WEAVEonline: Technical FAQs
|
|
- Hubert Gallagher
- 8 years ago
- Views:
Transcription
1 WEAVEonline: Technical FAQs 1. What is WEAVEonline? WEAVEonline is our core product, a powerful software application that addresses the need to develop and maintain continuous improvement processes for both the academic and administrative structures within an institution. It guides and provides for the alignment of multiple processes, such as assessment, planning, accreditation, budgeting and institutional priorities. Using a classic model of assessment, WEAVEonline allows users to follow a step-by-step process for completing the assessment cycle. This process begins with creating a mission/purpose and establishing goals for achieving that mission. The process takes the user through objective/outcome development, establishing appropriate measures, setting achievement targets for each measure, reviewing applicable data, writing findings of the assessment results, and establishing needs based on current data through planning before repeating the steps in the next assessment cycle. One of the many strengths of WEAVEonline is the way the application helps users to utilize their results to close the loop by developing and implementing action plans. Action plans can be developed based on need as determined by the data the user collects. Once created, action plans are tracked within WEAVEonline and categorized according to level of completion. This method creates a living history of the institution s assessment work and allows the institution to have a clear longitudinal view of how it has closed the loop. Action Plans can also be developed that are not findings-based but are, instead, intended for strategic planning and quality enhancement purposes. 2. Does the system exist or does it have to be designed and built? The entire structure of WEAVEonline exists already and does not need to be designed. Many institutions begin in academic assessment and expand to administrative assessment, mapping, strategic planning, etc., over time. WEAVEonline is an externally-hosted application. No institutional IT resources (neither hardwarearchitectural, configuration, or otherwise software, nor person hours) are required to employ the WEAVEonline application. It is accessed through web browsers and runs entirely as an online application. Since WEAVEonline is a hosted application, there is no application software download or installation for the institution or for individual client PCs. Recommended browsers are Firefox 5; Internet Explorer 8/9 with JavaScript enabled; Chrome 11.x. Supported browsers are Firefox 3.x/5; Internet Explorer 7/8/9; Chrome 11.x. 3. Where will the data be hosted, locally or on a remote server? WEAVEonline is a 100% hosted solution, and all appropriate commercially reasonable disaster recovery procedures are followed. A centralized automated data protection system is used for the backup and recovery of data and applications. Centrieva makes commercially reasonable efforts to
2 ensure that all modified data is backed-up every night. Encrypted backup data is stored off-site for disaster recovery purposes. No less than two independent Internet connections are maintained at all times. Reliability - WEAVEonline is Secure and Dependable, with: Geo-diverse data-centers: Denver, CO and Louisville, KY Continuously sync d databases and file systems with fully automatic fail-over 99.5% up-time: Down-time over last year has been only for scheduled software upgrades and routine patch maintenance. With triple redundant backups, WEAVEonline has an uptime of 99.5% with 24/7/365 availability. 4. Can we import data on users, courses, and entities to facilitate getting started? Absolutely. We would be happy to send you a brief recorded video of how this is accomplished if it would be helpful. WEAVEonline s Data Import/Export functionality is based on the ability of WEAVEonline to both produce and consume delimited files and XML documents. The Data Import/Export functionality includes the ability to add/edit/remove data in bulk and to exchange and maintain primary keys from external systems (e.g. PeopleSoft) such that the add/edit/remove import/export operations are deterministic and repeatable. Currently, this import/export capability is available for users, entities and courses. 5. Is there a separate charge for this bulk import? No. This is included in our annual membership fee. 6. Please detail the physical location of hosting site, number of years in business, number of clientele housed in the location, emergency preparedness/disaster recovery methodology and plan, detailed schematic of hosting infrastructure and fail-over sites. The location of WEAVE s primary data center is located in Denver, CO with a disaster recovery/automatic-fail-over/replica site in Louisville, KY. WEAVEonline is a 100% hosted solution, and all appropriate commercially reasonable disaster recovery procedures are followed. A centralized automated data protection system is used for the backup and recovery of data and applications. Centrieva makes commercially reasonable efforts to ensure that all modified data is backed-up every night. Encrypted backup data is stored off-site for disaster recovery purposes. No less than two independent Internet connections are maintained at all times. Security: Internal - Fine-grained compartmentalization of data via Entity-level Role assignment. External Internet Facing Dual hardware firewalls: Only HTTP(S) and VPN. Thawte Extended Validation Certificate Security best-practices: Continuous & timely application of system and security patches.
3 Database - All stored-procedures; no dynamic SQL; use of down-level accounts (no system access via database nor web application.) Salted, double-hashed user passwords (WeaveDB only) Extensive server logging and monitoring Filtering and sanitizing of user inputs Use of built-in ASP.NET protections against XSS and other vectors Successfully passed penetration/security audit via IBM AppScan 7. Please detail the scalability of WEAVEonline. SaaS: Subscribers have no limits on the numbers of users, entities nor supporting documents they can incorporate into their work. System can be scaled to multiple web servers (web farm) and multiple database backends with very little change to the application code. Existing system is estimated to support 3x-5x current member count prior to distributing the load across a web farm. 8. Please provide a specific description of on-going technical support beyond initial implementation. WEAVEonline provides maintenance and support for the life of your subscription and it is included in the annual membership fee. We find that our members need for support ebbs and flows and is usually focused more on assessment and planning questions rather than the software itself. Our support is provided by professionals who have first-hand knowledge of assessment and planning and have implemented WEAVEonline on their former campuses. With over 160 members, we have the depth of experience to help ensure your successful implementation and use of WEAVEonline. Support by one of our assessment specialists is provided 8:30 a.m.- 5:00 p.m. (Eastern), Monday- Friday. Because we are committed to your ongoing success, there is no charge to train additional members of your staff should you experience turnover in your WEAVEonline administrative staff. On-going training with regard to system upgrades: Features and functionality that expand the range of possible uses for the software are released on an ongoing basis, with advance notice to campus WEAVEonline Administrators. All on-going training is included in the WEAVEonline membership fee. WEAVEonline user guides/manuals: WEAVEonline has an internally available and integrated help system as well as an online tutorial. The help system includes page-specific help, assessment 101 documents, as well as technical FAQs. Many webinars, including a Faculty Training webinar, exist within our members-only Online Learning Community. The entirety of the integrated help system is also available within the Online Learning Community.
4 The following materials are available electronically: Implementation Guide Glossary* Tutorial* Page Specific Help* Quick Start Guide* Assessment Worksheet** Faculty Training PowerPoint** Introductory Faculty Training Webinar** Mapping Quick Start Guide* Mapping - The Nuts and Bolts of Building a Map Webinar ** Mapping - Many Uses, Great Value Webinar** *available within application **available within the Online Learning Community WEAVEonline acts as a teaching tool for faculty and administrators who are unfamiliar with assessment. The logical step-by-step process promotes successful assessment practice, even from those faculty and staff who are untrained in assessment and planning. For instance, the WEAVEonline data entry screen for adding a measure helps to teach assessment to those without an assessment background by providing sources of evidence lists (Academic Direct Measures, Academic Indirect Indicators, and Administrative Measures) from which to choose. A cursor hovering over each evidence source causes a brief definition to appear so that users can learn more about assessment methods with which they may not be familiar. The simplicity of the software, in tandem with the excellent page-specific help, which defines and explains assessment terms, facilitates the creation of a culture of assessment on campus. We also support this with on-going professional development via free monthly webinars and a quarterly newsletter to share best practices. 9. Please describe ownership of all data generated by the system. Should your institution choose WEAVEonline and, at a later date, elect not to continue as a member, you will retain unconditional rights of ownership of all data generated by WEAVEonline and all data will be submitted to you within thirty days after the contract period ends. 10. Does WEAVEonline support alternative authentication methods? At present, WEAVEonline supports four authentication methods: 1) its own internal database; 2) Central Authentication Service (CAS) v2 and v3; 3) LDAP v2 and v3; and, 4) Active Directory. The security architecture of WEAVEonline is modular and designed to support an unlimited number of authentication methods and variants. If the WEAVEonline internal database is utilized, then passwords are stored as salted/double-hashed one-way bits. If one of the aforementioned institutional single sign-on solutions is used, then no passwords are stored in the WEAVEonline database. If single sign-on has been configured, then users will be automatically redirected to the institution s login portal for CAS. In the case of LDAP, the WEAVEonline system will collect the user ID and password and send them to the institutions LDAP server for authentication. There is a one-time $3,000 fee to implement, configure, and test any of the alternate authentication methods.
5 11. Can WEAVEonline be accessed from behind a firewall? Yes. Browser access is unaffected by the presence of an institutional firewall. 12. Does the product write any data to the user s local hard drive? WEAVEonline does not write any data to the user s local machine. However, users do have the option to export and save reports to their local hard drive. 13. Does WEAVEonline store sensitive or confidential data? How is responsibility for sensitive data handled by the system? Users enter data related to academic or administrative assessments rather than student-level assessments. Most institutions do not classify this information as sensitive or confidential. Access to data is protected by WEAVEonline ID and password login. Institutions assign users to selected entities and also define each user s permissions/security access. WEAVEonline security roles permit selective viewing and modification of data depending on the user s area(s) of responsibility. 14. Is WEAVEonline in full compliance with the Americans with Disabilities Act Section 508? WEAVEonline is designed to meet the regulations governing the accessibility of Federal electronic information products (Section 508). This design also conforms to the access guidelines developed by the Web Accessibility Initiative of the World Wide Web Consortium, in that provisions are made to assure access for those individuals with vision impairments. To ensure this capability, WEAVEonline does not incorporate frames, multimedia presentations, user applets, or plug-ins, bypassing many of the issues outlined in Section 508. Where graphic images apply, the HTML "Alt Text" tag is utilized as a text descriptor to facilitate those individuals who may be using screen readers or other assisting devices.
Assessment, Planning & Accreditation Software. Consulting Services WWW.WEAVEONLINE.COM 877-932-8340
Assessment, Planning & Accreditation Software Consulting Services WWW.WEAVEONLINE.COM 877-932-8340 Almost a decade ago, WEAVEonline Assessment and Planning Management Software was born of higher education
More informationWhy SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
More informationRESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION. Prepared for Brigham Young University. April 21, 2015
RESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION Prepared for Brigham Young University April 21, 2015 Submitted by StreamLink Software, Lauren Nieberding, Sales Manager Company, Product and Service
More informationFrequently Asked Questions
Frequently Asked Questions Page 1 Instsanda FAQs v1.2 Instanda FAQs Contents Hosting, Security, Monitoring and Management... 3 Where is Instanda hosted?... 3 What is the hosting datacentre compliance?...
More informationTechnical specifications
Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.
More informationVersion: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
More informationSHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
More informationTroux Hosting Options
Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4
More informationWEAVE Overview. IE planning and assessment. Strategic plan goals. General education goals. Curriculum mapping. Affirm module - accreditation reports
WEAVE Overview IE planning and assessment Strategic plan goals General education goals Curriculum mapping Affirm module - accreditation reports Objectives Become familiar with the WEAVE cycle Understand
More informationSecure Data Hosting. Your data is our top priority.
Secure Data Hosting Your data is our top priority. ESO s world-class security infrastructure is designed to provide data redundancy, security and availability while keeping sensitive HIPAA and PHI information
More informationHosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
More informationQvidian Proposal Automation (QPA) 10 Quick Facts
Qvidian Proposal Automation (QPA) 10 Quick Facts Last Updated: 5/14/2013 Topic List This white paper lists Qvidian Proposal Automation (QPA) quick facts that address questions commonly asked by Qvidian
More informationSecurity Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
More informationHosted Solutions FAQ. Introduction
Introduction Q. What are Hosted Solutions? A. FileTrail s Hosted Solutions help our clients manage hardcopy records without the capital expense of a traditional software project. Instead of installing
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationSaaS Service Level Agreement (SLA)
SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements
More informationTECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS Technical audits in accordance with Regulation 211/2011 of the European Union and according to Executional Regulation 1179/2011 of the
More informationAuthentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
More informationMEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
More informationClockWork Enterprise 5
ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork
More informationCan SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations
Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS
More informationService Definition Easysite Web CMS
Service Definition Easysite Web CMS Easysite Web Content Management System G-Cloud III Service Definition Easysite Web Content Management System Contents 1 Service Easysite Web Content Management System...
More informationSaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
More informationSecuring the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
More informationWALKME WHITEPAPER. WalkMe Architecture
WALKME WHITEPAPER WalkMe Architecture Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises
More informationowncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
More informationHosting Features, Terms & Policies
Hosting Features, Terms & Policies Portalogiks SharePoint Hosting Table of Contents Data Center Introduction... 2 Connectivity... 3 Power... 3 Security... 3 Environment... 3 Hosting Hardware & Software...
More informationBackup Exec System Recovery Management Solution 2010 FAQ
Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation
More informationEntrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
More informationManaged Services PKI 60-day Trial Quick Start Guide
Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered
More informationPentaho Enterprise and Community Editions Feature Comparison
Pentaho Enterprise and Community Editions Feature Comparison Copyright 2008 Pentaho Corporation. Redistribution permitted. All trademarks are the property of their respective owners. For the latest information,
More informationFINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
More informationActive Directory Sync (AD) How to Setup
Active Directory Sync (AD) How to Setup 1 P a g e Contents How to Setup Active Directory Sync... 3 Download your AD Script... 3 Configuration... 5 Active Directory Sync F.A.Q... 6 2 P a g e How to Setup
More informationSECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our
ENDNOTE ONLINE SECURITY OVERVIEW FOR MY.ENDNOTE.COM In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our servers from attacks and other attempts
More informationCompany Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
More informationActive Directory Sync (AD) How it Works in WhosOnLocation
Active Directory Sync (AD) How it Works in WhosOnLocation 1 P a g e Contents Overview... 3 About AD in WhosOnLocation... 3 The Way It Works... 3 Requirements... 3 How to Setup Active Directory Sync...
More informationDesigning, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008
Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:
More informationWhen Your Networkʼs Down, Call Crown
When Your Networkʼs Down, Call Crown 521 W. Broad Avenue Albany, GA 31701 Phone: 229.317.7940 Fax: 229.317.7941 HelpDesk@CrownNetworking.com MANAGED SERVICES & FLAT RATE I.T. SUPPORT Our Managed Services,
More informationGladinet Cloud Enterprise
GLADINET, INC Gladinet Cloud Enterprise Multi-Site Deployment Guide Gladinet, Inc. 9/27/2013 This document discusses the technologies behind Gladinet Cloud Enterprise Copyright 2013 Gladinet, Inc. Table
More informationAttachment D System Hardware & Software Overview & Recommendations For IRP System
Attachment D System Hardware & Software Overview & Recommendations For IRP System Submitted by Explore Information Services, LLC Table of Contents Table of Contents...2 Explore IRP Configuration Recommendations...3
More informationIT SERVICE MANAGEMENT FAQ
IT SERVICE MANAGEMENT FAQ Version: 1.3 Date: February 2011 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Data Stewardship... 4 2.1 Where is the data stored?... 4 2.2 Who controls the data?... 4 2.2
More informationSecurity Specifications
Security Specifications Overview Password Manager Pro deals with administrative passwords that offer secure access to enterprise credentials and devices. Any compromise on the security of these passwords
More informationPrivate vs. Public Cloud Solutions
Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper
More informationProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
More informationCourse 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationSage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions
Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationProduct Comparison List
Product Comparison List Data Center Size Site Solution / Feature
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationMS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008
MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More information10231B: Designing a Microsoft SharePoint 2010 Infrastructure
10231B: Designing a Microsoft SharePoint 2010 Infrastructure Course Number: 10231B Course Length: 5 Days Course Overview This 5 day course teaches IT Professionals to design and deploy Microsoft SharePoint
More information6231A - Maintaining a Microsoft SQL Server 2008 Database
6231A - Maintaining a Microsoft SQL Server 2008 Database Course Number: 6231A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft Certified Professional
More informationSpektrix Service Definition
Spektrix Service Definition An overview of the G-Cloud Service Spektrix is a cloud-based ticketing and marketing software package provided as Software as a Service. It is designed for arts and entertainment
More informationOPEN FOR EDUCATION. CampusNet - Managed Hosting services for Higher Education
OPEN FOR EDUCATION CampusNet - Managed services for Higher Education The partnership with CampusNet provides ForeFront Education with a fullservice hosting environment complete with staff who have product
More informationFAQ. Hosted Data Disaster Protection
Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional
More informationTEXAS AGRILIFE SERVER MANAGEMENT PROGRAM
TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State
More informationCreating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
More informationINUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER OVERVIEW OF OPEN VIRTUAL DESKTOP Mathieu SCHIRES Version: 1.0.2 Published April 9, 2015 http://www.inuvika.com Contents 1 Introduction 2 2 Terminology and
More informationEdwin Analytics Getting Started Guide
Edwin Analytics Getting Started Guide This guide provides assistance for accessing and using Edwin Analytics, the Department of Elementary and Secondary Education s (ESE) online tool for expanding data
More informationChapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.
Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component
More informationImplementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
More informationImplementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
More informationRemote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
More informationCourse 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
More informationAdobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
More informationEnterprise Governance and Planning
GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,
More informationowncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
More informationPreparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation
Preparation Guide Content EXIN Cloud 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13 Computing Foundation Edition December 2015 Copyright 2015 EXIN All rights reserved.
More informationAppendix C Pricing Index DIR Contract Number DIR-TSO-2724
Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) Amazon Web Services (AWS) is a comprehensive cloud services platform that offers
More informationUpgrading to Websense Web Security v7.6
Upgrading to Websense Web Security v7.6 Webinar April 2011 web security data security email security 2009 Websense, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:
More informationSaaS-Based Employee Benefits Enrollment System
Situation A US based industry leader in Employee benefits catering to large and diverse client base, wanted to build a high performance enterprise application that supports sizeable concurrent user load
More informationSecurity, Reliability & Control with Hosted Exchange
Hosted Applications Commonly referred to a Cloud Computing and/or Software-as-a-Service (SaaS), web-hosted software applications service provides you with a new way to get business software and applications
More informationCherwell Software Hosted Environment. www.creekpointe.com info@creekpointe.com 864.297.4959 +1 800.613.1426
Cherwell Software Hosted Environment Cherwell Software, LLC ( Cherwell ) provides an efficient, expedient, and secure hosted environment so that customers are guaranteed exceptional performance and reliability.
More informationInstalling Version 7.6 The Latest Tips
Installing Version 7.6 The Latest Tips Webinar June 2011 web security data security email security 2009 Websense, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:
More informationREQUEST FOR PROPOSAL Website Design and Development. DUE DATE: FEBRUARY 19, 2016-12:00 p.m.
REQUEST FOR PROPOSAL Website Design and Development DUE DATE: FEBRUARY 19, 2016-12:00 p.m. City of Willow Park 516 Ranch House Rd. Willow Park, Texas 76087 (817) 441 7108 www.willowpark.org Inquiries Inquiries
More informationBefore taking this course, Citrix recommends that learners have the following:
Course CXA-206 Citrix XenApp 6.5 Administration Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize and manage applications
More informationMedia Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
More informationSystem Overview. Security
System Overview System includes embedded MSDE/SQL Server Express database server and full support for Microsoft SQL Server Users can organize, upload, scan and add new documents or view search results
More informationPierianDx - Clinical Genomicist Workstation Software as a Service FAQ s
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s
More informationPreparation Guide. EXIN Cloud Computing Foundation
Preparation Guide EXIN Cloud Computing Foundation Edition June 2012 Copyright 2012 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
More informationBigfoot CMMS. Cloud-Based Maintenance Software
Bigfoot CMMS Cloud-Based Maintenance Software Q U I C K TO L E A R N Q U I C K R E S U LT S w w w. b i g f o o t c m m s. c o m Bigfoot and the Bigfoot logo are registered trademarks of the U.S. Patent
More informationSecuring access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
More informationTable of Contents. Page 1 of 6 (Last updated 30 July 2015)
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
More informationEmpLive Technical Overview
Version 1.6 Updated 27/08/2015 Support: +61 2 8399 1688 Email: support@wfsaustralia.com Website: wfsaustralia.com Legal Notice Copyright WFS: A WorkForce Software Company. All Rights Reserved. By receiving
More informationWeb Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING
Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the
More informationTARRANT COUNTY PURCHASING DEPARTMENT
JACK BEACHAM, C.P.M., A.P.P. PURCHASING AGENT TARRANT COUNTY PURCHASING DEPARTMENT AUGUST 4, 2010 RFP NO. 2010-103 ROB COX, C.P.M., A.P.P. ASSISTANT PURCHASING AGENT RFP FOR DIGITAL ASSET MANAGEMENT SYSTEM
More informationBasic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led
Basic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led Course Description Basic Administration for Citrix XenApp 6.5 training course provides the foundation necessary for administrators
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationMigrating your custom settings to version 7.6
Migrating your custom settings to version 7.6 Webinar July 2011 web security data security email security 2009, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:
More informationBeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
More informationWhite Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
More informationFor <Project> Version 1.0
Oklahoma Department of Human Services Data Services Division Enterprise Single Sign-On System Implementation Plan For Version 1.0 Enterprise Single Sign-On System Implementation
More informationCITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS Number: 1Y0-A16 Passing Score: 550 Time Limit: 165 min File Version: 37.5 http://www.gratisexam.com/ CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS Exam Name: Architecting
More informationWoodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
More informationArchitecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
More informationEvolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016
Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission
More informationMicrosoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
More informationAgilisys G-Cloud Service V
Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform
More information