Splunk.conf Gerrit Schmitz Renjith Nair. Senior System Engineer, Bosch SoDware InnovaGons. Copyright 2015 Splunk Inc.

Size: px
Start display at page:

Download "Splunk.conf 2015. Gerrit Schmitz Renjith Nair. Senior System Engineer, Bosch SoDware InnovaGons. Copyright 2015 Splunk Inc."

Transcription

1 Splunk.conf 2015 Gerrit Schmitz Renjith Nair Senior System Engineer, Bosch SoDware InnovaGons Copyright 2015 Splunk Inc.

2 Bosch So(ware Innova0ons Agenda About Us Splunk SI Splunk Bosch- SI Splunk in Bosch IoT Business 5 Past and Future Challenges

3 About Us

4 Bosch So(ware Innova0ons About Us Gerrit Schmitz Senior System Engineer Renjith Nair Senior System Engineer Combined Splunk Experience of 8 years+

5 Bosch So(ware Innova0ons Bosch SoDware InnovaGons Worldwide Palo Alto Sales Chicago Sales MarkeGng Prof. Services Bosch So(ware Innova0ons SoDware and system services for enterprise solugons in the IoT Experience ranges from complex sodware systems to domain solugons 700 associates worldwide Berlin Corporate FuncGons Sales & MarkeGng Product Development Professional Services Immenstaad Corporate FuncGons Sales & MarkeGng Professional Services Product Development Prosyst Cologne/Sofia Sales & MarkeGng Product Development Professional Services Waiblingen Sales System Technology System Projects Professional Services Product Development Shanghai Sales Professional Services Singapore Sales & MarkeGng Professional Services Product Development System Projects

6 Bosch SoDware InnovaGons IoT Vision A Connected World Industry Mobility Energy Smart Home Smart City

7 The Things of Bosch

8 Splunk Bosch SI

9 Splunk Bosch SI 3950 km Stu^gart km Singapore

10 Splunk Bosch SI Five Search Heads Seven Indexers Eleven Heavy Forwarders Approximately 150 Universal Forwarders Two Masters (both Stu^gart) Two Indexer Clusters (stretched) One Search Head Cluster (stretched)

11 Splunk As A Monitoring Tool

12 Bosch So(ware Innova0ons ReporGng ApplicaGon Monitoring System Monitoring PoC - Splunk As a Monitoring Tool OpsMonK

13 Splunk As A Monitoring Tool

14 Splunk As A Monitoring Tool

15 Alerts Splunk As A Monitoring Tool

16 Alerts Splunk As A Monitoring Tool

17 Alerts Splunk As A Monitoring Tool

18 Maintenance Splunk As A Monitoring Tool

19 Splunk As A Monitoring Tool

20 Splunk As A Monitoring Tool

21 Splunk As A Monitoring Tool

22 Splunk In Bosch IoT Business

23 Bosch IoT Business emobility Industry 4.0

24 Bosch IoT Business Energy Virtual Power Plant Intelligent Tools

25 Connected lawn mower Indego Manage your connected devices with the touch of a finger The Bosch Indego is the first robotic lawn mower with a free GSM connection that can be operated simply and conveniently using an app.

26 - Connected lawn mower Indego The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. Mobile data The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. User Interface: Internet The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart Business Portal

27 Connected lawn mower Indego

28 Connected lawn mower Indego

29 Challenges

30 Past Challenges We use our own SSL cer0ficates. This is supported, but difficult. We isolate mul0ple Splunk processes on the same host. This is not supported, and also difficult. We run globally distributed Splunk clusters. This is not supported, but was quite easy. Our Splunk is completely highly available. Including Master and TCP Inputs If you want to do something similar, we are here to help J

31 Past and Future Challenges How could Splunk extract data from an embedded device? ê Universal forwarder available, but not officially supported for ARM h^ps://splunkbase.splunk.com/app/1611/ ê TCP Input cannot be access protected (safe for client cergficates) ê That leaves the REST Interface h^p://docs.splunk.com/documentagon/splunk/latest/restref/restinput#receivers.2fsimple Server AuthenGcaGon: via SSL CerGficate Client AuthenGcaGon: via Username/Password Client AuthorizaGon: ê edit_tcp permission required ê Is it a good idea to grant this to a large number of devices?

32 Future Challenges To- Do List: Migra0ng from single- 0er to mul0-0er storage. Use roles as distribu0on lists for alerts. Splunk knows the mail addresses from LDAP, why can t we send alerts to a whole role? Limit volume by index not indexer. Seems to require a change in Splunk. So far only alergng works. Automa0cally provision new tenants. Integrate more authen0ca0on mechanisms (oauth).

33 THANK YOU h^p://blog.bosch- si.com h^p:// si.com/

IoT in Production. Dr. Verena Majuntke, Bosch Software Innovations. Bosch Software Innovations

IoT in Production. Dr. Verena Majuntke, Bosch Software Innovations. Bosch Software Innovations IoT in Production Dr. Verena Majuntke, 1 Public INST/MKC 07.2014 GmbH 2014. All rights reserved, also regarding any disposal, Agenda The Internet of Things Internet of Things in Production Business Ecosystem

More information

The Bosch IoT Suite: Technology for a ConnectedWorld. Software Innovations

The Bosch IoT Suite: Technology for a ConnectedWorld. Software Innovations The Bosch IoT Suite: Technology for a ConnectedWorld. Software Innovations 2 Bosch IoT Suite The Bosch IoT Suite: Technological basis for applications in the Internet of Things. Our world is changing fast.

More information

Process Quality Manager Monitor and document process data. With ConnectedManufacturing Solutions by Bosch Software Innovations. Software Innovations

Process Quality Manager Monitor and document process data. With ConnectedManufacturing Solutions by Bosch Software Innovations. Software Innovations Process Quality Manager Monitor and document process data. With ConnectedManufacturing Solutions by Bosch Software Innovations. Software Innovations 2 Process Quality Manager Managing process data the

More information

Patching, AlerFng, BYOD and More: Managing Security in the Enterprise with Splunk Enterprise

Patching, AlerFng, BYOD and More: Managing Security in the Enterprise with Splunk Enterprise Copyright 2013 Splunk Inc. Patching, AlerFng, BYOD and More: Managing Security in the Enterprise with Splunk Enterprise Marquis Montgomery, CISSP, SSCP, GSEC Senior Security Architect, CedarCrestone #splunkconf

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Identity Management Administrator Guide

Identity Management Administrator Guide IMS Developer Guide Common Environment - Identity Management component Identity Management Administrator Guide Version 3.2.2 Bosch Software Innovations Americas: Bosch Software Innovations Corp. 161 N.

More information

Production Rules Configurator Rules-based analysis of production data With ConnectedManufacturing Solutions by Bosch Software Innovations

Production Rules Configurator Rules-based analysis of production data With ConnectedManufacturing Solutions by Bosch Software Innovations Production Rules Configurator Rules-based analysis of production data With ConnectedManufacturing Solutions by Bosch Software Innovations Software Innovations 2 Production Rules Configurator Detect deviations

More information

How does Big Data disrupt the technology ecosystem of the public cloud?

How does Big Data disrupt the technology ecosystem of the public cloud? How does Big Data disrupt the technology ecosystem of the public cloud? Copyright 2012 IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda Market trends 2020 Vision Introduce

More information

HOT CONSUMER TRENDS 2016. Ericsson ConsumerLab

HOT CONSUMER TRENDS 2016. Ericsson ConsumerLab HOT CONSUMER TRENDS 2016 Ericsson ConsumerLab 1. The Lifestyle Network Effect More people are benefitting from a wider network of consumers, with 4 out of 5 experiencing a lifestyle network effect when

More information

BPM for Insurance: Business Process Management effective, simple, unique

BPM for Insurance: Business Process Management effective, simple, unique BPM for Insurance: Business Process Management effective, simple, unique Software Innovations We want to communicate with our partners more effectively. We achieve this with Bosch Software Innovations!

More information

Application Note 02 Advanced SMTP setup

Application Note 02 Advanced SMTP setup Application Note 02 Advanced SMTP setup A regular SMTP setup may not work if the SMTP server cannot be directly addressed. The following two methods provide an alternative, when the SMTP server cannot

More information

The Bosch IoT Suite www.bosch-si.com

The Bosch IoT Suite www.bosch-si.com The Suite www.bosch-si.com Technology for a ConnectedWorld. Software Innovations bosch-si.com The Internet of Things opens the door to the ConnectedWorld. As a leading international supplier of technology

More information

Evolving from SCADA to IoT

Evolving from SCADA to IoT Evolving from SCADA to IoT Evolving from SCADA to IoT Let s define Semantics IoT Objectives, chapters 1 and 2 Separating the hype from the reality Why IoT isn t easy An IoT roadmap & framework IoT vs.

More information

Syracuse University. A vibrant entrepreneurial ecosystem

Syracuse University. A vibrant entrepreneurial ecosystem Syracuse University A vibrant entrepreneurial ecosystem Overview Most schools have entrepreneurial ac4vity New hires & courses Almost 7000 students in broadly defined e- ship courses Working to coordinate

More information

How To Plan A Desktop Workspace Infrastructure

How To Plan A Desktop Workspace Infrastructure Dell Copyright 2014 Moka5, Inc. All rights reserved. Moka5, MokaFive, LivePC, and the Moka5 logo are trademarks of Moka5, Inc. All other product or company names may be trademarks of their respective owners.

More information

Virtual Power Plant Manager activated grid and energy trading optimized. With ConnectedEnergy Solutions by Bosch Software Innovations.

Virtual Power Plant Manager activated grid and energy trading optimized. With ConnectedEnergy Solutions by Bosch Software Innovations. Virtual Power Plant Manager activated grid and energy trading optimized. With ConnectedEnergy Solutions by Bosch Software Innovations. Software Innovations 2 Virtual Power Plant Manager The energy market

More information

Proxied Authentication in SSO Setups with Common OSS. Open Identity Summit 2015 Prof. Dr. René Peinl Berlin, 10.11.2015

Proxied Authentication in SSO Setups with Common OSS. Open Identity Summit 2015 Prof. Dr. René Peinl Berlin, 10.11.2015 Proxied Authentication in SSO Setups with Common OSS Open Identity Summit 2015 Prof. Dr. René Peinl Berlin, 10.11.2015 Agenda 1 Use case / context 2 Challenge and ideal solution 3 Analysis of established

More information

High Availability with Elixir

High Availability with Elixir High Availability with Elixir High Availability High-availability clusters (also known as HA Clusters or Failover Clusters) are computer clusters that are implemented primarily for the purpose of providing

More information

User-ID Configuration

User-ID Configuration User-ID Configuration How to configure Active Directory for User-ID based internet access. Nick Pearce 5/11/2015 1 Install and configure the User-ID agent. Download the.zip file from https://dl.sgcyp.org.uk/pan/user-id.zip

More information

Overview of SOTI. www.so%.net

Overview of SOTI. www.so%.net Overview of SOTI www.so%.net World s Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide Since 1995, SOTI Inc. has been developing industry - leading technology that solves

More information

Intellicus Enterprise Reporting and BI Platform

Intellicus Enterprise Reporting and BI Platform Intellicus Cluster and Load Balancing (Windows) Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Copyright 2014 Intellicus Technologies This

More information

Palo Alto Networks. October 6

Palo Alto Networks. October 6 Palo Alto Networks October 6 Agenda Malware Trends by the numbers Protect Locally Share Globally Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2%

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Connecting Software. CB Mobile CRM Windows Phone 8. User Manual

Connecting Software. CB Mobile CRM Windows Phone 8. User Manual CB Mobile CRM Windows Phone 8 User Manual Summary This document describes the Windows Phone 8 Mobile CRM app functionality and available features. The document is intended for end users as user manual

More information

Mobile Security Mobile Device Management Mobile Applica6on Management

Mobile Security Mobile Device Management Mobile Applica6on Management Mobile Security Mobile Device Management Mobile Applica6on Management Corporate Overview Largest MDM provider with over 500 employees, 200 focused on R&D Provide MDM soluions to more than 2,000 global

More information

Reliable log data transfer

Reliable log data transfer OWASP Switzerland Chapter December 2015 Reliable log data transfer About (r)syslog, logstash, and log data signing A field report pascal.buchbinder@adnovum.ch Agenda Why we need log data transfer Syslog

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Oracle Database Security and Audit

Oracle Database Security and Audit Copyright 2014, Oracle Database Security and Audit Beyond Checklists Learning objectives Understand Oracle architecture Database Listener Oracle connection handshake Client/server architecture Authentication

More information

FileCruiser. Desktop Agent Guide

FileCruiser. Desktop Agent Guide FileCruiser Desktop Agent Guide FileCruiser Desktop Agent Guide Contents Contents Getting Started with FileCruiser 1 Using the FileCruiser Agent 2 Desktop Shortcut 2 Log in to FileCruiser Agent 3 Using

More information

How To Build An Internet Of Things (Iot)

How To Build An Internet Of Things (Iot) The Internet of Things: Devices, Avatars, Worlds, and APPs Tom Berarducci Director, Platform Product Mgmt Zebra Technologies Corp. Zebra Technologies Corp. Goal of the Internet of Things (IoT) A key goal

More information

Business Rules Management with Visual Rules BRM: intuitive modeling, agile rules, intelligent decisions. Software Innovations BRM

Business Rules Management with Visual Rules BRM: intuitive modeling, agile rules, intelligent decisions. Software Innovations BRM Business Rules Management with Visual Rules BRM: intuitive modeling, agile rules, intelligent decisions. Software Innovations BRM 2 Business Rules Management with Visual Rules BRM Visual Rules BRM: the

More information

CA Mobile Device Management 2014 Q1 Getting Started

CA Mobile Device Management 2014 Q1 Getting Started CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

iservdb The database closest to you IDEAS Institute

iservdb The database closest to you IDEAS Institute iservdb The database closest to you IDEAS Institute 1 Overview 2 Long-term Anticipation iservdb is a relational database SQL compliance and a general purpose database Data is reliable and consistency iservdb

More information

Creating connected manufacturing operations in the Internet of Things

Creating connected manufacturing operations in the Internet of Things Creating connected manufacturing operations in the Internet of Things Software Innovations Bosch Conn Bosch ConnectedManufacturing White Paper September 2014 Bosch Software Innovations GmbH 1 Table of

More information

Invest in security to secure investments. Breaking SAP Portal. Dmitry Chastuhin Principal Researcher at ERPScan

Invest in security to secure investments. Breaking SAP Portal. Dmitry Chastuhin Principal Researcher at ERPScan Invest in security to secure investments Breaking SAP Portal Dmitry Chastuhin Principal Researcher at ERPScan 1 About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite

More information

Deployment Best PracHces for Splunk Apps Monitoring MicrosoK- based Infrastructure

Deployment Best PracHces for Splunk Apps Monitoring MicrosoK- based Infrastructure Copyright 2013 Splunk Inc. Deployment Best PracHces for Splunk Apps Monitoring MicrosoK- based Infrastructure Sharad Kylasam Sr. Product Manager Jeff Bernt - SDET #splunkconf Legal NoHces During the course

More information

Navigating the OpenStack Ecosystem

Navigating the OpenStack Ecosystem Accelerating the adoption of Cloud Computing Navigating the OpenStack Ecosystem Speakers Today Seth Fox is the Vice-President of Operations for Solinea Managed and delivered some of the largest cloud deployments,

More information

How to use Certificate in Microsoft Outlook

How to use Certificate in Microsoft Outlook How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook

More information

CHAPTER 2: USING THE CAMERA WITH THE APP

CHAPTER 2: USING THE CAMERA WITH THE APP TABLE OF CONTENTS OVERVIEW... 1 Front of your camera... 1 Back of your camera... 2 ACCESSORIES... 3 CHAPTER 1: Navigating the Mobile Application... 4 Device List: How to Use this Page... 4 My Messages:

More information

Design for Success. Elevating Your Product s Capabilities through a Cloud-Connectivity System

Design for Success. Elevating Your Product s Capabilities through a Cloud-Connectivity System Design for Success Elevating Your Product s Capabilities through a Cloud-Connectivity System Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Connecting Software Connect Bridge - Mobile CRM Android User Manual

Connecting Software Connect Bridge - Mobile CRM Android User Manual Connect Bridge - Mobile CRM Android User Manual Summary This document describes the Android app Mobile CRM, its functionality and features available. The document is intended for end users as user manual

More information

Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE

Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE Mobile Secure Desktop Maximum Scalability, Security and Availability for View with F5 Networks HOW-TO GUIDE Solution Overview The VMware View Mobile Secure Desktop solution is a powerful architecture intended

More information

Integrate ExtraHop with Splunk

Integrate ExtraHop with Splunk Integrate ExtraHop with Splunk Introduction The ExtraHop system monitors network and application performance by gathering data passively on the network. It offers deep and customizable analytics of wire

More information

Splunk implementa-on. Our experiences throughout the 3 year journey

Splunk implementa-on. Our experiences throughout the 3 year journey Splunk implementa-on Our experiences throughout the 3 year journey About us Harvard University University Network Services Group Serving over 2500 faculty and more than 18,000 students Jim Donn Management

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Organizational Intelligence, Scalability, and Agility

Organizational Intelligence, Scalability, and Agility Organizational Intelligence, Scalability, and Agility BPMS at the pace of business The Modern Way to Optimize Business Processes Business Process Management Systems (BPMS) have been key to improving efficiency,

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Oracle Cloud Services Mike Lehmann Senior Director of Product Management WebLogic Server, Java Cloud Services, Coherence and Java EE

More information

VMware Virtual Desktop Manager User Authentication Guide

VMware Virtual Desktop Manager User Authentication Guide Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

With Bosch Software Innovations ConnectedManufacturing Solutions.

With Bosch Software Innovations ConnectedManufacturing Solutions. Production Performance Manager How to systematically improve machine availability. www.bosch-si.com/production-performance-manager With Bosch Software Innovations ConnectedManufacturing Solutions. Software

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

WebSphere Application Server - Introduction, Monitoring Tools, & Administration

WebSphere Application Server - Introduction, Monitoring Tools, & Administration WebSphere Application Server - Introduction, Monitoring Tools, & Administration presented by: Michael S. Pallos, MBA Senior Solution Architect IBM Certified Systems Expert: WebSphere MQ 5.2 e-business

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Intellicus Cluster and Load Balancing (Windows) Version: 7.3

Intellicus Cluster and Load Balancing (Windows) Version: 7.3 Intellicus Cluster and Load Balancing (Windows) Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not

More information

Note: This App is under development and available for testing on request. Note: This App is under development and available for testing on request. Note: This App is under development and available for

More information

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions

More information

Chapter 8 Monitoring and Logging

Chapter 8 Monitoring and Logging Chapter 8 Monitoring and Logging This chapter describes the SSL VPN Concentrator status information, logging, alerting and reporting features. It describes: SSL VPN Concentrator Status Active Users Event

More information

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Memory-to-memory session replication

Memory-to-memory session replication Memory-to-memory session replication IBM WebSphere Application Server V7 This presentation will cover memory-to-memory session replication in WebSphere Application Server V7. WASv7_MemorytoMemoryReplication.ppt

More information

How To Set Up An Intellicus Cluster And Load Balancing On Ubuntu 8.1.2.2 (Windows) With A Cluster And Report Server (Windows And Ubuntu) On A Server (Amd64) On An Ubuntu Server

How To Set Up An Intellicus Cluster And Load Balancing On Ubuntu 8.1.2.2 (Windows) With A Cluster And Report Server (Windows And Ubuntu) On A Server (Amd64) On An Ubuntu Server Intellicus Cluster and Load Balancing (Windows) Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Copyright 2014 Intellicus Technologies This

More information

Growing Insurance Leads: The Future of Tracking, Measuring, and Analyzing Your Lead Spend

Growing Insurance Leads: The Future of Tracking, Measuring, and Analyzing Your Lead Spend !! Wifi Access Code: leadspedia Follow Us: #leadscon!! TUESDAY, 2:00 2:40 PM!! Growing Insurance Leads: The Future of Tracking, Measuring, and Analyzing Your Lead Spend MODERATOR: Ian Smith, VP of Operations,

More information

Ron Shaham. Expert Witness in Islamic Courts : Medicine and Crafts in the Service of Law. : University of Chicago Press,. p 38

Ron Shaham. Expert Witness in Islamic Courts : Medicine and Crafts in the Service of Law. : University of Chicago Press,. p 38 : University of Chicago Press,. p 38 http://site.ebrary.com/id/10381149?ppg=38 : University of Chicago Press,. p 39 http://site.ebrary.com/id/10381149?ppg=39 : University of Chicago Press,. p 40 http://site.ebrary.com/id/10381149?ppg=40

More information

. Perspectives on the Economics of Aging. : University of Chicago Press,. p 3 http://site.ebrary.com/id/10209979?ppg=3 Copyright University of

. Perspectives on the Economics of Aging. : University of Chicago Press,. p 3 http://site.ebrary.com/id/10209979?ppg=3 Copyright University of : University of Chicago Press,. p 3 http://site.ebrary.com/id/10209979?ppg=3 : University of Chicago Press,. p 4 http://site.ebrary.com/id/10209979?ppg=4 : University of Chicago Press,. p 297 http://site.ebrary.com/id/10209979?ppg=297

More information

May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law.

May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. : University of Chicago Press,. p 24 http://site.ebrary.com/id/10292358?ppg=24 : University of Chicago Press,. p 25 http://site.ebrary.com/id/10292358?ppg=25 : University of Chicago Press,. p 26 http://site.ebrary.com/id/10292358?ppg=26

More information

VMware vcenter Operations Manager Administration Guide

VMware vcenter Operations Manager Administration Guide VMware vcenter Operations Manager Administration Guide Custom User Interface vcenter Operations Manager 5.6 This document supports the version of each product listed and supports all subsequent versions

More information

What s new in ProactiveWatch 2.1!

What s new in ProactiveWatch 2.1! What s new in ProactiveWatch 2.1! 1. ProactiveWatch 2.1 brings tighter integration with the RemoteCommand (FreeMyIT) system, providing new Task Manager -like features available from Manage Computers, including

More information

Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.

Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill. ORACLE Oracle Press Oracle Fusion Middleware 11 g Architecture and Management Reza Shafii Stephen Lee Gangadhar Konduri Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan

More information

The Internet of Things

The Internet of Things The Internet of Things Lucus Darnell Chief Innovation Evangelist @ T I B C O # D i g i t a l D i ff e r e n c e Everything is connected! Three Key Takeaways #1: The Internet of Things is exploding! #2:

More information

globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory

globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory Types of integration Resource integration Connect campus, project,

More information

Solu)on for Call Center

Solu)on for Call Center Secure Online Desktop & Gruppo Tecnocontrol present Powered by S.O.D. Solu)on for Call Center www.secure- od.com info@secure- od.com www.gruppotecnocontrol.com info@gruppotecnocontrol.com The content of

More information

Symantec VIP and Intel IPT Tecnologia e sicurezza on the cloud

Symantec VIP and Intel IPT Tecnologia e sicurezza on the cloud Symantec VIP and Intel IPT Tecnologia e sicurezza on the cloud Gianluca Busco Arré Sales Security Specialist Iden.ty and Informa.on Protec.on mobile: +39 (348) 9379915 email: gianluca_busco@symantec.com

More information

A Brief Overview. Delivering Windows Azure Services on Windows Server. Enabling Service Providers

A Brief Overview. Delivering Windows Azure Services on Windows Server. Enabling Service Providers A Brief Overview Enabling Service Providers Chris Van Wesep Cloud OS Product MKTG Manager Microsoft Corp. Delivering Windows Azure Services on Windows Server Challenges and needs Overview of Cloud OS Architecture

More information

Big Data : The New Oil

Big Data : The New Oil Big Data : The New Oil Data Driven Innova7on: $ 15 billion by 2015 Data Driven Innova,on for Growth and Well Being: OECD Report: Interim Synthesis Report 2014 The new data- driven era of scien7fic discovery

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Uila SaaS Installation Guide

Uila SaaS Installation Guide USER GUIDE Uila SaaS Installation Guide January 2016 Version 1.8.1 Company Information Uila, Inc. 2905 Stender Way, Suite 76E Santa Clara, CA 95054 USER GUIDE Copyright Uila, Inc., 2014, 15. All rights

More information

Mobile Access Software Blade

Mobile Access Software Blade Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.

More information

Portal In Anger. Ray Ploski Team Lead - Solutions Architecture, JBoss by Red Hat June 22, 2010

Portal In Anger. Ray Ploski Team Lead - Solutions Architecture, JBoss by Red Hat June 22, 2010 1 Portal In Anger Ray Ploski Team Lead - Solutions Architecture, JBoss by Red Hat June 22, 2010 Agenda: Location of Atlantis Video of Big Foot Guided tour of Area 52 Meaning of Life Slight Change of Plans

More information

FileCruiser. User Portal Guide

FileCruiser. User Portal Guide FileCruiser User Portal Guide FileCruiser Product Manual Contents Contents Getting Started with FileCruiser 1 Using the FileCruiser Agent 2 Desktop Shortcut 2 Log in to FileCruiser Agent 3 Using the FileCruiser

More information

Sophos Mobile Control Super administrator guide. Product version: 3

Sophos Mobile Control Super administrator guide. Product version: 3 Sophos Mobile Control Super administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5

More information

1. Server 2008 - Microsoft FEP 2010 - Instalation

1. Server 2008 - Microsoft FEP 2010 - Instalation 1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements

More information

Securing the Database Stack

Securing the Database Stack Technical Brief Securing the Database Stack How ScaleArc Benefits the Security Team Introduction Relational databases store some of the world s most valuable information, including financial transactions,

More information

Genera&ng Value from Big Data in the Internet of Things

Genera&ng Value from Big Data in the Internet of Things Genera&ng Value from Big Data in the Internet of Things THT10421 Cheng Kian Khor Global Industry Solu&on Leader - IoT/M2M for CSPs Communica&ons & Media Industry Solu&ons Group September 30, 2014 Safe

More information

An Intelligent Parking Guidance and Information System by using image processing technique

An Intelligent Parking Guidance and Information System by using image processing technique An Intelligent Parking Guidance and Information System by using image processing technique P.DharmaReddy 1, A. RajeshwarRao 2, Dr. Syed Musthak Ahmed 3 M. Tech Student, Embedded Systems, SR Engineering

More information

JAMF Software Server Installation Guide for Linux. Version 8.6

JAMF Software Server Installation Guide for Linux. Version 8.6 JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.

More information

TS03: Operational Excellence by Leveraging Internet of Things Technologies

TS03: Operational Excellence by Leveraging Internet of Things Technologies TS03: Operational Excellence by Leveraging Internet of Things Technologies Virendra Chaudhari- Industry Solutions Manufacturing- Microsoft Imtiaz Javeed Product Manager -Visualization & Information Software

More information

Oracle Internet Messaging - UM Option

Oracle Internet Messaging - UM Option Oracle Internet Messaging - UM Option Prepared by Oracle Business Development - NEMS Creation Date: Friday, July 17th, 1998 Last Updated: Friday, July 24th, 1998 Copyright (C) 1998 Oracle Corporation All

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

Efficient and multi-market embedded processing based on ARM : beyond architecture dilemma

Efficient and multi-market embedded processing based on ARM : beyond architecture dilemma Efficient and multi-market embedded processing based on ARM : beyond architecture dilemma Arnaud Van den Bossche, i.mx Business Development Manager J u n e 2 0 1 4 External Use Agenda New Time, New Market,

More information

Google Docs Print. Administrator's Guide

Google Docs Print. Administrator's Guide Google Docs Print Administrator's Guide October 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Google Docs...4 Acquiring a Google account...4 Customizing the application icon...4 Configuring

More information

Does your Infrastructure Zone Match Your Application Workload? Aaron Delp (@aarondelp), Cloud Solutions Architect, SolidFire

Does your Infrastructure Zone Match Your Application Workload? Aaron Delp (@aarondelp), Cloud Solutions Architect, SolidFire Does your Infrastructure Zone Match Your Application Workload? Aaron Delp (@aarondelp), Cloud Solutions Architect, SolidFire Expectations / Agenda Cloud Market Overview Dual Workloads Demo Cloud Market

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Design for Success: Designing for the Internet of Things with TiWiConnect

Design for Success: Designing for the Internet of Things with TiWiConnect Design for Success: Designing for the Internet of Things with TiWiConnect Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com Today s Agenda Why

More information

Copyright 2013 wolfssl Inc. All rights reserved. 2

Copyright 2013 wolfssl Inc. All rights reserved. 2 - - Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 3 Copyright 2013 wolfssl Inc. All rights reserved.

More information

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7 DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Scaling Big Data Mining Infrastructure: The Smart Protection Network Experience

Scaling Big Data Mining Infrastructure: The Smart Protection Network Experience Scaling Big Data Mining Infrastructure: The Smart Protection Network Experience 黃 振 修 (Chris Huang) SPN 主 動 式 雲 端 截 毒 技 術 架 構 師 About Me SPN 主 動 式 雲 端 截 毒 技 術 架 構 師 SPN Hadoop 基 礎 運 算 架 構 師 Hadoop in Taiwan

More information