Double-Take Console User s Guide

Size: px
Start display at page:

Download "Double-Take Console User s Guide"

Transcription

1 Double-Take Console User s Guide Double-Take, GeoCluster, Double-Take for Virtual Systems, TimeData, netboot/i, winboot/i, Double-Take Cargo, sanfly, Livewire, NSI, Balance, Double-Take ShadowCaster, and associated logos are registered trademarks or trademarks of Double-Take Software, Inc. and/or its subsidiaries in the United States and/or other countries. Microsoft, Windows, Windows Vista, Hyper-V, Active Directory, and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective companies Double-Take Software, Inc. All rights reserved. DTConsole-51FP

2 Attention Notice IMPORTANT: READ CAREFULLY BEFORE USING THIS PRODUCT AND ACCOMPANYING DOCUMENTATION ("Software"). USE OF THIS SOFTWARE IS SUBJECT TO THE DOUBLE-TAKE SOFTWARE, INC. ("Double-Take") SOFTWARE LICENSE TERMS AND CONDITIONS SET FORTH BELOW ("License Agreement"). OPENING, INSTALLING, AND/OR USING THE SOFTWARE INDICATES ACCEPTANCE OF THIS LICENSE AGREEMENT. IF YOU ("Licensee") DO NOT ACCEPT THE TERMS AND CONDITIONS IN THIS LICENSE AGREEMENT, LICENSEE MUST NOT INSTALL AND/OR USE THE SOFTWARE. A.Controlling Language All documents contained herein are in English and may be translated to different languages. In the event of any inconsistencies between the English and translated versions of any document, the English Version shall control. Copies of the English and translated documents can be obtained as follows: (1) from the physical media; (2) downloaded from the Double-Take Online Support website at or (3) by calling Double-Take Technical Support at the number listed on the Support website. B.License Grant Subject to Licensee's compliance with the terms and conditions set forth herein, in return for the fee paid by Licensee, Double-Take hereby grants Licensee a limited, non-transferable personal license to use the object code version of the Software included on the media on a single server authorized in writing by Double-Take in the relevant documentation pursuant to the terms and conditions specified by Double-Take in its License Agreement, quotation, invoice or other terms that may accompany the Software. If Your purchase includes multiple instances of Software, usage is restricted to the number of licenses specified in the relevant documentation accompanying Licensee's purchase. If Licensee has purchased a Gold Disk license, usage is restricted to the number of servers and licenses set forth in Licensee's purchase order or Gold Disk Agreement. If Licensee receives a license for evaluation purposes, usage is restricted to a controlled environment for evaluation and testing purposes only and solely for the period of time specified by Double-Take. The evaluation Software will be equipped with a time out mechanism set for the period of time specified by Double-Take. Evaluation licenses are not eligible for Indemnification. Unless otherwise specified, all Software licenses will be perpetual unless terminated or transferred in accordance with the terms of this License Agreement. In the event that the Software is Linux based, specific components of the Software are subject to additional licenses. Kernel dtfs.ko and dtrep.ko ("Open Source Software") are subject to the GNU General Public License version 2 ("GPL"), and LibESMTP is subject to the GNU Lesser General Public License Version 2.1 or later ("LGPL"), as published by the Free Software Foundation. The Open Source Software shall not be subject to the remaining terms herein. There are no warranties provided with respect to the Open Source Software and all implied warranties are disclaimed, in accordance with the terms of the GPL and/or LGPL. In the event of any conflict between the terms herein and the GPL and/or LGPL with respect to the Open Source Software, the terms of the GPL and/or LGPL shall control. A copy of the GPL and LGPL licenses are provided with the Software distribution and can also be obtained at The source files for the Open Source Software are available via an FTP site from Double-Take, and can be obtained upon request submitted to LinuxPM@doubletake.com. The version of LibESMTP library file being utilized is available at Notwithstanding the foregoing, the GPL and LGPL shall only apply to the Open Source Software and shall not apply, in whole or part, to the remaining Software, and in no event shall Licensee have any right to access or obtain the source code for the remaining Software. C.Copyright Software is owned and copyrighted by Double-Take. This License Agreement confers no title or ownership and is not a sale of any rights in the Software. Licensee agrees that this Software remains the property of Double-Take and that Licensee only has a license to use this Software. Double-Take reserves all other rights to the Software. D.Restrictions Licensee may not (1) rent, lease, sublicense, time-share, sell or otherwise transfer the Software or documentation except as expressly authorized in these terms; (2) make the Software available over the internet or any other publicly accessible network or technology; (3) remove any copyright, trademark, or other proprietary notices from the Software or the media; (4) make any copies of the documentation; (5) copy the Software except as expressly provided for herein; (6) assign any rights or obligations hereunder; or (7) reverse engineer, decompile, disassemble, or otherwise attempt directly or indirectly to discover, use, disclose or transfer any source code or other confidential information contained in the Software. E.Copying Licensee may make and maintain one backup copy of the Software provided it is used only for Licensee's own backup purposes and Licensee keep possession of all backup copies. F.Pre-Printed Terms Any pre-printed terms and conditions of any documents used by any third party in connection with this License Agreement shall not be binding on Double-Take and shall not be deemed to modify this License Agreement. G.Termination Double-Take may terminate Licensee's license upon notice for failure to comply with any of the license terms set forth herein. Immediately upon termination, the Software, and all copies of the Software, at Double-Take's option, will be destroyed or returned to Double-Take. H.Limitation of Liability EXCEPT TO THE EXTENT PROHIBITED BY LOCAL LAW, IN NO EVENT WILL DOUBLE-TAKE OR ITS SUBSIDIARIES, AFFILIATES, DIRECTORS, OFFICERS, EMPLOYEES, AGENTS OR SUPPLIERS BE LIABLE FOR DIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE, OR OTHER DAMAGES (INCLUDING LOST PROFIT, LOST DATA, OR DOWNTIME COSTS), ARISING OUT OF THE USE, INABILITY TO USE, OR THE RESULTS OF USE OF THE SOFTWARE, WHETHER BASED IN WARRANTY, CONTRACT, TORT OR OTHER LEGAL THEORY, AND WHETHER OR NOT DOUBLE-TAKE WAS ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. In any case, Double-Take's entire liability under any provision of this License Agreement shall be limited to amount received by Double-Take during the twelve (12) month period prior to the date the cause of action arose. Licensee's use of the Software is entirely at Licensee's own risk.

3 I.Limited Warranty Double-Take warrants only that the Software media will be free of physical defects for a period of ninety (90) days from delivery. The entire liability of Double-Take and Licensee's exclusive remedy for Software that does not conform to this limited warranty shall be the repair or replacement of the defective media. This warranty and remedy are subject to Licensee returning the defective media during the warranty period to Double-Take or to the distributor whom Licensee obtained the Software. J.Indemnification Infringement. Double-Take will, at Double-Take's expense, indemnify, defend and hold harmless Licensee (including officers, directors, employees and agents), against any actual third party claims (including but not limited to reasonable attorneys' fees and costs) that the Software infringes, violates or misappropriates a patent, copyright, trademark, or other property right of a third party in the United States by the Software in the form provided by Double-Take to Licensee provided that (1) Licensee notify Double-Take promptly upon learning that the claim might be asserted; (2) Double-Take has sole control over the defense of the claim and any negotiations for its settlement or compromise; and (3) Licensee take no action that, in Double-Take's judgment, impairs Double-Take's defense of the claim. This indemnification obligation shall be effective only if (1) Licensee has made all payments required by the terms of this License Agreement; (2) Licensee has given prompt notice of the claim; and (3) the infringement does not result from Licensee's modification of the Software or the Software's incorporation with other software, hardware or apparatus not supplied by Double-Take. Remedy. If such a claim is made, Double-Take, at its own expense, may exercise any of the following remedies that are reasonably and commercially practicable (1) obtain for Licensee the right to continue to use the Software consistent with this License Agreement; (2) modify the Software so it is non-infringing and in compliance with this License Agreement; or (3) replace the Software with non-infringing software that complies with this License Agreement. If none of these options are available, Double-Take shall refund to Licensee the remaining value of the Software as amortized over a thirty-six (36) month life. K.Disclaimer TO THE EXTENT ALLOWED BY LAW, THIS SOFTWARE IS PROVIDED TO LICENSEE "AS IS" WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, WHETHER ORAL OR WRITTEN, EXPRESS OR IMPLIED. DOUBLE-TAKE SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY, SATISFACTORY QUALITY, NON-INFRINGEMENT, TITLE, ACCURACY OF INFORMATIONAL CONTENT, AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE RESULTS AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY LICENSEE. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY DOUBLE-TAKE SHALL CREATE A WARRANTY OR AMEND THIS "AS IS" WARRANTY. Some jurisdictions do not allow exclusions of implied warranties or conditions, so the above exclusion may not apply to Licensee to the extent prohibited by such local laws. Licensee may have other rights that vary from country to country, state to state, or province to province. L.Government If the Software is licensed for use in the performance of a U.S. government prime contract or subcontract, Licensee agrees that, consistent with FAR and , commercial computer software, computer software documentation and technical data for commercial items are licensed under vendor's standard commercial license. M.Export Restrictions Licensee acknowledges that this Software is subject to the export laws of the United States and agrees to comply at all times with such laws. This Software or any components, data, code or technology thereof may not be exported except in full compliance with all United States and other applicable laws and regulations. Licensee hereby represents and warrants that Licensee: (1) is not a citizen or resident of Cuba, Iraq, Libya, Sudan, North Korea, Iran, or Syria; (2) and if a legal entity, (a) is not an entity formed under the laws of Cuba, Iraq, Libya, Sudan, North Korea, Iran, or Syria; or (b) is not included on the U.S. Treasury Department's list of Specially Designated nationals or the U.S. Commerce Department's Table of Deny Orders. N.Severability If any term or provision herein is determined to be illegal or unenforceable, the validity or enforceability of the remainder of the terms or provisions herein will remain in full force and effect. O.Gold Disk Maintenance Renewals If Licensee chooses to renew maintenance, Licensee shall purchase maintenance for all licenses purchased hereunder and for any subsequent licenses added to the Gold Disk. P.Notice Any notices or other communications under this License Agreement shall be in writing and delivered in person, or a national overnight express delivery service or United States mail (registered or certified mail, postage pre-paid, return receipt requested) and shall be deemed to have been given upon confirmation of Double-Take's signature. Notices should be sent to the attention of Chief Financial Officer, Double-Take Software, Inc., 8470 Allison Pointe Blvd., Suite 300, Indianapolis, IN with a copy to Associate Corporate Counsel. Rev 02/ Double-Take Software, Inc. All rights reserved.

4 Table of Contents Chapter 1 Introduction Resources Chapter 2 Installing Double-Take Console Requirements Protecting a server using Virtual Recovery Assistant for Hyper-V Protecting a server using Double-Take for Hyper-V Installing Double-Take Console Chapter 3 Navigating the Double-Take Console Starting Double-Take Console Getting help Working in the Double-Take Console Changing default Double-Take Console options Sharing the server configuration file Launching other Double-Take utilities Chapter 4 Virtual Recovery Assistant: Protecting a Server with a Hyper-V Virtual Machine Starting the protection workflow Selecting the source machine Selecting volumes to protect Selecting a target server Selecting the target volume Configuring the replica virtual machine Setting protection options Failing over to the replica virtual machine Reusing virtual hard disks Chapter 5 Double-Take for Hyper-V: Protecting a Hyper-V Virtual Machine Supported configurations Starting the protection workflow Selecting the source machine Selecting a virtual machine Selecting a target server Selecting the target volume Configuring the replica virtual machine i

5 Setting protection options Virtual hard disks Performing failover Undoing failover Reversing failover Chapter 6 Monitoring Protection Jobs Monitoring connections Viewing connection summary information Managing a connection Viewing connection details Chapter 7 Monitoring Double-Take Servers Adding servers Adding servers manually Importing servers Managing servers Modifying credentials Viewing server details Viewing server events Chapter 8 Using Firewalls Double-Take ports Microsoft Windows ports Hardware ports ii

6 Introduction Double-Take Console allows you to manage all aspects of the process of protecting your servers with Double-Take. With Double-Take Console, you can: Configure protection for an entire physical or virtual source server with a Microsoft Hyper-V target server using the Virtual Recovery Assistant. Configure protection for virtual machines running on the Microsoft Hyper-V platform using Double-Take Console for Hyper-V. Monitor your Double-Take servers and protection jobs, including statistics, events, and other diagnostic or configuration information. Resources You have many resources available to you when using Double-Take. Operating system and application documentation Make sure that you have complete documentation for your operating system and your applications. Double-Take documentation Each Double-Take manual is available in the \DblTake\docs directory on the product CD and in the root of the installation directory you selected during the installation. The manuals are in Adobe Acrobat PDF format. If needed, you can install the free Adobe Acrobat Reader by downloading the latest version from the Adobe web site at Double-Take User s Guide This guide is a complete how-to guide with detailed steps for installing and using Double-Take. This guide also contains a complete list of Double-Take messages, alerts, and statistics. Double-Take Console User s Guide This guide is a complete how-to guide for configuring protection jobs using the Double-Take Console. This manual is installed to C:\Program Files\Common Files\Double-Take Software\Double-Take Console\Docs\Common\Console_Users_Guide.pdf. Readme Double-Take includes a readme file which contains any last-minute information. The readme file is located in the \DblTake\docs directory of the product CD and in the root of the installation directory you selected during the installation. Other resources Technical support, professional services, and training are available for all Double-Take Software products. Technical Support If you need technical assistance, you can contact technical support. All basic configurations outlined in the Double-Take User s Guide and the Double-Take Console User s Guide will be supported through technical support. Your technical support center is dependent on the reseller or distributor you purchased your product from and is identified on your service agreement. If you do not have access to this agreement, contact Double-Take Software Technical Support and they will direct you to the correct service provider. To contact Double-Take Software Technical Support, you will need your serial number and activation code. For a complete list of US and international phone numbers, see the Double-Take Software web site at Online support is available at support.doubletake.com. Professional Services Assistance and support for advanced configurations may be referred to a Pre-Sales Systems Engineer or to Professional Services. See the Double-Take Software web site at for more information. Training Classroom and computer-based training are available. See the Double-Take Software web site at for more information. 1-1

7 Installing Double-Take Console Review the minimum requirements. When your servers meet the required conditions, continue with the installation instructions. For additional information about system requirements for Double-Take source and target servers, see the Double-Take User s Guide. Requirements Client The Double-Take Console client software must be installed on a 32-bit or 64-bit version physical or virtual server running one of the following operating systems: Microsoft Windows XP with Service Pack 2 or later Microsoft Windows 2003 with Service Pack 1 or later Microsoft Windows 2008 The client should not be running on the source machine. Windows Management Instrumentation (WMI) Double-Take is dependent on the WMI service. If you do not use this service in your environment, contact technical support..net Depending on your version of Windows and the components you have installed, you may see an initial screen indicating that you should install Microsoft.NET Framework. If you do not see this screen, your server already has the appropriate version of Microsoft.NET. The best practice is to install Microsoft.NET before installing Double-Take. The Microsoft.NET installation is via a web download. If your server does not have an Internet connection, you must manually install Microsoft.NET from the Double-Take CD or from a copy from the Microsoft web site. Windows Firewall The installation program will automatically attempt to configure the required ports for Double-Take Console. If you cancel this step, you will have to configure ports manually. File system formats FAT, FAT32, and NTFS file system formats are supported. IP protocols The following network protocols are supported: TCP/IP with static IP addressing or reserved DHCP addressing IPv4 and IPv6 addressing Protecting a server using Virtual Recovery Assistant for Hyper-V Double-Take requires the following minimum system configuration: Source server The source server can be any 32- or 64-bit physical or virtual machine running one of the following operating systems: Microsoft Windows 2003 with Service Pack 1 or later Microsoft Windows 2008 Windows 2003 Service Pack 2 is required for Hyper-V Integration Services. Target server The target Microsoft Hyper-V host server is a physical machine running Hyper-V Windows 2008 server. Ports Ports 6320, 6330, and 135 must be opened on the source and target Hyper-V hosts. 2-1

8 Protecting a server using Double-Take for Hyper-V Double-Take for Hyper-V requires the following minimum system configuration: Source server The source server must be running Microsoft Windows Server 2008 Standard, Datacenter, or Enterprise, 64-bit version, with the Hyper-V service installed There is no limit on the number of virtual machines that can be protected when using the Datacenter version of Double-Take for Hyper-V. Up to five virtual machines can be protected with the Enterprise version. The following are not supported: Windows Server 2008 without Hyper-V Clustered Windows 2008 Hyper-V hosts Microsoft Hyper-V Server 2008 Target server The target Hyper-V server must be running Windows Server 2008 Standard, Datacenter, or Enterprise, 64-bit version, with the Hyper-V service installed The following are not supported: Windows Server 2008 without Hyper-V Clustered Windows 2008 Hyper-V hosts Microsoft Hyper-V Server 2008 Ports Ports 6320, 6332, and 135 must be opened on the source and target Hyper-V hosts Installing Double-Take Console The Double-Take Dashboard and Double-Take Virtual Recovery Assistant for Hyper-V features of Double-Take Console are installed as part of the Double-Take for Windows application. For information about installing and upgrading Double-Take for Windows, including pre-installation requirements, see the Double-Take Console User s Guide. Double-Take for Hyper-V is also installed from the Double-Take Setup Launcher. To install Double-Take for Hyper-V, launch the Double-Take autorun.exe file, then select Double-Take for Hyper-V from the list of products. Select Install Double-Take for Hyper-V. 2-2

9 Navigating the Double-Take Console This section provides information about how to use the Double-Take Console. Starting Double-Take Console After Double-Take Console is installed, you can start it by selecting Start, Programs, Double-Take Software, Double-Take Console. The Double-Take Console will appear. Getting help Additional information about tasks in the Double-Take Console interface is available in the online help. To launch the online help: 1. From the Help menu, click Double-Take Console Help. 2. To navigate through the online help topics, click the icons in the upper-left corner of the help window. 3. To open the Table of Contents, click the closed book icon. To make sure that you are using the most recent version of Double-Take Console, periodically select Help, Check for updates. This will launch the Double-Take Software technical support site to see if an updated version of Double-Take is available. 3-1

10 Working in the Double-Take Console The console provides an overview of the connection status for your servers, with a special emphasis on servers that may need attention. The Home page provides an at-a-glance overview of the status of your connections as well as controls for managing your connections. From the Home page, you can: Launch tasks Click the links in the Tasks area on the right. View details about issues with connections Select a connection in the Headlines area on the left, then click View. View information about servers Click the links in the Servers Summary area on the left. View information about connections Click the links in the Connections Summary area on the left. To begin using Double-Take Console, click the Get Started button on the main toolbar, or select Go, Get Started. 3-2

11 Changing default Double-Take Console options On the Options page, you can configure general settings for Double-Take Console. To view the Options page, either click the Options button on the main toolbar, or select Tools, Options. Enter the following information. 1. In the Monitoring interval field, enter the interval (in number of seconds) at which you want Double-Take to poll the servers for updated information. 2. In the Default port field, enter the port number Double-Take will use when sending requests to the servers. The default is Select Automatically check for updates to have Double-Take Console automatically check for an updated version when the application starts. 4. When you are finished, click Save to save your changes and return to the Home page. Sharing the server configuration file You can share the Double-Take Console configuration between different installations of Double-Take Console. To save a configuration for use by the same user on another machine, select File, Export. When the Windows Save As dialog box appears, browse to where you want to save the file, enter a name for the.xml file, and click Save. The configuration file will be saved as a Double-Take Console XML file. Launching other Double-Take utilities Depending on which Double-Take utilities you have installed and licensed, you may be able to access them from Double-Take Console. You can open the Management Console, the Application Manager, and the Full-Server Failover Manager from the Tools menu. Tools, Management Console Launch the Double-Take Management Console (only available if the Double-Take Management Console is installed). Tools, Application Manager Launch the Double-Take Application Manager (only available if Application Manager is installed). 3-3

12 Tools, Full-Server Failover Manager Launch the Double-Take Full-Server Failover Manager (only available if the Full-Server Failover Manager is installed). You can also add other frequently-accessed application to the Tools menu. 1. To modify the list of utilities available from the Tools menu, select Tools, External Tools. The External Tools window will appear. 2. Click the New button to add a new tool. Or, select a tool in the Tools area to edit settings for an existing tool. 3. In the Name field, enter the name you want to use to identify the application or tool. 4. In the Command field, type the location of the.exe file for the tool, or click the Browse button to locate the.exe file. 5. In the Arguments field, enter any command-line arguments that should be used to pass the names of the selected object (connection or server) when launching the tool. $(ConnectionSourceName) Name of the source server for the selected connection $(ConnectionTargetName) Name of the target server for the selected connection $(ServerName) Name of the selected server. 6. To remove a tool, select it in the Tools area, then click Delete. 7. When you are finished adding a tool, click Apply. 8. To add or edit another tool, repeat steps Click OK. 3-4

13 Virtual Recovery Assistant: Protecting a Server with a Hyper-V Virtual Machine Double-Take can be used to protect entire physical or virtual machines with Microsoft Hyper-V virtual machines. Double-Take uses Virtual Recovery Assistant technology to automatically provision the virtual machines for you on the target Hyper-V host, greatly simplifying the protection process. The Double-Take clients are used to create protection jobs. The target Hyper-V host server is a physical machine that the Hyper-V host software runs on. All replica virtual machines will reside on this host. Virtual replica machines are hosted by the Hyper-V host server. The virtual replica machines are created by the source protection job, but remain powered off until failover. At failover, the replica machine is powered on and assumes the identity of the original source machine. Double-Take clients C:\ Source Machine 1 Replica1_C:\ Source Machine 1_Replica C:\ D:\ Replica2_C:\ Replica2_D:\ Source Machine 2 Hyper-V VHD files Source Machine 2_Replica Target Microsoft Hyper-V Host Server 4-1

14 Starting the protection workflow From the Home screen, click the Get Started button. You will be taken to the Get Started screen. Depending on which Double-Take components you have installed, you may see additional tasks on this screen. To begin setting up protection for a server with a Hyper-V virtual machine, select Protect a server to a Hyper-V virtual machine, then click Next. The workflow will guide you through all the steps to protect the physical source server whose data and system state you will be protecting with a virtual target server. Selecting the source machine When you click Protect a server to Hyper-V virtual machine, the Choose Source Server window will appear. 4-2

15 Enter the following information for the source server: 1. Server Enter or select the DNS name or IP address of the physical or virtual source server that you want to protect. Or, click the Browse button to locate a server. a. In the Browse for Server window, browse through the server tree to locate a source server. b. After you have found the source server, select it, then click OK. In order to protect a source, the source must have no more than four NICs enabled. If you enter the fully-qualified domain name for the server, the Double-Take Console will resolve the entry to the server short name. This could result in name resolution issues for servers with the same short name that reside in two different domains. To avoid this, enter the IP address of the server. 2. User name Enter the user name for the account that will access the source server. The user account specified must have Double-Take Admin and local administrator privileges on the source server. If this is a domain user account, you may enter a fully-qualified user name. The fully-qualified user name must be in the format domain\username or username@domain. 3. Password Enter the password that is associated with the user account. 4. Double-Take Console port If you have changed the default port (6320) used by the Double-Take Console server, specify the port. 5. After all fields have been completed, click Next. A window will display the progress as the source server is authenticated. 4-3

16 Selecting volumes to protect Select the volumes you want to protect with the target virtual machine. By default, the system volume will be selected. You can specify the size of the selected volume on the replica virtual machine. 1. Select the checkbox next to the volume(s) to protect in the Volume table. 2. In the Storage Controller column, select the type of storage controller for the volume (IDE or SCSI). A maximum of three volumes can be attached to an IDE controller. If you are protecting more than three volumes on the source, you will need to install the Hyper-V integration components to acquire a SCSI device. Consult your Hyper-V documentation to determine how to install additional SCSI controllers. 3. If you want to change the size of the selected volume: a. Select the volume in the Volume table. b. Enter a value in the Size of the selected volume on the replica virtual machine field. The value entered must be equal to or greater than the Used Space on the source volume. c. Use the drop-down box to select whether the value is in MB or GB. d. After you have entered the size for the selected volume, click Update. e. Repeat steps a-d to configure the size of additional volumes on the replica virtual machine. 4-4

17 4. To enable the SCSI controller, mouse, and other services on the replica virtual machine, select Install Hyper-V integration components on the source server. This option will only install components on servers running Windows If your source is running Windows 2003, you will need to manually install integration components on the virtual machine after failover is complete. The controllers, mouse, and other services will not be available on the replica virtual machine until after integration components have been installed. 5. To exclude a path or folder from the protection, type the path to exclude in the Exclude these paths field, then click Add. 6. To remove a path from being excluded, select the path, then click Remove. 7. When you are finished selecting the data to protect, click Next. Selecting a target server Select the target Hyper-V server where the replica virtual machines will be hosted. 4-5

18 Enter the following information for the target server: 1. Server Enter or select the IP address or DNS name of the target server that will host the virtual replica machines. Or, click the Browse button to locate a server. a. In the Browse for server window, browse through the file tree to locate a target server. b. After you have found the target server, select it, then click OK. If you enter the fully-qualified domain name for the server, the Double-Take Console will resolve the entry to the server short name. This could result in name resolution issues for servers with the same short name that reside in two different domains. To avoid this, enter the IP address of the server. 2. User name Enter the user name for the account that will access the target host. The user account entered here must have administrative rights for Microsoft Hyper-V on that server, and be a member of the Double-Take Console administrators group. If this is a domain user account, you may enter a fully-qualified user name. The fully-qualified user name must be in the format domain\username or username@domain. 3. Password Enter the password that is associated with the user account. 4. Double-Take Console port If you have changed the default port (6320) used by the Double-Take Console server, specify the port. 5. After all fields have been completed, click Next. A window will display the progress. 4-6

19 Selecting the target volume Select the volume where you would like the replica virtual machine to be stored. The target volume must have enough free space to store the source data. By default, the replica virtual machine will be created in the HVRA_Replicas\<source host name or IP> folder. If you want to change the replica virtual machine path, enter it in the field. The chosen directory will be created on the root level of the selected volume. All virtual hard disks (VHDs) will be created in the same folder. If the folder already exists, you will have the option of re-using the existing VHDs. For more information, see Reusing virtual hard disks on page When you are finished, click Next. 4-7

20 Configuring the replica virtual machine Select the options that will configure the virtual machine that will stand in for the source server after failover. 1. Replica virtual machine display name Use the default replica virtual machine name, or enter a new name. 2. Number of processors Select the number of processors for the replica virtual machine. The Processors on the source server field displays the number of processors on the original source server. 3. Amount of memory Enter the amount of memory to use for the replica virtual machine. The Memory on the source server field displays the amount of memory (in MB) on the original source server. 4. Map source IP addresses to target virtual switches If there are multiple target networks, you can select the network on the target to use. 5. When you are finished configuring the replica virtual machine, click Next. 4-8

21 Setting protection options Configure the parameters for the protection job. 1. Compression Select the compression level (None, Low, Medium, or High) to use when sending data from the source to target server. 2. Send data to this target route Select the IP v4 or IP v6 address on the target server to which you want to send data from the source. 3. Limit Bandwidth You can specify a limit for the bandwidth to be used by source-to-target communications for this protection job. Select the Limit Bandwidth checkbox, then enter a value (in kilobits per second) that bandwidth cannot exceed. 4. Fail over automatically if the target server cannot contact the source server If you want the replica virtual machine to stand in for the source server when the source is inaccessible, select this checkbox. Automatic failover will not occur until after the initial mirror has completed. 5. Monitor these addresses on the source server Select the IP address(es) to monitor for automatic failover. 6. Monitoring interval (seconds) (Default = 5) Select how often the monitor will check the source machine availability. 7. Number of missed intervals that trigger failover (Default = 5) Select how many monitor replies can be missed before assuming the source machine has failed. 4-9

22 8. When you have finished setting protection options, click Next. The Protection Summary window will appear. 9. (Optional) If you want to change the name of the protection, click the Change button. The Change Name window will appear. Enter a new name for the protection, then click Save. 10. Review the protection options, then click Finish to initiate the protection process. After you click Finish, Double-Take creates the job. The Monitor Connections page will appear. 4-10

23 Failing over to the replica virtual machine Double-Take Console provides the ability to failover to a replica virtual machine in the event of a failure of the source machine. Source servers may be failed over in two different ways: Automatic Failover The application detects that a failover condition is met and automatically initiates the failover process. Manual Failover The user manually initiates the failover process by clicking the Failover button in the user interface. The type of failover for the job is selected during job creation. For more information, see Setting protection options on page 4-9. After the protection job completes the initial synchronization, failover will be enabled. To initiate failover, select the connection and click the Failover button on toolbar at the bottom of the Monitor Connections page. During the failover process, the following steps are initiated by Double-Take Console: 1. The Double-Take connection between the source machine and target Hyper-V host is disconnected. 2. If you are performing manual failover and the source can be contacted, the source machine is shut down. 3. The target virtual disk volumes are connected to the replica virtual machine. 4. The replica virtual machine is powered on. Because of the nature of physical-to-virtual failover process, failback to the original source is not possible. Reusing virtual hard disks Virtual hard disks (VHDs) created by a virtual recovery protection job can be re-used by Double-Take Console. This can be useful for pre-staging data on the target over a LAN connection, and then moving your target Hyper-V server to your remote disaster recovery site after the initial synchronization. When you re-use an existing VHD file, Double-Take Console performs a difference mirror instead of a full mirror. To reuse a VHD: 1. Create a protection job over the LAN connection. 2. Allow the job to complete the initial synchronization. 3. Delete the protection job. When prompted, choose the option to Keep and register the replica virtual machine. 4. From the Hyper-V manager, delete the replica virtual machine. Doing this will delete the virtual machine configuration but will keep the associated VHD files. 5. Shut down and move the Hyper-V target server to your remote disaster recovery site. 6. After the target server is online, create a new protection job for the same source server used in the original job. 7. During job creation, when you select the replica path, if a VHD file with the same name exists, Double-Take Console will display a prompt asking if you would like to re-use the existing VHD. Select Yes. 8. Double-Take Console will re-use the existing VHD files and perform a file difference mirror over the LAN. 4-11

24 Double-Take for Hyper-V: Protecting a Hyper-V Virtual Machine With Double-Take Console for Hyper-V, you can use the Double-Take Console to protect virtual machines running on the Microsoft Hyper-V platform. Double-Take Console replicates all of the files associated with the virtual machine for one Microsoft Hyper-V host to another. Double-Take for Hyper-V can be used to: Automate the discovery and protection of virtual machines. Map the source virtual switches for a virtual machine to the available virtual switches on the target Hyper-V host. Monitor IP addresses and perform a manual failover when a failover condition is met. Bring the replica virtual machine online with the network adapters disabled, allowing you to test the replica virtual machine while the source is still online. Supported configurations Your Double-Take for Hyper-V environment must conform to the following requirements. The source virtual machine be in its own home folder that is not shared by any other virtual machines. The source virtual machine cannot be created in the Hyper-V system default folder. The source virtual machine cannot be replicated into to Hyper-V system default folder on the target host. The replica virtual machine folder on the target must be unique to the replica virtual machine. The source virtual machine snapshot folder must be unique to the virtual machine, and it cannot be in the Hyper-V system default folder. The replica virtual machine snapshot folder cannot be the Hyper-V system default folder. The replica virtual machine cannot share a snapshot folder with any other virtual machines. After protection has been configured for a virtual machine, the location of the snapshot folder for that virtual machine cannot be changed. If the snapshot folder is changed, the protection job must be removed and re-created. If a protected virtual machine is renamed in the Hyper-V manager, the replica virtual machine will not be renamed. In order to pick up the name change, the protection job must be removed and re-created. Virtual machines cannot use raw, pass-through, or differencing disks. Clustered Hyper-V source and target environments are not supported. Double-Take for Hyper-V supports the following host protection configurations when protecting Hyper-V virtual machines: Many to One Virtual machines from multiple Hyper-V hosts can be protected on a single Hyper-V target host. One to One Virtual machines from a single Hyper-V host can be protected on a single Hyper-V target host. Many to Many The Double-Take Console can manage multiple Hyper-V source and target hosts, allowing you to protect virtual machines from multiple Hyper-V hosts on multiple Hyper-V targets. 5-1

25 The following host protection configuration is not supported by Double-Take for Hyper-V. Chained configurations Double-Take for Hyper-V will does not support protecting virtual machines to a target Hyper-V host, and then in turn protecting those virtual machines from the first target host to an additional target Hyper-V host. Starting the protection workflow From the Home screen, click the Get Started button. You will be taken to the Get Started screen. Depending on which Double-Take components you have installed, you may see additional tasks on this screen. To begin setting up protection for a Hyper-V machine, select Protect a Hyper-V virtual machine, then click Next. The workflow will guide you through all the steps to protect the Hyper-V source virtual server. Selecting the source machine When you click Protect a Hyper-V virtual machine, the Choose Source Server window will appear. 5-2

26 Enter the following information for the source server: 1. Server Enter the name or IP address of the Hyper-V server that hosts the virtual machine that you want to protect. Or, click the Browse button to locate a server. a. In the Browse for Server window, browse through the server tree to locate a source Hyper-V host server. b. After you have found the source server, select it, then click OK. If you enter the fully-qualified domain name for the server, the Double-Take Console will resolve the entry to the server short name. This could result in name resolution issues for servers with the same short name that reside in two different domains. To avoid this, enter the IP address of the server. 2. User name Enter the user name for the account that will access the source server. The user account entered here must have administrative rights for Microsoft Hyper-V on that server, and be a member of the Double-Take Console administrators group. 3. Password Enter the password that is associated with the user account. 4. Double-Take Console Port If you have changed the default port (6320) used by the Double-Take Console server, specify the port. 5. After all fields have been completed, click Next. A window will display the progress as the source server is authenticated. 5-3

27 Selecting a virtual machine The virtual machines that are found on the source server will be added to the list on the Choose Virtual Machine window. Select a virtual machine to protect from the list, then click Next. Guest operating system information for the virtual machine will only be shown if Microsoft Integration Services is installed on the virtual machine and the machine is powered on. Selecting a target server Select the target Hyper-V server where the replica virtual machine will be stored. 5-4

28 Enter the following information for the target server: 1. Server Enter the IP address or DNS name of the Hyper-V server that will be the target host. Or, click the Browse button to browse to locate a server. a. In the Browse for server window, browse through the file tree to select a target server. b. After you have found the target server, select it, then click OK. 2. User name Enter the user name for the account that will access the target host. The user account entered here must have administrative rights for Microsoft Hyper-V on that server, and be a member of the Double-Take Console administrators group. 3. Password Enter the password that is associated with the user account. 4. Double-Take Console Port If you have changed the default port (6320) used by the Double-Take Console server, specify the port. 5. After all fields have been completed, click Next. A window will display the progress. 5-5

29 Selecting the target volume Select the volume on the Hyper-V target where you would like the replica virtual machine to be stored. All of the source virtual hard disk (VHD) files will be created on the same target volume. By default, the replica virtual machine will be created in the DTHV_Replicas\<source host name or IP>\<virtual machine name> folder. If you want to change the replica virtual machine path, enter it in the field. The chosen directory will be created on the root level of the selected volume. When you are finished, click Next. Configuring the replica virtual machine Configure the virtual switches for the replica virtual machine. 1. Replica virtual machine display name Use the default replica virtual machine name, or enter a new name. 5-6

30 2. Map source virtual switches to target virtual switches If there are multiple target networks, you can select the network on the target to use. 3. When you are finished configuring the replica virtual machine, click Next. Double-Take Console will not update the virtual machine network settings on failover. Setting protection options Configure the parameters for the protection job. Compression and bandwidth limit settings will apply to all protections that use the same source-to-target route. 1. Compression Select the compression level (None, Low, Medium, or High) to use when sending data from the source to target server. 2. Send data to this target route Select the IP address on the target server to which you want to send data from the source. If your host is on multiple networks and has multiple addresses associated with those networks, you can choose to use an IP address other than the one you entered for the target in Selecting a target server on page Limit Bandwidth You can specify a limit for the bandwidth to be used by source-to-target communications for this protection job. Select the Limit Bandwidth checkbox, then enter a value (in kilobits per second) that bandwidth cannot exceed. 5-7

31 4. When you have finished setting protection options, click Next. The Protection Summary window will appear. 5. (Optional) If you want to change the name of the protection, click the Change button. The Change Name window will appear. Enter a new name for the protection, then click Save. 6. Review the protection options, then click Finish to initiate the protection process. When you click Finish, a message box will appear identifying the status of the protection check. 5-8

32 Virtual hard disks Double-Take for Hyper-V monitors the virtual disks of a protected virtual machine for changes to the disk layout. If a virtual hard disk (VHD) is added to the virtual machine, Double-Take for Hyper-V will update the protection job to include the new VHD. This will start a file difference mirror. If a VHD is removed from a protected VM, Double-Take for Hyper-V will correctly update the configuration of the replica VM to include the new disk layout. However, the VHD will not be removed from the protection job until it is deleted from the source machine, or the job is removed and re-created. Performing failover After the protection job completes the initial synchronization, failover will be enabled. To initiate failover, select the connection and click the Failover button on the Monitor Connections page. When you select the Failover button, the following dialog box appears. From here, you can select the type of failover to perform. Live failover Select this option to perform a live failover with network connectivity to the target replica virtual machine. Live failover will shut down the source virtual machine (if available), stop the protection job, and start the replica virtual machine with full network connectivity. Test failover Select this option to perform a test failover without network connectivity to the target replica virtual machine. Test failover will leave the source virtual machine online, suspend the protection job, and start the replica virtual machine on the target with no network connectivity. This feature allows you to periodically test the replica virtual machine to verify that it is working correctly. After you select the type of failover to perform, click Failover. Undoing failover Once a live or test failover has been performed, it is possible to undo the failover by clicking on the Undo Failover button. Undoing failover will do the following: 1. The replica virtual machine will be shut down 2. The source virtual machine will be restarted (if it was shutdown with a live failover) 3. The protection will be restarted (a file difference mirror will be performed) All changes made to the replica virtual machine while the job is in a failed over state will be lost when an Undo is performed. 5-9

Crestron VMK-WIN TouchPoint Virtual Mouse & Keyboard Software for Windows Installation Guide

Crestron VMK-WIN TouchPoint Virtual Mouse & Keyboard Software for Windows Installation Guide Crestron VMK-WIN TouchPoint Virtual Mouse & Keyboard Software for Windows Installation Guide This document was prepared and written by the Technical Documentation department at: Crestron Electronics, Inc.

More information

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS

BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS BROCADE COMMUNICATIONS SYSTEMS, INC. END USER SOFTWARE LICENSE AGREEMENT FOR BROCADE IP ANALYTICS PACK FOR VMWARE VREALIZE OPERATIONS IMPORTANT: READ THIS CAREFULLY BEFORE INSTALLING, USING OR ELECTRONICALLY

More information

DME-N Network Driver Installation Guide for LS9

DME-N Network Driver Installation Guide for LS9 DME-N Network Driver Installation Guide for LS9 ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED

More information

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS IMPORTANT: PLEASE READ BEFORE DOWNLOADING, INSTALLING OR USING THE XANGATI, INC. ("LICENSOR") SOFTWARE YOU HAVE LICENSED ("SOFTWARE"). BY EXECUTING

More information

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D

DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D DME-N Network Driver Installation Guide for M7CL/LS9/DSP5D ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY

More information

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT 1. LICENSE 2. TERMINATION Subject to the terms and conditions of this HSS Software License Agreement (the Agreement ), HSS hereby grants to Client (herein

More information

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING

More information

END USER LICENSE AGREEMENT ( EULA )

END USER LICENSE AGREEMENT ( EULA ) END USER LICENSE AGREEMENT ( EULA ) PLEASE READ CAREFULLY THIS EULA IS A LEGAL AGREEMENT BETWEEN YOU, EITHER AS AN INDIVIDUAL, COMPANY OR OTHER LEGAL ENTITY (IN ANY CAPACITY REFERRED TO HEREIN AS END USER,

More information

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT This Webview Livescope Software Development Kit Developer License ("Agreement") between you, the "Developer" and the

More information

Full-Server Failover User s Guide

Full-Server Failover User s Guide Full-Server Failover User s Guide Twelfth Edition (March 2009) Part Number: T2558-96328 Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind with

More information

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

Partners in Care Welch Allyn Connex Software Development Kit License Agreement This Software Development Kit End User ( Agreement ) is between Welch Allyn, Inc. ( Welch Allyn ) and the Customer identified in the purchase order ( Customer or You ), and it governs the Software Development

More information

End-User Software License Agreement

End-User Software License Agreement End-User Software License Agreement This End-User Software License Agreement (the Agreement ) is a license agreement between you (the Licensee ) and IMSWorkX, Inc. ( IMSWorkX ), a Delaware corporation

More information

We suggest you retain a copy of these End User Terms of Use for your records.

We suggest you retain a copy of these End User Terms of Use for your records. END USER TERMS OF USE The use of Incident Response Technologies Inc. s ("IRT") Software is offered to you upon your acceptance of these End User Terms of Use. By using IRT s software (the Software ), you

More information

SOLARWINDS, INC. ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED

SOLARWINDS, INC. ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED SOLARWINDS, INC ipmonitor 8.0 MANAGER END USER LICENSE AGREEMENT REDISTRIBUTION NOT PERMITTED IMPORTANT -- READ CAREFULLY BEFORE USING THIS SOFTWARE: THIS IS A LEGAL AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL

More information

PointCentral Subscription Agreement v.9.2

PointCentral Subscription Agreement v.9.2 PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (

More information

BNSync User License Agreement

BNSync User License Agreement BNSync User License Agreement This Agreement ("Agreement") contains the complete terms and conditions that apply to your installation and use of BNSync, a proprietary software product that is owned and

More information

RockWare Click-Wrap Software License Agreement ( License )

RockWare Click-Wrap Software License Agreement ( License ) RockWare, Inc. ( RockWare ) 2221 East Street, Suite 101 Golden CO 80401 USA RockWare Click-Wrap Software License Agreement ( License ) IMPORTANT - READ ALL OF THE TERMS AND CONDITIONS IN THIS LICENSE CAREFULLY

More information

SPYDERS END USER LICENSE AGREEMENT TERMS AND CONDITIONS

SPYDERS END USER LICENSE AGREEMENT TERMS AND CONDITIONS SPYDERS END USER LICENSE AGREEMENT TERMS AND CONDITIONS 1. IMPORTANT NOTICE PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT (THE AGREEMENT ) CAREFULLY BEFORE PROCEEDING TO USE THE ENCLOSED

More information

LS9 Editor Installation Guide

LS9 Editor Installation Guide LS9 Editor Installation Guide ATTENTION SOFTWARE LICENCING AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE THIS SOFTWARE

More information

FME SOFTWARE LICENSE AGREEMENT

FME SOFTWARE LICENSE AGREEMENT FME SOFTWARE LICENSE AGREEMENT IMPORTANT READ CAREFULLY: This FME Software License Agreement ("Agreement") is a legal agreement between You (either an individual or a single legal entity) and Safe Software

More information

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT. Access Governance Suite 6 Lifecycle Manager 6 Compliance Manager 6 Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE

More information

SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360

SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360 SYMANTEC SOFTWARE SERVICE LICENSE AGREEMENT Norton 360 IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT ( LICENSE AGREEMENT ) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW).

More information

MDM Zinc 3.0 End User License Agreement (EULA)

MDM Zinc 3.0 End User License Agreement (EULA) MDM Zinc 3.0 End User License Agreement (EULA) THIS AGREEMENT (or "EULA") IS A LEGAL AGREEMENT BETWEEN THE PERSON, COMPANY, OR ORGANIZATION THAT HAS LICENSED THIS SOFTWARE ("YOU" OR "CUSTOMER") AND MULTIDMEDIA

More information

SMARTDRAW SOFTWARE LICENSE AGREEMENT

SMARTDRAW SOFTWARE LICENSE AGREEMENT SMARTDRAW SOFTWARE LICENSE AGREEMENT PLEASE READ CAREFULLY: SMARTDRAW SOFTWARE, LLC ("SMARTDRAW") IS WILLING TO LICENSE THE SMARTDRAW SOFTWARE ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED

More information

Service Agreement Hosted Dynamics GP

Service Agreement Hosted Dynamics GP Service Agreement Hosted Dynamics GP This is a Contract between you ( Company ) and WebSan Solutions Inc. ( WebSan ) of 245 Fairview Mall Drive, Suite 508, Toronto, ON M2J 4T1, Canada. This contract applies

More information

FILEMAKER PRO ADVANCED SOFTWARE LICENSE

FILEMAKER PRO ADVANCED SOFTWARE LICENSE FILEMAKER PRO ADVANCED SOFTWARE LICENSE IMPORTANT -- READ CAREFULLY: BY INSTALLING, COPYING, DOWNLOADING, ACCESSING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE.

More information

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows: IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CY, Ltd. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL

More information

SOFTWARE DISTRIBUTION AGREEMENT

SOFTWARE DISTRIBUTION AGREEMENT SOFTWARE DISTRIBUTION AGREEMENT APPLE COMPUTER, INC. Software Licensing Department 12545 Riata Vista Circle MS 198 3-SWL Austin, TX 78727 E-Mail Address: sw.license@apple.com Licensee Individual to Contact

More information

SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System

SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System with Internal Storage Focusing on IPMI Out of Band Management Recipe ID: 19SYAM190000000011-01 Contents Hardware Components...3

More information

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE 1. License and Permitted Use The Foreign National Information System (FNIS) is licensed, not sold. Subject to the

More information

How To Use Etechglobal Online Store

How To Use Etechglobal Online Store 5204 S. Sand Cherry Circle, Sioux Falls SD 57108 www.etechglobal.com Phone: (605) 339-4529 Merchant Service and Licensing Agreement AGREEMENT The EtechGlobal Online Store service ("EtechGlobal Online Store"

More information

1. GRANT OF LICENSE. Formdocs LLC grants you the following rights provided that you comply with all terms and conditions of this EULA:

1. GRANT OF LICENSE. Formdocs LLC grants you the following rights provided that you comply with all terms and conditions of this EULA: END-USER LICENSE AGREEMENT FOR FORMDOCS SOFTWARE IMPORTANT-READ CAREFULLY: This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single entity) and Formdocs

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

ALM Works End-User License Agreement for Structure Plugin

ALM Works End-User License Agreement for Structure Plugin ALM Works End-User License Agreement for Structure Plugin IMPORTANT - READ CAREFULLY: This End-User License Agreement (EULA) is a legal agreement between you (either an individual or a single legal entity)

More information

Magento U Virtual Machine Installation Instructions

Magento U Virtual Machine Installation Instructions Magento U Virtual Machine Installation Instructions Why use a virtual machine? The Magento U VM disk image provides Magento U students the shortest path to fulfill the technical requirements for participating

More information

Software License Agreement

Software License Agreement Software License Agreement GRANT OF LICENSE This Accusoft Corporation ("ACCUSOFT") Agreement ("LICENSE") grants YOU ("LICENSEE") a non-exclusive and non-transferable right to use the trial mode version

More information

IPInfoDB Web Service Agreement

IPInfoDB Web Service Agreement IPInfoDB Web Service Agreement PLEASE READ THIS WEB SERVICE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING IPINFODB SERVICES. BY CHECKING THE I HAVE READ, UNDERSTAND AND AGREE WITH THE SERVICE

More information

SUBSCRIPTION SERVICES.

SUBSCRIPTION SERVICES. SUSE Manager Server SUSE Manager Server with Database SUSE Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY PURCHASING, INSTALLING AND/OR USING THE SOFTWARE (INCLUDING ITS COMPONENTS),

More information

MyShortcut. Administrator's Guide

MyShortcut. Administrator's Guide MyShortcut Administrator's Guide January 2011 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.

More information

END-USER LICENSE AGREEMENT FOR DIGIMETRICS AURORA SOFTWARE

END-USER LICENSE AGREEMENT FOR DIGIMETRICS AURORA SOFTWARE END-USER LICENSE AGREEMENT FOR DIGIMETRICS AURORA SOFTWARE IMPORTANT READ CAREFULLY: This End-User License Agreement ("EULA") is a legal agreement between you (either an individual or a single entity)

More information

Web Site Development Agreement

Web Site Development Agreement Web Site Development Agreement 1. Parties; Effective Date. This Web Site Development Agreement ( Agreement ) is between Plug-N-Run, its affiliates, (including but not limited to USA Financial, USA Financial

More information

END USER LICENSE AGREEMENT

END USER LICENSE AGREEMENT END USER LICENSE AGREEMENT 1. SCOPE OF THIS AGREEMENT. This END USER LICENSE AGREEMENT ("EULA") is a legal agreement between you (either an individual or a single entity) and TradeStation ("TS") governing

More information

SERVICE TERMS AND CONDITIONS

SERVICE TERMS AND CONDITIONS SERVICE TERMS AND CONDITIONS Last Updated: April 19th, 2016 These Service Terms and Conditions ( Terms ) are a legal agreement between you ( Customer or you ) and Planday, Inc., a Delaware corporation

More information

Affiliate means a legal entity that is owned by or under common ownership with Stratus Technologies Ireland Limited.

Affiliate means a legal entity that is owned by or under common ownership with Stratus Technologies Ireland Limited. STRATUS TECHNOLOGIES IRELAND LIMITED ( STRATUS ) END-USER LICENSE AGREEMENT AND SOFTWARE SUPPORT TERMS AND CONDITIONS FOR STRATUS everrun SOFTWARE PRODUCTS Please read this end user license agreement ("EULA")

More information

Introduction to Hyper-V High- Availability with Failover Clustering

Introduction to Hyper-V High- Availability with Failover Clustering Introduction to Hyper-V High- Availability with Failover Clustering Lab Guide This lab is for anyone who wants to learn about Windows Server 2012 R2 Failover Clustering, focusing on configuration for Hyper-V

More information

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE.

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE. RAPID CONNECT SERVICES(sm) and SPECIFICATION LICENSE AGREEMENT THIS RAPID CONNECT SERVICES AND SPECIFICATION LICENSE AGREEMENT IS BETWEEN FIRST DATA MERCHANT SERVICES CORPORATION ( FDMS ) FDMS AND YOU,

More information

Ektron CMS400.NET Virtual Staging Server Manual Version 7.5, Revision 1

Ektron CMS400.NET Virtual Staging Server Manual Version 7.5, Revision 1 Ektron CMS400.NET Virtual Staging Server Manual Version 7.5, Revision 1 Ektron Inc. 542 Amherst St. Nashua, NH 03063 Tel: +1 603-594-0249 Fax: +1 603-594-0258 Email: sales@ektron.com http://www.ektron.com

More information

TOOLS for CC121 Installation Guide

TOOLS for CC121 Installation Guide TOOLS for CC121 Installation Guide ATTENTION SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE USING THIS SOFTWARE. YOU ARE ONLY PERMITTED TO USE THIS

More information

SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT

SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT SYMPHONY LEARNING LICENSE AND REMOTE HOSTED SERVICES AGREEMENT PLEASE READ THIS LICENSE AND REMOTE HOSTED SERVICES AGREEMENT CAREFULLY BEFORE USING THIS WEB SITE BY CHOOSING THE ACCEPT BUTTON YOU ARE (1)

More information

SUBSCRIPTION LICENSE AGREEMENT

SUBSCRIPTION LICENSE AGREEMENT AppNeta, Inc Oct 5, 2012 BEFORE INSTALLING AND USING THE PRODUCT (AS DEFINED BELOW) YOU SHOULD CAREFULLY READ THE FOLLOWING ( AGREEMENT ) THAT APPLIES TO THE PRODUCT. CLICK I AGREE IF YOU (ALSO REFERRED

More information

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT (THIS AGREEMENT ) IS DATED FOR REFERENCE PURPOSES ONLY AS OF MARCH 26, 2009, AND IS BY AND BETWEEN ALL WEATHER,

More information

Welcome to Maritime Information Systems Merchant Vessel Database (MVDB)

Welcome to Maritime Information Systems Merchant Vessel Database (MVDB) Welcome to Maritime Information Systems Merchant Vessel Database (MVDB) MVDB for Windows 95* and Windows 98 offers a complete U.S. Vessel Documentation database capable of searching, saving, exporting,

More information

Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0

Administration Guide. SafeWord for Internet Authentication Service (IAS) Agent Version 2.0 Administration Guide SafeWord for Internet Authentication Service (IAS) Agent Version 2.0 Copyright 2004 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced,

More information

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple.

C. System Requirements. Apple Software is supported only on Apple-branded hardware that meets specified system requirements as indicated by Apple. ENGLISH APPLE INC. SOFTWARE LICENSE AGREEMENT FOR APPLE STORE APPLICATION PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THE APPLE SOFTWARE. BY USING THE APPLE SOFTWARE,

More information

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other

More information

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010

More information

Mobile Banking and Mobile Deposit Terms & Conditions

Mobile Banking and Mobile Deposit Terms & Conditions Mobile Banking and Mobile Deposit Terms & Conditions PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS BEFORE PROCEEDING: This Mobile Banking and Mobile Deposit Addendum ( Addendum ) to the Old National

More information

SAMPLE SOFTWARE LICENSE AGREEMENT (Review Copy)

SAMPLE SOFTWARE LICENSE AGREEMENT (Review Copy) SAMPLE SOFTWARE LICENSE AGREEMENT (Review Copy) THIS AGREEMENT is entered into as of XXXX ("Effective Date") by and between NIELSEN ENGINEERING & RESEARCH, INC. (NEAR), with offices at 605 Ellis Street,

More information

END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT

END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT END USER LICENSE AGREEMENT FOR SLICKEDIT(R) CORE SOFTWARE IMPORTANT THIS IS A LEGAL AGREEMENT BETWEEN YOU ("You" or "Your") AND SLICKEDIT INC. ("SlickEdit"). SLICKEDIT IS WILLING TO (1) LICENSE THE SLICKEDIT

More information

Mobility Services Platform 3.1.1 Software Installation Guide

Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide Mobility Services Platform 3.1.1 Software Installation Guide 72E-100159-04 Revision D January 2008 2007 by Motorola, Inc. All rights reserved.

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Table of Content. Introduction. Software Install and Uninstall. Software Features and GUI. Quick Getting Started Guide. Frequently Asked Questions

Table of Content. Introduction. Software Install and Uninstall. Software Features and GUI. Quick Getting Started Guide. Frequently Asked Questions Table of Content Introduction Overview System Requirements Software Install and Uninstall Install Uninstall Software Features and GUI Software Menu Options Software Navigation Quick Getting Started Guide

More information

INSTALLATION GUIDE. AXIS Camera Station

INSTALLATION GUIDE. AXIS Camera Station INSTALLATION GUIDE AXIS Camera Station About this Guide This guide is intended for administrators and users of the AXIS Camera Station, and is applicable for software release 3.50 and later. It covers

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

FRANZ SOFTWARE LICENSE AGREEMENT

FRANZ SOFTWARE LICENSE AGREEMENT NOTICE TO USER: BY INSTALLING THIS SOFTWARE YOU ACCEPT ALL OF THE FOLLOWING TERMS AND CONDITIONS AND THOSE CONTAINED IN THE ATTACHED LICENSE AGREEMENT. PLEASE READ IT CAREFULLY. THE ATTACHED SOFTWARE LICENSE

More information

TotalShredder USB. User s Guide

TotalShredder USB. User s Guide TotalShredder USB User s Guide Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without

More information

Website Hosting Agreement

Website Hosting Agreement Website Hosting Agreement 6 oak grove avenue This Hosting Contract governs your purchase and use, in any manner, of all Web site hosting services, including the Shared Hosting Services, (collectively,

More information

InnoCaption TM Service Terms of Use

InnoCaption TM Service Terms of Use PRIOR TO USING THE INNOCAPTION SERVICE YOU MUST REVIEW AND AGREE TO THE TERMS AND CONDITIONS OF THIS SERVICE AGREEMENT ( AGREEMENT ) BY COMPLETING YOUR REGISTRATION ( SIGN UP ) FOR INNOCAPTION SERVICE.

More information

SolarWinds Migrating SolarWinds NPM Technical Reference

SolarWinds Migrating SolarWinds NPM Technical Reference SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

More information

ALPHA TEST LICENSE AGREEMENT

ALPHA TEST LICENSE AGREEMENT ALPHA TEST LICENSE AGREEMENT IMPORTANT NOTICE! PLEASE READ THIS STATEMENT AND THE ALPHA TEST LICENSE AGREEMENT COMPLETELY BEFORE USING THIS ALPHA SOFTWARE. BY CLICKING ON THE BUTTON MARKED YES BELOW OR

More information

SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002)

SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002) SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002) Whenever LICENSEE licenses software products ( Program(s) as further defined herein), a License Form shall be executed which shall refer to this

More information

SOFTWARE LICENSE AGREEMENT (Site License Version) A. Xerox grants to customer ( you ) a non-exclusive, non-transferable license to:

SOFTWARE LICENSE AGREEMENT (Site License Version) A. Xerox grants to customer ( you ) a non-exclusive, non-transferable license to: 1. LICENSE GRANT SOFTWARE LICENSE AGREEMENT (Site License Version) 2. FEES A. Xerox grants to customer ( you ) a non-exclusive, non-transferable license to: (1) load the Web Document Submission software,

More information

ZConverter. Windows Backup v 3.5

ZConverter. Windows Backup v 3.5 ZConverter ZConverter Windows Backup v 3.5 [User Guide] NOTE : DO NOT COPY, REPRODUCE OR REDISTRIBUTE WITHOUT EXPRESS WRITTEN CONSENT OF THE AUTHOR Copyright 2004-2010 ISA Technologies, Inc. ZConverter

More information

PHD Virtual Backup for Hyper-V

PHD Virtual Backup for Hyper-V PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V

More information

Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015

Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015 Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015 THIS IS A LEGAL AGREEMENT between "you", the individual, company, or organisation utilising Procon Frostbite

More information

EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT

EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT EXEDE (R) ANALYTICS APPLICATION END USER LICENSE AGREEMENT This Application End User License Agreement ( License ) is an agreement between you and ViaSat, Inc., with its principal place of business at

More information

ZaZaChat End User License Agreement

ZaZaChat End User License Agreement ZaZaChat End User License Agreement 1. Services and Support 1.1 The Services are provided subject to this Agreement, as it may be amended by ZaZa Network, and any guidelines, rules or operating policies

More information

LICENSE AGREEMENT FOR TOBII ANALYTICS SOFTWARE DEVELOPMENT KIT AND API

LICENSE AGREEMENT FOR TOBII ANALYTICS SOFTWARE DEVELOPMENT KIT AND API LICENSE AGREEMENT FOR TOBII ANALYTICS SOFTWARE DEVELOPMENT KIT AND API PREAMBLE This Tobii Analytics Software Development Kit and API License Agreement (the "Agreement") forms a legally binding contract

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User)

INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User) INTEL SOFTWARE LICENSE AGREEMENT (OEM / IHV / ISV Distribution & Single User) By clicking the Accept button, I signify that I have read and accept the terms below. IMPORTANT - READ BEFORE COPYING, INSTALLING

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Skedans Systems Inc EasyRTC ios and Android Software Developer's Kit ("SDK") License Agreement

Skedans Systems Inc EasyRTC ios and Android Software Developer's Kit (SDK) License Agreement Skedans Systems Inc EasyRTC ios and Android Software Developer's Kit ("SDK") License Agreement Notice to user: THIS IS A LICENSE AGREEMENT BETWEEN YOU AND SKEDANS SYSTEMS INC ( Skedans ). BY INDICATING

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

VIRTUAL OFFICE WEBSITE LICENSE AGREEMENT

VIRTUAL OFFICE WEBSITE LICENSE AGREEMENT Florida Keys Multiple Listing Service, Inc. VIRTUAL OFFICE WEBSITE LICENSE AGREEMENT Florida Keys MLS, Inc. 92410 Overseas Hwy, Ste. 11 Tavernier FL 33070 305-852-92940 305-852-0716 (fax) www.flexmls.com

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

/ WMS / LITE INDUSTRIAL)

/ WMS / LITE INDUSTRIAL) Acknowledgements Trademark Information COREflex Software Microsoft, Windows, Windows NT/ 2000/ XP, and Access are registered trademarks of Microsoft Corporation. Quickbooks is a registered trademark of

More information

SAMPLE RETURN POLICY

SAMPLE RETURN POLICY DISCLAIMER The sample documents below are provided for general information purposes only. Your use of any of these sample documents is at your own risk, and you should not use any of these sample documents

More information

Double-Take Application Manager User s Guide

Double-Take Application Manager User s Guide Double-Take Application Manager User s Guide Double-Take Application Manager User s Guide Revision 4.0.0 published February 2006 Double-Take, GeoCluster, and NSI are registered trademarks of NSI Software,

More information

Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement)

Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement) Mobile Banking Service Agreement (Addendum to your Primary Online Banking Service Agreement) I. INTRODUCTION PARTIES AND DEFINITIONS This Mobile Banking Service Agreement (as amended from time to time,

More information

CA XOsoft Replication for Windows

CA XOsoft Replication for Windows CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the

More information

Double-Take. Version

Double-Take. Version Double-Take Version Notices Double-Take Move System Center Integration Toolkit User's Guide Version 7.1.2, Wednesday, January 20, 2016 Check the Vision Solutions support web site at http://www.visionsolutions.com/supportcentral

More information

SOFTWARE LICENSE AGREEMENT

SOFTWARE LICENSE AGREEMENT SOFTWARE LICENSE AGREEMENT This Software License Agreement (this Agreement ) is entered into as of the installation date of the software by and between Nanotron Technologies GmbH, a German corporation

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document: Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by

More information

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server

TelePresence Migrating TelePresence Management Suite (TMS) to a New Server TelePresence Migrating TelePresence Management Suite (TMS) to a New Server THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,

More information

Version 2.17 Update Installation Guide

Version 2.17 Update Installation Guide Page 1 of 11 Version 2.17 Update Installation Guide Page 2 of 11 END-USER LICENSE AGREEMENT ( EULA ) FOR CPV LAB This End-User License Agreement ("EULA") pertains to the CPV Lab product (called Software"

More information

SOFTWARE DEVELOPMENT KIT LICENSE AGREEMENT

SOFTWARE DEVELOPMENT KIT LICENSE AGREEMENT Note: By clicking I AGREE, downloading, installing, or using the SDK, you conclude and agree to the terms of this license agreement (the Agreement ) in a legally binding manner with AirWatch LLC., 1155

More information