The Expert Advisor: An Expert System for Real Time Network Monitoring

Size: px
Start display at page:

Download "The Expert Advisor: An Expert System for Real Time Network Monitoring"

Transcription

1 The Expert Advisor: An Expert System for Real Time Network Monitoring Tony White Bell Northern Research P.O. Box 3511 Station C Ottawa, Ontario K1S 5B6 uiwhite@bnr.ca Andrzej Bieszczad Bell Northern Research Ottawa, Ontario K1Y 4H7 andrzej@bnr.ca Keywords Real-Time Expert System, Network Monitoring Abstract This paper describes the Expert Advisor 1, a real-time expert system used in the monitoring of packet switching networks and how it has been completely integrated into a conventional network surveillance system. The paper describes the primary functions of the expert system as being the identification of service-affecting conditions in the network and the presentation of all information pertinent to the problem to the network operator in a single entity. The expert system is based upon the concept of a network problem, defined in terms of network events and information from conventional databases. Problems are represented by problem descriptions that are written in a Problem Description Language (PDL) and are modular, allowing for incremental growth of the knowledge contained in the system. The paper describes system design considerations, the novel knowledge representation used, the Problem Description Language itself, and references a mathematical model used to compute the benefits derived by its use in a live network. 1 Copyright Northern Telecom

2 1. Introduction The Expert Advisor thus replaces a stream of network events with a set of problems that are A network operator's job is to monitor the network and identify service-affecting conditions as they arise and to take steps to rectify them. These actions can include the rebooting of a component, patching software or telephoning a repair person in order to have some on site repair effected. Frequently, a single fault in the network can cause the generation of tens of logs or alarms, most of which are artifacts of the fault rather than indicating the cause. It is left to the operator to determine which of the network events indicate the true failure. Also, as faults rarely occur one at a time, the network operator often has to deal with multiple faults simultaneously. With the increasing size and complexity of networks, the value of automated tools becomes apparent. structured in a hierarchy. Tools are provided with specialized browsers that allow rapid traversal of the problem hierarchy in order to view information pertinent to the solution of the problem at hand. The remainder of this paper is composed of four sections. Section two describes Expert Advisor design considerations. Section three provides a brief description of the various Expert Advisor elements. Section four describes the Expert Advisor benefits. Section five describes aspects of the maintenance process and section six concludes with a summary of the paper's key messages. 2. Design considerations The Expert Advisor is one such tool. The system acts as an interface between the event stream from the network and the operator and does what the operator traditionally has had to do - identify problems from a stream of network event information. Naturally, the system can deal with multiple faults simultaneously and is able to make correlations between problems in order to form problem hierarchies. The system can deal with several hundred problems simultaneously, significantly in excess of a human counterpart. The principal function of the Expert Advisor is to collect together in a single object - a problem - all events from the network, and other information from conventional data sources that might prove useful to the operator and present it in a comprehensible format. The system thus correlates network event information, along with other data, and presents the network operator with a set of problems. A problem can be any event or sequence of events in the network that is reflected in the stream of diagnostic data that comes from the network along with any information that has been gathered from system data bases. A problem can also have states associated with it - pieces of information that have been inferred from the stream of data gathered from the above sources. The key design goal in the system has been to present only the relevant information to the network operator, thereby eliminating extraneous data from the network. In this way, network operators can quickly identify, and rectify, problems in the network. An initial feasibility study indicated that conventional surveillance tools, such as a graphical browser, were component oriented, not problem oriented as is the nature of the work done by network operators. Conventional tools were found to be excellent at displaying the raw network events, but did little beyond that in terms of problem formulation. The need to create, and reason with, "a problem" was established. Tools from Artificial Intelligence seemed most appropriate for this. However, it was realized that the Expert Advisor could benefit significantly from providing data to, and receiving data from, the conventional surveillance tools for two reasons. Firstly, effective means for the graphical presentation of data have already been established, and the Expert Advisor should not duplicate these. Secondly, network operators are familiar with their conventional tools and would prefer new tools to augment, rather than replace, their existing mode of operation. For example, by allowing a graphical network browser to indicate one or more problems on a component and through selection to focus an Expert Advisor problem browser tool on that component, the best of the component and problem oriented paradigms are provided. A clear distinction was made between knowledge - behavior applying to all networks - and data - such as the topology of a specific network. The Expert Advisor identified several important characteristics that it must have in order to succeed. Firstly, the system must be able to operate in real time. It must have the capacity to be able to deal

3 with large bursts of data from the network and be able to present the condition of the network to the operator quickly. A performance goal of 20 network events per second was established. After having generated a prototype using a shell this goal implied the need to work in a procedural language and develop an interpreter that was highly tuned to the type of data being received from the network. Secondly, the system should be customizable. Traditionally, vendor-developed expert systems have been closed or difficult to modify. Very rarely has it been possible to modify the knowledge base while the system remains actively monitoring the network. It is very important to have a network surveillance system operational for 100% of the time and it should not be necessary to take down an expert system just because one inference is incorrect. Expert systems, as with most software, have contained defects or more importantly, the quality of their inferences could be improved by allowing the use of data from conventional data bases which are customer and network specific. By allowing customizability and providing a large startup knowledge base, both the novice and expert user can derive benefits from the system, the latter by using the 10,000 lines of provided problem description language (PDL) statements as examples of PDL coding. Enhanced network operator training was highlighted as a benefit with the provision of a customization environment. With such a large knowledge base it is necessary to provide a mechanism for decomposing the knowledge base into smaller components and provide a testing environment that can exercise the components in isolation. In providing a customizable system, it is necessary to solve several problems that present themselves such as customization mechanism (design of a language or graphical programming environment), provision of tools to effect knowledge base modification and how to introduce these changes to a running expert system. These problems are addressed in another paper concerned with the Expert Advisor customization environment. See the [White, Bieszczad 1992] for details. Thirdly, the expert system should be integrated with conventional surveillance systems and be able to exchange information with them. Traditionally, expert systems have not been written such that they can easily be integrated with conventional surveillance systems. As a result, to a greater or lesser degree, the value of the expert system is lost as information has to be transferred manually from one system to another. The Expert Advisor is completely integrated with conventional surveillance tools, such as a graphical network browser, thereby exploiting the strengths of both systems. Hence the choice of platform had to be that of the conventional surveillance system. This is a SUN Sparc 2 2. Finally, the expert system should support a graphical user interface in order to present information in an easy to understand and manipulate format, and preferably be consistent with the user interface paradigm used in conventional surveillance tools. 3. Expert System Design The real time Expert Advisor design consists of a number of distinct components, as is shown in figure 1. It should be noted that this is a much simplified view of the system. Expert System Components Application Program Interface PDL Compiler Problem Viewer Problem Inference Engine Knowledge Base Figure 1 There are four principal components of the expert system. They are the set of problem descriptions (or knowledge base), the problem inference engine that interprets those descriptions in the context of network events, an application program interface and a user interface component - the Problem Viewer. These four elements are described in detail in the next four sections. 2 Copyright Sun Microsystems.

4 3.1 Problem Descriptions base while monitoring the network. In this way, the Expert Advisor remains online during knowledge The set of problem descriptions stored in a single directory comprise the knowledge base. The knowledge base forms the most important part of the system. The knowledge base currently consists of approximately 10,000 lines of problem description language statements and 6,000 lines of problem help. One or more problem descriptions are contained in an ASCII file, stored on disk, and compiled to form structures usable by the problem inference engine. These compiled structures represent the expert knowledge needed by operators to monitor the network. This information includes the meaning of specific events and which events should be associated with a certain failure, the relationships between particular failures, and how information should be displayed for the operator. Figure 2 shows the organization of a knowledge base. A hybrid of model [Kahn et al, 1987] and rule based [Laffey et al, 1988] representations was chosen in the Expert Advisor. Early work on our current knowledge representation can be found in [Peacocke, Rabie, 1987] and [Rabie et al, 1988]. A description of the most recent knowledge representation which integrates aspects of object oriented technology can be found in [Baird, White, 1989]. The advantages of this modular approach are twofold. Firstly, the knowledge base used by the expert system can be easily modified by changing directory and the system has been designed to support the dynamic modification of the knowledge Examples: base maintenance. Garbage collection of vestigial problem descriptions is performed automatically by the system. Multiple knowledge bases are easily supported. For example, at Northern Telecom multiple knowledge bases have been built which allow fault diagnosis to take place down at the process level. Secondly the whole knowledge base need not be recompiled if a single problem description needs to be changed, or a new problem description added. Each problem description is associated with a given network component type, i.e., each problem is said to occur on a specific component type. A problem description can, therefore, be described as encapsulating the partial behavior of a component type. The problems that are defined on a given component type together provide a comprehensive model of the behavior of that component type. In this sense the Expert Advisor can be said to be fault model based - the fault model being the sum of all of the behaviors encoded in problem descriptions for a particular network component type. For example, the Expert Advisor knowledge base contains "Processor Fail", "Accounting records lost" and "Alarms lost" problem descriptions for the network component type PE. Hence we say that the "Processor Fail", "Accounting records lost" and "Alarms lost" problems form a partial fault model for the network component type PE. Each problem description represents a category of service-affecting conditions. For example, "Processor Fail" contains descriptions of several types of processor failure and Knowledge Base Organization /surveillance/kb Directory processor.obj.obj1.obj2....objn processor.prb Prob1.. Probk Probk+1 Probl... Probm Figure 2.

5 therefore accepts a wide range of network events. However, "Accounting records lost" indicates service degradation and is very specific in nature. In this later case, only a single network event is captured. A problem instance is an example of a particular problem description that has been instantiated on a specific component in the network. An example might be a "Processor Fail" problem instance on the component "PM R99 PE 8" in the network. To draw a comparison between the object oriented programming paradigm and the Expert Advisor knowledge representation scheme; the problem description corresponds to the object class and the problem instance corresponds to the object instance. As with the object oriented programming paradigm, several instances of a particular class can be active concurrently in the problem inference engine. In the Expert Advisor knowledge representation scheme, this translates to several physical components having similar faults. A problem description can be seen as a frame consisting of 14 slots that represents the behavior of a network component type under specific fault conditions. These slots are: Network component type: the type of component for which the problem applies. Problem Description Frame Problem Name: a meaningful description of the nature of faults described in the problem description. Problem trigger: a description of which events cause a new problem instance to be created. This slot is only used during problem instance creation. Accepts: a description of which events from this network component type are to be associated with a problem instance after it has been created. This slot is only used after a problem instance has been created and is used in conjunction with the During monitoring slot. Includes: a description of which events from other network component types are to be associated with a problem instance after it has been created. This slot is only used after a problem instance has been created and is used in conjunction with the During monitoring slot. Retrieves: a description of which events are to be retrieved from the events stored in memory and associated with the newly created problem instance. This slot provides a "look back" mechanism. This slot is only used during problem instance creation. Related: a description of which problem descriptions are related to this problem description. The slot encodes a "depends-upon" relationship. For example, a processor being part of a switch depends upon the power supply of the switch. This will be further described in a later section. Network component type Problem Name Problem trigger Includes Accepts Retrieves Related Suppressed Sends Receives Displays On creation On deletion During monitoring Network component type Problem Name Problem trigger Includes Accepts Retrieves Related Suppressed Sends Receives Displays On creation On deletion During monitoring Figure 3.

6 Suppresses: a description of which problem descriptions are subordinate or inferior to this problem description. This slot encodes a "part-of" relationship. For example, a port being part of a processor will have several of its problem descriptions suppressed by a processor problem description. The information encoded in this slot allows problem hierarchies to be generated. The suppresses slot has a display impact in that Problem Viewer users by default only see the problem instances at the top of various problem hierarchies. As the suppresses slot allows the specification of specific problem descriptions on particular network component types it is considerable more flexible than a simple "part-of" relationship. Sends: consists of a list of problem states which are to be broadcast to other problems which are related to or suppressed by this problem. This slot, along with the receives slot, implements an inter-problem message passing mechanism. Receives: consists of a list of problem states that are to be accepted when broadcast from other problems that are related to or suppressed by this problem. This slot, along with the sends slot, implements an inter-problem message passing mechanism. Displays: provides a description of which problem states are to be displayed in the Problem Viewer. This slot encodes which state variables from a problem are of interest and, whenever they change, Problem Viewer users are automatically notified of the new value. This slot negates the need for "printf" rule actions; which comprised a large percentage of rule actions in early prototypes. The final three slots provide mechanisms for describing the dynamic behavior of a problem as events arrive from the network. The Expert Advisor encodes this dynamic behavior using a rule-based representation. These slots are: On creation: this slot is a set of production rules which are evaluated on problem instance creation. On deletion: this slot consists of a set of production rules which are evaluated on problem instance deletion. During monitoring: this slot consists of a set of production rules that are evaluated whenever an event occurs which is of interest to a particular problem instance, i.e., whenever an event passes through the Accepts or Includes filters. By decomposing the frame into multiple slots which describe the various phases of the "life" of a problem instance, significant reduction in the number of rules which have to be evaluated for a single event has been made. Similarly, by having slots which indicate which events apply to various phases of the "life" of a problem instance, a similar reduction in inferencing has been observed. The overall Expert Advisor knowledge representation scheme is shown in figures 3 and 4. Figure 3 graphically shows the structure of a problem description frame, the arrows representing relationships between problem descriptions. Figure 4 graphically shows the model-based nature of the knowledge base and the inter problem relationships which exist between problem description frames. Knowledge Represention Legend network component fault model problem description interproblem relationship knowledge base Figure Problem Inference Engine The second component of the Expert Advisor is the problem inference engine (PIE). If the events are viewed as program data then the set of problem descriptions form a program operating on this data

7 and PIE is the interpreter that runs this program. Events fall into five categories within the Expert Advisor. These are: Network alarms. Network status messages. Expert Advisor internal alarms. Expert Advisor expectation alarms. Expert Advisor state messages. The first two categories are called network events; the last three categories are called internal events. Problem Viewer user as problem hierarchies may be modified. (5) If new links are created, the Sends slots from the linked problem instances are evaluated and states that are present in the Receives slot of the newly created problem instance are sent as messages to it. This causes all rules that relate to that state to be evaluated. (6) The rules stored in the During monitoring slot are then evaluated in the context of the triggering event. The algorithm that is used to process network events and internal alarms can be described as follows: 1. The event is first classified according to which network component type generated it. 2. All problem descriptions and problem instances which are associated with this network component type are then considered in two stages. (a) In the first stage, new problem instances are created. The Problem trigger slot of the problem description is evaluated in the context of the event. If the event passes the trigger, then a new instance of the problem description is created, instantiated using the component name associated with the event. Note that each problem description may define several triggering events but the problem instance will only have one triggering event. In other words, each problem in the real network is triggered by a single event. Checks are provided in order to ensure that multiple instances of a given problem description are not generated on a specific network component. (b) In the second stage, the existing problem instances for the network component type are processed. The Includes slot is evaluated and if the event passes the filter, the event is added to the event list stored for the problem instance. The rules stored in the During monitoring slot are then evaluated in the context of the event. Note that rules are executed in the order in which they are written in the problem description. Forward chaining of the rules occurs whenever the value of a state variable is changed by the actions of a rule. Expert Advisor expectation alarms provide a mechanism for the exploitation of the time dependency of events. Expectation alarms are created by the actions of rules, then inserted into the regular event stream after an appropriate delay. As such, expectation alarms provide a mechanism for belief revision. In association with the state message-passing mechanism mentioned previously, arbitrarily complex belief revision strategies can be encoded. Expectation alarms are used to express conditions such as: If the processor does not clear within Creating a problem instance involves several 60 seconds of failing steps. Then inform the operator that the processor is not recovering (1) An identifier for the problem instance is normally. created using the identity of the event. or (2) The Retrieves slot is evaluated in order If 5 threshold alarms occur within a 10 to retrieve events from the memory-resident minute time span event cache. Then inform the operator that a potential problem exists. (3) The On creation slot is then evaluated in the context of the triggering event. (4) The Suppressed and Related slots are evaluated and new inter-problem instance links are created as appropriate. This stage may cause changes in the display seen by a Expert Advisor state messages are generated whenever the value of a state variable is modified by a rule action. The Sends slot of the problem description script is evaluated and if it contains the

8 state variable, the value of the state variable is broadcast to all related or suppressed problem instances. 3.3 Problem Viewer Network operators use the expert system by accessing a Problem Viewer which has been built using the NT Signature 3 tool kit that is built on top of X 4 windows. Each operator defines an individual view (or set of views) of the network in terms of the region of interest (the components) and the problem descriptions of interest. A Problem Viewer provides a number of specialized browsers that can display different types of information. Problems are displayed in a hierarchy, with the highest level, the network, displayed in the main Problem Viewer browser. Every problem is considered to be a sub problem of the network. Figure 5 shows the main Problem Viewer browser with two problems. Figure 5 shows two problems, a PE problem on RM 99 PE 1 that is out of service and a port problem on AM 98 PE 5 PI 5 PO 1, indicating a modem problem. As the menu in figure 5 indicates, the alarms, status messages and system messages can be reviewed for the problem instance. An example of a message browser is shown in figure 6. Alarm and status browsers are similar. It is possible for the operator to manipulate the problem instance hierarchy. Problem instances can be moved from one level of the hierarchy to another and it is possible to hide or delete problem instances. Hiding a problem instance moves the problem instance to another specialized browser where it remains until the operator "unhides" it, or a change in the state of the instance occurs. For problem instances that have suppressed or related problems it is possible to open a related (or sub problem) browser. A sub problem browser looks similar to figure 5 except in that the title "Problem Viewer" is replaced with the name of the problem, for example, "RM 99 PE 1". 3 Copyright Northern Telecom. 4 X11 Copyright Massachusetts Institute of Technology. Problem Viewer Main Problem Viewer Browser Functions Options RM 99 PE 1: Out of service 22-10:10:01 AM 98 PE 5 PI 5 PO 1: Modem problem 22-10:10:01 Alarms Status Messages Related Problem help Help Figure 5 Problem Main Problem Viewer Viewer Message Browser Browser Problem Viewer Functions Options RM AM 99 PE 981: PE Out 5 of PI service 5 PO 1: Modem problem 22-10:10: :10:01 AM [22-10:08:01] 98 PE 5 PI 5 PO Modem 1: Modem DTC problem problem 22-10:10:01 [22-10:09:00] Modem okay Alarms [22-10:10:01] Modem problem Status Messages Related Problem help Help Figure 5 Figure 6. As the menu in figure 5 indicates, help for a particular problem can also be obtained. Help on a problem provides textual information on how to solve the problem and where extra information can be obtained, for example. The use of graphical and video help are currently under research. Audio help is already provided directly from the Problem Viewer without the provision of a special browser. An example of a help browser is shown in figure 7. Multiple radio buttons are defined in a help browser. Each radio button provides help on an aspect of the problem, or possibly alternative assistance that cannot be disambiguated based upon the eventrelated information processed by the expert system.

9 Problem Viewer Help Browser Help for: RM 99 PE 1 Currently, accounting records are being lost. This is possibly due to several calls clearing simultaneously and the processor is under-engineered. Please check call clear logs and, if excessive call clears are observed, re-engineer the processor with more memory. Records lost Re-engineering a processor Figure 7 Help on help 3.4 Application Program Interface The application program interface (API) allows other applications to share information with the Expert Advisor. The (API) provides a simple ASCII interface with mechanisms to: (a) Get data from the Expert Advisor, i.e., ask for historical data. (b) Set data in the Expert Advisor, i.e., modify parameters stored in the Expert Advisor. This allows problem states to be modified by external programs, implying that it is possible to inject state message events into the system. (c) Ask to notified of changes in Expert Advisor parameters. (d) Destroy data stored in the Expert Advisor. The API allows conventional applications such as a graphical network browser to benefit from the advanced reasoning done by the Expert Advisor. It is currently being used to drive a trouble ticket system. 4. Maintenance Maintenance of the Expert Advisor knowledge base takes two forms. These are: End user customization Northern Telecom maintenance The first type of maintenance uses the customization environment described earlier. The second type of maintenance occurs once every six months, or whenever a release of network software occurs. At that time, differences between the current and previous versions of the network log documentation are computed and appropriate software designers consulted to determine the impacts of these new logs. New problems are added or existing ones modified based upon interviews with these designers. New versions of the various problem scripts are placed in a revision control system. This is done in order that Northern Telecom updates can be merged with whatever end user changes have been made to appropriate scripts. This same revision control system is used in the customization environment in order that end users can maintain a history of their knowledge base changes. 5. Benefits A mathematical model [White, 1989] has been built in order to calculate the benefits of the Expert Advisor. The Expert Advisor was designed to assist network operators in the following areas. Problem identification Problem tracking Problem resolution Problem review Operator training These benefits are described in the next five sections. 5.1 Problem identification One or more network events is said to trigger a problem. The network operator is presented with a stream of problems, not network events such as logs or alarms. Constant observation of a stream of logs or alarms is therefore not required. Audio feedback, such as "PM R99 PE 1 is down" has helped here. 5.2 Problem tracking Once identified, the status of a problem is monitored automatically and displayed on screen. One of the principal functions of the Expert Advisor is to update the various browsers in real time in such a

10 way as to present the most important problem in the main browser. Thus, only the most important information is displayed; irrelevant network events, or events that are artifacts of another problem are hidden. Multiple failures or repeating problems are easily captured. 5.3 Problem resolution Assistance in the resolution of persistent problems is provided by clustering all relevant information together in one place. Status information, data from electronic sources, can be accessed without recourse to other tools. Further, suggestions on possible solution strategies are available via the problem help browser. It is also possible to have the system send commands to the network automatically which speeds up resolution of the problem. 5.4 Problem review Most conventional surveillance tools delete fault indicators on a given component when the component has returned to service. Thus a "fault audit trail" does not exist and it is difficult to detect chronic component failures. The Expert Advisor does not delete a problem when the associated fault has cleared up but rather retains it up to the storage limits of the system. Storage capacity has been so designed that hours of problems can be stored in memory in order that one shift can hand off chronic failures to the next shift. 5.5 Operator training The customization environment [White, Bieszczad, 1992] provided with the Expert Advisor allows novice operators to train themselves. Using fault scenarios captured from the network, it is possible to replay problem situations in a controlled way; at the user's own pace. The customization environment provides a whatyou-see-is-what-you-get interface thus allowing the operator to become familiar with the operation of the various problem browsers. It is strongly believed that this environment will ultimately lead to more consistently trained network operators. The mathematical model built predicted considerable savings due to increased network availability. 6. Summary The Expert Advisor system described in this paper has shown the benefits of a hybrid approach to expert system development. The use of a fault model, composed of multiple inter-related problem descriptions, has shown that a very large system can be designed, implemented and, most importantly maintained. The paper on Expert Advisor customization [White, Bieszczad 1992] provides further information of this aspect of the system. The isolation of network knowledge and network topology has allowed a generic knowledge base to be delivered. The message passing mechanisms employed in order to exchange information between problem instances has proven to be a particularly effective one for the de coupling of rule sets that describe the dynamic behavior of each problem. Message passing has proved to be an excellent way of testing the interfaces between problem descriptions. The system has shown itself to be easy to use, and has been quoted as being the most valuable single surveillance tool available in the Network Management toolset. Currently, work is being done to use the Problem Viewer, Problem Inference Engine and support tools to generate another expert system. The domain is again Network Management, but in the voice area on a different platform. The view is that greater than 80% of the software written will be reused and that an operational system will be produced in six months. The knowledge representation scheme has been shown to apply to this completely different environment with no modifications. Bibliography [Kahn et al, 1987] Kahn G., Kepner., Pepper J., TEST: A Model-Driven Application Shell, Proceedings AAAI 1987 pages [Laffey, et al 1988] Laffey T., WeitzenKamp S., Read J., Kao S., Schmidt J., Intelligent Real-Time Monitoring, Proceedings AAAI 1988 pages

11 [Peacocke, Rabie 1987] Peacocke D., Rabie S., Knowledge Based Maintenance in Networks, Proceedings Globecom [Rabie et al 1988] Rabie S., Rau-Chaplin A., Shibahara T., DAD: A Real-Time Expert System for Monitoring Data Packet Networks, IEEE Networks Magazine September, [Baird, White, 1989] Baird C., White T., A Real- Time Network Monitor, Proceedings of the 9th International Workshop on Expert Systems and their Applications 1989 pages [White, Bieszczad 1992] White T.,Bieszczad A., A Customization environment for the Expert Advisor Network Management system, Canadian Conference on Artificial Intelligence, Vancouver, [White, 1989] White T., Expert Advisor Benefits, internal Bell-Northern Research report.

PATROL From a Database Administrator s Perspective

PATROL From a Database Administrator s Perspective PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks

More information

www.dotnetsparkles.wordpress.com

www.dotnetsparkles.wordpress.com Database Design Considerations Designing a database requires an understanding of both the business functions you want to model and the database concepts and features used to represent those business functions.

More information

HELP DESK SYSTEMS. Using CaseBased Reasoning

HELP DESK SYSTEMS. Using CaseBased Reasoning HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Dell Active Administrator 8.0

Dell Active Administrator 8.0 What s new in Dell Active Administrator 8.0 January 2016 Dell Active Administrator 8.0 is the upcoming release of Dell Software's complete solution for managing Microsoft Active Directory security auditing,

More information

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW

FOXBORO. I/A Series SOFTWARE Product Specifications. I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 OVERVIEW I/A Series SOFTWARE Product Specifications Logo I/A Series Intelligent SCADA SCADA Platform PSS 21S-2M1 B3 The I/A Series Intelligent SCADA Platform takes the traditional SCADA Master Station to a new

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

New Generation of Software Development

New Generation of Software Development New Generation of Software Development Terry Hon University of British Columbia 201-2366 Main Mall Vancouver B.C. V6T 1Z4 tyehon@cs.ubc.ca ABSTRACT In this paper, I present a picture of what software development

More information

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals

AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Solution Documentation for Custom Development

Solution Documentation for Custom Development Version: 1.0 August 2008 Solution Documentation for Custom Development Active Global Support SAP AG 2008 SAP AGS SAP Standard Solution Documentation for Custom Page 1 of 53 1 MANAGEMENT SUMMARY... 4 2

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations

How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part

More information

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt>

Intelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt> Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

DETECTION. NMESys: AN EXPERT SYSTEM FOR NETWORK FAULT. Peter C. Nelson and Janet Warpinski

DETECTION. NMESys: AN EXPERT SYSTEM FOR NETWORK FAULT. Peter C. Nelson and Janet Warpinski NMESys: AN EXPERT SYSTEM FOR NETWORK FAULT DETECTION Peter C. Nelson and Janet Warpinski Department of Electrical Engineering and Computer Science University of Illinois at Chicago Chicago, IL 60680 Abstract.

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

orrelog Ping Monitor Adapter Software Users Manual

orrelog Ping Monitor Adapter Software Users Manual orrelog Ping Monitor Adapter Software Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, Ping Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series

CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series CA Nimsoft Monitor Probe Guide for Active Directory Server ad_server v1.4 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as

More information

TimePictra Release 10.0

TimePictra Release 10.0 DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features

More information

Citrix EdgeSight for Load Testing User s Guide. Citrix EdgeSight for Load Testing 3.8

Citrix EdgeSight for Load Testing User s Guide. Citrix EdgeSight for Load Testing 3.8 Citrix EdgeSight for Load Testing User s Guide Citrix EdgeSight for Load Testing 3.8 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License Agreement.

More information

A Symptom Extraction and Classification Method for Self-Management

A Symptom Extraction and Classification Method for Self-Management LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation

More information

Load Manager Administrator s Guide For other guides in this document set, go to the Document Center

Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager for Citrix Presentation Server Citrix Presentation Server 4.5 for Windows Citrix Access

More information

A Generic business rules validation system for ORACLE Applications

A Generic business rules validation system for ORACLE Applications A Generic business rules validation system for ORACLE Applications Olivier Francis MARTIN System analyst European Laboratory for Particle Physics - CERN / AS-DB Geneva - SWITZERLAND Jean Francois PERRIN

More information

Integrated System Monitoring and Recovering Tool for T-24 Core Banking Applications in Ethiopia

Integrated System Monitoring and Recovering Tool for T-24 Core Banking Applications in Ethiopia Integrated System Monitoring and Recovering Tool for T-24 Core Banking Applications in Ethiopia Anteneh Tadesse HiLCoE, Computer Science Programme, Ethiopia anteneht82@gmail.com Mesfin Kifle HiLCoE, Ethiopia

More information

How To Test Video Quality With Real Time Monitor

How To Test Video Quality With Real Time Monitor White Paper Real Time Monitoring Explained Video Clarity, Inc. 1566 La Pradera Dr Campbell, CA 95008 www.videoclarity.com 408-379-6952 Version 1.0 A Video Clarity White Paper page 1 of 7 Real Time Monitor

More information

INTELLECT TM Software Package

INTELLECT TM Software Package AxxonSoft INTELLECT TM Software Package Quick Start Guide Version 1.0.0 Moscow 2010 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 Document purpose... 3 1.2 Purpose of the Intellect software package...

More information

Cisco Active Network Abstraction 4.0

Cisco Active Network Abstraction 4.0 Cisco Active Network Abstraction 4.0 Product Overview Cisco Active Network Abstraction (ANA) is a flexible, vendor-neutral network resource management solution for a multitechnology, multiservice network

More information

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 Happy Birthday Spectrum! On this day, exactly 20 years ago (4/15/1991) Spectrum was officially considered meant - 2 CA Virtual Assurance

More information

NovaBACKUP Storage Server User Manual NovaStor / April 2013

NovaBACKUP Storage Server User Manual NovaStor / April 2013 NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change

More information

CA Performance Center

CA Performance Center CA Performance Center Release Notes Release 2.3.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS

Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network

More information

æ A collection of interrelated and persistent data èusually referred to as the database èdbèè.

æ A collection of interrelated and persistent data èusually referred to as the database èdbèè. CMPT-354-Han-95.3 Lecture Notes September 10, 1995 Chapter 1 Introduction 1.0 Database Management Systems 1. A database management system èdbmsè, or simply a database system èdbsè, consists of æ A collection

More information

Operation Error Management

Operation Error Management S&C IntelliTeam CNMS Communication Network Management System Operation Error Management Table of Contents Section Page Section Page Overview.... 2 Error Management Alarms... 4 Viewing Alarms.... 5 Editing

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker

Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker White Paper Publication Date: June 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Overview EventTracker

More information

QuickSpecs. Overview. Compaq Remote Insight Lights-Out Edition

QuickSpecs. Overview. Compaq Remote Insight Lights-Out Edition Overview M ODELS Remote Insight Lights-Out Edition 157866-001 New Remote Insight Lights-Out Edition provides virtual graphical control using any standard browser to your remote or data centre server, giving

More information

11.1. Performance Monitoring

11.1. Performance Monitoring 11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts

More information

SCADA Questions and Answers

SCADA Questions and Answers SCADA Questions and Answers By Dr. Jay Park SCADA System Evaluation Questions Revision 4, October 1, 2007 Table of Contents SCADA System Evaluation Questions... 1 Revision 4, October 1, 2007... 1 Architecture...

More information

DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com info@flexense.com. File Integrity Monitor

DiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com info@flexense.com. File Integrity Monitor DiskBoss File & Disk Manager File Integrity Monitor Version 2.0 Dec 2011 www.flexense.com info@flexense.com 1 Product Overview DiskBoss is an automated, rule-based file and disk manager allowing one to

More information

HP OEMF: Alarm Management in Telecommunications Networks

HP OEMF: Alarm Management in Telecommunications Networks HP OEMF: Management in Telecommunications s This article explains the HP OpenView Element Management Framework concept, which is based on the HP OpenView Fault Management Platform (FMP) and complements

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Citrix Online, div. of Citrix Systems Inc. GoToAssist TM. Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005

Citrix Online, div. of Citrix Systems Inc. GoToAssist TM. Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005 , div. of Citrix Systems Inc. GoToAssist TM Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005 Product Abstract GoToAssist enables businesses to securely interact in real time with

More information

Company & Solution Profile

Company & Solution Profile Company & Solution Profile About Us NMSWorks Software Limited is an information technology company specializing in developing Carrier grade Integrated Network Management Solutions for the emerging convergent

More information

Configuration Management Models in Commercial Environments

Configuration Management Models in Commercial Environments Technical Report CMU/SEI-91-TR-7 ESD-9-TR-7 Configuration Management Models in Commercial Environments Peter H. Feiler March 1991 Technical Report CMU/SEI-91-TR-7 ESD-91-TR-7 March 1991 Configuration Management

More information

TNT SOFTWARE White Paper Series

TNT SOFTWARE White Paper Series TNT SOFTWARE White Paper Series Event Log Monitor White Paper: Architecture T N T Software www.tntsoftware.com TNT SOFTWARE Event Log Monitor Architecture 2000 TNT Software All Rights Reserved 1308 NE

More information

MyCloudLab: An Interactive Web-based Management System for Cloud Computing Administration

MyCloudLab: An Interactive Web-based Management System for Cloud Computing Administration MyCloudLab: An Interactive Web-based Management System for Cloud Computing Administration Hoi-Wan Chan 1, Min Xu 2, Chung-Pan Tang 1, Patrick P. C. Lee 1 & Tsz-Yeung Wong 1, 1 Department of Computer Science

More information

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure

PLUMgrid Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Toolbox: Tools to Install, Operate and Monitor Your Virtual Network Infrastructure Introduction The concept of Virtual Networking Infrastructure (VNI) is disrupting the networking space and is enabling

More information

CC Family of Data Collectors

CC Family of Data Collectors CC Family of s Timely. Accurate. Complete. These are the characteristics you expect from CDR (Call Detail Recording) data generated by a call accounting system. CC data collectors* complement these characteristics

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto lft@inescporto.pt Luís Teixeira INESC Porto, Universidade Católica Portuguesa lmt@inescporto.pt Luís Corte-Real

More information

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper.

The EMSX Platform. A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks. A White Paper. The EMSX Platform A Modular, Scalable, Efficient, Adaptable Platform to Manage Multi-technology Networks A White Paper November 2002 Abstract: The EMSX Platform is a set of components that together provide

More information

Technology WHITE PAPER

Technology WHITE PAPER Technology WHITE PAPER What We Do Neota Logic builds software with which the knowledge of experts can be delivered in an operationally useful form as applications embedded in business systems or consulted

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Basic Trends of Modern Software Development

Basic Trends of Modern Software Development DITF LDI Lietišķo datorsistēmu programmatūras profesora grupa e-business Solutions Basic Trends of Modern Software Development 2 3 Software Engineering FAQ What is software engineering? An engineering

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

User Guide Win7Zilla

User Guide Win7Zilla User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

CDVS-7000 Series Remote Software Users Guide

CDVS-7000 Series Remote Software Users Guide CDVS-7000 Series Remote Software Users Guide Crest Electronics, Inc. Version 12.1005 Remote Surveillance Program The remote surveillance program enables users of the Crest 7000 series DVRs to connect remotely

More information

ivms-4200 Client Software Quick Start Guide V1.02

ivms-4200 Client Software Quick Start Guide V1.02 ivms-4200 Client Software Quick Start Guide V1.02 Contents 1 Description... 2 1.1 Running Environment... 2 1.2 Surveillance System Architecture with an Performance of ivms-4200... 3 2 Starting ivms-4200...

More information

Mitigating Risks and Monitoring Activity for Database Security

Mitigating Risks and Monitoring Activity for Database Security The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring

More information

SNMP Monitoring: One Critical Component to Network Management

SNMP Monitoring: One Critical Component to Network Management Network Instruments White Paper SNMP Monitoring: One Critical Component to Network Management Although SNMP agents provide essential information for effective network monitoring and troubleshooting, SNMP

More information

Remote Support. User Guide 7.23

Remote Support. User Guide 7.23 Remote Support User Guide 7.23 Copyright 1997 2011 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco WebEx logo are trademarks or registered trademarks

More information

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0 EUCIP - IT Administrator Module 2 Operating Systems Version 2.0 Module 2 Goals Module 2 Module 2, Operating Systems, requires the candidate to be familiar with the procedure of installing and updating

More information

Oracle Endeca Server. Cluster Guide. Version 7.5.1.1 May 2013

Oracle Endeca Server. Cluster Guide. Version 7.5.1.1 May 2013 Oracle Endeca Server Cluster Guide Version 7.5.1.1 May 2013 Copyright and disclaimer Copyright 2003, 2013, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of

More information

Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102

Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Interneer, Inc. Updated on 2/22/2012 Created by Erika Keresztyen Fahey 2 Workflow - A102 - Basic HelpDesk Ticketing System

More information

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring

More information

CORE Data Migration Guide

CORE Data Migration Guide CORE Data Migration Guide Limitation on Liability This CORE 5 Data Migration package (consisting of the CORE 5 Data Migration Guide and associated data migration schema and scripts) are provided at no

More information

The Hadoop Distributed File System

The Hadoop Distributed File System The Hadoop Distributed File System The Hadoop Distributed File System, Konstantin Shvachko, Hairong Kuang, Sanjay Radia, Robert Chansler, Yahoo, 2010 Agenda Topic 1: Introduction Topic 2: Architecture

More information

Diagnostics and Troubleshooting Using Event Policies and Actions

Diagnostics and Troubleshooting Using Event Policies and Actions Diagnostics and Troubleshooting Using Event Policies and Actions Brocade Network Advisor logs events and alerts generated by managed devices and the management server and presents them through the master

More information

JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS. Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany

JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS. Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS Christof Röhrig, 1 Andreas Jochheim 2 Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany Abstract: This paper

More information

Industrial IT Ó Melody Composer

Industrial IT Ó Melody Composer Overview Industrial IT Ó Melody Composer Features and Benefits Support of concurrent engineering for Control Systems Operation on Windows NT and Windows 2000 Multiple client/server architecture Off-Line

More information

XenData Archive Series Software Technical Overview

XenData Archive Series Software Technical Overview XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic

More information

NortechCommander Software Operating Manual MAN-00004 R6

NortechCommander Software Operating Manual MAN-00004 R6 NortechCommander Software Operating Manual MAN-00004 R6 If the equipment described herein bears the symbol, the said equipment complies with the applicable European Union Directive and Standards mentioned

More information

ABSTRACT INTRODUCTION MATERIALS AND METHODS

ABSTRACT INTRODUCTION MATERIALS AND METHODS JOURNAL OF AGRICULTURE & SOCIAL SCIENCES 1813 2235/2005/01 2 156 160 http://www.ijabjass.org Design and Implementation of Network Operational Management Systems for Integrated and Automated Management

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

HP Business Process Monitor

HP Business Process Monitor HP Business Process Monitor For the Windows operating system Software Version: 9.23 BPM Monitoring Solutions Best Practices Document Release Date: December 2013 Software Release Date: December 2013 Legal

More information

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

DANGER indicates that death or severe personal injury will result if proper precautions are not taken. Multi-User Systems 1 ArchiveServer 2 SIMATIC HMI WinCC V7.0 SP1 File Server 3 WinCC ServiceMode 4 Redundant Systems 5 System Manual Print of the Online Help 11/2008 Legal information Warning notice system

More information

Nokia Siemens Network NetAct For Juniper. Mobile Broadband Ethernet and IP Assurance

Nokia Siemens Network NetAct For Juniper. Mobile Broadband Ethernet and IP Assurance Nokia Siemens Network NetAct For Juniper Mobile Broadband Ethernet and IP Assurance Understanding the user experience is the key to customer loyalty Providing an excellent customer experience is essential

More information

IIS Media Services 3.0 Overview. Microsoft Corporation

IIS Media Services 3.0 Overview. Microsoft Corporation IIS Media Services 3.0 Overview Microsoft Corporation April 2010 Contents Contents...2 Introduction...4 IIS Media Services 3.0...4 Media Delivery Approaches Supported by Windows Server 2008 R2... 5 Goals

More information

HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer

HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer Survey Utility HP Industry Standard Servers June 2004 HP Insight Diagnostics Online Edition Technical White Paper Featuring Survey Utility and IML Viewer Table of Contents Abstract Executive Summary 3

More information

User's Guide - Beta 1 Draft

User's Guide - Beta 1 Draft IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Cluster Server Agent vnext User's Guide - Beta 1 Draft SC27-2316-05 IBM Tivoli Composite Application Manager for Microsoft

More information

System Services. Engagent System Services 2.06

System Services. Engagent System Services 2.06 System Services Engagent System Services 2.06 Overview Engagent System Services constitutes the central module in Engagent Software s product strategy. It is the glue both on an application level and on

More information

Monitoring Replication

Monitoring Replication Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package

More information

Please check www.milestonesys.com for updates to make sure you install the most recent version of our software.

Please check www.milestonesys.com for updates to make sure you install the most recent version of our software. Guide Contents Dear Milestone Customer, With the purchase of Milestone XProtect Central you have chosen a very powerful central monitoring solution, providing instant overview of any number of Milestone

More information

Citrix EdgeSight for Load Testing User s Guide. Citrx EdgeSight for Load Testing 2.7

Citrix EdgeSight for Load Testing User s Guide. Citrx EdgeSight for Load Testing 2.7 Citrix EdgeSight for Load Testing User s Guide Citrx EdgeSight for Load Testing 2.7 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License Agreement.

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

EMC Smarts Network Configuration Manager

EMC Smarts Network Configuration Manager EMC Smarts Network Configuration Manager Version 9.4.1 Advisors User Guide P/N 302-002-279 REV 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in the USA. Published October, 2015

More information

Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance

Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance 3.1 Introduction This research has been conducted at back office of a medical billing company situated in a custom

More information

Oracle 11g Database Administration

Oracle 11g Database Administration Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database

More information

ImagineWorldClient Client Management Software. User s Manual. (Revision-2)

ImagineWorldClient Client Management Software. User s Manual. (Revision-2) ImagineWorldClient Client Management Software User s Manual (Revision-2) (888) 379-2666 US Toll Free (905) 336-9665 Phone (905) 336-9662 Fax www.videotransmitters.com 1 Contents 1. CMS SOFTWARE FEATURES...4

More information

M3039 MPEG 97/ January 1998

M3039 MPEG 97/ January 1998 INTERNATIONAL ORGANISATION FOR STANDARDISATION ORGANISATION INTERNATIONALE DE NORMALISATION ISO/IEC JTC1/SC29/WG11 CODING OF MOVING PICTURES AND ASSOCIATED AUDIO INFORMATION ISO/IEC JTC1/SC29/WG11 M3039

More information

Agency manager roles & responsibilities

Agency manager roles & responsibilities Part 1 Agency manager roles & responsibilities Anyone with level 3 security can see and manage agency screens in VITA as well as any action items. With different subscriptions come different options within

More information

VISUALIZATION. Improving the Computer Forensic Analysis Process through

VISUALIZATION. Improving the Computer Forensic Analysis Process through By SHELDON TEERLINK and ROBERT F. ERBACHER Improving the Computer Forensic Analysis Process through VISUALIZATION The ability to display mountains of data in a graphical manner significantly enhances the

More information

Expedite for Windows Software Development Kit Programming Guide

Expedite for Windows Software Development Kit Programming Guide GXS EDI Services Expedite for Windows Software Development Kit Programming Guide Version 6 Release 2 GC34-3285-02 Fifth Edition (November 2005) This edition replaces the Version 6.1 edition. Copyright

More information

Automation Engine 14. Troubleshooting

Automation Engine 14. Troubleshooting 4 Troubleshooting 2-205 Contents. Troubleshooting the Server... 3. Checking the Databases... 3.2 Checking the Containers...4.3 Checking Disks...4.4.5.6.7 Checking the Network...5 Checking System Health...

More information

Software Certification and Software Certificate Management Systems

Software Certification and Software Certificate Management Systems Software Certification and Software Certificate Management Systems (Position Paper) Ewen Denney and Bernd Fischer USRA/RIACS, NASA Ames Research Center, Moffett Field, CA 94035, USA {edenney,fisch}@email.arc.nasa.gov

More information

Concepts of digital forensics

Concepts of digital forensics Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence

More information