Advanced Problems in Cloud Computing. Dipl.-Wirt.-Inform. Robert Neumann

Size: px
Start display at page:

Download "Advanced Problems in Cloud Computing. Dipl.-Wirt.-Inform. Robert Neumann"

Transcription

1 Advanced Problems in Cloud Computing Dipl.-Wirt.-Inform. Robert Neumann

2 0. General Reengineering Performance enhancements - Minimize roundtrips between separate systems - Write efficient algorithms - Use data types effectively - Make smart memory-cpu trade-off decisions - Avoid complex computations, when rendering query results 321

3 1. Secondary Indexing What for? - PK and RK are indexed fast access - Other entity properties are not indexed query runs over all entities Concept - An ordered index on properties that are neither PK nor RK -How? - Store secondary entity that has property that is to be indexed as PK 322

4 1. Secondary Indexing - Models Original entity 1. Pivoting Property with PK, maintain other properties - Pros: - One roundtrip to serve one query - Cons: - Redundant data storage (twice as much) 323

5 1. Secondary Indexing - Models Original entity 2. Pivoting Property with PK only - Pros: - Minimizes redundant data storage - Cons: - Two roundtrips to serve one query 324

6 1. Secondary Indexing -Example (primary index) E=(PK, RK, {P}) E=( New York, Central Park, {P}) 325

7 1. Secondary Indexing Example (secondary index) E=(PK, RK, {P}) E=( Central, 1, {P}) E=( Central Park, 1, {P}) To differentiate multiple entities for the same search term 326

8 2. High-speed Content Provisioning Medium Performance Consistent Persistent Azure Fast Yes No Membase Fast Yes Yes/No IIS cache Fast No No Table Storage/ SQL Azure Slow Yes Yes ASP.Net Profiles Slow Yes Yes Session State (Table/SQL) Slow Yes Yes/No Cookies Medium Yes/No No! Yes/No No! 327

9 2. High-speed Content Provisioning Table Storage - Good for Look-up Query Operations - Supported - Comparators (e.g., >, <, >=, <=, ==) - Not supported - Contains (e.g., Like ) 328

10 2. High-speed Content Provisioning Page-view Life cycle data 1. Volatile data Always-up-to-date business data Requires immediate consistency 2. Periodically volatile data Data that can be presented with delay Allows for eventual consistency 3. Non-volatile data Static data does not change over time Is repeatedly require to render queries 329

11 2. High-speed Content Provisioning - Example ServiceParrot Data Volatile Periodically volatile Non-volatile New Location X X - Updated Location X X - Top5/Latest5 X X - User Count - X - Location Count Feedback Count - X - - X - 330

12 2. High-speed Content Provisioning - Storage Using caches Volume Volatile Periodically volatile High Table Distributed Non-volatile Distributed Low Table IIS IIS Performance Hierarchy 1. IIS (Client Instance Client) 2. Distributed (Client Instance Instance Client) 3. Table Storage (Client Instance Table Instance Client) Trespasses no system boundary (inside the cloud)! Trespass at least one system boundary (inside the cloud)! 331

13 2. High-speed Content Provisioning - Example ServiceParrot Data Volatile Periodically volatile Non-volatile New Location X (Table) X (A-) - Updated Location X (Table) X (A-) - Top5/Latest5 X (Table) X () - User Count - X () - Location Count Feedback Count - X () - - X () - Volume High High Low Low Low Low Hit rate and size of cacheable data important! (very expensive resource!) 332

14 2. High-speed Content Provisioning - Example ServiceParrot Data Volatile Periodically volatile Non-volatile New Location X (Table) X (A-) - Updated Location X (Table) X (A-) - Top5/Latest5 X (Table) X () - User Count - X () - Location Count Feedback Count - X () - - X () - Volume High High Low Low Low Low Very promising: avoids one Table Storage roundtrip each! 333

15 2. High-speed Content Provisioning Periodic Volatility Strict consistency with Table Storage Request Response -Locations -Feedbacks -UserCount -LocationCount Browser IIS Table Storage 334

16 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Request Response -Locations -Feedbacks -UserCount -LocationCount Browser IIS LastUpdate >= 15Min Table Storage 335

17 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Instance 1 Instance 2 Instance 3 Table Storage UserCount = 1 336

18 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=0) Instance 1 Instance 2 Instance 3 UserCount = 1 UserCount = 1 UserCount = 1 Table Storage UserCount = 1 337

19 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=5) Instance 1 Instance 2 Instance 3 UserCount = 1 UserCount = 1 UserCount = 1 Table Storage UserCount = 1 338

20 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=10) Instance 1 Instance 2 Instance 3 UserCount = 1 UserCount = 1 UserCount = 1 Table Storage UserCount = 1 339

21 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=14) Instance 1 Instance 2 Instance 3 UserCount = 1 UserCount = 1 UserCount = 1 Table Storage UserCount = 2 340

22 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=15) Instance 1 Instance 2 Instance 3 UserCount = 1 UserCount = 1 UserCount = 2 Table Storage UserCount = 2 341

23 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=20) Instance 1 Instance 2 Instance 3 UserCount = 2 UserCount = 1 UserCount = 2 Table Storage UserCount = 2 342

24 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS Startup (T=25) Instance 1 Instance 2 Instance 3 UserCount = 2 UserCount = 2 UserCount = 2 Table Storage UserCount = 2 343

25 2. High-speed Content Provisioning Periodic Volatility Eventual Consistency with IIS and Distributed Request -Locations -Feedbacks Response -UserCount -LocationCount D- Clocks can differ up to 1 minute in the Azure cloud D- Browser IIS LastUpdate >= 15Min LastUpdate >= 15Min Table Storage 344

26 3. Azure Native Azure Instance - Windows Server 2008 R2 Full Trust and Native Code in Azure <WebRole name= WebRole enablenativecodeexecution= true > <InputEndpoints> <InputEndpoint name = HttpIn protocol= http port= 80 /> </InputEndpoints> </WebRole> 345

27 3. Azure Native Possibilities Languages/Platforms - Java: JBoss, Tomcat - Python - Ruby: RoR - PHP - Etc. Bind to Port 80? No, as IIS is already bound! Applications - Membase, Cassandra, Mongo DB - Sharepoint - Etc. 346

28 3. Azure Native CGI Common Gateway Interface (CGI) - Execute code on incoming requests - (create new process (e.g., Perl) and pipe to standard input) - Return response to user -Disadvantages - Heavy-weight CGI processes - Process creation is big drag on performance - Multiple running processes (uncontrolled) high memory consumption 347

29 3. Azure Native CGI in-process 1. In-process module Web server loads library into its address space Web server forwards incoming code to library No expensive process start-up/tear-down ISAPI (IIS), mod_perl/mod_php (Apache) 348

30 3. Azure Native Fast CGI 2. Fast CGI Web server communicates to special FastCGI process FastCGI process hosts language runtime Advantages Seperate process Isolated from web server (security, stability) Long-lived No proces start-up/tear-down overhead Open standard 349

31 3. Azure Native Fast CGI in Azure 1. Enable FastCGI mode Add Web.roleconfig to project root folder Web.roleconfig contains: <?xml version= 1.0 encoding= utf-8?> <configuration> <system.webserver> <fastcgi> <application fullpath= %RoleRoot%\fast-cgibinary.exe /> </fastcgi> </system.webserver> </configuration> 350

32 3. Azure Native Fast CGI in Azure 2. Map file type to FastCGI (in web.config!) Add Web.roleconfig to project root folder Web.config contains: <configuration> <system.webserver> <handlers> <add name= My FastCGI implementation path= *.fastcgi verb= * modules= FastCgiModule scriptprocessor= %RoleRoot%\fast-cgi-binary.exe resourcetype= Unspecified /> </handlers> </system.webserver> </configuration> 351

33 3. Azure Native Fast CGI in Azure 3. Alternatively Instead of step 1 & 2 Create CGI WebRole 352

34 3. Azure Native PHP in Azure Steps 1. Download latest PHP distribution 2. Add new folder to project (e.g., php ) 3. Unpack PHP zip into php project folder 4. In ServiceConfiguration.csdef 1. enablenativecodeexecution= true 5. In Web.roleconfig 1. <application fullpath= %RoleRoot%\php\php-cgi.exe /> 6. In web.config 1. <add name= My PHP processor path= *.php verb= * modules= FastCgiModule scriptprocessor= %RoleRoot%\php\php-cgi.exe resourcetype= Unspecified /> 353

35 3. Azure Native PHP in Azure Test <?php phpinfo();?> PHP/Azure Storage - Check: phpazure.codeplex.com 354

36 4. Secure Backup in the Cloud Compressions 1. Write tables into one big file and compress? 2. Write tables into many smaller files and compress? Achieves higher compression rates! Download Azure Backup from: 355

37 4. Secure Backup in the Cloud - Security Security Level - Data is secure, even if three-letter government agencies wanted to get it - Secrecy - Data must not be in the clear, neither in motion nor at rest - Integrity - Ability to find out whether data has been tampered with - Ability to verify tools - Only trust code you can see in any layer charged with enforcing Secrecy or Integrity 356

38 4. Secure Backup in the Cloud Data in Motion Protecting Data in Motion - Secure Sockets Layer (SSL) - Transport Layer Security (TSL) see Cloud Frontends lecture Authenticating clients - Cryptographic hashes - Client and server agree on a security salt - Client generates hash over HTTP query and adds it to URL - Server compares client s hash with his own hash 357

39 4. Secure Backup in the Cloud Data at Rest Protecting Data at Rest - Cloud providers are having various security practices to protect data Additional means of protection necessary for: - Highly sensitive data - Data for which laws and regulations apply - Corporate compliance models 358

40 4. Secure Backup in the Cloud Encryption Symmetric - E.g., Advanced Encryption Standard (AES) = Rijndael - Advantage - Fast! - Disadvantage - Both parties need to know secret key Asymmetric - Private and public key - Advantage - Everybody can encrypt cypher with public key - Only receiver can decrypt cypher with private key - Disadvantage - Slow! 359

41 Resources

E-Commerce: Designing And Creating An Online Store

E-Commerce: Designing And Creating An Online Store E-Commerce: Designing And Creating An Online Store Introduction About Steve Green Ministries Solo Performance Artist for 19 Years. Released over 26 Records, Several Kids Movies, and Books. My History With

More information

INSTALLING MOODLE 2.5 ON A MICROSOFT PLATFORM

INSTALLING MOODLE 2.5 ON A MICROSOFT PLATFORM INSTALLING MOODLE 2.5 ON A MICROSOFT PLATFORM Install Moodle 2.5 on Server 2012 R2 with SQL 2012 Ryan Mangan SysTech IT Solutions www.systechitsolutions.co.uk Contents Introduction... 2 Configuring basic

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

The Windows Web Platform. Michael Epprecht Microsoft Switzerland michael.epprecht@microsoft.com twitter: fastflame

The Windows Web Platform. Michael Epprecht Microsoft Switzerland michael.epprecht@microsoft.com twitter: fastflame The Windows Web Platform Michael Epprecht Microsoft Switzerland michael.epprecht@microsoft.com twitter: fastflame Star Map April 1994 to August 1995 Page Views per Day: 124'655 Number of Servers: 3 3

More information

SSL Protect your users, start with yourself

SSL Protect your users, start with yourself SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Click Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx

Click Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx Passwordstate Upgrade Instructions to V7 from V5.xx This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed,

More information

Abstract. 1. Introduction

Abstract. 1. Introduction Abstract In this paper we present a survey on web servers IIS, Apache, Sun Java web server, Apache Tomcat. Our survey work involves a comparative study of these web servers with respect to the following

More information

EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual

EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual Released January 2015 Updated March 2015 Table of Contents Overview...2 General Installation Considerations...2

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Web Hosting. Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications.

Web Hosting. Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications. Web Hosting Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications. Features High-performance Apache web server Apache 1.3 and 2.0 1 with HTTP

More information

<Insert Picture Here> Oracle Web Cache 11g Overview

<Insert Picture Here> Oracle Web Cache 11g Overview Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content

More information

Alaska Alternate Assessment. Website Security Assurances. June 2015. App3.6_Test_Site_Security

Alaska Alternate Assessment. Website Security Assurances. June 2015. App3.6_Test_Site_Security Alaska Alternate Assessment Website Security Assurances June 2015 App3.6_Test_Site_Security ISSUE 1: Secure access to http://ak.k12test.com The AK website makes use of the cryptographic protocols Transport

More information

FileMaker Server 11. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

IUCLID 5 Guidance and Support

IUCLID 5 Guidance and Support IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.

More information

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010 DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration

More information

FTP, IIS, and Firewall Reference and Troubleshooting

FTP, IIS, and Firewall Reference and Troubleshooting FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

EMC Documentum Connector for Microsoft SharePoint

EMC Documentum Connector for Microsoft SharePoint EMC Documentum Connector for Microsoft SharePoint Version 7.1 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2013-2014

More information

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12. Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON

More information

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...

More information

Layers of Caching: Key to scaling your website. Lance Albertson -- lance@osuosl.org Narayan Newton nnewton@tag1consulting.com

Layers of Caching: Key to scaling your website. Lance Albertson -- lance@osuosl.org Narayan Newton nnewton@tag1consulting.com Layers of Caching: Key to scaling your website Lance Albertson -- lance@osuosl.org Narayan Newton nnewton@tag1consulting.com Importance of Caching RAM is fast! Utilize resources more efficiently Improve

More information

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course

More information

multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158

multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158 Index A Active Directory Active Directory nested groups, 96 creating user accounts, 67 custom authentication, 66 group members cannot log on, 153 mapping certificates, 65 mapping user to Active Directory

More information

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

More information

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

IDENTIKEY Server Windows Installation Guide 3.2

IDENTIKEY Server Windows Installation Guide 3.2 IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

A Tool for Evaluation and Optimization of Web Application Performance

A Tool for Evaluation and Optimization of Web Application Performance A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 cernyto3@fel.cvut.cz Michael J. Donahoo 2 jeff_donahoo@baylor.edu Abstract: One of the main goals of web application

More information

Bubble Code Review for Magento

Bubble Code Review for Magento User Guide Author: Version: Website: Support: Johann Reinke 1.1 https://www.bubbleshop.net bubbleshop.net@gmail.com Table of Contents 1 Introducing Bubble Code Review... 3 1.1 Features... 3 1.2 Compatibility...

More information

Alliance Key Manager Cloud HSM Frequently Asked Questions

Alliance Key Manager Cloud HSM Frequently Asked Questions Key Management Alliance Key Manager Cloud HSM Frequently Asked Questions FAQ INDEX This document contains a collection of the answers to the most common questions people ask about Alliance Key Manager

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

Reference and Troubleshooting: FTP, IIS, and Firewall Information

Reference and Troubleshooting: FTP, IIS, and Firewall Information APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the

More information

Overview... 2. Servers and Infrastructure... 2. Communication channels... 3. Peer-to-Peer connections... 3. Data Compression and Encryption...

Overview... 2. Servers and Infrastructure... 2. Communication channels... 3. Peer-to-Peer connections... 3. Data Compression and Encryption... Data security is a high priority at Brosix, enabling us to continue achieving the goal of providing efficient and secure online realtime communication services. Table of Contents Overview... 2 Servers

More information

FileMaker Server 12. Getting Started Guide

FileMaker Server 12. Getting Started Guide FileMaker Server 12 Getting Started Guide 2007 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,

More information

Deployment Guide Microsoft IIS 7.0

Deployment Guide Microsoft IIS 7.0 Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...

More information

Microsoft Dynamics CRM Server 2011 software requirements

Microsoft Dynamics CRM Server 2011 software requirements Microsoft Dynamics CRM Server 2011 software requirements This section lists the software and application requirements for Microsoft Dynamics CRM Server 2011. Windows Server operating system: Microsoft

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Okta/Dropbox Active Directory Integration Guide

Okta/Dropbox Active Directory Integration Guide Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk

More information

10972B: Administering the Web Server (IIS) Role of Windows Server

10972B: Administering the Web Server (IIS) Role of Windows Server 10972B: Administering the Web Server (IIS) Role of Windows Server Course Details Course Code: Duration: Notes: 10972B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

Installation Guide for Pulse on Windows Server 2012

Installation Guide for Pulse on Windows Server 2012 MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Enabling SSL and Client Certificates on the SAP J2EE Engine

Enabling SSL and Client Certificates on the SAP J2EE Engine Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine

More information

EWD: Simplifying Web Application Architecture

EWD: Simplifying Web Application Architecture EWD: Simplifying Web Application Architecture Rob Tweed M/Gateway Developments Ltd http://www.mgateway.com Twitter: @rtweed 1980s: A bit about me Lead Mumps developer at Royal Marsden Hospital, London:

More information

Security IIS Service Lesson 6

Security IIS Service Lesson 6 Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and

More information

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality. PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Installation Guide for Pulse on Windows Server 2008R2

Installation Guide for Pulse on Windows Server 2008R2 MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software

More information

Microsoft 10972 - Administering the Web Server (IIS) Role of Windows Server

Microsoft 10972 - Administering the Web Server (IIS) Role of Windows Server 1800 ULEARN (853 276) www.ddls.com.au Microsoft 10972 - Administering the Web Server (IIS) Role of Windows Server Length 5 days Price $4169.00 (inc GST) Version B Overview This course provides students

More information

Important Release Information and Technical and Deployment Support Notes

Important Release Information and Technical and Deployment Support Notes PrinterOn On-Premise Server Release Technical Support Notes Important Release Information and Technical and Deployment Support Notes During the course of product development and support, configurations

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON

Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Revista Informatica Economică, nr. 4 (44)/2007 45 Developing a Web Server Platform with SAPI Support for AJAX RPC using JSON Iulian ILIE-NEMEDI, Bucharest, Romania, inemedi@ie.ase.ro Writing a custom web

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

PrivateServer HSM EKM Provider for Microsoft SQL Server

PrivateServer HSM EKM Provider for Microsoft SQL Server PrivateServer HSM EKM Provider for Microsoft SQL Server January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this

More information

DFW Backup Software. Whitepaper Data Security

DFW Backup Software. Whitepaper Data Security Version 6 Jan 2012 Table of Content 1 Introduction... 3 2 DFW Backup Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 128-bit SSL communication... 4 2.2 Backup data are securely encrypted...

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

WEB APPLICATION DEVELOPMENT. UNIT I J2EE Platform 9

WEB APPLICATION DEVELOPMENT. UNIT I J2EE Platform 9 UNIT I J2EE Platform 9 Introduction - Enterprise Architecture Styles - J2EE Architecture - Containers - J2EE Technologies - Developing J2EE Applications - Naming and directory services - Using JNDI - JNDI

More information

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN

SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN 1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

FileMaker Server 10. Getting Started Guide

FileMaker Server 10. Getting Started Guide FileMaker Server 10 Getting Started Guide 2007-2009 FileMaker, Inc. All rights reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Removing Failure Points and Increasing Scalability for the Engine that Drives webmd.com

Removing Failure Points and Increasing Scalability for the Engine that Drives webmd.com Removing Failure Points and Increasing Scalability for the Engine that Drives webmd.com Matt Wilson Director, Consumer Web Operations, WebMD @mattwilsoninc 9/12/2013 About this talk Go over original site

More information

Computer System Management: Hosting Servers, Miscellaneous

Computer System Management: Hosting Servers, Miscellaneous Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation

More information

Apache Jakarta Tomcat

Apache Jakarta Tomcat Apache Jakarta Tomcat 20041058 Suh, Junho Road Map 1 Tomcat Overview What we need to make more dynamic web documents? Server that supports JSP, ASP, database etc We concentrates on Something that support

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING

(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING (n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING a Class IIIc SSL Certificate using BEA Weblogic V ERSION 1.0 Page 1 of 8 Procedure for

More information

WebPanel Manual DRAFT

WebPanel Manual DRAFT WebPanel Manual DRAFT 1 Untitled Chapter 1.1 Configure web server prior to installing WebsitePanel Agent 4 1.2 Install the WebsitePanel Server Agent to a Server 20 1.3 Configuring Firewall Settings for

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

DIRECTORY PASSWORD V1.2 Quick Start Guide

DIRECTORY PASSWORD V1.2 Quick Start Guide DIRECTORY PASSWORD V1.2 Quick Start Guide Directory Password is a self-service password reset / account unlock tool that is an optional add-on for Directory Update v2.5. Directory Update must be installed

More information

Fusion Installer Instructions

Fusion Installer Instructions Fusion Installer Instructions This is the installation guide for the Fusion NaviLine installer. This guide provides instructions for installing, updating, and maintaining your Fusion REST web service.

More information

JBoss Seam Performance and Scalability on Dell PowerEdge 1855 Blade Servers

JBoss Seam Performance and Scalability on Dell PowerEdge 1855 Blade Servers JBoss Seam Performance and Scalability on Dell PowerEdge 1855 Blade Servers Dave Jaffe, PhD, Dell Inc. Michael Yuan, PhD, JBoss / RedHat June 14th, 2006 JBoss Inc. 2006 About us Dave Jaffe Works for Dell

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Lecture 11 Web Application Security (part 1)

Lecture 11 Web Application Security (part 1) Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)

More information

FrontDesk. (Server Software Installation) Ver. 1.0.1. www.frontdeskhealth.com

FrontDesk. (Server Software Installation) Ver. 1.0.1. www.frontdeskhealth.com FrontDesk (Server Software Installation) Ver. 1.0.1 www.frontdeskhealth.com This document is the installation manual for installing the FrontDesk Server, Kiosk/Touch Screen, and License Management Tool

More information

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation

SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation A BasisOnDemand.com White Paper SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation by Prakash Palani Table of Contents 1. Purpose... 3 2. What is Web Dispatcher?... 3 3. Can

More information

Enhancing your Web Experiences with ASP.NET Ajax and IIS 7

Enhancing your Web Experiences with ASP.NET Ajax and IIS 7 Enhancing your Web Experiences with ASP.NET Ajax and IIS 7 Rob Cameron Developer Evangelist, Microsoft http://blogs.msdn.com/robcamer Agenda IIS 6 IIS 7 Improvements for PHP on IIS ASP.NET Integration

More information

Installation Guide for contineo

Installation Guide for contineo Installation Guide for contineo Sebastian Stein Michael Scholz 2007-02-07, contineo version 2.5 Contents 1 Overview 2 2 Installation 2 2.1 Server and Database....................... 2 2.2 Deployment............................

More information

Product Name: ANZ egate Connect Version: 2.1.9 Document Type: Help doc Author: Milople Inc.

Product Name: ANZ egate Connect Version: 2.1.9 Document Type: Help doc Author: Milople Inc. Product Name: ANZ egate Connect Version: 2.1.9 Document Type: Help doc Author: Milople Inc. https://www.milople.com/magento-extensions/anz-egate-connect.html Table of Content 1. Installation and Un-installation

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461

More information

Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.

Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved. ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright

More information

PowerChute TM Network Shutdown Security Features & Deployment

PowerChute TM Network Shutdown Security Features & Deployment PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

Installation and Configuration Guide

Installation and Configuration Guide Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

S y s t e m A r c h i t e c t u r e

S y s t e m A r c h i t e c t u r e S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

Large-Scale Web Applications

Large-Scale Web Applications Large-Scale Web Applications Mendel Rosenblum Web Application Architecture Web Browser Web Server / Application server Storage System HTTP Internet CS142 Lecture Notes - Intro LAN 2 Large-Scale: Scale-Out

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information