Automatic Application Deployment in the Cloud: from Practice to Theory and Back
|
|
- Sybil Virginia Randall
- 8 years ago
- Views:
Transcription
1 Automatic Application Deployment in the Cloud: from Practice to Theory and Back Gianluigi Zavattaro University of Bologna - Italy FoCUS research team INRIA - France Based on joint work with: T.A. Lascu, J. Mauro Univ. of Bologna - Italy R. Di Cosmo, S. Zacchiroli, J. Zwolakowski Univ. Paris Diderot - France A. Eiche Mandriva SA - France
2 Cloud applications u Cloud computing offers the possibility to build sophisticated software systems on virtualized infrastructures at a fraction of the time / cost necessary just few years ago u We can give a look at Juju to have an idea of how cloud applications can be easily deployed nowadays
3 Cloud application management is any way a complex task u Even if tool-supported, the cloud application operator must decide: n which software components to select n the overall application architecture n the order of the configuration actions n
4 The challenge u Understand how much of the operator s activities can be automatised: n selection of the software components (selected from appropriate repositories) n synthesis of the overall architecture n planning of the configuration actions to be executed to realize the expected architecture n
5 Our current practical results u Definition of a language for describing component s repositories { "states": [ { "provide": {}, "require": {}, "initial": true, "name": "Installed", "successors": [ "Template" ] }, { "provide": {}, "require": {}, "successors": [ "Configured" ], "name": "Template" }, { "provide": {}, "require": { "@Haproxy/Active/add_database": 1 }, "successors": [ "Active" ], "name": "Configured" }, { "provide": {}, "require": { "@Haproxy/Active/add_database": 1, "@Httpd/Active/start": 1, "@Httpd/Configured/get_document_root": 1 }, "successors": [ "ActiveWithNfs" ], }, "name": "Active" } { "provide": { "@Wordpress/ActiveWithNfs/get_website": 1000 }, "require": { "@Haproxy/Active/add_database": 1, "@Httpd/Active/start": 1, "@Httpd/Configured/get_document_root": 1, "@Nfs_client/Active/mount": 1 }, "name": "ActiveWithNfs" } ], "name": "Wordpress"
6 Our current practical results u Definition of a language for describing component s @Httpd/Configured/get_document_root Configured Template Installed Legend Component State Initial State Require Port Provide Port
7 Our current practical results u Realization of a tool for component s selection and architecture synthesis debian3@aeiche.innovation.mandriva.com @Wordpress/ActiveWithNfs/get_website mbs1@aeiche.innovation.mandriva.com [mbs] mbs0@aeiche.innovation.mandriva.com [mbs] debian1@aeiche.innovation.mandriva.com [debian] mbs3@aeiche.innovation.mandriva.com @Nfs_server/Active/get_dir mbs2@aeiche.innovation.mandriva.com [mbs] debian2@aeiche.innovation.mandriva.com [debian]
8 Our current practical results u Realization of a tool for component s selection and architecture synthesis
9 Our current practical results u Realization of a tool for planning the configuration actions to be executed GALERA-1 WORDPRESS-2 GALERA-3 GALERA-2 WORDPRESS-1 galera-1 (C,Repositories) wordpress-2 (C,Installed) galera-3 (C,Repositories) galera-2 (C,Repositories) wordpress-1 (C,Installed) HTTPD-1 HTTPD-2 galera-1 (Repositories,Installed) wordpress-2 (Installed,Template) httpd-1 (C,Installed) galera-3 (Repositories,Installed) galera-2 (Repositories,Installed) wordpress-1 (Installed,Template) httpd-2 (C,Installed) NFS_SERVER-1 galera-1 (Installed,Configured) wordpress-2 (Template,Configured) httpd-1 (Installed,Configured) galera-3 (Installed,Configured) galera-2 (Installed,Configured) wordpress-1 (Template,Configured) httpd-2 (Installed,Configured) HAPROXY-2 HAPROXY-1 haproxy-2 (C,Installed) galera-1 (Configured,Active) wordpress-2 httpd-1 (Configured,Active) galera-3 (Configured,Active) galera-2 (Configured,Active) haproxy-1 (C,Installed) wordpress-1 httpd-2 (Configured,Active) VARNISH-1 NFS_CLIENT-2 NFS_CLIENT-1 haproxy-2 (Installed,Configured) galera-1 (Active,D) varnish-1 (C,Installed) wordpress-2 (Active,ActiveWithNfs) httpd-1 (Active,D) galera-3 (Active,D) galera-2 (Active,D) haproxy-1 (Installed,Configured) wordpress-1 (Active,ActiveWithNfs) httpd-2 (Active,D) nfs_client-2 (C,Installed) nfs_server-1 (Configured,Active) varnish-1 (Installed,Configured) haproxy-1 (Configured,Active) wordpress-1 (ActiveWithNfs,D) nfs_client-2 (Installed,Active) nfs_server-1 (Active,D) haproxy-2 (Active,D) varnish-1 (Configured,Active.ActiveSysD) haproxy-1 (Active,D) nfs_client-2 (Active,D) varnish-1 (Active.ActiveSysD,Active) varnish-1 (Active,D)
10 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work
11 Component types u A component has provide and require ports u A component has an internal state machine u Ports are active or inactive according to the current internal state Provide ports Require ports
12 Example: the Wordpress component @Httpd/Configured/get_document_root Legend Template Component Installed wordpress State Initial State Require Port Provide Port
13 Conflicts u Conflicts are expressed as special ports n The apache web server is in conflict with the lighttpd web server
14 Capacity constraints u Provide (resp. require) ports could have an associated upper (resp. lower) bound to the number of connections wordpress 3 mysql 2 wordpress 2 loadbalancer wordpress mysql varnish mysql
15 Configurations u Component instances, with a current build. In the kerberos case, krb5 is built in the first stage state, missing and out the complementary generation of the krb5-ldapprovide/require package. Then ports openldap connected can be built directly by bindings into its normal build satisfying ing between the tified by id 1 and tified by id 2 ; tate of the commore than one ponents. For inonfiguration dete the resources apache2, a), and three new comy. All these new e initial state for mponents can be ge(a, uninst, inst) int, to be able n Example: build into its Kerberos normal stage. This with process ldap wouldsupport be modeled in Aeolus as depicted in Fig. 2. Debian (example of circular dependency) the mysql inst its dependencies. Once openldap is built, krb5 can also be
16 Configurations u Component instances, with a current state, and complementary provide/require ports connected by bindings 2 mysql loadbalancer varnish 2 wordpress wordpress wordpress wordpress 3 mysql 3 mysql 2 mysql 2 mysql mysql wordpress mysql mysql
17 Formalizing the deployment problem
18 Formalizing the deployment problem
19 Formalizing the deployment problem
20 Deployment problem u Input: n A set of component types (called Universe) n One target component type-state pair u Output: n Yes, if there exists a deployment plan n No, otherwise Deployment plan: a sequence of actions leading to a final configuration containing at least one component of the given target type, in the given target state
21 een the id 1 and id 2 ; the comhan one. For intion deesources,a), and ew comese new l state for ts can be inst, inst) be able ysql inst Deployment problem: example build. In the kerberos case, krb5 is built in the first stage u missing Consider out the the generation problem of the krb5-ldap of installing package. Then openldap kerberos can bewith built directly ldap intosupport its normal build in satisfying Debian its dependencies. Once openldap is built, krb5 can also be build into its normal stage. This process would be modeled in Aeolus as depicted in Fig. 2. n Universe: packages krb5 and openldap n Target: krb5 in normal state
22 een the id 1 and id 2 ; the comhan one. For intion deesources,a), and ew comese new l state for ts can be inst, inst) be able ysql inst Deployment problem: example build. In the kerberos case, krb5 is built in the first stage missing out the generation of the krb5-ldap package. Then new(k:krb5),new(o:openldap), openldap can be built directly into its normal build satisfying statechange(k,uninst,stage1), its dependencies. Once openldap is built, krb5 can also be bind(libkrb5-dev,o,k),statechange(o,uninst,normal), build into its normal stage. This process would be modeled bind(libldap2-dev,k,o), Aeolus as depicted Fig. 2. statechange(k,stage1,normal) u Deployment plan: k o
23 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work
24 Summary of decidability/complexity results Component model Deployment is Full component model Undecidable [SEFM12] No capacity constraints Ackermann-hard [ICALP13,I&C14] No capacity constraints, No conflicts Quadratic [SEFM12]
25 Quadratic algorithm without constraints and conflicts [SEFM12] u Forward reachability algorithm n all reachable states computed by saturation Algorithm 1 Checking achievability in the Aeolus model function Achievability(U, T, q) absconf := { T, T.init T U} provport := T,q absconf {dom(t.p(q ))} repeat new := { T,q T,q absconf, (q,q ) T.trans}\absConf newport := T,q new {dom(t.p(q ))} while T,q new. dom(t.r(q )) provport newport do new := new \{ T,q } newport := T,q new {dom(t.p(q ))} end while absconf := absconf new provport := provport newport until new = if T,q absconf then return true else return false end if end function
26 issing out the generation of the krb5-ldap package. Then penldap Example: can be built directly into its normal build satisfying ts dependencies. Once openldap is built, krb5 can also be uild into its normal stage. This process would be modeled in eolus as depicted in Fig. 2. the kerberos case-study a pyramid of levels of component-states having arrows or arcs between two consecutive levels as the one in Fig. 3. Initial states New states ig. 2: Representation of the krb5 and openldap components. All reachable. Reachability analysis The first step in the proposed technique checks if the the esired states target state can be reached. To do so all reachable tates are computed, for each of the component types in the iven universe. In the following we use the pair T,q to enote a Automatic component Application type Deployment T and one in the ofcloud its state q. An increasing sequence of sets of component-state pairs
27 Lesson learned from the foundational study Deployment can be reasonably fully automatised if we do not consider capacity constraints and conflicts
28 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work
29 Fully automated deployment (no capacity, no conflicts) [ICTAI13] or. 3. u Use the graph of the reachability algorithm bottom-up from the target state n select the bindings (red arrows) n select the predecessors (black arrows) (a) ple. (b)
30 we at es he m ate in he Fully automated deployment (no capacity, no conflicts) (a) replacing z,x,y with z,x,y where z,x,y is a delete action or it is the the first statechange reaching a state y that does not provide r. After applying these relaxations we obtain the final version of abstract plan that, for the kerberos case, is the one depicted in Fig. 6. (b) Time g. 4: Generation of abstract plan for the kerberos example. te, get component-state pair at the bottom of the pyramid. om to the bottom level we then proceed upward selecting the mponents he that are used to deploy the selected componentte pairs at the lower level. To do so, for every selected on mponent at level i + 1, we select at level i one of its edecessors (i.e. a component-state pair connected via the Fig. Automatic 6: Abstract Application plan Deployment for the kerberos in the Cloud example after relaxation. arrow) or a copy (i.e. a component-state pair connected [ICTAI13] u Generate an abstract plan (one component for each maximal path) Arrows represent a precedence relation: blue: start requirement red: end requirement
31 Fully automated deployment we at es he m ate in he te, to he on en (no capacity, no conflicts) u Plan as a topological visit until target: new(k:krb5),new(o:openldap), statechange(k,uninst,stage1), bind(libkrb5-dev,o,k),statechange(o,uninst,normal), bind(libldap2-dev,k,o), statechange(k,stage1,normal) replacing z,x,y with z,x,y where z,x,y is a delete action or it is the the first statechange reaching a state y that does not provide r. After applying these relaxations we obtain the final version of abstract plan that, for the kerberos case, is the one depicted in Fig. 6. Time [ICTAI13] Arrows represent a precedence relation: blue: start requirement red: end requirement Fig. Automatic 6: Abstract Application plan Deployment for the kerberos in the Cloud example after relaxation.
32 Fully automated deployment (no capacity, no conflicts) [ICTAI13] u Problem: cycles could forbid the topological visit u Example: krb5 in normal requires an openldap in uninst state
33 Fully automated deployment (no capacity, no conflicts) kerberos example in which the component type krb5 in normal state requires not only one openldap in normal state, but also one in uninst state. In thisu case The the target abstract plan state will be as in Fig. 7 (note the addition of the pair of arcs labeled with cannot be visited! uninst). [ICTAI13] Fig. 7: Abstract plan for the modified kerberos example. th d n 9 th im th o n in f F h th n w
34 this is not possible because in the same phase of the plan the instance is required to change its internal state. This problem can be solved by means of instance duplication: an additional component instance is deployed in such a way that the new instance can continue providing the required interface during Fully automated deployment (no capacity, no conflicts) that specific phase of the plan. The application of instance duplication to the abstract plan in Fig. 7 is reported in Fig. 8, where we add a new instance y of type openldap that does not proceed further than state uninst. This new resource is used to satisfy the requirement uninst of z. Notice that the topological visit until the target node z, stage1, normal becomes now possible. [ICTAI13] u Solution: component duplication Fig. 8: Abstract plan in Fig. 7 after duplication of instance w. reachability dependencie nodes at a lo In the con very importa developing l change and, Since 1998, defined for in order to a This languag Our tool to validate o do so we ha problem int into one PD to state cha only when t required inte unbind actio
35 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work
36 Capacity constraints and conflicts strike back [ASE14,CONCUR15] u We have investigated the problem of synthesising the final configuration n considering capacity constraints and conflicts but... n abstracting away from the internal configuration automata u Idea for computing the final configuration: n first perform component selection n and then establish the bindings
37 Component selection [CONCUR15] u Component selection is NP-complete but we can use Contraint Solving technology
38 Bindings establishment [CONCUR15] u Bindings decided as solution of a max-flow problem
39 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work
40 Putting everything together: Aeolus Blender [ICSOC15] u Armonic: library of components u Zephyrus: synthesis of the final architecture u Metis: plan the configuration actions
41 Reconfiguration vs. Deployment u Reconfiguration problem: n same as deployment, but with non empty initial configuration n reconfiguration is already PSpace-complete without capacity constraints and conflicts [MFCS15] u Open issue: n Find further restrictions to the model that make reconfiguration tractable (seems very useful in practice)
42 Other open issues u In real systems there is a flow of configuration data among components: n Room for name-passing models? u Hierarchical modeling (administrative domains, cloud providers, geographical areas, ): n Room for ambient-like models? u QoS and resource consumption: n Room for quantitative models?
43 Structure of the talk u Formalizing the deployment problem u Decidability/complexity results u Fully automatic deployment (without capacity constraints and conflicts) u Constraints and conflicts strike back u Conclusion and Open issues u Related work
44 Related work u TOSCA [OASIS standard 2013] n Language for topologies and deployment plans
45 Related work Figure 6: Life-cycle of a node u CloudMF { "id" : "SensApp", "retrieval" : "wget -P ~ war; wget -P ~ sh ; wget -P ~ sh", "deployment" : "deploysensapp.sh", "start" : "startsensapp.sh", "requires" : [ { "id" : "JettyCapability", "isoptional" : false }, { "id" : "MongoDBCapability", "isoptional" : false } ], "inputs" : [ { "id" : "RESTChannel", "portnumber" : "8080", "isremote" : true } ], "provides" : [ { "id" : "RESTServer", "portnumber" : "8080" } ] } Automatic ] Application Deployment in the Cloud Changing the status of an artefact encompasses adapting all its de pendencies accordingly. The resources that can be associated to a artefact type can be annotated with commands describing how t move from one state to another. [J.Ferry et al. - NordiCloud13] n Similar language for component description ()%*( Listing 4: An example of a node instance from a C "nodeinstances"!"#$#%& : '#"%& [ /"#"*$%&& ] { "id" : "smallgnulinux1",!"#"$%&''() "type" : "SmallGNULinux", "provides" : [ { "id" : "ssh1", } ] #"*$%&&%$#+"-.%#& #"*$%&& /"#"*$%&& "type" : "SSH" } *"$%&''() 1+".#,/)( *$%)$#",-())+) 200,0 An artefact instance represents an instance of a co +,"-#./0() application on a specific virtual machine (e.g., an ())+) Jetty container and 1+".#,/)( of the SENSAPP server deploye machine above). *$+0 *$%)$ Listing 5: 1/""#". Examples of artefact instances fro JSON "artefactinstances" : [ { Figure "id" 7: : "jetty1", Life-cycle of an application
46 } var cpus as 1..4; var memory as int; ject, and is Automatic not shared Application between Deployment different in the instances Cloud of Mawe always wanted ws1 to run on m1 we would al ous work, before discussing the implications and directions for future work. var machine as r abstract class Rol to write: } 2 Modelling with ConfSolve Related work var m0 as Machine; class WebServer ex ConfSolve provides the user with Which an is object-oriented an example of an equality var port constraint. as 0..6 In which m0 is a Machine object declarative in thelanguage, global scope, with with a Java-like Constraints: syntax, which Constraints adheres cpus, to several an integer key subrange; principles: } are expressions whi members os, an enumeration; u ConfSolve [J.A.Hewson, P.Anderson, hold in A.D.Gordon any solution to the - LISA12] model. For example and memory, an unbounded integer. 1. Order never matters. Declaration ducing and a database-server usage can oc- role which can be either Member variables may also declare objects, allowing or master, and must be peered References: with another slave Asso the nesting of child objects within a parent object. For elled using referenc example, we could add a network interface to the machine definition: enum DatabaseRole { Master, Consider Slave an } objects elsewhere i instanc n Object-oriented cur in any orderlanguage with no difference for inservices meaning. and ter, as appropriate: machines 2. Everything is an expression, except declarations. 3. All classes are equal: there are no built-in classes n Type system with special for meanings checking such asconfiguration Machine or File. correctness class Machine { class DatabaseServer extends Variables and Classes: A ConfSolve model consists var ws1 Role as { WebServ... var role as DatabaseRole; of a global scope in which strongly-typed variables, n Constraint solver for var en0 as NetworkInterface; classes, and enumerations may be declared. For example, a simple placement machine may of be defined as: machine was declar In the previous decl } // slave or master automatic var peer as ref DatabaseServer; contains a referenc class NetworkInterface services on machines enum { OperatingSystem { Windows, UNIX, OSX } refer to m0, as it is t var subnet as 0..3; // the peer cannot be itself clared. The solver w } peer!= this; class Machine { a reference to any in var os as OperatingSystem; // a master s peer mustwe bealways a slave, wanted w An instance of NetworkInterface var cpus will as be created 1..4; whenever a Machine is instantiated. varthe memory lifetime as int; of the Net- role!= peer.role; // and a slave s peer must to write: be a master workinterface instance is} tied to that of its parent ob- } ws1.machine = m1; var m0 as Machine; ws1.machine = m1;
47 Related work u Engage [J.Fischer, R.Majumdar, S.Esmaeilsabzali - PLDI12] n Architectural specification in terms of inside / peer / environment relationships n Automata with resource lifecycle and transient dependencies n Assumption on acyclic relationships (to always guarantee topological visit) uninstalled Figure 5 shows the dependencies generated when partial instantiation specification [ active] of Figure 2. We h resource install instances that were start restart present in the specificat inside inside Server running inside server, inside and an instance openmrs for inside RS application running inside tomcat. In particular, the t have to explicitly give JDK the other JRE dependencies on Java MySQL env env peers. The partial installation specification may also define ndividual Tomcat configuration portinside properties. In Open our example, MRS me and os user name properties have been assigned ssigned configuration properties will take the default ed infigure the associated 5:HypergraphforpartialinstallationspecificationinFigure 2 Automatic resource Application types. Deployment in the Cloud figuration engine takes this partial installation. specifiinactive active Lemma uninstall 1. Let R be a stop set of well-formed resourc a partial install specification. [ inactive] Then procedure G creates a directed hypergraph G = (V, E), such th resource Figure 3: instance Resource driver r I, forwehaver Tomcat V, and for instance r V, either CONCUR'15 r I- or there is some res r I that is transitively dependent on the key
48 Mentioned publications u u u u u u u [SEFM12] R. Di Cosmo, S. Zacchiroli, G. Zavattaro. Towards a Formal Component Model for the Cloud. Proc. of SEFM 12: LNCS 7504, Springer. [ICALP13] R. Di Cosmo, J. Mauro, S. Zacchiroli, G. Zavattaro. Component Reconfiguration in the Presence of Conflicts. Proc. of ICALP 13: LNCS 7966, Springer. [ICTAI13] T. A. Lascu, J. Mauro, G. Zavattaro. A Planning Tool Supporting the Deployment of Cloud Applications. Proc. of ICTAI 13: IEEE Press. [I&C14] R. Di Cosmo, J. Mauro, S. Zacchiroli, G. Zavattaro. Aeolus: A component model for the cloud. Information and Computation, 239: (2014). [MFCS15] J. Mauro, G. Zavattaro. On the Complexity of Reconfiguration in Systems with Legacy Components. Proc. of MFCS 15: LNCS 9234, Springer. [ASE14] R. Di Cosmo, M. Lienhardt, R. Treinen, S. Zacchiroli, J. Zwolakowski, A. Eiche, A. Agahi. Automated synthesis and deployment of cloud applications. Proc. of ASE 14: ACM Press. [ICSOC15] R. Di Cosmo, A. Eiche, J. Mauro, S. Zacchiroli, G. Zavattaro, J. Zwolakowski. Automatic Deployment of Services in the Cloud with Aeolus Blender. Proc. of ICSOC 15, to appear, Springer.
Aeolus: Mastering the Complexity of Cloud Application Deployment
Aeolus: Mastering the Complexity of Cloud Application Deployment Gianluigi Zavattaro University of Bologna - Italy FoCUS research team INRIA - France Based on joint work with: Tudor A. Lascu and Jacopo
More informationAutomatic Application Deployment in the Cloud: from Practice to Theory and Back
Automatic Application Deployment in the Cloud: from Practice to Theory and Back Roberto Di Cosmo 2, Michael Lienhardt 1, Jacopo Mauro 1, Stefano Zacchiroli 2, Gianluigi Zavattaro 1, and Jakub Zwolakowski
More informationTowards a Deployment System for Cloud Applications
Towards a Deployment System for Cloud Applications Ruici Luo 1,3, Wei Ye 2,3, and Shikun Zhang 2,3 1 School of Electronics Engineering and Computer Science, Peking University, China 2 National Engineering
More informationWinery A Modeling Tool for TOSCA-based Cloud Applications
Institute of Architecture of Application Systems Winery A Modeling Tool for TOSCA-based Cloud Applications Oliver Kopp 1,2, Tobias Binz 2, Uwe Breitenbücher 2, and Frank Leymann 2 1 IPVS, 2 IAAS, University
More informationOn the Integration of Automatic Deployment into the ABS Modeling Language
On the Integration of Automatic Deployment into the ABS Modeling Language Stijn De Gouw, Michael Lienhardt, Jacopo Mauro, Behrooz Nobakht, Gianluigi Zavattaro To cite this version: Stijn De Gouw, Michael
More informationPlanning Configuration Relocation on the BonFIRE Infrastructure
Planning Configuration Relocation on the BonFIRE Infrastructure Herry Herry and Paul Anderson School of Informatics, University of Edinburgh Edinburgh, UK h.herry@sms.ed.ac.uk, dcspaul@ed.ac.uk Abstract
More informationIntroduction to CloudScript
Introduction to CloudScript A NephoScale Whitepaper Authors: Nick Peterson, Alan Meadows Date: 2012-07-06 CloudScript is a build language for the cloud. It is a simple Domain Specific Language (DSL) that
More informationC2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds
C2C: An Automated Deployment Framework for Distributed Applications on Multi-Clouds Flora Karniavoura, Antonis Papaioannou, and Kostas Magoutis Institute of Computer Science (ICS) Foundation for Research
More informationHow To Set Up An Intellicus Cluster And Load Balancing On Ubuntu 8.1.2.2 (Windows) With A Cluster And Report Server (Windows And Ubuntu) On A Server (Amd64) On An Ubuntu Server
Intellicus Cluster and Load Balancing (Windows) Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Copyright 2014 Intellicus Technologies This
More informationIntellicus Cluster and Load Balancing (Windows) Version: 7.3
Intellicus Cluster and Load Balancing (Windows) Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not
More information<Insert Picture Here> Introducing Hudson. Winston Prakash. Click to edit Master subtitle style
Introducing Hudson Click to edit Master subtitle style Winston Prakash What is Hudson? Hudson is an open source continuous integration (CI) server. A CI server can do various tasks
More informationCHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS Java EE Components Java EE Vendor Specifications Containers Java EE Blueprint Services JDBC Data Sources Java Naming and Directory Interface Java Message
More informationCatDV Pro Workgroup Serve r
Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability
More informationPortal Factory 1.0 - CMIS Connector Module documentation
DOCUMENTATION Portal Factory 1.0 - CMIS Connector Module documentation Rooted in Open Source CMS, Jahia s Digital Industrialization paradigm is about streamlining Enterprise digital projects across channels
More informationCreate WebLogic Cluster application... 2. Prerequisites... 2. From Application director import-export service... 2
Table of Contents Create WebLogic Cluster application... 2 Prerequisites... 2 From Application director import-export service... 2 Deploy the WebLogic Server 12c Cluster application... 5 Method - 1: From
More informationAttack Graph Techniques
Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration
More informationWEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE
WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE Contents 1. Pattern Overview... 3 Features 3 Getting started with the Web Application Pattern... 3 Accepting the Web Application Pattern license agreement...
More informationHow To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
More informationSimba XMLA Provider for Oracle OLAP 2.0. Linux Administration Guide. Simba Technologies Inc. April 23, 2013
Simba XMLA Provider for Oracle OLAP 2.0 April 23, 2013 Simba Technologies Inc. Copyright 2013 Simba Technologies Inc. All Rights Reserved. Information in this document is subject to change without notice.
More informationBuilding a Continuous Integration Pipeline with Docker
Building a Continuous Integration Pipeline with Docker August 2015 Table of Contents Overview 3 Architectural Overview and Required Components 3 Architectural Components 3 Workflow 4 Environment Prerequisites
More informationUser Guide. version 1.0
User Guide version 1.0 December 16, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's IT Automation
More informationOracle WebLogic Server 11g Administration
Oracle WebLogic Server 11g Administration This course is designed to provide instruction and hands-on practice in installing and configuring Oracle WebLogic Server 11g. These tasks include starting and
More informationWeb development... the server side (of the force)
Web development... the server side (of the force) Fabien POULARD Document under license Creative Commons Attribution Share Alike 2.5 http://www.creativecommons.org/learnmore Web development... the server
More informationDynamic Resource allocation in Cloud
Dynamic Resource allocation in Cloud ABSTRACT: Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from
More informationChapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
More informationHP OO 10.X - SiteScope Monitoring Templates
HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,
More informationUser Guide. version 1.2
Network Discovery User Guide version 1.2 February 15, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationPTC Integrity Eclipse and IBM Rational Development Platform Guide
PTC Integrity Eclipse and IBM Rational Development Platform Guide The PTC Integrity integration with Eclipse Platform and the IBM Rational Software Development Platform series allows you to access Integrity
More informationAklaBox. The Ultimate Document Platform for your Cloud Infrastructure. Installation Guideline
AklaBox The Ultimate Document Platform for your Cloud Infrastructure Installation Guideline Contents Introduction... 3 Environment pre-requisite for Java... 3 About this documentation... 3 Pre-requisites...
More informationIBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
More informationInfrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS) (ENCS 691K Chapter 4) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ References 1. R. Moreno et al.,
More informationBootstrapping Software Distributions
Bootstrapping Software Distributions Pietro Abate 1 Johannes Schauer 2 1 Univ Paris Diderot, PPS, UMR 7126, Paris, France 2 Jacobs University Bremen, College Ring 3, MB670, 28759 Bremen CBSE 2013 P. Abate,
More informationJava, PHP & Ruby - Cloud Hosting
Java, PHP & Ruby - Cloud Hosting NO LOCK-IN No technical lock-in and no binding contract. We believe in open standards without any technical lock-ins. We think that Open source provides flexibility and
More informationNS DISCOVER 4.0 ADMINISTRATOR S GUIDE. July, 2015. Version 4.0
NS DISCOVER 4.0 ADMINISTRATOR S GUIDE July, 2015 Version 4.0 TABLE OF CONTENTS 1 General Information... 4 1.1 Objective... 4 1.2 New 4.0 Features Improvements... 4 1.3 Migrating from 3.x to 4.x... 5 2
More informationHow To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
More information24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
More informationMagento Search Extension TECHNICAL DOCUMENTATION
CHAPTER 1... 3 1. INSTALLING PREREQUISITES AND THE MODULE (APACHE SOLR)... 3 1.1 Installation of the search server... 3 1.2 Configure the search server for usage with the search module... 7 Deploy the
More informationFermilab Central Web Service Site Owner User Manual. DocDB: CS-doc-5372
Fermilab Central Web Service Site Owner User Manual DocDB: CS-doc-5372 1 Table of Contents DocDB: CS-doc-5372... 1 1. Role Definitions... 3 2. Site Owner Responsibilities... 3 3. Tier1 websites and Tier2
More informationA Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems
A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems Vincenzo Grassi Università di Roma Tor Vergata, Italy Raffaela Mirandola {vgrassi, mirandola}@info.uniroma2.it Abstract.
More informationOpenTOSCA Release v1.1. Contact: info@opentosca.org Documentation Version: March 11, 2014 Current version: http://files.opentosca.
OpenTOSCA Release v1.1 Contact: info@opentosca.org Documentation Version: March 11, 2014 Current version: http://files.opentosca.de NOTICE This work has been supported by the Federal Ministry of Economics
More informationInstall guide for Websphere 7.0
DOCUMENTATION Install guide for Websphere 7.0 Jahia EE v6.6.1.0 Jahia s next-generation, open source CMS stems from a widely acknowledged vision of enterprise application convergence web, document, search,
More informationCHAPTER 7 SSL CONFIGURATION AND TESTING
CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive
More informationSmart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)
More informationSNMP and Web-based Load Cluster Management System
and Web-based Load Cluster Management System Myungsup Kim and J. Won-Ki Hong Distributed Processing & Network Management Lab. Dept. of Computer Science and Engineering, Pohang Korea Tel: +82-54-279-5654
More informationAutomatic Configuration of Slave Nameservers (BIND 9.7.2 only)
DNSSHIM 1 DNSSHIM is an open-source software that implements the Domain Name Name System (DNS) protocol for the Internet. Its main feature is to work as a Hidden Master nameserver, that is, provide information
More informationHow To Monitor A Server With Zabbix
& JavaEE Platform Monitoring A Good Match? Company Facts Jesta Digital is a leading global provider of next generation entertainment content and services for the digital consumer. subsidiary of Jesta Group,
More informationdocs.hortonworks.com
docs.hortonworks.com : Security Administration Tools Guide Copyright 2012-2014 Hortonworks, Inc. Some rights reserved. The, powered by Apache Hadoop, is a massively scalable and 100% open source platform
More information1 How to install CQ5 with an Application Server
1 How to install CQ5 with an Application Server Contents 1.1. WebSphere v6.1... 1 1.2. WebLogic v10.3... 3 1.3. Tomcat v6... 6 1.4. JBoss v4... 8 1.5. Generic Procedures... 10 The following sections detail
More informationSee the installation page http://wiki.wocommunity.org/display/documentation/deploying+on+linux
Linux Installation See the installation page http://wiki.wocommunity.org/display/documentation/deploying+on+linux Added goodies (project Wonder) Install couple of more goodies from Wonder. I Installed
More informationSSL CONFIGURATION GUIDE
HYPERION RELEASE 9.3.1 SSL CONFIGURATION GUIDE CONTENTS IN BRIEF About This Document... 2 Assumptions... 2 Information Sources... 2 Identifying SSL Points for Hyperion Products... 4 Common Activities...
More informationSynchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
More informationUsing LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
More informationOW2 migration to Xsalto
OW2 migration to Xsalto 10 th july 2007 Armel Lannois Table of Content ObjectWeb architecture overview Actual OW2 Servers overview Problems Opportunities OW2 architecture Migration plan Tasks 2 ObjectWeb
More informationIntegrated Billing Solutions with HP CSA 4.00
Technical white paper Integrated Billing Solutions with HP CSA 4.00 Table of Contents Introduction... 2 Part 1. HP CSA Concepts... 2 Part 2. Billable Service Conditions... 4 Part 3. Billable Intervals...
More informationTivoli Endpoint Manager for Remote Control Version 8 Release 2. User s Guide
Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Tivoli Endpoint Manager for Remote Control Version 8 Release 2 User s Guide Note Before using this information and the product
More informationFormal Verification Problems in a Bigdata World: Towards a Mighty Synergy
Dept. of Computer Science Formal Verification Problems in a Bigdata World: Towards a Mighty Synergy Matteo Camilli matteo.camilli@unimi.it http://camilli.di.unimi.it ICSE 2014 Hyderabad, India June 3,
More informationContent Server Installation Guide
Content Server Installation Guide Version 5.3 SP3 July 2006 Copyright 1994-2006 EMC Corporation. All rights reserved. Table of Contents Preface... 11 Chapter 1 Server Installation Quick Start... 13 Installing
More informationIaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
More informationWebSphere Business Monitor V7.0: Clustering Single cluster deployment environment pattern
Copyright IBM Corporation 2010 All rights reserved WebSphere Business Monitor V7.0: Clustering Single cluster deployment environment pattern What this exercise is about... 2 Exercise requirements... 2
More informationUnderstanding Infrastructure as Code. By Michael Wittig and Andreas Wittig
Understanding Infrastructure as Code By Michael Wittig and Andreas Wittig In this article, excerpted from Amazon Web Service in Action, we will explain Infrastructure as Code. Infrastructure as Code describes
More informationIntellicus Enterprise Reporting and BI Platform
Intellicus Cluster and Load Balancing (Windows) Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Copyright 2014 Intellicus Technologies This
More informationLoad testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
More informationCreating Basic Custom Monitoring Dashboards Antonio Mangiacotti, Stefania Oliverio & Randy Allen
Creating Basic Custom Monitoring Dashboards by Antonio Mangiacotti, Stefania Oliverio & Randy Allen v1.1 Introduction With the release of IBM Tivoli Monitoring 6.3 and IBM Dashboard Application Services
More informationEQUELLA. Clustering Configuration Guide. Version 6.0
EQUELLA Clustering Configuration Guide Version 6.0 Document History Document No. Reviewed Finalised Published 1 17/10/2012 17/10/2012 17/10/2012 October 2012 edition. Information in this document may change
More informationIBM Cloud Manager with OpenStack
IBM Cloud Manager with OpenStack Download Trial Guide Cloud Solutions Team: Cloud Solutions Beta cloudbta@us.ibm.com Page 1 Table of Contents Chapter 1: Introduction...3 Development cycle release scope...3
More informationAT&T CLOUD SERVICES. AT&T Synaptic Compute as a Service SM : How to Get Started. Version 2.0 January 2012
Version 2.0 January 2012 AT&T CLOUD SERVICES AT&T Synaptic Compute as a Service SM : How to Get Started 2012 AT&T Intellectual Property. All rights reserved. Notice Copyright AT&T Intellectual Property.
More informationCommand-Line Tool for View Manager View Manager 4.0
Technical Note Command-Line Tool for View Manager View Manager 4.0 The Command Line Tool for View Manager is a utility provided with the View Manager application that allows you to carry out administrative
More informationCentral Web Service Linux WordPress SaaS Architecture Design
Central Web Service Linux WordPress SaaS Architecture Design Table of Contents Support Staff... 2 System Design... 3 WordPress SaaS Architecture Design Document... 3 Server Layout... 3 Access Zones...
More informationIBM SmartCloud Workload Automation - Software as a Service. Agent Installation and Uninstallation Messages
IBM SmartCloud Workload Automation - Software as a Service Agent Installation and Uninstallation Messages IBM SmartCloud Workload Automation - Software as a Service Agent Installation and Uninstallation
More informationHP Asset Manager. Software version: 5.20. Integration with software distribution and configuration management tools
HP Asset Manager Software version: 5.20 Integration with software distribution and configuration management tools Document Release Date: 01 October 2009 Software Release Date: October 2009 Legal Notices
More informationMyOra 3.0. User Guide. SQL Tool for Oracle. Jayam Systems, LLC
MyOra 3.0 SQL Tool for Oracle User Guide Jayam Systems, LLC Contents Features... 4 Connecting to the Database... 5 Login... 5 Login History... 6 Connection Indicator... 6 Closing the Connection... 7 SQL
More informationMcAfee Network Threat Response (NTR) 4.0
McAfee Network Threat Response (NTR) 4.0 Configuring Automated Reporting and Alerting Automated reporting is supported with introduction of NTR 4.0 and designed to send automated reports via existing SMTP
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationSystem Center Configuration Manager 2007
System Center Configuration Manager 2007 Software Distribution Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has
More informationWeb Development on the SOEN 6011 Server
Web Development on the SOEN 6011 Server Stephen Barret October 30, 2007 Introduction Systems structured around Fowler s patterns of Enterprise Application Architecture (EAA) require a multi-tiered environment
More informationAppStack Technology Overview Model-Driven Application Management for the Cloud
AppStack Technology Overview Model-Driven Application Management for the Cloud Accelerating Application Time-to-Market The last several years have seen a rapid adoption for public and private cloud infrastructure
More informationLego4TOSCA: Composable Building Blocks for Cloud Applications
Institute of Architecture of Application Systems Lego4TOSCA: Composable Building Blocks for Cloud Applications Florian Haupt, Frank Leymann, Alexander Nowak, Sebastian Wagner Institute of Architecture
More informationCA Spectrum and CA Service Desk
CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter
More informationA Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools
A Characterization Taxonomy for Integrated Management of Modeling and Simulation Tools Bobby Hartway AEgis Technologies Group 631 Discovery Drive Huntsville, AL 35806 256-922-0802 bhartway@aegistg.com
More informationHAProxy. Ryan O'Hara Principal Software Engineer, Red Hat September 17, 2014. 1 HAProxy
HAProxy Ryan O'Hara Principal Software Engineer, Red Hat September 17, 2014 1 HAProxy HAProxy Overview Capabilities Configuration OpenStack HA Neutron LBaaS Resources Questions 2 HAProxy Overview Load
More informationConfiguration & Build Management
Object-Oriented Software Engineering Using UML, Patterns, and Java Configuration & Build Management Outline of the Lecture Purpose of Software Configuration Management (SCM) Some Terminology Software Configuration
More informationOASIS TOSCA. Introduction and Overview. Thomas Spatzier, IBM (thomas.spatzier@de.ibm.com)
OASIS TOSA Introduction and Overview Thomas Spatzier, IBM (thomas.spatzier@de.ibm.com) Agenda TOSA Overview and Examples TOSA oncepts Explained TOSA advanced Features 2 Motivation for TOSA Even simple
More informationComodo Certificate Manager Version 5.4
Comodo Certificate Manager Version 5.4 Comodo Certificate Authority Proxy Server Architectural Overview Guide Version 5.4.031816 Comodo CA Limited 3rd Floor, 26 Office Village, Exchange Quay, Trafford
More informationContents. System Development Models and Methods. Design Abstraction and Views. Synthesis. Control/Data-Flow Models. System Synthesis Models
System Development Models and Methods Dipl.-Inf. Mirko Caspar Version: 10.02.L.r-1.0-100929 Contents HW/SW Codesign Process Design Abstraction and Views Synthesis Control/Data-Flow Models System Synthesis
More informationLOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS
LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations
More informationTOSCA Interoperability Demonstration
Topology and Orchestration Specification for Cloud Applications (TOSCA) Standard TOSCA Interoperability Demonstration Participating Companies: Join the TOSCA Technical Committee www.oasis-open.org, join@oasis-open.org
More informationNimsoft Monitor Compatibility Matrix October 17, 2013
Nimsoft Monitor Compatibility Matrix October 17, 2013 1 Nimsoft Monitor Compatibility Matrix Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided
More informationOASIS TOSCA. Introduction and Overview
OASIS TOSA Introduction and Overview Frank Leymann, IBM & U of Stuttgart (Leymann@iaas.uni-stuttgart.de Thomas Spatzier, IBM (thomas.spatzier@de.ibm.com) Agenda TOSA Overview and Examples TOSA oncepts
More informationForward proxy server vs reverse proxy server
Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose
More information1. Introduction 2. Getting Started 3. Scenario 1 - Non-Replicated Cluster 4. Scenario 2 - Replicated Cluster 5. Conclusion
1. Introduction... 1 1.1. Non-Replicated Cluster... 1 1.2. Replicated Cluster... 2 1.3. Mixing Both Options... 3 2. Getting Started... 5 3. Scenario 1 - Non-Replicated Cluster... 6 3.1. JOSSO Agent Configuration...
More informationIntegrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation
Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation Agenda Overview Components Considerations Configurations Futures Summary What is needed? Thorough understanding components,
More informationWebSphere Business Monitor V7.0 Configuring a remote CEI server
Copyright IBM Corporation 2010 All rights reserved WebSphere Business Monitor V7.0 What this exercise is about... 2 Lab requirements... 2 What you should be able to do... 2 Introduction... 3 Part 1: Install
More informationChapter 2: Getting Started
Chapter 2: Getting Started Once Partek Flow is installed, Chapter 2 will take the user to the next stage and describes the user interface and, of note, defines a number of terms required to understand
More informationSoftware Configuration Management. Addendum zu Kapitel 13
Software Configuration Management Addendum zu Kapitel 13 Outline Purpose of Software Configuration Management (SCM) Motivation: Why software configuration management? Definition: What is software configuration
More informationConfiguration Manager
After you have installed Unified Intelligent Contact Management (Unified ICM) and have it running, use the to view and update the configuration information in the Unified ICM database. The configuration
More informationMeta-Model specification V2 D602.012
PROPRIETARY RIGHTS STATEMENT THIS DOCUMENT CONTAINS INFORMATION, WHICH IS PROPRIETARY TO THE CRYSTAL CONSORTIUM. NEITHER THIS DOCUMENT NOR THE INFORMATION CONTAINED HEREIN SHALL BE USED, DUPLICATED OR
More informationAutomated Validation & Verification of Software Paper Presentation
Regression Test Selection for Java Software Salvador Valencia Rodríguez Automated Validation & Verification of Software Paper Presentation Paper authors Mary Jean Harrold James A. Jones Tongyu Li Donglin
More informationSubversion Server for Windows
Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.
More informationRobust Reconfiguration of Cloud Applications
Robust Reconfiguration of Cloud Applications Francisco Durán University of Málaga, Spain duran@uma.es Gwen Salaün University of Grenoble Alpes, Inria, LIG, CNRS, France gwen.salaun@imag.fr ABSTRACT Cloud
More informationIntroduction to XML Applications
EMC White Paper Introduction to XML Applications Umair Nauman Abstract: This document provides an overview of XML Applications. This is not a comprehensive guide to XML Applications and is intended for
More information