System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

Size: px
Start display at page:

Download "System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks"

Transcription

1 System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0

2 Contents 1 Introduction Purpose Project Scope Definitions, Acronyms, and Abbreviations Overview Background Document Management Systems Desktop Search Tools Peer to Peer Networking Overall Description Product Perspective Product Functions User Types, Constraints and Dependencies Product Features External Interfaces Authentication File System Network Search Request Network Download Request User Interface, Search User Interface, Download User Interface, Settings User Interface, Connections User Interface, Logs Software Functions Search index construction Authentication Authorization Distributed search Distributed download

3 4.2.6 Version management Performance requirements and Design constraints Performance Security Flexibility References 20 2

4 Chapter 1 Introduction 1.1 Purpose This document describes the requirements of a distributed desktop search and document sharing software called DistShare. It aims to describe the required product features, constraints, dependencies and form a basis for design and development phases of the project. 1.2 Project Scope Document exchange among members of a project is a daily routine activity which is in the core of the project life cycle. DistShare project proposes a solution to store and share documents through peer to peer communication facilitated with distributed content (i.e. keyword, meta-data) search and authentication. DistShare is a tool to share local documents of a desktop user with other members in the local area network. It is mostly a combination of desktop search tools and document management systems. DistShare watches the documents of a local user and constructs a document index as any desktop search tool. It also keeps track of sharing properties of documents, in other words who can access the documents. Then it enables users to execute a distributed content search on all computers in the DistShare network where users can see all documents containing the search words that are accessible to them. After the search, users use DistShare peer to peer download service to receive the documents. If same documents are available on multiple hosts, it is downloaded in parallel. 3

5 1.3 Definitions, Acronyms, and Abbreviations Document management system: A platform for storing, accessing, sharing documents. Most systems include mechanisms for authentication, version control of documents. Desktop search tool: A software to keep track of documents on local disk and provides means of fast access of documents through name, metadata and content keywords. P2P: Peer to peer network. 1.4 Overview This document describes the software requirements specification for Dist- Share. In the next chapter overall description of the project, main functions, dependencies and constraints are given. In Third chapter specific requirements of the project, system interfaces, functional requirements, performance and design requirements are given. 4

6 Chapter 2 Background 2.1 Document Management Systems A document management system is a document store providing access to multiple users. They are usually realized as central web based repositories that can be accessed through web browsers. They also have remote file system links so that user will be able to access documents on repository as if they were local documents. A document management system has the following components [10]: document meta-data integration (direct access through file system or other application) indexing searching versioning storage retrieval security distribution workflow capture (printed documents, fax, OCR) collaboration publishing 5

7 reproduction First eight items above also holds in the purpose of DistShare. The remaining items are mostly related to printed documents and business flow of documents so out of the scope of this project. Content management systems are similar to document management systems that are focused on especially web content and documents. Some existing document management tools are: [1, 3, 2]. 2.2 Desktop Search Tools Desktop search tools provide quick access to documents through previously generated indexes. As number of files on local filesystems increase, searching a specific file name, file attribute or content keyword becomes a common and repeated task. In order to accelerate this operation, desktop search software generates a local index to map search items to document paths. Basic indexing items are file names and file attributes. In addition to these, meta-data of documents like singer information of a music file or author of a text file can be extracted from document content and indexed. Another type of index is reverse index of a document which maps individual words contained in the document to documents as web search engines do. A well known framework for document indexing is Lucene [7]. In order to create indexes, a desktop search tool scans all local documents and generates the database. After creating the initial index, these tools keep the index up to date through periodic rescans or listening on file change events of the system. Beagle [8], Metatracker [9] and Google desktop are example of such tools. DistShare needs to repeat most of the tasks of a desktop search tool for a group of user supplied share directories. In addition, it needs to keep track of the authentication information of the documents. 2.3 Peer to Peer Networking One major drawback of central file sharing is the large volume of data and bandwidth requirements. However on a distributed environment copies of a documents can be distributed over a group of smaller capacity hosts and on demand, it can be downloaded in parallel from multiple hosts with smaller bandwidth. This idea is realized in peer to peer networks where each client is also a server for an object and shares it through peer to peer connections in contrast to all clients containing to a single master location. This allows more resilient operation and redundancy in nature. If some of the nodes or links fail, a peer to peer network can operate on remaining nodes and links. 6

8 Objects in a peer to peer network is addressed through a Distributed Hash Table which is basically a document digest to document meta-data mapping stored, searched and redistributed among all nodes of the network. DistShare aims to let everyone share documents with everyone else in the network, it is by nature suitable for peer to peer networking. Although authentication/authorization issues needs to be solved. Also a distributed search facility is needed. There are many frameworks and tools for peer to peer networking like [4, 5, 6]. 7

9 Chapter 3 Overall Description 3.1 Product Perspective DistShare is a tool working on a desktop computer, interacting with local filesystem, user for setup and a peer to peer network for search and download facilities. It may work along with existing desktop search tools, i.e. use their databases, or maintain its own search functionality. Besides that, it will work as a self contained tool. It will have some functions of a document management system like search and retrieval of documents, marking them to be shared etc. It will use one of the existing protocols for maintaining a distributed hash table of documents and distributed search and download facilities. 3.2 Product Functions DistShare consists of the following basics tasks: 1. Search index construction 2. Authorization 3. Authentication 4. Distributed search 5. Distributed download 6. Version management Search index construction is the on demand construction and incremental maintenance of document indexes. 8

10 Authorization is setting local documents sharing features so that they will be accessible to specific group of authenticated users remotely. Otherwise documents are not going to be displayed searches initiated by other hosts, nor they will be downloadable. Authentication is the mechanism of users to prove their identity to remote hosts. DistShare needs means of making sure that the host making the request is carrying the operation on behalf of the correct users. Distributed search is the tools ability to retrieve search results from other hosts in the P2P network. A search unstated in local host is repeated on other P2P hosts and results collected. Distributed download is executed when user asks download of a searched file. If same exact file is copied across multiple hosts, it will be downloaded in parallel to utilize network bandwidth. Version control is systems ability to maintain multiple revisions of the same file. System keeps track of local changes and try to associate the file with is origin. So that when the file is searched, results with version options could be returned. 3.3 User Types, Constraints and Dependencies Users of the system is desktop users working on a local area network or Internet. All users are in the same class. Operating environment is a desktop computer. Any of Linux, Windows or MacOs can be considered as target platform. Interoperability could be expected as platform independent documents are to be shared. A desktop with graphical interfaces are expected for user friendliness. Major constraint in the system is the security. Ordinary users should not be able to access documents of the desktop user. Another constraint is the lack of central control. As in other P2P applications almost all information should be kept in network nodes, not on a central server. There should be no central control other than an authentication server. There are freely available libraries for document indexing, P2P and authentication. Project depends on such libraries. 9

11 Chapter 4 Product Features 4.1 External Interfaces Authentication Each user of software needs to be authenticated in order to access other hosts. Authentication information should be sharable among other members of the P2P network. Authentication can be operating system/workgroup based or network based. Depending on the design choices, multiple authentication mechanisms could be supported. Input is the operating system or a network service. Output is the identification of the user File System All files that are marked to be shared should be watched on the filesystem. On manual invocation, periodic invocation or as files change, system needs to update information about the file. Input is the file on a local file system and output is the database keeping search indexes Network Search Request System should wait for network requests to answer remote search requests. Input is a group of search sentence and identity of the remote user. Output is the list of matching files Network Download Request When a matched document is requested, it is served by the local file holders. Software needs to serve such requests. 10

12 Input is the file locator and identity of the remote user. Output is the file content probably in fragments User Interface, Search Major operation in graphical user interface is the search. Search operation consists of a search sentence, i.e. list of keywords to search or a specific syntax for search. This search is sent to active members of P2P network and local host. Input is the search sentence, output is the list of files that are matched, their details and their locators (locations they can be downloaded) User Interface, Download User clicks the file to be downloaded and file is downloaded from probably multiple locations. Input is the file locators, output is the file download progress and the status of the download User Interface, Settings Authorization and other settings of local files can be configured by the user. The authorization and watch settings per directory/file can be carried out in user interface. Input is the file or directory and settings to be applied User Interface, Connections Existing connections, live hosts and users should be displayed. Input is the network and system state, output is the list of hosts, users and ongoing connections User Interface, Logs History of recent activity, executed searches, remotely activated searches, downloaded files, files downloaded by remote hosts are listed. Input is the system log database, output is the list of logs. 11

13 4.2 Software Functions Search index construction Meta-data extraction For each file, software shall extract meta data and keywords and update the index accordingly. Meta-data include text documents, office documents, image, music, video and other possible meta-data types based on file type. Activated internally. Input is a file path. Based on file type, result is written on search index database. severity: must Index reconstruction On demand, software shall browse all local files and extract meta-data and construct indexes. Activated by user. Input is all files to be watched is invoked Index update When a local file under share control is updated, the database should be incrementally updated. Update can be instantaneous if system supports or through periodic rescans for changed files and updates. Activated internally by system on file change is repeated for file and database updated Authentication System authentication In case of system supporting workgroup of network based authentication trust. System authentication can provide identity. Software should take this authentication information from system Activated by user on first execution. Operating system and environment is interacted. Result is success of failure and users identity. 12

14 Third party authentication All members of network can be authenticated through a trusted third party. Single login servers, kerberos authentication are examples. Activated by user on first execution. An external service is interacted. Result is success of failure and users identity. severity demanded Public key authentication Public key exchange through P2P confirmation as in PGP is another mechanism for authentication. Software might support this authentication via user to user pairing. This mechanism might work as in the social networks as connection requests confirmed by two parties. Activated by user. Input are the users identity information and the other user to connect. Other user gets the request. If approves authentication is successful and process repeated automatically without user invocation afterwords. Otherwise fails. severity nice to have Authorization Individual user permissions User shall give individual users to search and download files. Activated by user. Input is a file and user identity. Authorization database is updated User grouping User should be able to group users and define permission based on user groups as well. Activated by user. Input is a group of users and group name. Authorization database is updated. Group add, delete, users group member modification cases are handled. severity demanded 13

15 Public and authenticated groups Authorization can be granted as public in case everyone can download without authentication and authenticated where anyone that is authenticated to the system. These groups should be supported. severity demanded User/group exclusion User should be able to define permissions to exclude users and groups in permissions as everyone but selected users can access. severity demanded Directory based permissions User should be able to define directories to have default permissions so that files under that directory recursively will have a default set of permissions. User initiated. Input is a directory and set of permissions. Authorization database updated. All filenames under directory inherits the permissions afterwards. severity demanded Multiple access levels Permission can be given for multiple levels. For example operations like search, download, and create revision can be granted as different levels. severity demanded Distributed search Keeping track of alive hosts System shall keep track of currently active software that are connected. Depending on the underlying mechanism, hosts in broadcast network, registered hosts, hosts through P2P host exchange should be monitored for being alive. Activated periodically. Repeat host search, collect status results, store. 14

16 Local query execution Local user can invoke a query on local search database and resulting files are listed. Query can be on filename, meta-data or file content. Activated by user. Search query is the input. Search is executed on local database, results are output Query language support Queries can be guided through a query language. Partial matches, full matches, multiple work matches, meta-data matches can be supported. Input is search sentence. Sentence is parsed, verified. As a result, a query procedure is generated. severity demanded Query executed by a remote user Software shall wait on a network port and carry out the queries sent by remote users. Query results are filtered for the identity of the user. Only permitted results are shown. Activated by network user. Identity of user and search sentence are input. Query executed as in and result is returned on network Query executed on a remote host Software shall repeat users query on all alive hosts, collect the results and display. Activated by user. Input is search sentence. List of alive hosts are retrieved. For each host query is executed as in and results shown in user interface Search result detail Based on the search query and type of match the information of each match is displayed. This information contain filename, owner and metadata. 15

17 Internally activated. Input is the matched file and the query. Output is the detailed information about the file and query type Result snippets In case of keyword match, the portion of the matched file containing the keywords, or a document summary is to be displayed. Internally activated. Input is the matched file and the query. Output is the snippet text. severity nice to have Query result caching Results of the last executed queries are cached in case of repetition and for history revisit. Internally activated. Input is the search result. Result is written on cache database. Effects , severity nice to have Distributed download Keeping track of the files to download Search results contain a locator, probably a distributed hash table identity of the file. This identity should be searchable through all alive hosts. Multiple hosts may contain the same file. Results respect to users identity and authorization, if user is not authorized file is not displayed. Each promoted file to DHT should contain necessary information for download access Handling of file download request Software shall serve the request to download a portion of a file if the request coming from an authorized user. Activated over network. Input are the file locator, identity of the requester and the part of the file to be requested. The requested file part is transferred over P2P. 16

18 Downloading a file from remote hosts A download request initiated by user should be sent to remote hosts containing the file and file should be downloaded. P2P download semantics are followed. Initiated by user. Input is the file selected by user. File request is sent to remote hosts containing the file. If multiple, requests are sent as parts. File download executed in background and success status is displayed to user when available File integrity control File locator and DHT should contain a file and fragments digest. 1 This digest information should be used to control if fragments downloaded correctly. P2P frameworks have mechanisms for this. File download is only completed when all parts of the file pass integrity check. Internal operation. Input is the meta-data of the file containing fragment checksums, the fragment that is just received. Output is mark of the fragment as complete or not Download auto share User should set up if the downloaded file inherits the permissions and shared for other users to download Internal operation. Input is the file path that completed download. The file is added on search index of shared files. severity demanded Version management Version tracking When file is changed on disk, user is asked if a new revision is to be created. Documents link to its original file is kept and revision semantics is followed in all operations of search and download. Initiated by system on file write on shared directory. Input is the new file 1 most P2P applications support fragmentation of large files and keep a summary of integrity information per fragment 17

19 and old file information. Output is the new revision stored on search index. severity nice to have Automated Versioning User can configure a specific file or directory to get versions with some maximum period automatically. In other words after a predefined time interval, when document is rewritten a version is automatically created without user intervention. severity nice to have All versions download When multiple version exists for a document, all versions can be downloaded with a single click by the user. Modification of with all download option downloading all revisions. severity nice to have 4.3 Performance requirements and Design constraints Performance In order to provide fair interaction, search queries should be answered in couple of seconds. This implies preconstruction of search indexes. Processing the documents on demand per query is not acceptable. Download performance should be optimized to take advantage of P2P networking Security Since most private documents of a user could be revealed, security design is utterly important in the system. Proper authentication and authorization should be provided without annoying user Flexibility Types of files supported in search is not static. For example most of the electronic document formats we are using have been introduced in last ten years and new formats are still being introduced as epub and DejaVu. 18

20 Systems ability to adapt itself as new formats introduced is ultimately important. User should not need to reinstall software in order to introduce a new format to meta-data extraction ( ). 19

21 References [1] OpenDocMan web site,http://www.opendocman.com/. [2] Dropbox web site,https://www.dropbox.com/. [3] Google docs web site,https://docs.google.com/. [4] Gnutella in Wikipedia,http://en.wikipedia.org/wiki/Gnutella. [5] Bittorrent in Wikipedia,http://en.wikipedia.org/wiki/ BitTorrent. [6] Direct Connect in Wikipedia,http://en.wikipedia.org/wiki/ Direct_Connect_(file_sharing). [7] Lucene web site,http://lucene.apache.org/core/. [8] Beagle web site,http://www.beagle-project.org/. [9] Meta Tracker web site,http://projects.gnome.org/tracker/. [10], Wikipedia article on Document Management Systems en.wikipedia.org/wiki/dms/. 20

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server.

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server. Contents For Administrators... 3 Set up SourceAnywhere... 3 SourceAnywhere Service Configurator... 3 Start Service... 3 IP & Port... 3 SQL Connection... 4 SourceAnywhere Server Manager... 4 Add User...

More information

NAS 225 Introduction to FTP Explorer

NAS 225 Introduction to FTP Explorer NAS 225 Introduction to FTP Explorer Connect to FTP sites and transfer files A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use FTP Explorer to connect

More information

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table

More information

P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T

P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T, F U S I O N E D I T I O N R E L E A S E 1 1. 1. 1.x P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E

More information

Insight Video Net. LLC. CMS 2.0. Quick Installation Guide

Insight Video Net. LLC. CMS 2.0. Quick Installation Guide Insight Video Net. LLC. CMS 2.0 Quick Installation Guide Table of Contents 1. CMS 2.0 Installation 1.1. Software Required 1.2. Create Default Directories 1.3. Create Upload User Account 1.4. Installing

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically

More information

How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550

How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550 How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550 Send to the SMB server You can send the data read in from the copier's ADF or the original scanning glass (scanned data)

More information

File Share Navigator Online 1

File Share Navigator Online 1 File Share Navigator Online 1 User Guide Service Pack 3 Issued November 2015 Table of Contents What s New in this Guide... 4 About File Share Navigator Online... 5 Components of File Share Navigator Online...

More information

ReadyNAS Setup Manual

ReadyNAS Setup Manual ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM User Manual Table of Contents Introducing OWL...3 Starting to use Owl...4 The Logging in page...4 Using the browser...6 Folder structure...6 Title Bar...6

More information

What Is Ad-Aware Update Server?

What Is Ad-Aware Update Server? Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying

More information

NASA Workflow Tool. User Guide. September 29, 2010

NASA Workflow Tool. User Guide. September 29, 2010 NASA Workflow Tool User Guide September 29, 2010 NASA Workflow Tool User Guide 1. Overview 2. Getting Started Preparing the Environment 3. Using the NED Client Common Terminology Workflow Configuration

More information

Provisioning Agent Software

Provisioning Agent Software 4 Provisioning Agent Software This section describes Agent provisioning, which is the task of installing the K1000 Agent software onto the machines that you want to manage using the K1000 Management Appliance.

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Urchin E-Commerce. User Guide

Urchin E-Commerce. User Guide 2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be reproduced,

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

ANSYS EKM Overview. What is EKM?

ANSYS EKM Overview. What is EKM? ANSYS EKM Overview What is EKM? ANSYS EKM is a simulation process and data management (SPDM) software system that allows engineers at all levels of an organization to effectively manage the data and processes

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

HELPDESK. Electronic Management System of Technical Assistance Requests

HELPDESK. Electronic Management System of Technical Assistance Requests HELPDESK Electronic Management System of Technical Assistance Requests What does it do for You? Increases efficiency of assistance activity by process structuring, standardizing and automation, reducing

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1

More information

CatDV Pro Workgroup Serve r

CatDV Pro Workgroup Serve r Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability

More information

User Manual. Document Management System

User Manual. Document Management System User Manual Document Management System Version 1.0 1 of 23 Table of Contents 1. Introduction... 4 2. Objective... 4 3. Login to E-Governance System... 4 4. Document Management System (DMS) in E-Governance

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

HDAccess Administrators User Manual. Help Desk Authority 9.0

HDAccess Administrators User Manual. Help Desk Authority 9.0 HDAccess Administrators User Manual Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM User Guide Revision D Issued July 2014 Table of Contents About CRM Migration Manager... 4 System Requirements... 5 Operating Systems... 5 Dynamics

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

CLEARPASS ONGUARD CONFIGURATION GUIDE

CLEARPASS ONGUARD CONFIGURATION GUIDE CONFIGURATION GUIDE REVISION HISTORY Revised By Date Changes Dennis Boas July 2015 Version 1 initial release TABLE OF CONTENTS... 1 INTRODUCTION... 3 CONFIGURATION WORKFLOW... 4 CONFIGURE POSTURE POLICIES...

More information

There are numerous ways to access monitors:

There are numerous ways to access monitors: Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Net Services: File System Monitor

Net Services: File System Monitor Net Services: File System Monitor Settings for ExtremeZ-IP file server volumes...1 Setup of the Net Services server...2 Configuring and testing the Net Services server...3 Installing File System Monitor...4

More information

Using SSH Secure Shell Client for FTP

Using SSH Secure Shell Client for FTP Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking

More information

SAM XFile. Trial Installation Guide Linux. Snell OD is in the process of being rebranded SAM XFile

SAM XFile. Trial Installation Guide Linux. Snell OD is in the process of being rebranded SAM XFile SAM XFile Trial Installation Guide Linux Snell OD is in the process of being rebranded SAM XFile Version History Table 1: Version Table Date Version Released by Reason for Change 10/07/2014 1.0 Andy Gingell

More information

PRINT CONFIGURATION. 1. Printer Configuration

PRINT CONFIGURATION. 1. Printer Configuration PRINT CONFIGURATION Red Flag Server5 has improved the designs of the printer configuration tool to facilitate you to conduct print configuration and print tasks management in a more convenient and familiar

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

Avira Management Console AMC server configuration for managing online remote computers. HowTo

Avira Management Console AMC server configuration for managing online remote computers. HowTo Avira Management Console AMC server configuration for managing online remote computers HowTo Table of Contents 1. General... 3 2. Network layout plan... 3 3. Configuration... 4 3.1 Port forwarding...4

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

LogLogic Trend Micro OfficeScan Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and

More information

Basic SQL Server operations

Basic SQL Server operations Basic SQL Server operations KB number History 22/05/2008 V1.0 By Thomas De Smet CONTENTS CONTENTS... 1 DESCRIPTION... 1 SOLUTION... 1 REQUIREMENTS...13 REFERENCES...13 APPLIES TO...13 KEYWORDS...13 DESCRIPTION

More information

What's New in SAS Data Management

What's New in SAS Data Management Paper SAS034-2014 What's New in SAS Data Management Nancy Rausch, SAS Institute Inc., Cary, NC; Mike Frost, SAS Institute Inc., Cary, NC, Mike Ames, SAS Institute Inc., Cary ABSTRACT The latest releases

More information

Litigation Support connector installation and integration guide for Summation

Litigation Support connector installation and integration guide for Summation Litigation Support connector installation and integration guide for Summation For AccuRoute v2.3 July 28, 2009 Omtool, Ltd. 6 Riverside Drive Andover, MA 01810 Phone: +1/1 978 327 5700 Toll-free in the

More information

Sharing Documents on the Internet

Sharing Documents on the Internet Capture Components, LLC White Paper Page 1 of 13 32158 Camino Capistrano Suite A PMB 373 San Juan Capistrano, CA 92675 Sales@CaptureComponents.com www.capturecomponents.com Sharing Documents on the Internet

More information

UNICORN 6.4. Administration and Technical Manual

UNICORN 6.4. Administration and Technical Manual UNICORN 6.4 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

User Guide Part 7. Status Server

User Guide Part 7. Status Server User Guide Part 7 Contents 1 OVERVIEW... 3 1.1 About OPC UA... 3 1.2 Uses of Status... 3 1.3 Status as a Platform... 4 1.4 Communication Ports... 4 2 SUB SYSTEMS... 5 2.1 Data Model... 5 2.1.1 Data Model

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Manage Licenses and Updates

Manage Licenses and Updates Manage Licenses and Updates Palo Alto Networks Panorama Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054

More information

FINDING AND LINKING RESOURCES

FINDING AND LINKING RESOURCES FINDING AND LINKING RESOURCES VUE supports attached digital content from your computer, the Web and from remote systems such as FTP sites, digital repositories, and Google servers. Content can be added

More information

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.

More information

TAO Installation Guide v0.1. September 2012

TAO Installation Guide v0.1. September 2012 TAO Installation Guide v0.1 September 2012 TAO installation guide v0.1 page 2/22 This installation guide provides instructions for installing TAO. For all other aspects of using TAO, please see the user

More information

Web Conferencing Version 8.3 Troubleshooting Guide

Web Conferencing Version 8.3 Troubleshooting Guide System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which

More information

WhatsUp Gold v11 Features Overview

WhatsUp Gold v11 Features Overview WhatsUp Gold v11 Features Overview This guide provides an overview of the core functionality of WhatsUp Gold v11, and introduces interesting features and processes that help users maximize productivity

More information

Security Provider Integration Kerberos Authentication

Security Provider Integration Kerberos Authentication Security Provider Integration Kerberos Authentication 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration

More information

DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com info@flexense.com. File Integrity Monitor

DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com info@flexense.com. File Integrity Monitor DiskBoss File & Disk Manager File Integrity Monitor Version 2.0 Dec 2011 www.flexense.com info@flexense.com 1 Product Overview DiskBoss is an automated, rule-based file and disk manager allowing one to

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

BarTender Print Portal. Web-based Software for Printing BarTender Documents WHITE PAPER

BarTender Print Portal. Web-based Software for Printing BarTender Documents WHITE PAPER BarTender Print Portal Web-based Software for Printing BarTender Documents WHITE PAPER Contents Overview 3 Installing Print Portal 4 Configuring Your Installation 4 Supported Printing Technologies 5 Web

More information

Integrating with BarTender Integration Builder

Integrating with BarTender Integration Builder Integrating with BarTender Integration Builder WHITE PAPER Contents Overview 3 Understanding BarTender's Native Integration Platform 4 Integration Builder 4 Administration Console 5 BarTender Integration

More information

Monitoring Replication

Monitoring Replication Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

PAYMENTVAULT TM LONG TERM DATA STORAGE

PAYMENTVAULT TM LONG TERM DATA STORAGE PAYMENTVAULT TM LONG TERM DATA STORAGE Version 3.0 by Auric Systems International 1 July 2010 Copyright c 2010 Auric Systems International. All rights reserved. Contents 1 Overview 1 1.1 Platforms............................

More information

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. venkatr20032002@gmail.com Ms. Smita Dange Lecturer,

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Cloudera Backup and Disaster Recovery

Cloudera Backup and Disaster Recovery Cloudera Backup and Disaster Recovery Important Note: Cloudera Manager 4 and CDH 4 have reached End of Maintenance (EOM) on August 9, 2015. Cloudera will not support or provide patches for any of the Cloudera

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4

Pcounter Web Report 3.x Installation Guide - v2014-11-30. Pcounter Web Report Installation Guide Version 3.4 Pcounter Web Report 3.x Installation Guide - v2014-11-30 Pcounter Web Report Installation Guide Version 3.4 Table of Contents Table of Contents... 2 Installation Overview... 3 Installation Prerequisites

More information

DOCSVAULT Document Management System for everyone

DOCSVAULT Document Management System for everyone Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Group Management Server User Guide

Group Management Server User Guide Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame

Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame Label Gallery Software for Microsoft Windows Terminal Services and Citrix MetaFrame White Paper Version 20100716 2009 SATO CORPORATION. All rights reserved. http://www.satoworldwide.com softwaresupport@satogbs.com

More information

Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015

Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Table of Contents Logging into the Drive Application 4 Log In Sign Up Access the Drive Application

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

Server Installation, Administration and Integration Guide

Server Installation, Administration and Integration Guide Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management

More information

Doc ID: URCHINB-001 (3/30/05)

Doc ID: URCHINB-001 (3/30/05) Urchin 2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be

More information

Coveo Platform 7.0. Oracle Knowledge Connector Guide

Coveo Platform 7.0. Oracle Knowledge Connector Guide Coveo Platform 7.0 Oracle Knowledge Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing

More information

Improving the Customer Support Experience with NetApp Remote Support Agent

Improving the Customer Support Experience with NetApp Remote Support Agent NETAPP WHITE PAPER Improving the Customer Support Experience with NetApp Remote Support Agent Ka Wai Leung, NetApp April 2008 WP-7038-0408 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 NETAPP SUPPORT REMOTE

More information

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13 Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV

More information

Snow Inventory. Installing and Evaluating

Snow Inventory. Installing and Evaluating Snow Inventory Installing and Evaluating Snow Software AB 2002 Table of Contents Introduction...3 1. Evaluate Requirements...3 2. Download Software...3 3. Obtain License Key...4 4. Install Snow Inventory

More information

User s Guide For Department of Facility Services

User s Guide For Department of Facility Services Doc s File Server User s Guide For Department of Facility Services For Ver : 7.2.88.1020 Rev : 1_05-27-2011 Created by : Elliott Jeyaseelan 2 Table of Contents SERVER LOGIN & AUTHENTICATION REQUIREMENTS

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Remote Drive PC Client software User Guide

Remote Drive PC Client software User Guide Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

Application Notes for Calabrio Workforce Management Release 9.2(1) SR3 with Avaya Aura Contact Center Release 6.4 Issue 1.0

Application Notes for Calabrio Workforce Management Release 9.2(1) SR3 with Avaya Aura Contact Center Release 6.4 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Calabrio Workforce Management Release 9.2(1) SR3 with Avaya Aura Contact Center Release 6.4 Issue 1.0 Abstract These Application Notes describe

More information

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Hyperoo 2 User Guide. Hyperoo 2 User Guide 1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous

More information

SQL Server 2008 R2 Express Edition Installation Guide

SQL Server 2008 R2 Express Edition Installation Guide Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details

More information

Installation and configuration of Real-Time Monitoring Tool (RTMT)

Installation and configuration of Real-Time Monitoring Tool (RTMT) Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable

More information

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing

More information

Shavlik Patch for Microsoft System Center

Shavlik Patch for Microsoft System Center Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

X Series Application Note 43:

X Series Application Note 43: X Series Application Note 43: Using the Remote Viewing & Web Pages of the X - Series & GR Series Recorders The Remote Viewing function of the X-Series and GR Series Recorders provide the user with the

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information