Gorohovski. Version 1.1. Preventing Data Leakage via
Ben Gurion University Deutsche Telekom Labs Authors: Rostislav Pinski, Dmitry Kaganov, Eli Shtein, Alexander Gorohovski Version 1.1 1 1. Introduction...4-16 1.1 Vision...4 1.2 The Problem Domain...5-6
More informationSingle Sign-On for PCF. User's Guide
Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans
More informationChapter 2 WEBLOGIC SERVER DOMAINS. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 WEBLOGIC SERVER DOMAINS SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Domain - concept and implementation. Content of a domain. Common domain types. Production versus
More informationCN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.
CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server
More information<Insert Picture Here> WebLogic JMS Messaging Infrastructure WebLogic Server 11gR1 Labs
WebLogic JMS Messaging Infrastructure WebLogic Server 11gR1 Labs Messaging Basics Built-in Best-of-Breed Messaging (JMS) Engine Years of hardening. Strong performance.
More informationSystem and Software Architecture Description (SSAD)
System and Software Architecture Description (SSAD) FlowerSeeker Team 05 Name Eder Figueroa Sophia Wu Doris Lam Hiram Garcia Roles Primary Role: Project Manager/ Implementer. Secondary Role: Tester. Primary
More informationAuthenticatr. Two-factor authentication made simple for Windows network environments. Version 0.9 USER GUIDE
Authenticatr Two-factor authentication made simple for Windows network environments Version 0.9 USER GUIDE Authenticatr Page 1 Contents Contents... 2 Legal Stuff... 3 About Authenticatr... 4 Installation
More informationPhone Customization Manager
Phone Customization Manager User Guide Release 7.0 May 16 2016 Table of Contents Introduction... 3 Workstation Requirements... 3 Network Connectivity Requirements... 3 Licensing Requirements... 3 Login
More informationNirvana A Technical Introduction
Nirvana A Technical Introduction Cyril PODER, ingénieur avant-vente June 18, 2013 2 Agenda Product Overview Client Delivery Modes Realm Features Management and Administration Clustering & HA Scalability
More information5 OAuth Essentials for API Access Control
5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows
More informationAuthor: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon. All Completed SRS2 Steps
Software Requirements Document for Graffiti Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon Version Date Author Change 0.1 09/13/ SM Initial Document 07 0.2 09/22/
More informationCPM. Quick Start Guide V2.4.0
CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...
More informationPartner Center: Secure application model
Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including
More informationCLUSTERING HIVEMQ. Building highly available, horizontally scalable MQTT Broker Clusters
CLUSTERING HIVEMQ Building highly available, horizontally scalable MQTT Broker Clusters 12/2016 About this document MQTT is based on a publish/subscribe architecture that decouples MQTT clients and uses
More informationCourse: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training
Course: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training Course Length: Duration; 4 days Course Code: WA 2060 This training course covers both the unsupported open source
More informationStoneFax provides the Print To Fax feature to any user who is in the same Windows Domain of the StoneFax server.
Print To Fax StoneFax provides the Print To Fax feature to any user who is in the same Windows Domain of the StoneFax server. Note: StoneFax and the client PC using this feature must be in the same Windows
More informationRelease for Microsoft Windows
[1]Oracle Fail Safe Tutorial Release 4.1.1 for Microsoft Windows E57061-02 April 2015 Oracle Fail Safe Tutorial, Release 4.1.1 for Microsoft Windows E57061-02 Copyright 1999, 2015, Oracle and/or its affiliates.
More informationMicrosoft Dynamics CRM Integration with Bomgar Remote Support
Microsoft Dynamics CRM Integration with Bomgar Remote Support 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown
More informationGetting Started Guide. Prepared by-fatbit Technologies
Getting Started Guide Prepared by-fatbit Technologies 1 Contents 1. Manage Settings... 3 1.1. General... 4 1.2. Local... 6 1.3. SEO... 7 1.4. Option... 8 1.5. Live Chat... 19 1.6. Third Part API s... 20
More informationOctober J. Polycom Cloud Services Portal
October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationBEAWebLogic RFID. Edge Server. Using the Administration Console
BEAWebLogic RFID Edge Server Using the Administration Console Version 2.1 Revised: June 29, 2006 Contents 1. Introduction and Roadmap Document Scope and Audience.............................................
More informationPrivileged Access Management Administrative Guide 15.1
Privileged Access Management Administrative Guide 15.1 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
More informationVMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments
VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation
More informationSAS Event Stream Processing 4.3: Visualizing Event Streams with Streamviewer
SAS Event Stream Processing 4.3: Visualizing Event Streams with Streamviewer Overview Streamviewer provides a user interface that enables you to subscribe to window event streams from one or more event
More informationSectigo Accounts Management
Sectigo Accounts Management Software Version 7.0 User Guide Guide Version 7.0.030414 2018 Sectigo. All rights reserved. Table of Contents 1. Introduction To Sectigo Accounts Management...3 2. My Account...5
More informationPhone Inventory 1.1 (1012)
(1012) 2015 VoIP Integration July 28, 2015 Table of Contents Product Overview... 3 Requirements... 3 Application Requirements... 3 Call Manager... 3 Network Connectivity... 3 IP Phones... 3 Installation
More informationCore Solutions of Microsoft Skype for Business 2015
Course 20334: Core Solutions of Microsoft Skype for Business 2015 Course Outline Module 1: Installing and Implementing Skype for Business Server 2015 This module helps you to identify the external dependencies
More informationEnhancing cloud applications by using messaging services IBM Corporation
Enhancing cloud applications by using messaging services After you complete this section, you should understand: Messaging use cases, benefits, and available APIs in the Message Hub service Message Hub
More informationUsing ANM With Virtual Data Centers
APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,
More informationOracle Communications Services Gatekeeper
Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or
More informationCloud FastPath: Highly Secure Data Transfer
Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance
More informationSenior Project: Calendar
Senior Project: Calendar By Jason Chin June 2, 2017 Contents 1 Introduction 1 2 Vision and Scope 2 2.1 Business Requirements...................... 2 2.1.1 Background........................ 2 2.1.2 Business
More informationMicrosoft Dynamics CRM Integration with Remote Support
Microsoft Dynamics CRM Integration with Remote Support 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property
More informationRemote Support 19.1 Web Rep Console
Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property
More informationMobile Client. User Manual. Version: 2.0.0
Mobile Client User Manual Version: 2.0.0 Index Sr. No. Topic Page 1 Requirement 3 2 How to use Mobile Client 4 3 Compose Message 5 4 Select Contacts 6 5 Manage Contacts 17 6 Manage Distribution List 23
More informationWork with the Outreach App. Schoolwires Centricity2
Work with the Centricity2 Trademark Notice, the logos, and the unique trade dress of are the trademarks, service marks, trade dress and logos of, Inc. All other trademarks, service marks, trade dress and
More informationVMware Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments
VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENS2 for cloud and on-premises deployments Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation
More information271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA
Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.
More informationAdvOSS AAA: Architecture, Call flows and implementing emerging business use cases
AdvOSS AAA: Architecture, Call flows and implementing emerging business use cases An AdvOSS White Paper Latest version of this white paper can always be found at http://advoss.com/resources/whitepapers/advoss-aaa-workflows.pdf
More informationSolace JMS Integration with Red Hat JBoss Fuse (6.0)
Solace JMS Integration with Red Hat JBoss Fuse (6.0) Document Version 1.0 September, 2014 This document is an integration guide for using Solace JMS as a JMS provider in Red Hat JBoss Fuse. Red Hat JBoss
More informationLaserfiche Rio 10.3: Deployment Guide. White Paper
Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6
More informationSecuring Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.
Securing Amazon Web Services (AWS) EC2 Instances with Dome9 A Whitepaper by Dome9 Security, Ltd. Amazon Web Services (AWS) provides business flexibility for your company as you move to the cloud, but new
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationTIBCO API Exchange Manager
TIBCO API Exchange Manager Release Notes Software Release 2.1.0 March 2014 Two-Second Advantage Important Information SSOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR
More informationCitrix Cloud Resource Locations
Citrix Cloud Resource Locations Oct 13, 2017 In Citrix Cloud, resource locations contain the resources you manage such as hypervisors, Cloud Connectors, and VDAs. For an overview, see What are resource
More informationVST Hospital Administrator Guide. Version 2.0.4
VST Hospital Administrator Guide Version 2.0.4 Notice Copyright 2002- Vocera Communications, Inc. All rights reserved. Vocera is a registered trademark of Vocera Communications, Inc. This software is licensed,
More informationOCS INSTALLATION GUIDE
OCS INSTALLATION GUIDE 1. Application database preparation... 2 1.1. Oracle Database 11g... 2 1.2 MySQL 5.5+... 2 2. System initialisation... 3 2.1. Application file storage... 3 2.2. Security tool installation...
More informationTable of Contents. Revision History. 1. Introduction Purpose Document Conventions Intended Audience and Reading Suggestions4
Software Requirements Specification for Python Checker Version 1.0 approved Prepared by Matthew Arnold, Seong, Ian Computer Science Team 4 February 4th 2015 Table of Contents Table of Contents Revision
More informationGoogle Sync Integration Guide. VMware Workspace ONE UEM 1902
Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,
More informationLightstreamer. The Streaming-Ajax Revolution. Product Insight
Lightstreamer The Streaming-Ajax Revolution Product Insight 1 Agenda Paradigms for the Real-Time Web (four models explained) Requirements for a Good Comet Solution Introduction to Lightstreamer Lightstreamer
More informationSCALE AND SECURE MOBILE / IOT MQTT TRAFFIC
APPLICATION NOTE SCALE AND SECURE MOBILE / IOT TRAFFIC Connecting millions of devices requires a simple implementation for fast deployments, adaptive security for protection against hacker attacks, and
More informationWeb Console Setup & User Guide. Version 7.1
Web Console Setup & User Guide Version 7.1 1 Contents Page Number Chapter 1 - Installation and Access 3 Server Setup Client Setup Windows Client Setup Mac Client Setup Linux Client Setup Interoperation
More informationCA Service Desk Integration with Remote Support
CA Service Desk Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the
More informationAssure Self-Service Portal
Assure Self-Service Portal Assure Self-Service Portal is a web-based portal, where Customers are able to: Record Cases to Assure Support 24/7 View existing and past Cases Find solutions to known issues
More informationPAS for OpenEdge Support for JWT and OAuth Samples -
PAS for OpenEdge Support for JWT and OAuth 2.0 - Samples - Version 1.0 November 21, 2017 Copyright 2017 and/or its subsidiaries or affiliates. All Rights Reserved. 2 TABLE OF CONTENTS INTRODUCTION... 3
More informationInstalling and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS 3.0(2) and CallManager 3.2
Cisco - Installing and Configuring Extension Mobility Using Either: Extended Services 2... Page 1 of 90 Installing and Configuring Extension Mobility Using Either: Extended Services 2.2; CRA 2.2 or CRS
More informationContract Information Management System (CIMS) Technical System Architecture
Technical System REVISION HISTORY REVISION NUMBER ISSUE DATE PRIMARY AUTHOR(S) NOTES 1.0 2/2015 Cheryl Kelmar Software: Kami Phengphet Engineer: Pornpat Nikamanon Architect: Jim Zhou Creation of CIMS document.
More informationEquitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation
Equitrac Embedded for Kyocera Mita 1.3 Setup Guide 2012 Equitrac Corporation 2012 Equitrac Corporation Equitrac Embedded for Kyocera Mita Setup Guide Document Revision History Revision Date Revision List
More informationCPM Quick Start Guide V2.2.0
CPM Quick Start Guide V2.2.0 1 Content 1 Introduction... 3 1.1 Launching the instance... 3 1.2 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 3 3 Creating a Simple Backup
More informationOPC UA Configuration Manager PTC Inc. All Rights Reserved.
2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance
More informationOverview. Borland VisiBroker 7.0
Overview Borland VisiBroker 7.0 Borland Software Corporation 20450 Stevens Creek Blvd., Suite 800 Cupertino, CA 95014 USA www.borland.com Refer to the file deploy.html for a complete list of files that
More informationEnterprise print management in VMware Horizon
Enterprise print management in VMware Horizon Introduction: Embracing and Extending VMware Horizon Tricerat Simplify Printing enhances the capabilities of VMware Horizon environments by enabling reliable
More informationOracle WebLogic Server 11g: Administration Essentials
Oracle University Contact Us: +33 (0) 1 57 60 20 81 Oracle WebLogic Server 11g: Administration Essentials Duration: 5 Days What you will learn This Oracle WebLogic Server 11g: Administration Essentials
More informationApplication Container Cloud
APPLICATION CONTAINER CLOUD Application Container Cloud with Java SE and Node The Best Java SE and Node Cloud. Get the choice of either Oracle Java SE Advanced, including Flight Recorder for production
More informationOracle Responsys. Release 18B. New Feature Summary ORACLE
Oracle Responsys Release 18B New Feature Summary ORACLE TABLE OF CONTENTS Revision History 4 Overview 4 APIs 4 New Throttling Limits for Web Services APIs 4 New Asynchronous Web Services APIs 5 New REST
More informationTECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper
TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS White Paper Table of Contents Executive Summary... 3 Audience.... 3 Introduction.... 3 Architecture....
More informationWeb Design and Applications
Web Design and Applications JEE, Message-Driven Beans Gheorghe Aurel Pacurar JEE, Message-Driven Beans Java Message Service - JMS Server JMS is a standard Java API that allows applications to create, send,
More informationSetting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1
Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date
More informationSoftware Release Communication 02/07/2014. Topics covered. Solutions You Can Count On
Topics covered Vea Web... 2 User Access Changes... 4 Dashboard Sharing... 7 Component Upgrade... 8 System Manager Geocode Function... 9 Installer Changes... 11 VEA WEB The initial version of Vea Web, included
More informationBEA WebLogic. Server. MedRec Clustering Tutorial
BEA WebLogic Server MedRec Clustering Tutorial Release 8.1 Document Date: February 2003 Revised: July 18, 2003 Copyright Copyright 2003 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This
More informationSystem and Software Architecture Description (SSAD)
System and Software Architecture Description (SSAD) FlowerSeeker Team 05 Name Eder Figueroa Sophia Wu Doris Lam Hiram Garcia Roles Primary Role: Project Manager/ Implementer. Secondary Role: Tester. Primary
More informationSETUP GUIDE PPP FOR PPP USERS PLANT PROTECTION PRODUCTS VERSION 0.4
SETUP GUIDE FOR PPP USERS VERSION 0.4 PPP PLANT PROTECTION PRODUCTS TABLE OF CONTENTS 1. INTRODUCTION... 3 2. STEP 1: CREATING YOUR ECAS ACCOUNT... 4 3. STEP 2: REQUESTING ACCESS TO THE APPLICATION...
More informationMobile ios Configuration Guide
Mobile ios Configuration Guide Version 23 SP-WX-MBLIOS-CG-201807--R023.00 Sage 2018. All rights reserved. This document contains information proprietary to Sage and may not be reproduced, disclosed, or
More information