ThinAir Server Platform White Paper June 2000
|
|
- Natalie Briggs
- 5 years ago
- Views:
Transcription
1 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, All Rights Reserved
2 Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part of it may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without permission from ThinAirApps Inc. June Printed in the United States of America. Trademark Attributions ThinAirApps SM, ThinAir Server, ThinAir Provider, ThinAirApps logos and/or other ThinAirApps products referenced herein are trademarks of ThinAirApps. The names of other products mentioned herein may be the trademarks of their respective owners. ThinAirApps 428 Broadway New York, New York, USA ThinAirApps, Inc. 1999, All Rights Reserved 1
3 The ThinAir Server Platform ThinAir Server is an open and extensible platform, offering applications a broad range of services focused on the wireless access paradigm. The server provides a rich execution environment, capable of supporting access from many different types of wireless devices, and of allowing applications to serve data to and interact with the users of these devices. Applications leverage core ThinAir Server functionality such as the ability to detect and gather device-specific information, store persistent user information, and access various distributed data access components. Real-Time Access to Data In contrast to mobile computing technologies that rely exclusively on synchronization between device and desktop, the ThinAir Server application model focuses on providing a real-time, two-way communication channel between end-users, with their myriad devices, and back-end data stores and organizational applications. Device users gain instant access to the most up-to-date information and have the ability to affect that data remotely. ThinAirApps, Inc. 1999, All Rights Reserved 2
4 A Secure Solution The modular architecture of ThinAir Server is designed to specifically address the wide range of security models employed by all types and sizes of organizations. The server leverages the same 128-bit Secure Sockets Layer (SSL) protocol relied upon by industry-leading Internet e-commerce and financial applications. The distributed architecture supports the most complex and tightly regulated firewall and LAN configurations with ease. The platform also takes maximum advantage of security mechanisms provided by Wireless Service Providers (WSPs) and device manufacturers, ensuring that your data is secure as it travels the numerous links between the enterprise and wireless device. Groupware Access for ThinAir Server The Groupware Access for ThinAir Server application is included with this server distribution, giving your organization an immediate channel from the most popular wireless devices into secure groupware and messaging servers. The devices supported by the Groupware Access application are include Palm handhelds, WAP and HDML handsets, RIM Pagers, and any HTML Micro-Browser including Pocket IE on Pocket PCs. Leading corporate messaging servers, such as Microsoft Exchange and Lotus Domino, are supported, as well as any open standards-based server which utilizes IMAP, POP, and LDAP. Empowering Developers ThinAir Server is designed to allow developers to quickly build applications that interface with existing Web sites, groupware servers, sales automation tools, databases, or virtually anything else. Please visit the Developer section of the ThinAirApps Web site at for more information and to download the Wireless SDK for ThinAir Server. An Open Platform ThinAir Server is an open, extensible platform for developing and delivering applications to a variety of wireless devices, from palmtops to WAP-enabled handsets. Implemented in 100% Pure Java, the ThinAir Server architecture manages the communication details of each device automatically, allowing developers to concentrate on writing the business logic of their applications. This document introduces developers to the tools and services that make up the Wireless SDK for ThinAir Server. It includes both a general overview of the ThinAir application development model and a series of step-by-step examples that use the SDK APIs to implement useful applications. An application built for ThinAir Server is composed of one or more components called Connectors. Each Connector is a small Java program written on top of the ThinAir Platform API that implements the application for a set of device types. The server provides each Connector with several run-time services, including device identification, session management, and a persistent data store for user information, that satisfy requirements common to most applications. ThinAirApps, Inc. 1999, All Rights Reserved 3
5 For more complex applications, a Connector can be complemented with a data-acquisition component called a Provider. By implementing a Provider, developers can delegate the interaction with a remote data store to a separate module, allowing the Connectors to focus exclusively on communication with devices. ThinAir Server supports Providers running within the same process, as separate processes on a single machine, or as fully distributed components on multiple servers within a public network. These options allow an organization to configure its applications for optimal scalability and fault-tolerance. Groupware Access for ThinAir Server is an example of a full-featured application leveraging the capabilities of the ThinAir Server. The Groupware application is composed of Connectors for Palm and RIM handhelds, WAP and HDML-enabled phones, and HTML Web browser devices including Pocket PC. The standard ThinAir Server installation includes Providers for POP, IMAP, Exchange, and Lotus Domino groupware servers. Each Connector can communicate with any of these Providers to obtain groupware data. Finally, the ThinAir Server architecture employs full SSL services (including HTTPS) to protect communication between devices, Connectors, and Providers. This and other features, including a fully encrypted user profile store, ensure that ThinAir Server meets the highest industry standards for security within a distributed system. ThinAirApps, Inc. 1999, All Rights Reserved 4
6 Architecture ThinAir Server provides a highly modular and pluggable foundation for serving applications to wireless devices. ThinAir Server accepts HTTP (or HTTPS) requests and distributes them to registered applications. These applications then respond to requests with content appropriate for each type of device. In the case of browser-based devices, this may be markup content such as WML, HDML, HTML, or others. For devices that support other types of content, applications may support them as well. Applications running on the server may consist of just a single component, or may in fact be made up of several discrete pieces, all easily administered, which communicate through the core server framework. Depending on the particular scheme of the device/wsp, ThinAir Server applications may also leverage client-side components to handle user-interface and network operations. Devices Independent of any applications running on it, ThinAir Server maintains a pool of device decision logic. This logic, built into dynamically pluggable components installed in the server, allows it to examine an incoming request, make decisions about the nature of the requesting device, and gather detailed information on that device to make available to applications. The server framework takes these responsibilities away from the application developer in a flexible, extensible way. Support for new devices can also be added as they are released into the market, ensuring long-term value of the server. Connectors Connectors, the fundamental building blocks of ThinAir Server applications, are responsible for receiving requests from particular types of devices and returning responses appropriate to the capabilities of those devices. ThinAir Server manages a set of loaded Connectors and delegates incoming requests to them appropriately based on device type and application. By using this approach, a ThinAir Server application can be expanded to support new types of devices simply by adding additional Connector functionality. Connectors may or may not support custom client software installed on the wireless device. ThinAir s Groupware Access application for the Palm handheld consists of both a server-side (Connector) and client-side (.PRC application) component. However, the same application also supports WAP-enabled handsets by taking advantage of the device s built-in WML browser and does not require any ThinAir software on the device. Connectors, then, support ThinAir Server applications and are configured as part of the ThinAir Server configuration process. Connector modules can be removed and inserted into ThinAir Server without restricting information flow to other devices. Providers Any back-end data-access logic required in a ThinAir Server application can be easily separated into a distributed, load-balanced component known as a Provider. While Providers are optional components of applications, in many cases they offer significant performance and management advantages. A Provider may be loaded with, and run in, the same process as ThinAir Server itself. It can also be configured to run standalone, residing on a different machine, including that of the data-store itself, or even in a different LAN or authentication domain. Once registered with a ThinAir Server, Providers accept requests from Connectors, authenticate them, and retrieve data from various stores using appropriate protocols. ThinAirApps, Inc. 1999, All Rights Reserved 5
7 ThinAir Server Device Detection Connector(s) Provider Data Store Device ConnectorAccess session management user profiles Provider proxy User Management Fundamental to ThinAir Server is its ability to manage User Profile information on behalf of applications. These profiles allow applications and administrators to manage user devices, ensuring that the user experience is fully tailored to their particular handheld and that administrators have a convenient, consistent way to control application use. The profile management aspect of the server extends to support different levels of authentication and varying security requirements. ThinAir Server includes a graphical tool, ThinAir Server User Manager, for administering the users, applications, and devices communicating with the server. Security Mechanisms ThinAir Server offers wireless devices a secure gateway into an organization s sensitive internal data stores. In addition to encrypting data as it travels over both wired and wireless public networks the ThinAir Server Platform offers authentication services and ensures the integrity of transmitted data. ThinAirApps leverages an industry-leading SSL 3.0 implementation from RSA Security, Inc. to accomplish this goal. The Secure Sockets Layer (SSL) protocol is a reasonably complex one, and some configuration is required to enable it for ThinAir Server. At the simplest level, SSL requires that a secure server have associated with it a Public Key Certificate and a Private Key. The server manages these through a ThinAir SSL Activation File, a file you generate based on your Certificate and Private Key. Between the Server and Wireless Devices The ThinAir Server manages potentially two SSL connections, one between the server and any Wireless Service Provider s proxy, and one between the server and any distributed Providers running with SSL Mode data connections. In the first case, ThinAir Server acts as a secure server and accepts secure connections from clients. Note that the client is actually not the wireless device in most cases, but a proxy server maintained by the WSP. This means it is important that these proxy servers recognize the Certificate Authority (CA) used to sign the ThinAir Server's Public Key, as it is not typically possible to accept new CAs as one might do in a conventional desktop Web browser such as Microsoft Internet Explorer. This also places restrictions on your ability to use your organization s own CA. ThinAirApps, Inc. 1999, All Rights Reserved 6
8 Between the Server and Distributed Providers When using an SSL Mode data connection between the server and distributed Providers, both components act as both server and client, depending on which makes the connection first. The /certs subdirectory of both the server and distributed Provider installations contains Root Certificates for a number of popular Certificate Authorities Root Certificates that are used to verify the validity of a server s certificate when the component is acting as a client. Both components must have a ThinAir SSL Activation File available, though the Certificate on which they are based may come from an internal or other less popular CA. If using a CA for which there is no Root Certificate in the /certs directory, you will need to add the Root Certificate appropriately. Applications, Devices, and User Profiles The ThinAir Server architecture provides three fundamental abstractions underlying both its administrative and application development models: Applications, Devices, and User Profiles. Applications An application is a collection of services that collaborate to provide wireless access to some computation or data store. In the ThinAir architecture, one or more Connectors implement an application. With the ThinAir User Manager tool, administrators can see which Applications have been installed on a server, and for each application, the users who have registered with it. The ThinAir platform provides a security model for applications that governs the conditions under which users of the system can access them, and how they can take advantage of the server s User Profile functionality. Using the User Manager, administrators can add and remove users to applications and modify these security settings to suit their organization s preferences. Devices ThinAir Server currently supports the industry s most popular and powerful wireless devices, and ThinAirApps mission is to keep pace with the latest advances in wireless technology. When a device contacts the server, its properties (such as screen size, resolution, or color depth) are automatically recognized by the server and made available to applications. If one such property is a unique device identifier, the Connector writer may choose to associate that ID directly with the User Profile of the person making the request. Connectors can use this technique to track users by their devices and to format output conditionally depending on the user and/or type of device to which they are responding. With the User Manager, administrators can graphically relate the devices a user possesses to the applications she is working with. User Profiles Applications often require the ability to identify repeat users and record new ones when they first contact the server. To address this common need, ThinAir Server creates a passwordprotected User Profile for each user of the system, identified by a globally unique ID (the user s ThinAir User ID). User Profiles include information about which devices a user possesses, which applications he has accessed, as well as any application-specific data (such as backend server account information) stored in them by Connectors. The ThinAir User Manager manipulates User Profiles directly, allowing an administrator to inspect a user s profile information, and add (or remove) users to the system and to particular applications. Finally, ThinAir Server can persist User Profiles to a flat file, and will recover this information when restarted. ThinAirApps, Inc. 1999, All Rights Reserved 7
9 Wireless Application Considerations There are many important steps to successfully building and deploying a wireless application. Each new application will be targeted at different sets of devices, and allow interaction with different sets of data. While the ThinAir Server Platform empowers developers to create wireless applications, there are still a variety of issues to understand and work through. Before you begin planning your code, you will want to make a few important decisions about your application: How will wireless extend your existing application? Not all Web or desktop-based applications will be easily extended to wireless devices. , stock trading, and formbased data collection are obvious applications, with fairly straightforward application models. Anything involving a basic push or pull of information can be supported easily. More complicated application models that involve data in various states with a high amount of interaction between the user and server will require more careful planning and consideration. The need for offline queuing and data access will also complicate your application, and its inclusion should be carefully considered. What devices do you want to support? Wireless devices vary widely in price, capabilities, and coverage; if your organization hasn t already standardized on one, it should make this decision very early in the development process. You may find that settling on a single device is impossible because of the diverse needs of your users. The ThinAir Server provides Connector writers with tools to accommodate almost any wireless device, but as the number of devices an application is required to support grows, so will the development effort. Technically, there are several key factors that may affect which device is best suited to your intended application, and thereby influence your design approach: Screen size and resolution. Make sure you ll have enough screen real estate to present a reasonable user interface. Markup language richness. Some devices support a variant of HTML, with an application shell (start screen) and certain resources, such as icons, resident on the device. Other devices use multiple card-based markup languages, allowing for device-side manipulation of data through variables and scripting. Examine the features of the device s markup language, and make sure they can support your intended interaction model. Input mechanism. If your application will require extended text input, be sure that the device provides a keyboard, stylus, or other mechanism that s comfortable to your users. Native application capability. Some wireless devices support only markuplanguage (browser-type) applications, while others are fully programmable. If your application will require complex processing on the device itself, make sure it s of the programmable type. (In many cases, though, processing should be offloaded to the server; the wireless application should be kept as simple as possible.) ThinAirApps, Inc. 1999, All Rights Reserved 8
10 Should your application be implemented as a single Connector or as several Connectors? A Connector is capable of servicing requests from one or more types of devices. If your application logic is basically the same for all device types, with minor changes, you ll probably want to implement it as a single Connector and insert some conditional logic to execute any device-specific code. On the other hand, if your implementation varies widely from device to device, your code will be simplified if you implement a separate Connector for each device type, with shared classes encapsulating the application logic. Do you want to implement Providers? If you are developing a simple application that does not require interaction with a back-end data store, or if some interaction is required, but it can be managed without a lot of complex code, then a Provider may not be necessary. However, if communicating with the back-end data store requires significant processing resources, or if it embeds logic that can be repackaged in a form that s more convenient for use by Connectors, then you may want to implement Providers for the data. You ll also want to consider whether your application would realize significant performance advantages by deploying distributed Providers. Distributed Providers permit the server to dynamically load-balance by routing requests in round-robin fashion to Providers running on different machines. The Connector(s) will handle device requests on one node of the network, while the Providers will communicate with the back-end store on others. How do you want to securely access back-end data stores? An application can attempt to access a secure back-end resource in any way the developer chooses it is a combination of administration and development work that ensure a well-behaved, unbreakable application. In this vein, the application development process happens in concert with the system administration of any back-end resource. For example, an administrator may maintain a database of internal customer data that a developer wishes to access in their application. This would typically be most effectively implemented by having the developer write the application using some standard database-access interface, such as JDBC, in coordination with the administrator maintaining user accounts for that database. The security of the application s back-end, then, can leverage the back-end security system with a username and password scheme. The ThinAir Server environment offers applications straightforward ways to store and securely manage this type of sensitive information, or even just to pass it straight through from the user every time. The Groupware Access for ThinAir Server application is an example of a highly secure solution built using a combination of back-end and internal server authentication and verification mechanisms. Each Groupware Access Provider implements a different security mechanism appropriate to the type of back-end store it accesses, though the application in general also optionally stores encrypted information in the User Profile Store. Conclusion Whether you are interested in wireless access to your groupware or messaging server, or you need to develop your own application, the ThinAir Server Platform provides a robust, secure, extensible solution. For the enterprise, the Groupware Access application is a quick and powerful solution for enabling the myriad of consumer wireless devices to become secure terminals into corporate servers. More enterprise-focused applications will also be released in the coming months, adding to the value of your existing server. For developers, the platform provides a real set of tools and services for enabling existing applications, without proposing an infeasible magical, all-in-one type solution. As the wireless device and application market evolves and expands, ThinAirApps modular and component-based technology can be updated and enhanced to support the most cutting-edge needs. ThinAirApps, Inc. 1999, All Rights Reserved 9
11 Please visit our Web site at for the latest information on our products, and the developer site at for more information on the Wireless SDK. ThinAirApps, Inc. 1999, All Rights Reserved 10
WHITE PAPER. Good Mobile Intranet Technical Overview
WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry
More informationBlackBerry Integration With IBM WebSphere Everyplace Access 4.3
BlackBerry Integration With IBM WebSphere Everyplace Access 4.3 Integration Note Research In Motion 2003 Research In Motion Limited. All Rights Reserved. Contents Integration overview... 3 Related resources...
More informationRIM Introduces New BlackBerry Wireless Handhelds With Integrated Speaker/Microphone And Roaming Capabilities For International Travelers
October 16, 2002 RIM Introduces New BlackBerry Wireless Handhelds With Integrated Speaker/Microphone And Roaming Capabilities For International Travelers Java-Based BlackBerry 6710 And BlackBerry 6720
More informationExtending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E
Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,
More informationRoadSync Java MIDP 2.0 Manual
RoadSync Java MIDP 2.0 Manual Table of Contents General Product Information What is RoadSync (Exchange ActiveSync )... 4 Advantages for Companies and IT Administrators... 4 Key Product Features... 5 System
More informationBlackBerry Enterprise Server Express for Microsoft Exchange
BlackBerry Enterprise Server Express for Microsoft Exchange Version: 5.0 Service Pack: 3 Feature and Technical Overview Published: 2011-04-11 SWDT305802-1526466-0411010819-001 Contents 1 Overview: BlackBerry
More informationRSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief
Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout
More informationApplication Security for Java-based BlackBerry Handhelds
Application Security for Java-based Originally posted: February 2003 Latest revision: May 2003 Introduction Corporate data access capabilities supported by the BlackBerry platform enable wireless connectivity
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server
More informationBlackBerry Enterprise Server Express for IBM Lotus Domino
BlackBerry Enterprise Server Express for IBM Lotus Domino Version: 5.0 Service Pack: 3 Feature and Technical Overview Published: 2011-04-11 SWDT305802-1526466-0411011002-001 Contents 1 Overview: BlackBerry
More informationW H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud
W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationTechnical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems
Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that
More informationGeneral Security Principles
Oracle Enterprise Data Quality for Product Data Security Guide Release 11g R1 (11.1.1.6) E35849-02 February 2013 This document describes the general principles of security of the Oracle Enterprise Data
More informationIBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights
IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Feature and Technical Overview SWDT305802-525776-0331031530-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationX100 ARCHITECTURE REFERENCES:
UNION SYSTEMS GLOBAL This guide is designed to provide you with an highlevel overview of some of the key points of the Oracle Fusion Middleware Forms Services architecture, a component of the Oracle Fusion
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Feature and Technical Overview SWDT305802-524791-0331031644-001 Contents 1 Overview: BlackBerry Enterprise Server... 5 New in this release...
More informationOracle Communications Services Gatekeeper
Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or
More informationConfiguration Guide. Installation and. BlackBerry Enterprise Server for Novell GroupWise. Version: 5.0 Service Pack: 4
BlackBerry Enterprise Server for Novell GroupWise Version: 5.0 Service Pack: 4 Installation and Configuration Guide Published: 2014-01-14 SWD-20140114171550404 Contents 1 Overview: BlackBerry Enterprise
More informationQlik Analytics Platform
Technical Brief Qlik Analytics Platform Building Engaging Visual Analytics October, 2015 qlik.com Table of Contents Introduction 3 Introducing Qlik Analytics Platform 3 Integration Capabilities 4 Architecture
More informationAlteryx Technical Overview
Alteryx Technical Overview v 1.5, March 2017 2017 Alteryx, Inc. v1.5, March 2017 Page 1 Contents System Overview... 3 Alteryx Designer... 3 Alteryx Engine... 3 Alteryx Service... 5 Alteryx Scheduler...
More informationBlackBerry Java Development Environment (JDE)
1 BlackBerry Java Applications for Accessing SAP Applications BlackBerry Java Development Environment The BlackBerry Java Development Environment (JDE) is a fully integrated development and simulation
More informationSECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON
White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage
More informationOneBridge Mobile Groupware 5.0
OneBridge Mobile Groupware 5.0 release overview Extended Systems 5777 North Meeker Avenue Boise, ID 83713 Tel: (800) 235-7576 (208) 322-7800 Fax: (208) 327-5004 Web: www.extendedsystems.com Rev. 1005 Legal
More informationSafeguarding Cardholder Account Data
Safeguarding Cardholder Account Data Attachmate Safeguarding Cardholder Account Data CONTENTS The Twelve PCI Requirements... 1 How Reflection Handles Your Host-Centric Security Issues... 2 The Reflection
More information5 OAuth Essentials for API Access Control
5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationSentinet for Microsoft Azure SENTINET
Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...
More informationPolicy Manager for IBM WebSphere DataPower 7.2: Configuration Guide
Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower Configuration Guide SOAPMDP_Config_7.2.0 Copyright Copyright 2015 SOA Software, Inc. All rights
More informationSSO Integration Overview
SSO Integration Overview 2006-2014 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 7.2 June, 2014 Ping Identity Corporation 1001 17th Street, Suite 100 Denver,
More informationImplementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,
More informationOracle Enterprise Manager
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for VMware ESX Server Release 5 (1.0.3.0.0) to Release 8 (1.1.3.2.0) E13339-05 November 2009 This document is the installation guide
More informationLoad Balancing VMware Workspace Portal/Identity Manager
Load Balancing VMware Workspace Portal/Identity Manager Overview VMware Workspace Portal/Identity Manager combines applications and desktops in a single, aggregated workspace. Employees can then access
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationPervasive Web Application Architecture. History Scalability Availability Development Application Architecture
Pervasive Web Application Architecture History Scalability Availability Development Application Architecture It support multiple devices, such as PCs, WAP phones, PDAs and voice-only phones enables to
More informationM.SARAVANA KARTHIKEYAN
PERVASIVE COMPUTING Unit II Part A 1. What is XML? XML stands for EXtensible Markup Language XML is a markup language much like HTML XML was designed to carry data, not to display data XML tags are not
More informationSolution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server
Solution Integration Guide for Multimedia Communication Server 5100/WLAN/Blackberry Enterprise Server NN49000-302 Document status: Standard Document version: 0101 Document date: 24 May 2007 All Rights
More informationUsing the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationOracle Mobile Hub. Complete Mobile Platform
Oracle Mobile Hub Mobile is everywhere and has changed nearly every facet of our lives. The way we work, play, socialize and interact with one another have all been revolutionized by mobile devices. More
More informationSecure Container DME. SecureContainer - DME is available for ios and Android.
Secure Container DME Soliton SecureContainer - DME is a remote access solution enabling employees to securely access corporate data using their mobile devices. Corporate e-mail, calendar, to-do s and other
More informationEnhancing VMware Horizon View with F5 Solutions
Enhancing VMware Horizon View with F5 Solutions VMware Horizon View is the leading virtualization solution for delivering desktops as a managed service to a wide range of devices. F5 BIG-IP devices optimize
More informationMaking life simpler for remote and mobile workers
: Technology GoToMyPC Technology Making life simpler for remote and mobile workers Learn why GoToMyPC is the most secure, cost-effective and easy-to-use solution for providing remote access to the desktop.
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationEnhancing Exchange Mobile Device Security with the F5 BIG-IP Platform
Enhancing Exchange Mobile Device Security with the F5 BIG-IP Platform By the F5 business development team for the Microsoft Global Alliance Version 1.0 Introduction As the use of mobile devices in the
More informationSiebel CTI Administration Guide. Siebel Innovation Pack 2015, Rev. A October 2015
Siebel CTI Administration Guide Siebel Innovation Pack 2015, Rev. A October 2015 Copyright 2005, 2015 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided
More informationWireless Access Protocol(WAP) architecture
Wireless Access Protocol(WAP) architecture While the evolution of cellular networks has resulted in many mobile services, such services are primarily for voice. Mobile phone users do have the desire to
More informationApplication Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
More informationBusinessObjects OLAP Intelligence XI
Configuring Overview BusinessObjects OLAP Intelligence XI allows users to connect to and design custom applications against OLAP data sources. OLAP Intelligence XI and its web components use the Microsoft
More informationServer Installation ZENworks Mobile Management 2.6.x January 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.6.x January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationWHITEPAPER. Security overview. podio.com
WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features
More informationOracle Fusion Middleware
Oracle Fusion Middleware Creating Domains Using the Configuration Wizard 11g Release 1 (10.3.4) E14140-04 January 2011 This document describes how to use the Configuration Wizard to create, update, and
More informationBLOOMBERG FOR BLACKBERRY
BLOOMBERG FOR BLACKBERRY Maintenance of Device Software 13 February 2008 Version: 1.0 1 CONTENTS 1. INTRODUCTION 2 1.1. Scope 2 2. DOWNLOADING of DEVICE SOFTWARE 3 3. SOFTWARE RELEASE SCHEDULE 4 4. SOFTWARE
More informationSecurity context. Technology. Solution highlights
Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for
More informationQlik Sense Enterprise architecture and scalability
White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,
More informationUnderstanding ACS 5.4 Configuration
CHAPTER 2 ACS 5.4 Configuration : This chapter explains the differences in configuration between ACS 3.x and 4.x and ACS 5.4 when you convert the existing 3.x and 4.x configurations to 5.4. This chapter
More informationDetermining the Best Approach
2 Determining the Best Approach The remaining chapters of this book cover the capabilities of the BlackBerry application platform and then dig into each application development option in detail. Before
More informationHow the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications
White Paper Reflection Desktop for X How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications White Paper How the Next-Generation PC X Server Maximizes the Value of Your UNIX Applications
More informationVI. Corente Services Client
VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...
More informationSiebel Installation Guide for Microsoft Windows
Siebel Installation Guide for Microsoft Windows Siebel 2018 (Applies to Siebel CRM Updates 18.4 through 18.9) September 2018 Copyright 2005, 2018 Oracle and/or its affiliates. All rights reserved. This
More informationDreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com
DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com By Bill Appleton, CTO, DreamFactory Software billappleton@dreamfactory.com Introduction DreamFactory
More informationNovell Access Manager
Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties
More informationCertification Authority
Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying
More informationEvaluation Guide Host Access Management and Security Server 12.4
Evaluation Guide Host Access Management and Security Server 12.4 Copyrights and Notices Copyright 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials
More informationThe SafeNet Security System Version 3 Overview
The SafeNet Security System Version 3 Overview Version 3 Overview Abstract This document provides a description of Information Resource Engineering s SafeNet version 3 products. SafeNet version 3 products
More informationLightweight Directory Access Protocol (LDAP)
Lightweight Directory Access Protocol (LDAP) Blackboard Web Community Manager Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks,
More informationvshield Administration Guide
vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationWHITE PAPER. F5 and Cisco. Supercharging IT Operations with Full-Stack SDN
+ WHITE PAPER F5 and Cisco Supercharging IT Operations with Full-Stack SDN Contents Introduction 3 Confronting the bottleneck 3 Evolving SDN technologies 4 An integrated solution 5 Application policies,
More informationA10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE
A10 Thunder ADC with Oracle E-Business Suite 12.2 DEPLOYMENT GUIDE Table of Contents 1. Introduction... 2 2 Deployment Prerequisites... 2 3 Oracle E-Business Topology... 3 4 Accessing the Thunder ADC Application
More informationLink Platform Manual. Version 5.0 Release Jan 2017
Version 5.0 Release 4.1.1 Jan 2017 Link Platform Manual Copyright 2017 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationTECHNICAL HELP: PRESS * 0
28-NOV- 2001 1 Oracle Corporation 9i Series iseminar: Presenters: Taesang Choi Eun Heo YunSeok Choi Fukiat Julnual Wednesday, November 28, 2001 28-NOV- 2001 2 think fast. think simple. think smart. 28-NOV-
More informationIBM SecureWay On-Demand Server Version 2.0
Securely delivering personalized Web applications IBM On-Demand Server Version 2.0 Highlights Delivers personalized Web solutions on demand to anyone, anywhere using profile serving Provides industry-leading,
More informationIntegrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
More informationMozy. Administrator Guide
Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license
More informationTwo-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Digital Interconnect Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively
More informationRemote Support 19.1 Web Rep Console
Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property
More informationDelivers cost savings, high definition display, and supercharged sharing
TM OpenText TM Exceed TurboX Delivers cost savings, high definition display, and supercharged sharing OpenText Exceed TurboX is an advanced solution for desktop virtualization and remote access to enterprise
More informationSafelayer's Adaptive Authentication: Increased security through context information
1 Safelayer's Adaptive Authentication: Increased security through context information The password continues to be the most widely used credential, although awareness is growing that it provides insufficient
More informationXerox Mobile Print Solution
Software Version 2.5 Version 1.3 Xerox Mobile Print Solution Information Assurance Disclosure Xerox Mobile Print Solution Copyright 2012 Xerox Corporation. All rights reserved. Includes Material Copyright
More informationChapter 3. Technology Adopted. 3.1 Introduction
Chapter 3 Technology Adopted 3.1 Introduction The previous chapter described difference between the propose system and traditional methods and also about the existing similar systems. In this chapter,
More informationSiebel CTI Administration Guide. Siebel Innovation Pack 2016 May 2016
Siebel CTI Administration Guide Siebel Innovation Pack 2016 May 2016 Copyright 2005, 2016 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a
More informationWhat to Know About Exchange 2013 and Load Balancing
What to Know About Exchange 2013 and Load Balancing What are the major differences between Exchange 2010 and Exchange 2013? To answer that let s discuss the main architectural differences between Exchange
More informationDEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER
DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration
More informationLoad Balancing 101: Nuts and Bolts
Load Balancing 101: Nuts and Bolts Load balancing technology is the basis on which today's Application Delivery Controllers operate. But the pervasiveness of load balancing technology does not mean it
More informationOverview. Business value
PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to
More informationAppScaler SSO Active Directory Guide
Version: 1.0.3 Update: April 2018 XPoint Network Notice To Users Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless
More informationOracle Enterprise Single Sign-on Provisioning Gateway
Oracle Enterprise Single Sign-on Provisioning Gateway Installation and Setup Guide Release 10.1.4.0.3 E10330-01 June 2007 Oracle Enterprise Single Sign-on Provisioning Gateway Installation and Setup Guide,
More informationDeveloping corporate mobile applications. An alternative approach to native development
Developing corporate mobile applications An alternative approach to native development SUN J2ME Code Camp Paris, November 5th, 2001 Franck Lefèvre Franck.lefevre@DigitalAirways.com 2 The problem with developing
More informationScaling for the Enterprise
White Paper Solutions Business Manager Scaling for the Enterprise by Pete Dohner and Jeremy Vorndam June 2, 2017 Table of Contents Who Should Read This Paper?... 1 Introduction... 1 N-Tier Architecture...
More informationRelease Notes 1 of 5. Release Notes. BlackBerry 7100g BlackBerry 7290 Wireless Handheld.
Release Notes 1 of 5 Release Notes BlackBerry 7100g BlackBerry 7290 Wireless Handheld Release Notes 2 of 5 NOTE This document is provided for informational purposes only, and does not constitute a binding
More informationCisco How Virtual Private Networks Work
Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:
More informationDomino Integration DME 4.6 IBM Lotus Domino
DME 4.6 IBM Lotus Domino Document version 1.3 Published 10-05-2017 Contents... 3 Authentication and authorization: LDAP... 4 LDAP identity...4 Access groups...5 User information retrieval...6 Configuration...6
More informationUsing the Terminal Services Gateway Lesson 10
Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web
More informationGlobalbrain Administration Guide. Version 5.4
Globalbrain Administration Guide Version 5.4 Copyright 2012 by Brainware, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationClearPath OS 2200 System LAN Security Overview. White paper
ClearPath OS 2200 System LAN Security Overview White paper Table of Contents Introduction 3 Baseline Security 3 LAN Configurations 4 Security Protection Measures 4 Software and Security Updates 4 Security
More informationWorkspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902
Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationFeature Guide. Sybase mbanking
Feature Guide Sybase mbanking 365 2.1 DOCUMENT ID: DC00785-01-0210-01 LAST REVISED: March 2009 Copyright 2009 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and to any
More informationVerizon Wireless Corporate Setup Guide
Verizon Wireless Corporate Email Setup Guide Verizon Wireless Corporate Email Setup Guide You must download and subscribe to the Corporate Email Client before you can begin using the application. You may
More information