System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks"

Transcription

1 System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0

2 Contents 1 Introduction Purpose Project Scope Definitions, Acronyms, and Abbreviations Overview Background Document Management Systems Desktop Search Tools Peer to Peer Networking Overall Description Product Perspective Product Functions User Types, Constraints and Dependencies Product Features External Interfaces Authentication File System Network Search Request Network Download Request User Interface, Search User Interface, Download User Interface, Settings User Interface, Connections User Interface, Logs Software Functions Search index construction Authentication Authorization Distributed search Distributed download

3 4.2.6 Version management Performance requirements and Design constraints Performance Security Flexibility References 20 2

4 Chapter 1 Introduction 1.1 Purpose This document describes the requirements of a distributed desktop search and document sharing software called DistShare. It aims to describe the required product features, constraints, dependencies and form a basis for design and development phases of the project. 1.2 Project Scope Document exchange among members of a project is a daily routine activity which is in the core of the project life cycle. DistShare project proposes a solution to store and share documents through peer to peer communication facilitated with distributed content (i.e. keyword, meta-data) search and authentication. DistShare is a tool to share local documents of a desktop user with other members in the local area network. It is mostly a combination of desktop search tools and document management systems. DistShare watches the documents of a local user and constructs a document index as any desktop search tool. It also keeps track of sharing properties of documents, in other words who can access the documents. Then it enables users to execute a distributed content search on all computers in the DistShare network where users can see all documents containing the search words that are accessible to them. After the search, users use DistShare peer to peer download service to receive the documents. If same documents are available on multiple hosts, it is downloaded in parallel. 3

5 1.3 Definitions, Acronyms, and Abbreviations Document management system: A platform for storing, accessing, sharing documents. Most systems include mechanisms for authentication, version control of documents. Desktop search tool: A software to keep track of documents on local disk and provides means of fast access of documents through name, metadata and content keywords. P2P: Peer to peer network. 1.4 Overview This document describes the software requirements specification for Dist- Share. In the next chapter overall description of the project, main functions, dependencies and constraints are given. In Third chapter specific requirements of the project, system interfaces, functional requirements, performance and design requirements are given. 4

6 Chapter 2 Background 2.1 Document Management Systems A document management system is a document store providing access to multiple users. They are usually realized as central web based repositories that can be accessed through web browsers. They also have remote file system links so that user will be able to access documents on repository as if they were local documents. A document management system has the following components [10]: document meta-data integration (direct access through file system or other application) indexing searching versioning storage retrieval security distribution workflow capture (printed documents, fax, OCR) collaboration publishing 5

7 reproduction First eight items above also holds in the purpose of DistShare. The remaining items are mostly related to printed documents and business flow of documents so out of the scope of this project. Content management systems are similar to document management systems that are focused on especially web content and documents. Some existing document management tools are: [1, 3, 2]. 2.2 Desktop Search Tools Desktop search tools provide quick access to documents through previously generated indexes. As number of files on local filesystems increase, searching a specific file name, file attribute or content keyword becomes a common and repeated task. In order to accelerate this operation, desktop search software generates a local index to map search items to document paths. Basic indexing items are file names and file attributes. In addition to these, meta-data of documents like singer information of a music file or author of a text file can be extracted from document content and indexed. Another type of index is reverse index of a document which maps individual words contained in the document to documents as web search engines do. A well known framework for document indexing is Lucene [7]. In order to create indexes, a desktop search tool scans all local documents and generates the database. After creating the initial index, these tools keep the index up to date through periodic rescans or listening on file change events of the system. Beagle [8], Metatracker [9] and Google desktop are example of such tools. DistShare needs to repeat most of the tasks of a desktop search tool for a group of user supplied share directories. In addition, it needs to keep track of the authentication information of the documents. 2.3 Peer to Peer Networking One major drawback of central file sharing is the large volume of data and bandwidth requirements. However on a distributed environment copies of a documents can be distributed over a group of smaller capacity hosts and on demand, it can be downloaded in parallel from multiple hosts with smaller bandwidth. This idea is realized in peer to peer networks where each client is also a server for an object and shares it through peer to peer connections in contrast to all clients containing to a single master location. This allows more resilient operation and redundancy in nature. If some of the nodes or links fail, a peer to peer network can operate on remaining nodes and links. 6

8 Objects in a peer to peer network is addressed through a Distributed Hash Table which is basically a document digest to document meta-data mapping stored, searched and redistributed among all nodes of the network. DistShare aims to let everyone share documents with everyone else in the network, it is by nature suitable for peer to peer networking. Although authentication/authorization issues needs to be solved. Also a distributed search facility is needed. There are many frameworks and tools for peer to peer networking like [4, 5, 6]. 7

9 Chapter 3 Overall Description 3.1 Product Perspective DistShare is a tool working on a desktop computer, interacting with local filesystem, user for setup and a peer to peer network for search and download facilities. It may work along with existing desktop search tools, i.e. use their databases, or maintain its own search functionality. Besides that, it will work as a self contained tool. It will have some functions of a document management system like search and retrieval of documents, marking them to be shared etc. It will use one of the existing protocols for maintaining a distributed hash table of documents and distributed search and download facilities. 3.2 Product Functions DistShare consists of the following basics tasks: 1. Search index construction 2. Authorization 3. Authentication 4. Distributed search 5. Distributed download 6. Version management Search index construction is the on demand construction and incremental maintenance of document indexes. 8

10 Authorization is setting local documents sharing features so that they will be accessible to specific group of authenticated users remotely. Otherwise documents are not going to be displayed searches initiated by other hosts, nor they will be downloadable. Authentication is the mechanism of users to prove their identity to remote hosts. DistShare needs means of making sure that the host making the request is carrying the operation on behalf of the correct users. Distributed search is the tools ability to retrieve search results from other hosts in the P2P network. A search unstated in local host is repeated on other P2P hosts and results collected. Distributed download is executed when user asks download of a searched file. If same exact file is copied across multiple hosts, it will be downloaded in parallel to utilize network bandwidth. Version control is systems ability to maintain multiple revisions of the same file. System keeps track of local changes and try to associate the file with is origin. So that when the file is searched, results with version options could be returned. 3.3 User Types, Constraints and Dependencies Users of the system is desktop users working on a local area network or Internet. All users are in the same class. Operating environment is a desktop computer. Any of Linux, Windows or MacOs can be considered as target platform. Interoperability could be expected as platform independent documents are to be shared. A desktop with graphical interfaces are expected for user friendliness. Major constraint in the system is the security. Ordinary users should not be able to access documents of the desktop user. Another constraint is the lack of central control. As in other P2P applications almost all information should be kept in network nodes, not on a central server. There should be no central control other than an authentication server. There are freely available libraries for document indexing, P2P and authentication. Project depends on such libraries. 9

11 Chapter 4 Product Features 4.1 External Interfaces Authentication Each user of software needs to be authenticated in order to access other hosts. Authentication information should be sharable among other members of the P2P network. Authentication can be operating system/workgroup based or network based. Depending on the design choices, multiple authentication mechanisms could be supported. Input is the operating system or a network service. Output is the identification of the user File System All files that are marked to be shared should be watched on the filesystem. On manual invocation, periodic invocation or as files change, system needs to update information about the file. Input is the file on a local file system and output is the database keeping search indexes Network Search Request System should wait for network requests to answer remote search requests. Input is a group of search sentence and identity of the remote user. Output is the list of matching files Network Download Request When a matched document is requested, it is served by the local file holders. Software needs to serve such requests. 10

12 Input is the file locator and identity of the remote user. Output is the file content probably in fragments User Interface, Search Major operation in graphical user interface is the search. Search operation consists of a search sentence, i.e. list of keywords to search or a specific syntax for search. This search is sent to active members of P2P network and local host. Input is the search sentence, output is the list of files that are matched, their details and their locators (locations they can be downloaded) User Interface, Download User clicks the file to be downloaded and file is downloaded from probably multiple locations. Input is the file locators, output is the file download progress and the status of the download User Interface, Settings Authorization and other settings of local files can be configured by the user. The authorization and watch settings per directory/file can be carried out in user interface. Input is the file or directory and settings to be applied User Interface, Connections Existing connections, live hosts and users should be displayed. Input is the network and system state, output is the list of hosts, users and ongoing connections User Interface, Logs History of recent activity, executed searches, remotely activated searches, downloaded files, files downloaded by remote hosts are listed. Input is the system log database, output is the list of logs. 11

13 4.2 Software Functions Search index construction Meta-data extraction For each file, software shall extract meta data and keywords and update the index accordingly. Meta-data include text documents, office documents, image, music, video and other possible meta-data types based on file type. Activated internally. Input is a file path. Based on file type, result is written on search index database. severity: must Index reconstruction On demand, software shall browse all local files and extract meta-data and construct indexes. Activated by user. Input is all files to be watched is invoked Index update When a local file under share control is updated, the database should be incrementally updated. Update can be instantaneous if system supports or through periodic rescans for changed files and updates. Activated internally by system on file change is repeated for file and database updated Authentication System authentication In case of system supporting workgroup of network based authentication trust. System authentication can provide identity. Software should take this authentication information from system Activated by user on first execution. Operating system and environment is interacted. Result is success of failure and users identity. 12

14 Third party authentication All members of network can be authenticated through a trusted third party. Single login servers, kerberos authentication are examples. Activated by user on first execution. An external service is interacted. Result is success of failure and users identity. severity demanded Public key authentication Public key exchange through P2P confirmation as in PGP is another mechanism for authentication. Software might support this authentication via user to user pairing. This mechanism might work as in the social networks as connection requests confirmed by two parties. Activated by user. Input are the users identity information and the other user to connect. Other user gets the request. If approves authentication is successful and process repeated automatically without user invocation afterwords. Otherwise fails. severity nice to have Authorization Individual user permissions User shall give individual users to search and download files. Activated by user. Input is a file and user identity. Authorization database is updated User grouping User should be able to group users and define permission based on user groups as well. Activated by user. Input is a group of users and group name. Authorization database is updated. Group add, delete, users group member modification cases are handled. severity demanded 13

15 Public and authenticated groups Authorization can be granted as public in case everyone can download without authentication and authenticated where anyone that is authenticated to the system. These groups should be supported. severity demanded User/group exclusion User should be able to define permissions to exclude users and groups in permissions as everyone but selected users can access. severity demanded Directory based permissions User should be able to define directories to have default permissions so that files under that directory recursively will have a default set of permissions. User initiated. Input is a directory and set of permissions. Authorization database updated. All filenames under directory inherits the permissions afterwards. severity demanded Multiple access levels Permission can be given for multiple levels. For example operations like search, download, and create revision can be granted as different levels. severity demanded Distributed search Keeping track of alive hosts System shall keep track of currently active software that are connected. Depending on the underlying mechanism, hosts in broadcast network, registered hosts, hosts through P2P host exchange should be monitored for being alive. Activated periodically. Repeat host search, collect status results, store. 14

16 Local query execution Local user can invoke a query on local search database and resulting files are listed. Query can be on filename, meta-data or file content. Activated by user. Search query is the input. Search is executed on local database, results are output Query language support Queries can be guided through a query language. Partial matches, full matches, multiple work matches, meta-data matches can be supported. Input is search sentence. Sentence is parsed, verified. As a result, a query procedure is generated. severity demanded Query executed by a remote user Software shall wait on a network port and carry out the queries sent by remote users. Query results are filtered for the identity of the user. Only permitted results are shown. Activated by network user. Identity of user and search sentence are input. Query executed as in and result is returned on network Query executed on a remote host Software shall repeat users query on all alive hosts, collect the results and display. Activated by user. Input is search sentence. List of alive hosts are retrieved. For each host query is executed as in and results shown in user interface Search result detail Based on the search query and type of match the information of each match is displayed. This information contain filename, owner and metadata. 15

17 Internally activated. Input is the matched file and the query. Output is the detailed information about the file and query type Result snippets In case of keyword match, the portion of the matched file containing the keywords, or a document summary is to be displayed. Internally activated. Input is the matched file and the query. Output is the snippet text. severity nice to have Query result caching Results of the last executed queries are cached in case of repetition and for history revisit. Internally activated. Input is the search result. Result is written on cache database. Effects , severity nice to have Distributed download Keeping track of the files to download Search results contain a locator, probably a distributed hash table identity of the file. This identity should be searchable through all alive hosts. Multiple hosts may contain the same file. Results respect to users identity and authorization, if user is not authorized file is not displayed. Each promoted file to DHT should contain necessary information for download access Handling of file download request Software shall serve the request to download a portion of a file if the request coming from an authorized user. Activated over network. Input are the file locator, identity of the requester and the part of the file to be requested. The requested file part is transferred over P2P. 16

18 Downloading a file from remote hosts A download request initiated by user should be sent to remote hosts containing the file and file should be downloaded. P2P download semantics are followed. Initiated by user. Input is the file selected by user. File request is sent to remote hosts containing the file. If multiple, requests are sent as parts. File download executed in background and success status is displayed to user when available File integrity control File locator and DHT should contain a file and fragments digest. 1 This digest information should be used to control if fragments downloaded correctly. P2P frameworks have mechanisms for this. File download is only completed when all parts of the file pass integrity check. Internal operation. Input is the meta-data of the file containing fragment checksums, the fragment that is just received. Output is mark of the fragment as complete or not Download auto share User should set up if the downloaded file inherits the permissions and shared for other users to download Internal operation. Input is the file path that completed download. The file is added on search index of shared files. severity demanded Version management Version tracking When file is changed on disk, user is asked if a new revision is to be created. Documents link to its original file is kept and revision semantics is followed in all operations of search and download. Initiated by system on file write on shared directory. Input is the new file 1 most P2P applications support fragmentation of large files and keep a summary of integrity information per fragment 17

19 and old file information. Output is the new revision stored on search index. severity nice to have Automated Versioning User can configure a specific file or directory to get versions with some maximum period automatically. In other words after a predefined time interval, when document is rewritten a version is automatically created without user intervention. severity nice to have All versions download When multiple version exists for a document, all versions can be downloaded with a single click by the user. Modification of with all download option downloading all revisions. severity nice to have 4.3 Performance requirements and Design constraints Performance In order to provide fair interaction, search queries should be answered in couple of seconds. This implies preconstruction of search indexes. Processing the documents on demand per query is not acceptable. Download performance should be optimized to take advantage of P2P networking Security Since most private documents of a user could be revealed, security design is utterly important in the system. Proper authentication and authorization should be provided without annoying user Flexibility Types of files supported in search is not static. For example most of the electronic document formats we are using have been introduced in last ten years and new formats are still being introduced as epub and DejaVu. 18

20 Systems ability to adapt itself as new formats introduced is ultimately important. User should not need to reinstall software in order to introduce a new format to meta-data extraction ( ). 19

21 References [1] OpenDocMan web site,http://www.opendocman.com/. [2] Dropbox web site,https://www.dropbox.com/. [3] Google docs web site,https://docs.google.com/. [4] Gnutella in Wikipedia,http://en.wikipedia.org/wiki/Gnutella. [5] Bittorrent in Wikipedia,http://en.wikipedia.org/wiki/ BitTorrent. [6] Direct Connect in Wikipedia,http://en.wikipedia.org/wiki/ Direct_Connect_(file_sharing). [7] Lucene web site,http://lucene.apache.org/core/. [8] Beagle web site,http://www.beagle-project.org/. [9] Meta Tracker web site,http://projects.gnome.org/tracker/. [10], Wikipedia article on Document Management Systems en.wikipedia.org/wiki/dms/. 20

How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550

How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550 How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550 Send to the SMB server You can send the data read in from the copier's ADF or the original scanning glass (scanned data)

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server.

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server. Contents For Administrators... 3 Set up SourceAnywhere... 3 SourceAnywhere Service Configurator... 3 Start Service... 3 IP & Port... 3 SQL Connection... 4 SourceAnywhere Server Manager... 4 Add User...

More information

P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T

P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T, F U S I O N E D I T I O N R E L E A S E 1 1. 1. 1.x P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E

More information

VThis A PP NOTE USING ON THE SPOT MEDIA WITH TRAFFICMANAGER

VThis A PP NOTE USING ON THE SPOT MEDIA WITH TRAFFICMANAGER A PP NOTE USING ON THE SPOT MEDIA WITH TRAFFICMANAGER Introduction...2 Setting Up and Configuring EZSpot...3 Integrating On The Spot Media in Your Inbound Factory...3 Copyright and Trademark Notice...6

More information

Insight Video Net. LLC. CMS 2.0. Quick Installation Guide

Insight Video Net. LLC. CMS 2.0. Quick Installation Guide Insight Video Net. LLC. CMS 2.0 Quick Installation Guide Table of Contents 1. CMS 2.0 Installation 1.1. Software Required 1.2. Create Default Directories 1.3. Create Upload User Account 1.4. Installing

More information

What Is Ad-Aware Update Server?

What Is Ad-Aware Update Server? Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying

More information

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table

More information

ReadyNAS Setup Manual

ReadyNAS Setup Manual ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes

StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes User Guide Rev A StreamServe Persuasion SP4StreamServe Connect for SAP - Business Processes User Guide Rev A SAP, mysap.com,

More information

Litigation Support connector installation and integration guide for Summation

Litigation Support connector installation and integration guide for Summation Litigation Support connector installation and integration guide for Summation For AccuRoute v2.3 July 28, 2009 Omtool, Ltd. 6 Riverside Drive Andover, MA 01810 Phone: +1/1 978 327 5700 Toll-free in the

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

Studio 5.0 User s Guide

Studio 5.0 User s Guide Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

NAS 225 Introduction to FTP Explorer

NAS 225 Introduction to FTP Explorer NAS 225 Introduction to FTP Explorer Connect to FTP sites and transfer files A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use FTP Explorer to connect

More information

CatDV Pro Workgroup Serve r

CatDV Pro Workgroup Serve r Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

DOCSVAULT Document Management System for everyone

DOCSVAULT Document Management System for everyone Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Laptop Backup - Administrator Guide (Windows)

Laptop Backup - Administrator Guide (Windows) Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL

More information

SAM XFile. Trial Installation Guide Linux. Snell OD is in the process of being rebranded SAM XFile

SAM XFile. Trial Installation Guide Linux. Snell OD is in the process of being rebranded SAM XFile SAM XFile Trial Installation Guide Linux Snell OD is in the process of being rebranded SAM XFile Version History Table 1: Version Table Date Version Released by Reason for Change 10/07/2014 1.0 Andy Gingell

More information

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM User Manual Table of Contents Introducing OWL...3 Starting to use Owl...4 The Logging in page...4 Using the browser...6 Folder structure...6 Title Bar...6

More information

Coming Soon in Tableau 8.0 Server

Coming Soon in Tableau 8.0 Server Coming Soon in Tableau 8.0 Server Tableau version 8.0 is a major new release that includes new capabilities sure to delight all customers. This new version continues to extend Tableau s ease of use, flexibility,

More information

Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015

Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Table of Contents Logging into the Drive Application 4 Log In Sign Up Access the Drive Application

More information

Web Conferencing Version 8.3 Troubleshooting Guide

Web Conferencing Version 8.3 Troubleshooting Guide System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which

More information

What's New in SAS Data Management

What's New in SAS Data Management Paper SAS034-2014 What's New in SAS Data Management Nancy Rausch, SAS Institute Inc., Cary, NC; Mike Frost, SAS Institute Inc., Cary, NC, Mike Ames, SAS Institute Inc., Cary ABSTRACT The latest releases

More information

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. venkatr20032002@gmail.com Ms. Smita Dange Lecturer,

More information

CLEARPASS ONGUARD CONFIGURATION GUIDE

CLEARPASS ONGUARD CONFIGURATION GUIDE CONFIGURATION GUIDE REVISION HISTORY Revised By Date Changes Dennis Boas July 2015 Version 1 initial release TABLE OF CONTENTS... 1 INTRODUCTION... 3 CONFIGURATION WORKFLOW... 4 CONFIGURE POSTURE POLICIES...

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

Net Services: File System Monitor

Net Services: File System Monitor Net Services: File System Monitor Settings for ExtremeZ-IP file server volumes...1 Setup of the Net Services server...2 Configuring and testing the Net Services server...3 Installing File System Monitor...4

More information

Windows Peer-to-Peer Network Configuration Guide

Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication

More information

Using the Synchronization Client

Using the Synchronization Client Using the Synchronization Client The owncloud Desktop Client remains in the background and is visible as an icon in the system tray (Windows, KDE), status bar (Mac OS X), or notification area (Linux).

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443

More information

Subversion Server for Windows

Subversion Server for Windows Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.

More information

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well. QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

TAO Installation Guide v0.1. September 2012

TAO Installation Guide v0.1. September 2012 TAO Installation Guide v0.1 September 2012 TAO installation guide v0.1 page 2/22 This installation guide provides instructions for installing TAO. For all other aspects of using TAO, please see the user

More information

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud

More information

File Share Navigator Online 1

File Share Navigator Online 1 File Share Navigator Online 1 User Guide Service Pack 3 Issued November 2015 Table of Contents What s New in this Guide... 4 About File Share Navigator Online... 5 Components of File Share Navigator Online...

More information

SchoolBooking LDAP Integration Guide

SchoolBooking LDAP Integration Guide SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

User s Guide For Department of Facility Services

User s Guide For Department of Facility Services Doc s File Server User s Guide For Department of Facility Services For Ver : 7.2.88.1020 Rev : 1_05-27-2011 Created by : Elliott Jeyaseelan 2 Table of Contents SERVER LOGIN & AUTHENTICATION REQUIREMENTS

More information

ThinPoint Quick Start Guide

ThinPoint Quick Start Guide ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...

More information

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically

More information

Integrating with BarTender Integration Builder

Integrating with BarTender Integration Builder Integrating with BarTender Integration Builder WHITE PAPER Contents Overview 3 Understanding BarTender's Native Integration Platform 4 Integration Builder 4 Administration Console 5 BarTender Integration

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

qliqdirect Active Directory Guide

qliqdirect Active Directory Guide qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect

More information

Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006

Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006 /30/2006 2 3 4 5 6 7 8 9 0 2 3 4 5 6 7 8 9 20 2 22 23 24 25 26 27 28 29 30 3 32 33 34 35 36 37 38 39 = required; 2 = optional; 3 = not required functional requirements Discovery tools available to end-users:

More information

UNICORN 6.4. Administration and Technical Manual

UNICORN 6.4. Administration and Technical Manual UNICORN 6.4 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...

More information

Coveo Platform 7.0. Oracle Knowledge Connector Guide

Coveo Platform 7.0. Oracle Knowledge Connector Guide Coveo Platform 7.0 Oracle Knowledge Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Upload files to FTP server

Upload files to FTP server Upload files to FTP server V.150630 1. Overview The instructions in this article will explain how to upload the snapshots and videos from your camera to a FTP server. All Phylink cameras have the ability

More information

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main

More information

HDAccess Administrators User Manual. Help Desk Authority 9.0

HDAccess Administrators User Manual. Help Desk Authority 9.0 HDAccess Administrators User Manual Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks

More information

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM User Guide Revision D Issued July 2014 Table of Contents About CRM Migration Manager... 4 System Requirements... 5 Operating Systems... 5 Dynamics

More information

User Manual. Document Management System

User Manual. Document Management System User Manual Document Management System Version 1.0 1 of 23 Table of Contents 1. Introduction... 4 2. Objective... 4 3. Login to E-Governance System... 4 4. Document Management System (DMS) in E-Governance

More information

SQL Server 2008 R2 Express Edition Installation Guide

SQL Server 2008 R2 Express Edition Installation Guide Hardware, Software & System Requirements for SQL Server 2008 R2 Express Edition To get the overview of SQL Server 2008 R2 Express Edition, click here. Please refer links given below for all the details

More information

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com CHAPTER: Introduction Microsoft virtual architecture: Hyper-V 6.0 Manager Hyper-V Server (R1 & R2) Hyper-V Manager Hyper-V Server R1, Dell UPS Local Node Manager R2 Main Operating System: 2008Enterprise

More information

User Guide. MABS v3.0. Motorola Automated Backup System

User Guide. MABS v3.0. Motorola Automated Backup System User Guide MAS v3.0 Motorola Automated ackup System MOTOROLA and the Stylized M logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC. Firefox and the Firefox logos are trademarks

More information

2.0. Installation Guide. March 2011 2.0.69637. 2011 Telestream, Inc.

2.0. Installation Guide. March 2011 2.0.69637. 2011 Telestream, Inc. 2.0 Installation Guide March 2011 2.0.69637 2011 Telestream, Inc. iii Contents Installing Vantage Start Here Common Installation Scenarios...1 Other Installation Scenarios...2 Installing or Upgrading

More information

SERVER 9 QUALIFIED ASSOCIATE. Exam Preparation Guide

SERVER 9 QUALIFIED ASSOCIATE. Exam Preparation Guide SERVER 9 QUALIFIED ASSOCIATE Exam Preparation Guide Exam Details This document provides information on the structure of the exam, along with the knowledge and skills being measured. It will also guide

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

Scheduling in SAS 9.4 Second Edition

Scheduling in SAS 9.4 Second Edition Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

Urchin E-Commerce. User Guide

Urchin E-Commerce. User Guide 2005 Linux Web Host. All rights reserved. The content of this manual is furnished under license and may be used or copied only in accordance with this license. No part of this publication may be reproduced,

More information

Thinspace deskcloud. Quick Start Guide

Thinspace deskcloud. Quick Start Guide Thinspace deskcloud Quick Start Guide Version 1.2 Published: SEP-2014 Updated: 16-SEP-2014 2014 Thinspace Technology Ltd. All rights reserved. The information contained in this document represents the

More information

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5

GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab

Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab Yocto Project Developer Day San Francisco, 2013 Jessica Zhang Introduction Welcome to the Yocto Project Eclipse plug-in

More information

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing

More information

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1 Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of

More information

Basic SQL Server operations

Basic SQL Server operations Basic SQL Server operations KB number History 22/05/2008 V1.0 By Thomas De Smet CONTENTS CONTENTS... 1 DESCRIPTION... 1 SOLUTION... 1 REQUIREMENTS...13 REFERENCES...13 APPLIES TO...13 KEYWORDS...13 DESCRIPTION

More information

Load testing with WAPT: Quick Start Guide

Load testing with WAPT: Quick Start Guide Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

Network Detective. Using the New Network Detective User Interface Quick Start Guide. 2016 RapidFire Tools, Inc. All rights reserved.

Network Detective. Using the New Network Detective User Interface Quick Start Guide. 2016 RapidFire Tools, Inc. All rights reserved. Network Detective SQL Server Assessment Module Using the New Network Detective User Interface Quick Start Guide 2016 RapidFire Tools, Inc. All rights reserved. V20160111 Ver 3F Overview The Network Detective

More information

ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client

ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client ibaan ERP 5.2a Configuration Guide for ibaan ERP Windows Client A publication of: Baan Development B.V. P.O.Box 143 3770 AC Barneveld The Netherlands Printed in the Netherlands Baan Development B.V. 2002.

More information

orrelog SQL Table Monitor Adapter Users Manual

orrelog SQL Table Monitor Adapter Users Manual orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Scheduling in SAS 9.3

Scheduling in SAS 9.3 Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3

More information

NASA Workflow Tool. User Guide. September 29, 2010

NASA Workflow Tool. User Guide. September 29, 2010 NASA Workflow Tool User Guide September 29, 2010 NASA Workflow Tool User Guide 1. Overview 2. Getting Started Preparing the Environment 3. Using the NED Client Common Terminology Workflow Configuration

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4 Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory

More information

Deployment Guide: Unidesk and Hyper- V

Deployment Guide: Unidesk and Hyper- V TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview

More information

Uploading files to FTP server

Uploading files to FTP server V.150630 1. Overview Uploading files to FTP server The instructions in this article will explain how to upload the snapshots and videos from your camera to a FTP server. FTP is an Internet communications

More information

Business 360 Online - Product concepts and features

Business 360 Online - Product concepts and features Business 360 Online - Product concepts and features Version November 2014 Business 360 Online from Software Innovation is a cloud-based tool for information management. It helps you to work smarter with

More information

SQL EXPRESS INSTALLATION...

SQL EXPRESS INSTALLATION... Contents SQL EXPRESS INSTALLATION... 1 INSTALLING SQL 2012 EXPRESS... 1 SQL EXPRESS CONFIGURATION... 7 BILLQUICK DATABASE... 9 SQL Express Installation The Microsoft SQL Server 2012 Express software is

More information

Using and Contributing Virtual Machines to VM Depot

Using and Contributing Virtual Machines to VM Depot Using and Contributing Virtual Machines to VM Depot Introduction VM Depot is a library of open source virtual machine images that members of the online community have contributed. You can browse the library

More information

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...

More information