~ On-Line Monitoring: A Thtorial

Size: px
Start display at page:

Download "~ On-Line Monitoring: A Thtorial"

Transcription

1 ~ On-Line Monitoring: A Thtoria Beth A. Schroeder State University of New York, Binghamton On-ine monitoring can compement forma techniques to increase appication dependabiity. This tutoria outines the concepts and identifies the activities that comprise eventbased monitoring, describing severa representative monitoring systems. though monitoring has been around since the eary 1960s with the advent of debuggers, the fied has recenty made some exciting advances. Monitoring systems today monitor distributed appications and are often themseves distributed. In addition, they are increasingy seen as a viabe soution to areas of growing concern: ack of dependabiity and toos to support distributed appications. Monitoring has succeeded in these areas and has matured in its abiity to give users freedom in defining what is to be monitored. Monitoring gathers information about a computationa process as it executes and can be cassified by its functionaity (see Figure 1). Dependabiity incudes faut toerance and safety. Performance enhancement incudes dynamic system configuration, dynamic program tuning, and on-ine steering.* Correctness checking is the monitoring of an appication to ensure consistency with a forma specification. It can be used to detect runtime errors or as a verification technique. Security monitoring attempts to detect security vioations such as iega ogin or attempted fie access. Contro incudes cases where the monitoring system is part of the target system, a necessary component in providing computationa functionaity. Debugging and testing empoys monitoring techniques to extract data vaues from an appication being tested. Performance evauation uses monitoring to extract data from a system that is ater anayzed to assess system performance. I focus on four of the seven functiona areas: dependabiity, performance enhancement, correctness checking, and security. The systems in these functiona areas exhibit common characteristics. First, the monitor functions as an externa observer of the target software. Unike contro monitors, externa observers are not required to provide computationa functionaity. Second, the systems are designed to monitor the target software and respond whie the target software is operationa. This forces the monitoring system to react in a timey manner to events as they occur in the target system. (Debuggers are not so constrained, because they either sow the appication s execution rate or simpy gather trace data for ater anaysis or repay.) Lasty, the monitoring component is a permanent part of the overa system, athough at times it may run at reduced functionaity. (This is unike performance evauation toos that are, ike some hardware test toos, attached to a system.) We ca a monitoring system that is an externa observer, monitors a fuy functioning appication, and is generay intended to be permanent an on-ine monitoringsystem. These systems often do more than just gather information; they interpret the gathered information and respond appropriatey. On-ine monitoring systems can therefore provide increased robustness, security, faut-toerance, and adaptabiity. Computer /95/14.00 i 1995EEE

2 CONCEPTS AND TERMINOLOGY An on-ine monitoring system is a process or set of possibydistributed processes whose function is the dynamic gathering, interpreting, and acting on information concerning an appication as that appication executes. In an event-based monitoring system, which I discuss here, the gathered information arrives at the monitoring system in the form of events. An event describes an activity usuay invoving just a sma part of the appication state space. Events can be grouped into three primary categories: hardware-eve events, process-eve events, and appication-dependent events. Hardware-eve events are ow-eve activities such as page fauts, samping of a cache miss counter, and I/O channe activity. In Autonet, for exampe, events incude exceeded threshod on corrupt packets, exceeded threshod on stuck inks, or excessive vioations occurring from such things as static on a network ine. Process-eve events are events observabe externa to the process. Figure 2 iustrates event activity at this eve. Communication between a program and fie (or device) is evident by observing communication between the appication and the fie subsystem (in a Unix-based system). Communication between processes is simiary visibe by observing activity occurring between an appication and the interprocess communication subsystem, Process state information is avaiabe in the process contro subsystem. Appication-dependent events describe activity interna to an appication. The types of appication-dependent events that a monitoring system defines for use depend on the monitoring system s purpose. Definingjust the right event set can be difficut. What set of events is sufficient to capture the desired behavior in the appication? Is it enough to capture changes to seected variabes and messages passed between processes, or is a higher-eve view needed to observe, for exampe, changes to the membership of a group of processes? Sensors A sensor is an entity that observes the behavior of a sma part of the appication system state space. Upon being triggered, a sensor generates an event. A sensor is triggered either by a change to the entity it observes or by a request from the monitoring system. When triggered by a change to the entity, the sensor is said to trace the entity. Tracing is performed synchronousy with the change in the vaue of the entity. When the vaue of the object changes, the sensor reports the new vaue to the monitoring system.4 How does the sensor know there has been a change to the entity? Most frequenty, sensors are paced in the target system at ocations where changes to the entity occur. The sensor code is then executed immediatey after the change occurs. Samping, on the other hand, is the on-demand coection of information by a monitoring program and is asyn chronous with the change in the entity s vaue. When a monitoring routine decides to coect an entity s vaue, it sends a message to the appropriate sensor, and the sensor returns the current vaue.4 In Figure 3, the monitoring system is notified whenever a change occurs to the temperature variabe temp in the target system. The sensor is a sma code segment in the appication address space that is triggered by a change to temp. Upon being triggered, the sensor captures the variabe s vaue and sends an event to the monitoring system. Sensors can incude additiona functionaity. The user can define conditions that must be satisfied before the monitoring system is notified. For exampe, the sensor may generate an event onywhen the temperature exceeds 100 degrees Cesius. The condition is effectivey a fiter, fitering some events whie aowing others to pass. Figure 1. Primary uses of monitoring. User program Figure 2. Externay observabe activities. Figure 3. Sensing a vaue in a target system. I June 1995

3 Figure 4. Monitoring tasks. The dark ova represents preexecution tasks. The ight gray ovas represent tasks that can be done either before or during execution. The tasks shown as white ovas must be done during execution. Actions, event history, and interference An action is the monitoring system s response to an event or set of events. Actions can for exampe ater the appication state space, report some aspect of appication behavior to the user, or start up a process. Some monitoring systems maintain an event history, which may contain a events since system start-up or some subset of events (for exampe, the ast twenty events of each sensed entity, or a count of the number of ogin events since the system was booted). An event history s size is constrained utimatey by the avaiabe storage space. It shoud be noted that some kind of event history is necessary if the monitoring system is to evauate behavior as it occurs over time. Monitoring systems are often characterized by the eve of interference they impose upon the appication. If the monitoring system requires the use of appication resources (that is, CPU time, I/O devices, or shared communication channes), it is said to be intrusive. Intrusive monitoring raises the possibiity that through coecting information to anayze target system behavior, one is atering that very behavior. This is referred to as the Heisenberg effect for software. If no resources are consumed, the monitoring system is nonintrusive. A nonintrusive monitoring system has no effect on the order and timing of events in the appication. A monitoring system can be a nonintrusive gatherer, but intrusive when it executes actions. Most monitoring systems, particuary those that rey on software added to sensors, are intrusive to some degree. Competey nonintrusive monitoring systems use dedicated hardware for monitoring. intrusiveness but generay provide very ow-eve data. Software monitoring requires instrumenting the appication source code, system ibraries, or compier. Software approaches are generay more portabe and present information at an abstraction eve coser to the users way of thinking than, say, binary code or assemby anguage instructions, making them easier to use than hardware approaches. Hybrid monitoring brings together the nonintrusive nature of hardware approaches and the fexibiity of soft- ware approaches. Most monitoring systems empoy either software or hybrid monitoring. Monitoring can occur either synchronousy with appication execution or asynchronousy to the execution. Synchronous checking, or assertion checking, requires that the user add assertions to the appication code. Assertions are checks to determine if, for a particuar section of software, the reevant parts of the system state (for exampe, variabe vaues or I/O signas) are within the bounds needed for that section to operate propery.6 Assertions are paced directy in the appication and can ony be checked when encountered during execution. If more frequent checking is needed, asynchronous checking must be used. Asynchronous checking is done in an externa process that receives events from the appication. Most monitoring systems are of the atter kind. Monitoring distributed systems Monitoring distributed systems brings with it its own set of probems. The main issues in monitoring distributed systems are as foows: Monitoring approaches There are three broad approaches to monitoring: hardware, software, and hybrid approaches. Hardware monitoring requires instrumenting the hardware patform on which the appication runs. Tsai et a.5 use dedicated hardware to atch data directy off the target system s interna buses. Hardware approaches have the advantage of ow Deays in transfering information mean this information may be out of date. Variabe deays in transfering information resut in events arriving out of order. The number of objects generating monitoring information in a arge system can easiy swamp monitors. In the ikey event that the distributed system is hetero- Computer

4 geneous, a canonica form is needed to encode messages passed between heterogeneous machines. MONITORING SYSTEM ACTIVITIES Many activities, as derived from Snodgrass, go into making monitoring work. These activities are characterized by two traits. Is the task performed by the user or by the monitoring system, and Is the task performed before execution, during execution, or both? In Figure 4, preexecution tasks are shown as the darkest ovas (for exampe, Sensor setup). The ight gray ovas represent tasks that can be done either before or during execution. The tasks shown as white ovas must be done during execution. It is desirabe to provide as much fexibiity as possibe by deaying user tasks unti ater stages. This ets the user make adjustments as needed without recompiing the entire monitoring system and appication. In some systems, activities are omitted or combined. Sensor setup Sensor setup usuay precedes appication execution. Sensor setup performed during execution is difficut in software-based, appication-eve monitoring systems because sensors are generay impemented as embedded code in the appication data space. Sensor configuration invoves deciding what information each sensor wi record and where the sensor wi be ocated, and it can be done by the monitoring system. Sensor instaation, on the other hand, invoves pacing the coded sensors at the correct ocations and is generay done by the user. Automated sensor instaation requires the use of dependency anaysis ike that used in parae compiers.7 An enabed sensor is ready to coect information. Some sensors are permanenty enabed (that is, permanenty on), whereas others can be individuay or coectivey enabed or disabed either automaticay or at the user s direction. Sensor enabing is generay performed by the monitoring system. Sensing is the runtime activity of coecting information about the appication. When a sensed event occurs in an appication, it must be conveyed to the monitor. The event is either conveyed immediatey or can be deayed if the cost of conveying individua events is too high. How events are conveyed depends on the system architecture. In a singe-processor or shared-memory system, an event can be written to a shared-memory ocation and the monitor notified by signa or interrupt. In a message-based environment, events are sent by message. event interpretation specification can contain a specific response for each event type. Appication-dependent monitoring is more difficut. If a user is ooking for error conditions or other vioations, the system needs an event interpretation specification that contains either a compete description of correct behavior or a description of each error condition. In the former case, an incoming event is compared to the monitoring system s notion of what shoud be happening to see if the event is consistent with that notion. IDES8 and Sankar and Manda19 use this approach. Where each error condition is described individuay, an event arriving at the monitoring system is compared to the set of descriptions. A match indicates an error has occurred. Leveson6 uses this approach in her synchronous monitoring scheme. The description need not necessariy be of an error condition. ISSOS and Meta0 both provide a anguage and data mode (entity-reationship data mode) for describing arbitrary compex scenarios. Incoming events are directed to the appropriate behavior description. A match occurs when the events satisfy the description. Action specification and execution An action specification is a description suppied by the user of the action to be taken when significant behavior occurs. On recognizing a behavior, the monitoring system executes an appropriate action. Athough most monitors perform some action, often the action does not ater the appication s state. In some concurrent debuggers, for exampe, the monitoring system during execution passivey accepts events, storing them in a repository. On program competion, the monitoring system invokes a program to anayze the events in the repository and format them for graphica dispay. A SAMPLING OF MONITORING SYSTEMS I have seected one representative sampe from each of the functiona areas that comprise on-ine monitoring. Huang and Kintaa s components enhance the dependabiity of an appication; IDES monitors security vioations; Sankar and Manda s methodoogy provides correctness checking; and the Facon system provides a mechanism for on-ine steering of computationay intense parae appications. With each sampe I focus on the foowing key questions: Events. What are the events? Sensing. How is the event data gathered? Event interpretation. How does the monitoring system interpret events? Action execution. What response does the monitoring system make? Event interpretation Event interpretation is the heart of the monitoring system, where the monitoring system interprets the gathered information. What does the monitoring system need to aow it to make sense of the information? Hardware-eve and process-eve monitoring systems have reativey simpe event interpretation components. For these systems, the event set is usuay fixed and known in advance, so the The sampes ampy demonstrate that there are varied and interesting ways to address each question. At the end of each sampe I briefy discuss the potentia advantages and/or disadvantages of the approach. See Tabe 1 for a, summary of characteristics. I Huang and Kintaa Huang and Kintaa have deveoped a set of software ~ ~ June1995

5 , r- Tabe 1. Summary of monitoring system characteristics. Purpose Configure sensors Huang and Kintaa IDES Sankar and Manda Facon Dependabiity Security Correctness checking On-ine program steering Sensor provided User writes Sensors created by User writes sensors as ibrary routine sensors before monitor compier before execution execution Insta sensors User manuay User manuay Sensors instaed User manuay adds sensors adds sensors to automaticay adds sensors before execution kerne before before execution before execution execution Enabe sensors Aways enabed Aways enabed Aways enabed Enabed/disabed during execution Event Buit into Profies and Annotations added User describes interpretation monitoring statistica modes to source event/action specification system define behavior using view anguage Event Match occurs when Match occurs on Match occurs Match occurs interpretation heartbeat not every event on every event when events received satisfy condition in view Sensing Samping Tracing Tracing Samping and tracing Action specification Restart appication Anomay records on node or backup provided to user Diagnostic information User encodes decision provided to user routines and actions Action execution detected match occurs anomay occurs inconsistency detected match occurs components that are easiy incorporated into an existing appication to enhance its eve of faut toerance: watchd watches an appication process and recovers it in the event the process or node on which the process resides crashes; ibft is used to specify and checkpoint critica data, recover checkpointed data, og events, and ocate and reconnect a recovered process; and REPL provides faciities for on-ine repication of user-specified fies on a backup host. I focus on watchd, the component responsibe for gathering information to determine whether a process has crashed. One approach to sensor setup is to augment the appication process with a routine that periodicay sends a heartbeat message (that is, an I am aive event) to watchd. When the event arrives, the monitoring system does nothing. If the heartbeat message is not received within a specified period of time, the monitoring system assumes the appication is hung and restarts the target process at an initia or checkpointed state on the host node or backup node. DISCUSSION. Watchd has the benefit of being minimay intrusive. The heartbeat routine is provided as a ibrary routine so the user need onyinkwith the ibrary and write code to periodicay invoke the routine. On the other hand, the approach is imited to detecting ony process crash. Intrusion Detection Expert System (IDES) IDES8 is a mode for a rea-time intrusion-detection expert system. The mode proposes to detect numerous security vioations ranging from attempted break-ins by outsiders to system penetrations and abuses by insiders. Events in IDES incude ogin, command execution, pro- gram execution, fie access, fie protection vioation, and device access. For IDES to be totay transparent to the user, sensors need to reside in the kerne. A ikey pace to insta a sensor to detect attempts to og onto a Unix system, for exampe, woud be in the ogin process. When a user ID is entered, the sensor is triggered and sends an event to IDES. To interpret events, IDES matches an incoming event against a set of profies. A profie characterizes a subject s behavior with respect to an object; it serves as a description of norma activity between a subject and object. Subjects are the initiators of activities (such as user or process) whie objects are the receivers of activities (such as fies, records, or terminas). When a profie match is found, the monitor uses the event history and a statistica mode identified in the profie to determine whether the Computer

6 current event is consistent with the norma behavior described by the profie. If the event is norma, it updates the profie. Otherwise, it is stored as an anomay and reported to the operator. The knowedge possessed by the monitoring system is of two kinds. The first kind is a set of activity rues that are appicabe independent of the appication being monitored; activity rues specify the action to be taken when a condition is satisfied. For exampe, when a match occurs between an event and a profie, the action taken is to update the profie and check for anomaous behavior. The second kind is the set of profies, statistica metrics, and statistica modes that are unique to an appication and must be suppied by the user. DISCUSSION. Adding a new object woud, in the worst case, invove adding a sensor to the kerne, adjusting profies to incude the aowabe actions on the new object, and instaing a new statistica mode for evauating the reasonabeness of an action taken against the object. It is conceivabe to update the profies and statistica modes on-ine. Adding a new sensor to the kerne woud necessitate rebooting the system, at a minimum. Sankar and Manda Sankar and Manda19 have deveoped a methodoogy to continuousy monitor an executing Ada program for specification consistency. The user annotates an Ada program with constructs from Anna, a forma specification anguage. Annotations are predicates (that is, Booean-vaued expressions) that express constraints on Ada anguage constructs such as data objects, types, subtypes, subprograms, and exceptions. The annotation beow constrains a vaues of type EVEN to be even numbers. EVEN-CON- STRAINT is the annotation name. type EVEN is new INTEGER; - 1 < < EVEN-CONSTRAINT > > -wherex:even=>xmod2=0; Sensing is achieved indirecty by adding annotations to the target system. By annotating the code, the user is at the same time seecting the sensor ocations. The compier transforms the annotations into checking functions, each function as a separate task. In pace of the transformed annotation, the compier inserts a ca to the checking function. The ca statement then is a sensor, and the checking function task becomes a monitor. An event occurs when the ca statement is executed. Since each annotation is transformed into its own monitor, the monitor code is usuay quite simpe. In EVEN-CON- STRAINT above, the monitor checks that the parameter is even and returns the vaue if the condition is true or raises an exception otherwise. If an inconsistency occurs, diagnostic information is provided. DISCUSSION. Because of its synchronous checking approach, sensors can be instaed automaticay by the compier. However, adding another annotation requires recompiing the appication software. Aso, because a separate checking task is created for every annotation, a potentiay arge number of monitors can exist for an appication. Facon Faconi is a set of toos that support on-ine steering of parae and distributed appications. The approach offers a way of providing interactivity to high-performance appications that separates the interactive component from the computationay intensive component and provides a dynamic ink between the two. The interactive, or steering, component monitors the appication, dispays the information to the end user or submits it to a steering agent, accepts steering commands from the user, and enacts changes that affect the appication s execution. Events are user defined, invoving appication-specific data. As an exampe, an event can be generated when a thread has attempted to obtain a mutex ock and another generated when the thread has succeeded in obtaining the ock. The user defines the sensors using a sensor specification anguage and manuay inserts them in the target program. Sensors forward events to a oca monitor resident on the target program s processor, which coects the events and can appy fiters to reduce the monitoring overhead or anaysis toos to produce higher eve information. To interpret events, the gathered events (once fitered and anayzed) are matched against event/action records stored in a repository. When the condition in the event/action record is satisfied, a match occurs and the associated action is executed. The action might be to perform some actua steering action on the appication, note the occurrence of some monitoring event for future reference, or simpy forward the event for dispay or further processing. DISCUSSION. Facon is the most genera of the monitors discussed. It supports samped sensors, traced sensors, and traced sensors with fitering and computing capabiities. Sensors can be enabed and disabed. The monitoring system can be configured to meet the needs of the appication. On-ine steering is done either interactivey by directy invoving the user or by means of userdeveoped agorithms. Sensors, however, must be defined before execution begins and must be instaed manuay by the user. ON-LINE MONITORING IS INCREASINGLY SEEN AS A VIABLE means of increasing appication dependabiity. Forma methods, often regarded as a way of guaranteeing a certain eve of dependabiity, are not without shortcomings. More importanty, they are difficut to appy comprehensivey to arge deveopment projects. Design assumptions made by forma techniques to dea with unpredictabiity of the externa environment or to simpify a probem can be vioated at runtime. In some cases, it may simpy be unfeasibe to formay verify some properties. On-ine monitoring can be used to compement forma techniques to increase the overa dependabiity of an appication. In addition, monitoring distributed and parae systems during execution can provide information that can be used to reconfigure the system, tune the appication, steer its outcome, or provide visuaization of behavior. With monitoring systems today being more genera (ess target architecture and appication specific), they are promising toos for wider use in the future. I June 1995

7 Acknowedgments I thank Sudhir Aggarwa, State University of New York, Binghamton, for his time and suggestions given generousy throughout the deveopment of this artice. I aso thank Chandra Kintaa, AT&T Be Laboratories, and Karsten Schwan, Georgia Tech, for reviewing parts of the manuscript. Dependent Dynamic Monitoring of Distributed and Parae Systems, IEEE Trans. Parae anddistributed Systems, Vo. 4, No. 7, Juy 1993, pp D.E. Denning, An Intrusion-Detection Mode, IEEE Trans. Software Eng., Vo. 13, No. 2, Feb. 1987, pp S. Sankar and M. Manda, Concurrent Runtime Monitoring of Formay Specified Programs, Computer, Vo. 26, No. 3, Mar. 1993, pp K. Marzuo et a., Toos for Distributed Appication Man- References 1. R. Snodgrass, A Reationa Approach to Monitoring Compex Systems, ACM Trans. Computer Systems, Vo. 6, No. 2, May 1988, pp W. Gu, J. Vettrr, and K. Schwan, AnAnnotated Bibiography of Interactive Program Steering, SIGPan Notices, Vo. 29, No. 9, Sept. 1994, pp S. Muender, ed., Distributed Systems, 2nd ed., ACM Press, New York, 1993, pp agement, Computer, Vo. 24, No. 8, Aug. 1991, pp Y. Huang and C. Kintaa, Software-Impemented Faut Toerance: Technoogies and Experience, Proc. 23rdInt Symp. on Faut-Toerant Computing, IEEE CS Press, Los Aamitos, Caif., Order No T, 1993, pp W. Gu et a., Facon: On-ine Monitoring and Steering of Large-Scae Parae Programs, Tech. Report GIT-CC-94-21, Coege of Computing, Georgia Institute of Technoogy, Atanta, Ga., M. Kaebing and D. Oge, Minimizing Monitoring Costs: Choosing Between Tracing and Samping, Proc. 23rd Int BethA. Schroeder is a PhD candidate in computer sci- Conf. SystemSciences, IEEE CS Press, Los Aamitos, Caif. Jan. ence at State University of New York at Binghamton. Cur- 1990, pp rent research interests incude on-ine monitoring, 5. J.J.P. Tsai et a., ANoninterference Monitoring and RepayMechanism for Rea-Time Software Testing and Debugging, IEEE Trans. SofrwareEng., Vo. 16, No. 8, Aug. 1990, pp N. Leveson and T. Shimea, Safety Assertions for Processdistributed rea-time systems, and safety-critica systems. She received an MS in computer sciencefrom Tempe University in 1991, an MBAfrom the University of La Verne in 1986, and a BSc in computer sciencefrom the University of Contro Systems, Proc. 13thnt. Symp. Faut-Toerant Com- Southern Mississippi in puting, IEEE CS Press, Los Aamitos, Caif., Order No. 477 (microfiche ony), 1983, pp Readers can contact the author via e-mai at beths@cc. ~ 7. D.M. Oge, K. Schwan, and R. Snodgrass, Appication- gatech.edu Object-Oriented Appication Frameworks edited by Ted G. Lewis One of the next major steps in object-oriented design and programming is framework design and programming. This book addresses the anticipated surge of interest in what has previousy been a itte-understood technoogy and heps the reader understand the subteties of this new technoogy. The first part is an introduction to the underying principes of objectoriented design. The second is a comparative survey of frameworks for persona computers and UNIX workstations. The ast part is an iustration of the uses of frameworks. 352 p39g..qri Softcover. ISBN O Cataog # RSOOO25 - $44.00 Makers / $50.00 List Now Avaiabe on IEEE Computer Society On-Line This month in Computer: Artice Summaries, Binary Critic, Hot Topics, Letters to the Editor, Software Chaenges, and Tabe of Contents (a new option off the main menu) *Abstracts and tabes of contents of Computer Society pubications (weeks before pubication) Conference caendar Cas for papers Career opportunities Vounteer directory Genera membership and subscription information *Author guideines and copyright forms Computer Society Press Cataog Staff contact ist Senior/staff manager ist 1994 IEEE feows The server is avaiabe with a gopher cient at info.computer.org or a WWW cient at computer.org. For more detaied information, send questions on e-mai to on-ine.access@ computer.org.

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

SNMP Reference Guide for Avaya Communication Manager

SNMP Reference Guide for Avaya Communication Manager SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

NCH Software FlexiServer

NCH Software FlexiServer NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No

More information

READING A CREDIT REPORT

READING A CREDIT REPORT Name Date CHAPTER 6 STUDENT ACTIVITY SHEET READING A CREDIT REPORT Review the sampe credit report. Then search for a sampe credit report onine, print it off, and answer the questions beow. This activity

More information

Setting Up Your Internet Connection

Setting Up Your Internet Connection 4 CONNECTING TO CHANCES ARE, you aready have Internet access and are using the Web or sending emai. If you downoaded your instaation fies or instaed esigna from the web, you can be sure that you re set

More information

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH DMS PDMG-RH Partia discharge monitor for GIS Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Unrivaed PDM feature set

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

Qualifications, professional development and probation

Qualifications, professional development and probation UCU Continuing Professiona Deveopment Quaifications, professiona deveopment and probation Initia training and further education teaching quaifications Since September 2007 a newy appointed FE ecturers,

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,

More information

Application and Desktop Virtualization

Application and Desktop Virtualization Appication and Desktop Virtuaization Content 1) Why Appication and Desktop Virtuaization 2) Some terms reated to vapp and vdesktop 3) Appication and Desktop Deivery 4) Appication Virtuaization 5)- Type

More information

The Web Insider... The Best Tool for Building a Web Site *

The Web Insider... The Best Tool for Building a Web Site * The Web Insider... The Best Too for Buiding a Web Site * Anna Bee Leiserson ** Ms. Leiserson describes the types of Web-authoring systems that are avaiabe for buiding a site and then discusses the various

More information

Design Considerations

Design Considerations Chapter 2: Basic Virtua Private Network Depoyment Page 1 of 12 Chapter 2: Basic Virtua Private Network Depoyment Before discussing the features of Windows 2000 tunneing technoogy, it is important to estabish

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1 SPECIAL CONFERENCE ISSUE THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP spring 2012 Introduction to Master Data and Master Data Management (MDM): Part 1 Utiizing Orace Upgrade Advisor for

More information

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services 2012 Before You Buy A Description of the Caifornia Partnership for Long-Term Care Prepared by the Caifornia Department of Heath Care Services Page 1 of 13 Ony ong-term care insurance poicies bearing any

More information

The growth of online Internet services during the past decade has

The growth of online Internet services during the past decade has IEEE DS Onine, Voume 2, Number 4 Designing an Adaptive CORBA Load Baancing Service Using TAO Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

Oracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus

Oracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus N o r w e g i a n S e a White 60ûN ATLANTIC OCEAN UNITED KINGDOM Rio Douro Hebrid Bay of Biscay Garonne Faroe Isands Shetand Isands Orkney Isands North Loire ine Rhone Rhine Po Ebe Adriatic Batic Guf of

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

Driving Accountability Through Disciplined Planning with Hyperion Planning and Essbase

Driving Accountability Through Disciplined Planning with Hyperion Planning and Essbase THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP summer 2012 Driving Accountabiity Through Discipined Panning with Hyperion Panning and Essbase Introduction to Master Data and Master Data

More information

Lexmark ESF Applications Guide

Lexmark ESF Applications Guide Lexmark ESF Appications Guide Hep your customers bring out the fu potentia of their Lexmark soutions-enabed singe-function and mutifunction printers Lexmark Appications have been designed to hep businesses

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning Monitoring and Evauation Unit Learning from evauations Processes and instruments used by GIZ as a earning organisation and their contribution to interorganisationa earning Contents 1.3Learning from evauations

More information

PREFACE. Comptroller General of the United States. Page i

PREFACE. Comptroller General of the United States. Page i - I PREFACE T he (+nera Accounting Office (GAO) has ong beieved that the federa government urgenty needs to improve the financia information on which it bases many important decisions. To run our compex

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

IBM Security QRadar SIEM

IBM Security QRadar SIEM IBM Security QRadar SIEM Boost threat protection and compiance with an integrated investigative reporting system Highights Integrate og management and network threat protection technoogies within a common

More information

APIS Software Training /Consulting

APIS Software Training /Consulting APIS Software Training /Consuting IQ-Software Services APIS Informationstechnoogien GmbH The information contained in this document is subject to change without prior notice. It does not represent any

More information

IT Governance Principles & Key Metrics

IT Governance Principles & Key Metrics IT Governance Principes & Key Metrics Smawood Maike & Associates, Inc. 9393 W. 110th Street 51 Corporate Woods, Suite 500 Overand Park, KS 66210 Office: 913-451-6790 Good governance processes that moves

More information

EDS-Unigraphics MIS DataBroker Architecture

EDS-Unigraphics MIS DataBroker Architecture EDS-Unigraphics MIS DataBroker Architecture Jeff Greiner Bob Woodridge October 9,1996 Topics UG/MIS Probem Domain Requirements for New Architecture Seection of Java Deveoping Java Based Intranet Soutions

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Teach yourself Android application development - Part I: Creating Android products

Teach yourself Android application development - Part I: Creating Android products Teach yoursef Android appication deveopment - Part I: Creating Android products Page 1 of 7 Part of the EE Times Network A Artices Products Course TechPaper Webinars Login Register Wecome, Guest HOME DESIGN

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan Let s get usabe! Usabiity studies for indexes Susan C. Oason The artice discusses a series of usabiity studies on indexes from a systems engineering and human factors perspective. The purpose of these

More information

We focus on systems composed of entities operating with autonomous control, such

We focus on systems composed of entities operating with autonomous control, such Middeware Architecture for Federated Contro Systems Girish Baiga and P.R. Kumar University of Iinois at Urbana-Champaign A federated contro system (FCS) is composed of autonomous entities, such as cars,

More information

I m pretty lucky as far as teen librarians

I m pretty lucky as far as teen librarians feature Hot Spot: Teen Tech Week Onine Marketing Strategies for Reaching Today s Teens By Laura Peowski Horn I m pretty ucky as far as teen ibrarians go. The ibrary I work at is right next to the ony high

More information

ICAP CREDIT RISK SERVICES. Your Business Partner

ICAP CREDIT RISK SERVICES. Your Business Partner ICAP CREDIT RISK SERVICES Your Business Partner ABOUT ICAP GROUP ICAP Group with 56 miion revenues for 2008 and 1,000 empoyees- is the argest Business Services Group in Greece. In addition to its Greek

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS

DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS TABLE OF CONTENTS INTRODUCTION... 1 GOVERNANCE... 1 COMMONLY PURCHASED GOODS AND SERVICES... 1 HOW TO REGISTER YOUR COMPANY...

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

Vital Steps. A cooperative feasibility study guide. U.S. Department of Agriculture Rural Business-Cooperative Service Service Report 58

Vital Steps. A cooperative feasibility study guide. U.S. Department of Agriculture Rural Business-Cooperative Service Service Report 58 Vita Steps A cooperative feasibiity study guide U.S. Department of Agricuture Rura Business-Cooperative Service Service Report 58 Abstract This guide provides rura residents with information about cooperative

More information

Leadership & Management Certificate Programs

Leadership & Management Certificate Programs MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J

More information

NCH Software Warp Speed PC Tune-up Software

NCH Software Warp Speed PC Tune-up Software NCH Software Warp Speed PC Tune-up Software This user guide has been created for use with Warp Speed PC Tune-up Software Version 1.xx NCH Software Technica Support If you have difficuties using Warp Speed

More information

NCH Software Express Accounts Accounting Software

NCH Software Express Accounts Accounting Software NCH Software Express Accounts Accounting Software This user guide has been created for use with Express Accounts Accounting Software Version 5.xx NCH Software Technica Support If you have difficuties using

More information

Information Systems Technician Training Series

Information Systems Technician Training Series NONRESIDENT TRAINING COURSE Information Systems Technician Training Series Modue 1 Administration and Security NAVEDTRA 14222 IMPORTANT Any future change to this course can be found at https://www.advancement.cnet.navy.mi,

More information

We are XMA and Viglen.

We are XMA and Viglen. alearn with Microsoft 16pp 21.07_Layout 1 22/12/2014 10:49 Page 1 FRONT COVER alearn with Microsoft We are XMA and Vigen. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

MARKETING INFORMATION SYSTEM (MIS)

MARKETING INFORMATION SYSTEM (MIS) LESSON 4 MARKETING INFORMATION SYSTEM (MIS) CONTENTS 4.0 Aims and Objectives 4.1 Introduction 4.2 MIS 4.2.1 Database 4.2.2 Interna Records 4.2.3 Externa Sources 4.3 Computer Networks and Internet 4.4 Data

More information

NCH Software MoneyLine

NCH Software MoneyLine NCH Software MoneyLine This user guide has been created for use with MoneyLine Version 2.xx NCH Software Technica Support If you have difficuties using MoneyLine pease read the appicabe topic before requesting

More information

The BBC s management of its Digital Media Initiative

The BBC s management of its Digital Media Initiative The BBC s management of its Digita Media Initiative Report by the Comptroer and Auditor Genera presented to the BBC Trust s Finance and Compiance Committee, 13 January 2011 Department for Cuture, Media

More information

DECEMBER 2008. Good practice contract management framework

DECEMBER 2008. Good practice contract management framework DECEMBER 2008 Good practice contract management framework The Nationa Audit Office scrutinises pubic spending on behaf of Pariament. The Comptroer and Auditor Genera, Tim Burr, is an Officer of the House

More information

L I C E N S I N G G U I D E

L I C E N S I N G G U I D E O R A C L E H Y P E R I O N E N T E R P R I S E P E R F O R M A N C E M A N A G E M E N T S Y S T E M L I C E N S I N G G U I D E EPM System Licensing Guide Copyright 2009, Orace and/or its affiiates.

More information

Internal Control. Guidance for Directors on the Combined Code

Internal Control. Guidance for Directors on the Combined Code Interna Contro Guidance for Directors on the Combined Code ISBN 1 84152 010 1 Pubished by The Institute of Chartered Accountants in Engand & Waes Chartered Accountants Ha PO Box 433 Moorgate Pace London

More information

Precise assessment of partial discharge in underground MV/HV power cables and terminations

Precise assessment of partial discharge in underground MV/HV power cables and terminations QCM-C-PD-Survey Service Partia discharge monitoring for underground power cabes Precise assessment of partia discharge in underground MV/HV power cabes and terminations Highy accurate periodic PD survey

More information

LADDER SAFETY Table of Contents

LADDER SAFETY Table of Contents Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3

More information

Oracle Project Financial Planning. User's Guide Release 11.1.2.2

Oracle Project Financial Planning. User's Guide Release 11.1.2.2 Orace Project Financia Panning User's Guide Reease 11.1.2.2 Project Financia Panning User's Guide, 11.1.2.2 Copyright 2012, Orace and/or its affiiates. A rights reserved. Authors: EPM Information Deveopment

More information

mi-rm mi-recruitment Manager the recruitment solution for Talent Managers everywhere

mi-rm mi-recruitment Manager the recruitment solution for Talent Managers everywhere mi-rm mi-recruitme Manager the recruitme soution for Tae Managers everywhere mi-rm mi-recruitme Manager Your very own tae manager First Choice Software has been a eading suppier of recruitme software since

More information

Migrating and Managing Dynamic, Non-Textua Content

Migrating and Managing Dynamic, Non-Textua Content Considering Dynamic, Non-Textua Content when Migrating Digita Asset Management Systems Aya Stein; University of Iinois at Urbana-Champaign; Urbana, Iinois USA Santi Thompson; University of Houston; Houston,

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

Law Libraries in the Cloud **

Law Libraries in the Cloud ** LAW LIBRARY JOURNAL Vo. 101:2 [2009-15] Technoogy for Everyone... * Law Libraries in the Coud ** Diane Murey *** Ms. Murey provides an overview of the meanings of coud computing and software as a service,

More information

Federal Financial Management Certificate Program

Federal Financial Management Certificate Program MANAGEMENT CONCEPTS Federa Financia Management Certificate Program Training to hep you achieve the highest eve performance in: Accounting // Auditing // Budgeting // Financia Management ENROLL TODAY! Contract

More information

NCH Software BroadCam Video Streaming Server

NCH Software BroadCam Video Streaming Server NCH Software BroadCam Video Streaming Server This user guide has been created for use with BroadCam Video Streaming Server Version 2.xx NCH Software Technica Support If you have difficuties using BroadCam

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

Business schools are the academic setting where. The current crisis has highlighted the need to redefine the role of senior managers in organizations.

Business schools are the academic setting where. The current crisis has highlighted the need to redefine the role of senior managers in organizations. c r o s os r oi a d s REDISCOVERING THE ROLE OF BUSINESS SCHOOLS The current crisis has highighted the need to redefine the roe of senior managers in organizations. JORDI CANALS Professor and Dean, IESE

More information

ADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES

ADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES ADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES Product Features 1. System 2. Saes Ledger Unimited companies with password protection User security Muti-user system: 1 user comes as standard, up to

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES About ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account. Some of

More information

Lucent Technologies Bell Labs Innovations. PARTNER II Communications System PARTNER Plus Communications System Release 4.1.

Lucent Technologies Bell Labs Innovations. PARTNER II Communications System PARTNER Plus Communications System Release 4.1. Lucent Technoogies Be Labs Innovations PARTNER II Communications System PARTNER Pus Communications System Reease 4.1 System Panner 518-455-338 Issue 2 August 1996 Copyright 1996 Lucent Technoogies A Rights

More information

WINMAG Graphics Management System

WINMAG Graphics Management System SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic

More information

The growth of online Internet services during the past decade has increased the

The growth of online Internet services during the past decade has increased the IEEE DS Onine, Voume 2, Number 3 March 2001 Strategies for CORBA Middeware-Based Load Baancing Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998

Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998 GAO United States Genera Accounting Office Washington, D.C. 20548 Resources, Community, and Economic Deveopment Division B-276660 Apri 25, 1997 The Honorabe Pete V. Domenici Chairman The Honorabe Harry

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information

Introduction to XSL. Max Froumentin - W3C

Introduction to XSL. Max Froumentin - W3C Introduction to XSL Max Froumentin - W3C Introduction to XSL XML Documents Stying XML Documents XSL Exampe I: Hamet Exampe II: Mixed Writing Modes Exampe III: database Other Exampes How do they do that?

More information

How To Get Acedo With Microsoft.Com

How To Get Acedo With Microsoft.Com alearn with Microsoft We are XMA. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow us @WeareXMA Introduction Use our 'steps to alearn' framework to ensure you cover a bases...

More information

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006 (19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE

More information

DOE2000 Panel Parallel Programming Tools

DOE2000 Panel Parallel Programming Tools DOE2000 Pane Parae Programming Toos Rod Odehoeft Advanced Computing Lab Los Aamos Nationa Laboratory American Nucear Society Winter Meeting November 16, 1998 Projects Overview: Toos for Agorithm Deveopment

More information

Ricoh Healthcare. Process Optimized. Healthcare Simplified.

Ricoh Healthcare. Process Optimized. Healthcare Simplified. Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove

More information

WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS

WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS Password Reset Process Navigate to the og in screen Seect the Forgot Password ink You wi be asked to enter the emai address you registered with

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

Vision Helpdesk Client Portal User Guide

Vision Helpdesk Client Portal User Guide Hepdesk Hepdesk Vision Hepdesk Cient Porta User Guide VISION HELPDESK v3 User Guide (for Cient) CLIENT PORTAL DETAILS VISION HELPDESK v3 User Guide (for Cient) Hepdesk Index Cient Porta.....................................................

More information

Technical Support Guide for online instrumental lessons

Technical Support Guide for online instrumental lessons Technica Support Guide for onine instrumenta essons This is a technica guide for Music Education Hubs, Schoos and other organisations participating in onine music essons. The guidance is based on the technica

More information

INDUSTRIAL AND COMMERCIAL

INDUSTRIAL AND COMMERCIAL Finance TM NEW YORK CITY DEPARTMENT OF FINANCE TAX & PARKING PROGRAM OPERATIONS DIVISION INDUSTRIAL AND COMMERCIAL ABATEMENT PROGRAM PRELIMINARY APPLICATION AND INSTRUCTIONS Mai to: NYC Department of Finance,

More information

Semantics-based design for Secure Web Services

Semantics-based design for Secure Web Services 1 Semantics-based design for Secure Web Services Massimo Bartoetti Pierpaoo Degano Gian Luigi Ferrari Roberto Zunino bart@di.unipi.it degano@di.unipi.it giangi@di.unipi.it zunino@di.unipi.it Dipartimento

More information

WHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons

WHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons Understanding the Vaue of Visua Data Discovery A Guide to Visuaizations WHITE Tabe of Contents Executive Summary... 3 Chapter 1 - Datawatch Visuaizations... 4 Chapter 2 - Snapshot Visuaizations... 5 Bar

More information

I Using Metrics to Manage

I Using Metrics to Manage x Using Metrics to Manage Software Projects Edward E Weer Bu HN nformation Systems* n 1989, Bu s Arizona faciity aunched a project management program that required additiona software metrics and inspections.

More information

Program Management Seminar

Program Management Seminar Program Management Seminar Program Management Seminar The word s best management schoos are noted for their superior program execution, high eves of customer satisfaction, and continuous program improvements.

More information

Measuring operational risk in financial institutions

Measuring operational risk in financial institutions Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information