Advanced Problems in Cloud Computing. Dipl.-Wirt.-Inform. Robert Neumann
|
|
- Georgina Jefferson
- 8 years ago
- Views:
Transcription
1 Advanced Problems in Cloud Computing Dipl.-Wirt.-Inform. Robert Neumann
2 0. General Reengineering Performance enhancements - Minimize roundtrips between separate systems - Write efficient algorithms - Use data types effectively - Make smart memory-cpu trade-off decisions - Avoid complex computations, when rendering query results 321
3 1. Secondary Indexing What for? - PK and RK are indexed fast access - Other entity properties are not indexed query runs over all entities Concept - An ordered index on properties that are neither PK nor RK -How? - Store secondary entity that has property that is to be indexed as PK 322
4 1. Secondary Indexing - Models Original entity 1. Pivoting Property with PK, maintain other properties - Pros: - One roundtrip to serve one query - Cons: - Redundant data storage (twice as much) 323
5 1. Secondary Indexing - Models Original entity 2. Pivoting Property with PK only - Pros: - Minimizes redundant data storage - Cons: - Two roundtrips to serve one query 324
6 1. Secondary Indexing -Example (primary index) E=(PK, RK, {P}) E=( New York, Central Park, {P}) 325
7 1. Secondary Indexing Example (secondary index) E=(PK, RK, {P}) E=( Central, 1, {P}) E=( Central Park, 1, {P}) To differentiate multiple entities for the same search term 326
8 2. High-speed Content Provisioning Medium Performance Consistent Persistent Azure Fast Yes No Membase Fast Yes Yes/No IIS cache Fast No No Table Storage/ SQL Azure Slow Yes Yes ASP.Net Profiles Slow Yes Yes Session State (Table/SQL) Slow Yes Yes/No Cookies Medium Yes/No No! Yes/No No! 327
9 2. High-speed Content Provisioning Table Storage - Good for Look-up Query Operations - Supported - Comparators (e.g., >, <, >=, <=, ==) - Not supported - Contains (e.g., Like ) 328
10 2. High-speed Content Provisioning Page-view Life cycle data 1. Volatile data Always-up-to-date business data Requires immediate consistency 2. Periodically volatile data Data that can be presented with delay Allows for eventual consistency 3. Non-volatile data Static data does not change over time Is repeatedly require to render queries 329
11 2. High-speed Content Provisioning - Example ServiceParrot Data Volatile Periodically volatile Non-volatile New Location X X - Updated Location X X - Top5/Latest5 X X - User Count - X - Location Count Feedback Count - X - - X - 330
12 2. High-speed Content Provisioning - Storage Using caches Volume Volatile Periodically volatile High Table Distributed Non-volatile Distributed Low Table IIS IIS Performance Hierarchy 1. IIS (Client Instance Client) 2. Distributed (Client Instance Instance Client) 3. Table Storage (Client Instance Table Instance Client) Trespasses no system boundary (inside the cloud)! Trespass at least one system boundary (inside the cloud)! 331
13 2. High-speed Content Provisioning - Example ServiceParrot Data Volatile Periodically volatile Non-volatile New Location X (Table) X (A-) - Updated Location X (Table) X (A-) - Top5/Latest5 X (Table) X () - User Count - X () - Location Count Feedback Count - X () - - X () - Volume High High Low Low Low Low Hit rate and size of cacheable data important! (very expensive resource!) 332
14 2. High-speed Content Provisioning - Example ServiceParrot Data Volatile Periodically volatile Non-volatile New Location X (Table) X (A-) - Updated Location X (Table) X (A-) - Top5/Latest5 X (Table) X () - User Count - X () - Location Count Feedback Count - X () - - X () - Volume High High Low Low Low Low Very promising: avoids one Table Storage roundtrip each! 333
15 2. High-speed Content Provisioning Periodic Volatility Strict consistency with Table Storage Request Response -Locations -Feedbacks -UserCount -LocationCount Browser IIS Table Storage 334
16 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Request Response -Locations -Feedbacks -UserCount -LocationCount Browser IIS LastUpdate >= 15Min Table Storage 335
17 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Instance 1 Instance 2 Instance 3 Table Storage UserCount = 1 336
18 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=0) Instance 1 Instance 2 Instance 3 UserCount = 1 UserCount = 1 UserCount = 1 Table Storage UserCount = 1 337
19 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=5) Instance 1 Instance 2 Instance 3 UserCount = 1 UserCount = 1 UserCount = 1 Table Storage UserCount = 1 338
20 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=10) Instance 1 Instance 2 Instance 3 UserCount = 1 UserCount = 1 UserCount = 1 Table Storage UserCount = 1 339
21 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=14) Instance 1 Instance 2 Instance 3 UserCount = 1 UserCount = 1 UserCount = 1 Table Storage UserCount = 2 340
22 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=15) Instance 1 Instance 2 Instance 3 UserCount = 1 UserCount = 1 UserCount = 2 Table Storage UserCount = 2 341
23 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=20) Instance 1 Instance 2 Instance 3 UserCount = 2 UserCount = 1 UserCount = 2 Table Storage UserCount = 2 342
24 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=25) Instance 1 Instance 2 Instance 3 UserCount = 2 UserCount = 2 UserCount = 2 Table Storage UserCount = 2 343
25 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS and Distributed Request -Locations -Feedbacks Response -UserCount -LocationCount D- Clocks can differ up to 1 minute in the Azure cloud D- Browser IIS LastUpdate >= 15Min LastUpdate >= 15Min Table Storage 344
26 3. Azure Native Azure Instance - Windows Server 2008 R2 Full Trust and Native Code in Azure <WebRole name= WebRole enablenativecodeexecution= true > <InputEndpoints> <InputEndpoint name = HttpIn protocol= http port= 80 /> </InputEndpoints> </WebRole> 345
27 3. Azure Native Possibilities Languages/Platforms - Java: JBoss, Tomcat - Python - Ruby: RoR - PHP - Etc. Bind to Port 80? No, as IIS is already bound! Applications - Membase, Cassandra, Mongo DB - Sharepoint - Etc. 346
28 3. Azure Native CGI Common Gateway Interface (CGI) - Execute code on incoming requests - (create new process (e.g., Perl) and pipe to standard input) - Return response to user -Disadvantages - Heavy-weight CGI processes - Process creation is big drag on performance - Multiple running processes (uncontrolled) high memory consumption 347
29 3. Azure Native CGI in-process 1. In-process module Web server loads library into its address space Web server forwards incoming code to library No expensive process start-up/tear-down ISAPI (IIS), mod_perl/mod_php (Apache) 348
30 3. Azure Native Fast CGI 2. Fast CGI Web server communicates to special FastCGI process FastCGI process hosts language runtime Advantages Seperate process Isolated from web server (security, stability) Long-lived No proces start-up/tear-down overhead Open standard 349
31 3. Azure Native Fast CGI in Azure 1. Enable FastCGI mode Add Web.roleconfig to project root folder Web.roleconfig contains: <?xml version= 1.0 encoding= utf-8?> <configuration> <system.webserver> <fastcgi> <application fullpath= %RoleRoot%\fast-cgibinary.exe /> </fastcgi> </system.webserver> </configuration> 350
32 3. Azure Native Fast CGI in Azure 2. Map file type to FastCGI (in web.config!) Add Web.roleconfig to project root folder Web.config contains: <configuration> <system.webserver> <handlers> <add name= My FastCGI implementation path= *.fastcgi verb= * modules= FastCgiModule scriptprocessor= %RoleRoot%\fast-cgi-binary.exe resourcetype= Unspecified /> </handlers> </system.webserver> </configuration> 351
33 3. Azure Native Fast CGI in Azure 3. Alternatively Instead of step 1 & 2 Create CGI WebRole 352
34 3. Azure Native PHP in Azure Steps 1. Download latest PHP distribution 2. Add new folder to project (e.g., php ) 3. Unpack PHP zip into php project folder 4. In ServiceConfiguration.csdef 1. enablenativecodeexecution= true 5. In Web.roleconfig 1. <application fullpath= %RoleRoot%\php\php-cgi.exe /> 6. In web.config 1. <add name= My PHP processor path= *.php verb= * modules= FastCgiModule scriptprocessor= %RoleRoot%\php\php-cgi.exe resourcetype= Unspecified /> 353
35 3. Azure Native PHP in Azure Test <?php phpinfo();?> PHP/Azure Storage - Check: phpazure.codeplex.com 354
36 4. Secure Backup in the Cloud Compressions 1. Write tables into one big file and compress? 2. Write tables into many smaller files and compress? Achieves higher compression rates! Download Azure Backup from: 355
37 4. Secure Backup in the Cloud - Security Security Level - Data is secure, even if three-letter government agencies wanted to get it - Secrecy - Data must not be in the clear, neither in motion nor at rest - Integrity - Ability to find out whether data has been tampered with - Ability to verify tools - Only trust code you can see in any layer charged with enforcing Secrecy or Integrity 356
38 4. Secure Backup in the Cloud Data in Motion Protecting Data in Motion - Secure Sockets Layer (SSL) - Transport Layer Security (TSL) see Cloud Frontends lecture Authenticating clients - Cryptographic hashes - Client and server agree on a security salt - Client generates hash over HTTP query and adds it to URL - Server compares client s hash with his own hash 357
39 4. Secure Backup in the Cloud Data at Rest Protecting Data at Rest - Cloud providers are having various security practices to protect data Additional means of protection necessary for: - Highly sensitive data - Data for which laws and regulations apply - Corporate compliance models 358
40 4. Secure Backup in the Cloud Encryption Symmetric - E.g., Advanced Encryption Standard (AES) = Rijndael - Advantage - Fast! - Disadvantage - Both parties need to know secret key Asymmetric - Private and public key - Advantage - Everybody can encrypt cypher with public key - Only receiver can decrypt cypher with private key - Disadvantage - Slow! 359
41 Resources
E-Commerce: Designing And Creating An Online Store
E-Commerce: Designing And Creating An Online Store Introduction About Steve Green Ministries Solo Performance Artist for 19 Years. Released over 26 Records, Several Kids Movies, and Books. My History With
More informationINSTALLING MOODLE 2.5 ON A MICROSOFT PLATFORM
INSTALLING MOODLE 2.5 ON A MICROSOFT PLATFORM Install Moodle 2.5 on Server 2012 R2 with SQL 2012 Ryan Mangan SysTech IT Solutions www.systechitsolutions.co.uk Contents Introduction... 2 Configuring basic
More informationUsing etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
More informationThe Windows Web Platform. Michael Epprecht Microsoft Switzerland michael.epprecht@microsoft.com twitter: fastflame
The Windows Web Platform Michael Epprecht Microsoft Switzerland michael.epprecht@microsoft.com twitter: fastflame Star Map April 1994 to August 1995 Page Views per Day: 124'655 Number of Servers: 3 3
More informationSSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
More informationSiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
More informationClick Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx
Passwordstate Upgrade Instructions to V7 from V5.xx This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed,
More informationAbstract. 1. Introduction
Abstract In this paper we present a survey on web servers IIS, Apache, Sun Java web server, Apache Tomcat. Our survey work involves a comparative study of these web servers with respect to the following
More informationEOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual
EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual Released January 2015 Updated March 2015 Table of Contents Overview...2 General Installation Considerations...2
More informationTIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
More informationWeb Hosting. Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications.
Web Hosting Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications. Features High-performance Apache web server Apache 1.3 and 2.0 1 with HTTP
More information<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
More informationAlaska Alternate Assessment. Website Security Assurances. June 2015. App3.6_Test_Site_Security
Alaska Alternate Assessment Website Security Assurances June 2015 App3.6_Test_Site_Security ISSUE 1: Secure access to http://ak.k12test.com The AK website makes use of the cryptographic protocols Transport
More informationFileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationOwner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this
More informationIUCLID 5 Guidance and Support
IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.
More informationDEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
More informationFTP, IIS, and Firewall Reference and Troubleshooting
FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationEMC Documentum Connector for Microsoft SharePoint
EMC Documentum Connector for Microsoft SharePoint Version 7.1 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2013-2014
More informationRELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
More informationTable of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index
Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...
More informationLayers of Caching: Key to scaling your website. Lance Albertson -- lance@osuosl.org Narayan Newton nnewton@tag1consulting.com
Layers of Caching: Key to scaling your website Lance Albertson -- lance@osuosl.org Narayan Newton nnewton@tag1consulting.com Importance of Caching RAM is fast! Utilize resources more efficiently Improve
More informationhttp://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationAdministering the Web Server (IIS) Role of Windows Server
Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course
More informationmultiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158
Index A Active Directory Active Directory nested groups, 96 creating user accounts, 67 custom authentication, 66 group members cannot log on, 153 mapping certificates, 65 mapping user to Active Directory
More informationAdministering the Web Server (IIS) Role of Windows Server 10972B; 5 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days
More informationTable of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
More informationSophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
More informationSecurity Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationIDENTIKEY Server Windows Installation Guide 3.2
IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
More informationA Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 cernyto3@fel.cvut.cz Michael J. Donahoo 2 jeff_donahoo@baylor.edu Abstract: One of the main goals of web application
More informationBubble Code Review for Magento
User Guide Author: Version: Website: Support: Johann Reinke 1.1 https://www.bubbleshop.net bubbleshop.net@gmail.com Table of Contents 1 Introducing Bubble Code Review... 3 1.1 Features... 3 1.2 Compatibility...
More informationAlliance Key Manager Cloud HSM Frequently Asked Questions
Key Management Alliance Key Manager Cloud HSM Frequently Asked Questions FAQ INDEX This document contains a collection of the answers to the most common questions people ask about Alliance Key Manager
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationClick Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
More informationSecurity Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
More informationReference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
More informationOverview... 2. Servers and Infrastructure... 2. Communication channels... 3. Peer-to-Peer connections... 3. Data Compression and Encryption...
Data security is a high priority at Brosix, enabling us to continue achieving the goal of providing efficient and secure online realtime communication services. Table of Contents Overview... 2 Servers
More informationFileMaker Server 12. Getting Started Guide
FileMaker Server 12 Getting Started Guide 2007 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
More informationDeployment Guide Microsoft IIS 7.0
Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...
More informationMicrosoft Dynamics CRM Server 2011 software requirements
Microsoft Dynamics CRM Server 2011 software requirements This section lists the software and application requirements for Microsoft Dynamics CRM Server 2011. Windows Server operating system: Microsoft
More informationClick Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationOkta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
More informationUnderstanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk
More information10972B: Administering the Web Server (IIS) Role of Windows Server
10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationCriteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
More informationEnabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
More informationEWD: Simplifying Web Application Architecture
EWD: Simplifying Web Application Architecture Rob Tweed M/Gateway Developments Ltd http://www.mgateway.com Twitter: @rtweed 1980s: A bit about me Lead Mumps developer at Royal Marsden Hospital, London:
More informationSecurity IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
More informationPLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.
PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and
More informationCisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationMicrosoft 10972 - Administering the Web Server (IIS) Role of Windows Server
1800 ULEARN (853 276) www.ddls.com.au Microsoft 10972 - Administering the Web Server (IIS) Role of Windows Server Length 5 days Price $4169.00 (inc GST) Version B Overview This course provides students
More informationImportant Release Information and Technical and Deployment Support Notes
PrinterOn On-Premise Server Release Technical Support Notes Important Release Information and Technical and Deployment Support Notes During the course of product development and support, configurations
More informationCisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationDeveloping a Web Server Platform with SAPI Support for AJAX RPC using JSON
Revista Informatica Economică, nr. 4 (44)/2007 45 Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Iulian ILIE-NEMEDI, Bucharest, Romania, inemedi@ie.ase.ro Writing a custom web
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationStreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
More informationPrivateServer HSM EKM Provider for Microsoft SQL Server
PrivateServer HSM EKM Provider for Microsoft SQL Server January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this
More informationDFW Backup Software. Whitepaper Data Security
Version 6 Jan 2012 Table of Content 1 Introduction... 3 2 DFW Backup Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 128-bit SSL communication... 4 2.2 Backup data are securely encrypted...
More informationERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
More informationWEB APPLICATION DEVELOPMENT. UNIT I J2EE Platform 9
UNIT I J2EE Platform 9 Introduction - Enterprise Architecture Styles - J2EE Architecture - Containers - J2EE Technologies - Developing J2EE Applications - Naming and directory services - Using JNDI - JNDI
More informationSSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
More informationTLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
More informationFileMaker Server 10. Getting Started Guide
FileMaker Server 10 Getting Started Guide 2007-2009 FileMaker, Inc. All rights reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and
More informationIntroduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
More informationRemoving Failure Points and Increasing Scalability for the Engine that Drives webmd.com
Removing Failure Points and Increasing Scalability for the Engine that Drives webmd.com Matt Wilson Director, Consumer Web Operations, WebMD @mattwilsoninc 9/12/2013 About this talk Go over original site
More informationComputer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
More informationApache Jakarta Tomcat
Apache Jakarta Tomcat 20041058 Suh, Junho Road Map 1 Tomcat Overview What we need to make more dynamic web documents? Server that supports JSP, ASP, database etc We concentrates on Something that support
More informationChapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
More information(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING a Class IIIc SSL Certificate using BEA Weblogic V ERSION 1.0 Page 1 of 8 Procedure for
More informationWebPanel Manual DRAFT
WebPanel Manual DRAFT 1 Untitled Chapter 1.1 Configure web server prior to installing WebsitePanel Agent 4 1.2 Install the WebsitePanel Server Agent to a Server 20 1.3 Configuring Firewall Settings for
More informationVirtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
More informationDIRECTORY PASSWORD V1.2 Quick Start Guide
DIRECTORY PASSWORD V1.2 Quick Start Guide Directory Password is a self-service password reset / account unlock tool that is an optional add-on for Directory Update v2.5. Directory Update must be installed
More informationFusion Installer Instructions
Fusion Installer Instructions This is the installation guide for the Fusion NaviLine installer. This guide provides instructions for installing, updating, and maintaining your Fusion REST web service.
More informationJBoss Seam Performance and Scalability on Dell PowerEdge 1855 Blade Servers
JBoss Seam Performance and Scalability on Dell PowerEdge 1855 Blade Servers Dave Jaffe, PhD, Dell Inc. Michael Yuan, PhD, JBoss / RedHat June 14th, 2006 JBoss Inc. 2006 About us Dave Jaffe Works for Dell
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationLecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
More informationFrontDesk. (Server Software Installation) Ver. 1.0.1. www.frontdeskhealth.com
FrontDesk (Server Software Installation) Ver. 1.0.1 www.frontdeskhealth.com This document is the installation manual for installing the FrontDesk Server, Kiosk/Touch Screen, and License Management Tool
More informationSAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation
A BasisOnDemand.com White Paper SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation by Prakash Palani Table of Contents 1. Purpose... 3 2. What is Web Dispatcher?... 3 3. Can
More informationEnhancing your Web Experiences with ASP.NET Ajax and IIS 7
Enhancing your Web Experiences with ASP.NET Ajax and IIS 7 Rob Cameron Developer Evangelist, Microsoft http://blogs.msdn.com/robcamer Agenda IIS 6 IIS 7 Improvements for PHP on IIS ASP.NET Integration
More informationInstallation Guide for contineo
Installation Guide for contineo Sebastian Stein Michael Scholz 2007-02-07, contineo version 2.5 Contents 1 Overview 2 2 Installation 2 2.1 Server and Database....................... 2 2.2 Deployment............................
More informationProduct Name: ANZ egate Connect Version: 2.1.9 Document Type: Help doc Author: Milople Inc.
Product Name: ANZ egate Connect Version: 2.1.9 Document Type: Help doc Author: Milople Inc. https://www.milople.com/magento-extensions/anz-egate-connect.html Table of Content 1. Installation and Un-installation
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
More informationThales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.
ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright
More informationPowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
More informationWeb Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
More informationInstallation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationS y s t e m A r c h i t e c t u r e
S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual
More informationServer Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationWhat is Web Security? Motivation
brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
More informationLarge-Scale Web Applications
Large-Scale Web Applications Mendel Rosenblum Web Application Architecture Web Browser Web Server / Application server Storage System HTTP Internet CS142 Lecture Notes - Intro LAN 2 Large-Scale: Scale-Out
More informationServer Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
More information