Problem Statement. Jonathan Huang Aditya Devarakonda. Overview

Size: px
Start display at page:

Download "Problem Statement. Jonathan Huang Aditya Devarakonda. Overview"

Transcription

1 Jonathan Huang Aditya Devarakonda Problem Statement Overview Automated job schedulers have been extensively studied and implemented in large clusters and supercomputers. However, many of these clusters do not provide detailed utilization information which users can take advantage of. For example, users working to meet deadlines can utilize the cluster monitoring to make appropriate decisions regarding application deployment. Using a web-based interface will allow users easy access to the cluster monitoring system and job scheduler. One advantage of using the web, is that it provides systems administrators to customize the access privileges for individual users or groups of users. Another consequence of implementing both monitoring and scheduling is the ability to generate prediction models. The models would enable the system to react effectively to jobs currently running and the current cluster utilization. Customers We anticipate that this system would be appealing to anyone who intends to implement a job scheduling system for their clusters and supercomputers. In general, we believe that this High Performance Computing community can benefit the most with this system. This work can, in the future, be scaled-down for administrators managing smaller clusters. Goals Primarily we would like to provide a system which combines job scheduling and cluster monitoring using a web-based interface. This interface can be made accessible over the Internet so that users can monitor the clusters from anywhere. By combining monitoring and scheduling we can take advantage of detailed utilization information and attempt to map jobs to machines efficiently using prediction models - which are generated from the utilization information. Deliverables This project will be implemented in three phases. The first phase will be dedicated to developing the framework of the front and back end portions of the system. The web interface as well as the cluster logging will be implemented. Users will be able to view log files as well as graphs of the data. Individual pieces of work will be allocated to each member to work on due to the size of this phase. During the second phase, the job submission module and preliminary prediction models will be added. Also the interface will be updated for multiple users. Each user will have access to specific content and machines. Users will be able to submit jobs and retrieve the results as well as view expected future utilization generated by the prediction module. In the last phase, the final implementation of prediction models will be implemented. All remaining performance and ease of use improvements will be made. Schedule

2 Date Deliverable 3/30 Main framework of the front and back end 4/13 Multi user system, job submission module and utilization prediction model 5/04 Final version of prediction model and remaining performance and interface improvements. System Functions Evident The front-end will handle all user requests to submit jobs to the cluster and provide cluster utilization information to the user. Coupled with this functionality is the authentication and security protocols which separate one user from another. The back-end is effectively hidden from the user in that they cannot directly look at the application execution. However, the results from each job are available to users hence the application execution is evident at an abstracted level. Hidden The movement of data from front-end to back-end (for cluster setup and application execution) is hidden from the user. Similarly the job scheduler and the prediction models being used are also hidden from the user. The entire back-end is hidden from users accessing the front-end. More specifically, the cluster utilization data collection, application runtime monitoring and transfer of application results/ outputs are also hidden from user. Effectively the users submit their job for execution, monitor the cluster utilization through the front-end and receive results once execution has completed. Although the users can see the utilization information, they cannot see the mechanisms used to collect the information nor alter them. Frill The real-time cluster utilization graphs can allow users to filter information based on their requirements. The capability of filtering results and allowing users to customize the graphs does not change the functionality of the system but provides better usability. A mobile interface would extend the availability such that anyone would be able to access the services provided even when they are roaming and have only a mobile device available. System Attributes

3 Front-End The job scheduler on the front end must be able to access cluster utilization information and implement scheduling algorithms which attempt to produce optimal resource to application mapping. Generating an optimal mapping acts as a constraint for the job scheduler in the sense that any mapping which would delay application execution and degrade cluster performance must be avoided. The prediction model we intend to implement must improve the performance of the cluster and aid the job scheduler in making better decisions regarding resource allocation. In the case, the main constraint for the prediction model is that it must improve upon the job scheduler. Otherwise, utilizing the prediction model would be costly and unnecessary if it does not improve performance. Back-End The cluster information being collected on the back-end is essential to being able to provide utilization graphs and the prediction model. As a result, the collection system must collect data frequently enough to provide enough information but avoid collecting so much information that it disrupts application execution and steals too many processor cycles. Once again, this becomes an optimization problem between collecting enough data and interfering with running jobs.

4 Data Dictionary Document User - By user we mean any person who would use and benefit from this system. For example, application developers, application users and systems administrators can be users of this system. Job Scheduler - This is a sub-system which attempts to optimize the resource provisioning for each job. It implements algorithms which do the optimization by using the cluster utilization information. Prediction Model - This is a sub-system which takes advantage of the cluster information being collected and implements algorithms to use this information to predict future load and latency of the cluster. Cluster - Any set of resources used for computation (desktop computer, datacenters (virtualized and non-virtualized), supercomputers, etc.). Data - This defines the set of information being collected on the back-end. For example we will be collecting Temperature, CPU Utilization and Network Latency. Metadata - This is a collection of requirements specified by the user when submitting a job. This includes information such as expected running time and application profile (CPU-intensive, network intensive).

5 Use Case Diagram

6 Use Case Specifications Log In UCATS001 Description: User accesses the webpage and enters login credentials (username and password) Purpose - This use case is an important part of providing security guarantees when using the scheduling and monitoring features. This also ensures that users are accountable and allows systems administrators to customize resource access to individual users or groups of users. Related Use Cases: View Data and Submit Job Primary Actor: User (Person). Secondary Actor: None. Technical Requirements: Valid username and password, a web browser. Pre-Condition: None. Main Course: 1. The user accesses the website and enters his/her login credentials. 2. The login information is forwarded to the authentication system. 3. The authentication system verifies the username and password. 4. The authentication system returns with success or failure. 5. The user is subsequently forwarded to the welcome page and can use the services. Post-Conditions: The user will have access to their appropriate services. Alternative Course: 1. Username and password cannot be verified and the system will display Issues: 1. Authentication errors must be handled appropriately. Assumptions: 1. The user has entered his/her username or password incorrectly and must be given a retry period. Design Comments: 1. Make the username and password form easily viewable and accessible to the user.

7 View Graph UCATS002 Description : User queries web interface for a graph of defined data. The database returns the appropriate data range, graph code is generated by the back-end and returned to the user s browser. Purpose : This Use Case illustrates the primary data display module available to the user. Related Use Cases : UCATS001 Primary Actor(s) : User(Man) Secondary Actor(s) : Cluster(Machine) Technical Requirements : Browser capable of generating graphs Pre-condition : User must have a valid login to the system. Database must have collected data available. Main Course : 1. User queries web interface for data through the View Graph function. 2. The front-end queries the back-end through the Collect Data function. 3. The back-end sends a request to the database for the appropriate data. 4. When the data is returned, the Graph code is generated from the Create Graph function and returned to the user. Alternate Course : 1. User queries web interface for data through the View Graph function. 2. The front-end queries the back-end through the Collect Data function. 3. The back-end sends a request to the database for the appropriate data. 4. Data is not available, no graph is generated and an error is returned to the user. Issues : 1. Appropriate error checking data values and date ranges. Assumptions : Design Comments : Change Log : 3/2 - First draft implemented.

8 View Prediction UCATS003 Description : User queries web interface for data of a future date range. The database returns data from the range, predicted values are calculated by the back-end and returned to the user s browser. Purpose : This Use Case shows the flow of data required for the prediction modeling. Related Use Cases : UCATS001, UCATS002 Primary Actor(s) : User(Man) Secondary Actor(s) : Cluster(Machine) Technical Requirements : None Pre-condition : User must have a valid login to the system. Database must have collected data available. Main Course : 1. User queries web interface for data through the View Prediction function. 2. The front-end queries the back-end through the Collect Data function. 3. The back-end sends a request to the database for the appropriate data. 4. When the data is returned, the prediction is generated from the Create Prediction function and returned to the user. Alternate Course : 1. User queries web interface for data through the View Prediction function. 2. The front-end queries the back-end through the Collect Data function. 3. The back-end sends a request to the database for the appropriate data. 4. Data is not available, no prediction is generated and an error is returned to the user. Issues : 1. Appropriate error checking data values and date ranges. 2. Insufficient data to perform Create Prediction. Assumptions : Design Comments : Change Log : 3/2 - First draft implemented.

9 Submit Job UCATS004 Description: User submits his/her application to be scheduled for execution using the job submission page. User provides Metdata for their application along with the application. Purpose: This use case is an essential component to submitting jobs for execution and provides an interface for users to submit them. Related Use Case: None Primary Actor: User Secondary Actor: None. Technical Requirements: a web browser. Pre-Condition: Must have a valid login. Main Course: 1. The user uploads their application binary. 2. The user fills out the Metadata form and provides information about application profile and estimated running time. 3. The Metadata is converted into a file used by the job scheduler to queue the job. 4. The application is subsequently scheduled, mapped to resources and executed. 5. After the application completes the user is notified of the job completion. 6. The results from the job are made available to the user. Alternate Course: 1. The user does not fill out the Metadata form. 2. A generic Metadata file is generated and forwarded to the job scheduler. 3. The job is scheduled, mapped and executed. 4. After the application completes the user is notified of the job completion. 5. The results from the job are made available to the user. Issues: Assumptions : Design Comments : Change Log : 3/2 - First draft implemented.

10 Job Scheduler UCATS005 Description: The job scheduler receives the applications and Metadata from the Front-end and schedules the application based on cluster utilization and the application s Metadata. Purpose: This use case is an essential module which allows users to submit their application, optimize the mapping and execute the application. Related Use Case: UCATS004 Primary Actor: Cluster Secondary Actor: None Technical Requirements: None Pre-Condition: A job has been submitted and needs to be scheduled. Main Course - 1. The Job Scheduler receives an application and Metadata. 2. The scheduler runs the scheduling algorithm using the Metadata. 3. The scheduler generates a mapping to resources and queues the application. 4. The application is moved to the execution environment. 5. The application is executed. 6. The application is monitored until termination. 7. The output files generated by the application are returned to the user. Alternate Course - 1. The scheduler cannot successfully schedule due to an error. 2. It generates an error log and forwards it to the user. 3. The user can evaluate the error log. Issues : 1. Designing an appropriate scheduling algorithm. Assumptions : Design Comments : 1. The algorithm must be optimal in its resource allocation and application to resource mapping. Change Log : 3/2 - First draft implemented.

11 Collect Data UCATS006 Description : Cluster is periodically queried by the system in order to pull log data. This data is saved into the database for future use. Purpose : This Use Case highlights the back-end interactions between the system and the cluster. Related Use Cases : UCATS001, UCATS002 Primary Actor(s) : Cluster(Machine) Secondary Actor(s) : None Technical Requirements : None Pre-condition : None Main Course : 1. System accesses the cluster machines at a periodic rate with the Collect Data function. 2. The cluster machines will return the requested log files. 3. These logs are parsed by the back-end via the Process Data function and sent to the database. Alternate Course : 1. System accesses the cluster machines at a periodic rate with the Collect Data function. 2. One of the machines fails to respond within the time-out period allocated. 3. No data is inputted for that machine in the database while all the other collected data is inputted. Issues : 1. Appropriate error checking data values. 2. Assigning reasonable time-out periods for data collection. Assumptions : Design Comments : Change Log : 3/2 - First draft implemented.

CS 3610: Software Engineering. Summer 2013. Software Requirements Specification Document. Project Title: Road Repair Tracking System

CS 3610: Software Engineering. Summer 2013. Software Requirements Specification Document. Project Title: Road Repair Tracking System CS 3610: Software Engineering Summer 2013 Software Requirements Specification Document Project Title: Road Repair Tracking System Team 7 Ryan Wooten Chris Wyland Due Date Tuesday 06/04/2013 Table of Contents

More information

Scyld Cloud Manager User Guide

Scyld Cloud Manager User Guide Scyld Cloud Manager User Guide Preface This guide describes how to use the Scyld Cloud Manager (SCM) web portal application. Contacting Penguin Computing 45800 Northport Loop West Fremont, CA 94538 1-888-PENGUIN

More information

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997

Swirl. Multiplayer Gaming Simplified. CS4512 Systems Analysis and Design. Assignment 1 2010. Marque Browne 0814547. Manuel Honegger - 0837997 1 Swirl Multiplayer Gaming Simplified CS4512 Systems Analysis and Design Assignment 1 2010 Marque Browne 0814547 Manuel Honegger - 0837997 Kieran O' Brien 0866946 2 BLANK MARKING SCHEME 3 TABLE OF CONTENTS

More information

<Company Name> ugather Event Management System Software Requirements Specification. Version 1.0

<Company Name> ugather Event Management System Software Requirements Specification. Version 1.0 ugather Event Management System Version 1.0 Revision History Date Version Description Author 18/Feb/09 1.0 Initial creation of SRS document Confidential Page 2 Table of Contents 1. Introduction

More information

User Guide for Archie and Review Manager 5. The Cochrane Airways Group

User Guide for Archie and Review Manager 5. The Cochrane Airways Group User Guide for Archie and Review Manager 5 The Cochrane Airways Group 1 Contents Introduction to User Guide... 3 Preliminary details... 4 Managing your contact details... 5 Principles of Review Manager

More information

High Level Design Distributed Network Traffic Controller

High Level Design Distributed Network Traffic Controller High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction

More information

Software Requirement Specification For Flea Market System

Software Requirement Specification For Flea Market System Software Requirement Specification For Flea Market System By Ilya Verlinsky, Alexander Sarkisyan, Ambartsum Keshishyan, Igor Gleyser, Andrey Ishuninov 1 INTRODUCTION 1.1 Purpose 1.1.1 Purpose of SRS document

More information

Banner Web Time Entry STUDENT Web Timekeeping Manual

Banner Web Time Entry STUDENT Web Timekeeping Manual Banner Web Time Entry STUDENT Web Timekeeping Manual Introduction Web Time Entry (WTE) is a web-based time recording system designed to improve accuracy and eliminate loss or delays in processing paper

More information

How To Set Up Chime For A Coworker On Windows 7.1.2 (Windows) With A Windows 7 (Windows 7) On A Windows 8.1 (Windows 8) With An Ipad (Windows).Net (Windows Xp

How To Set Up Chime For A Coworker On Windows 7.1.2 (Windows) With A Windows 7 (Windows 7) On A Windows 8.1 (Windows 8) With An Ipad (Windows).Net (Windows Xp INSTALLATION GUIDE July 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may

More information

Harmonized Use Case for Electronic Health Records (Laboratory Result Reporting) March 19, 2006

Harmonized Use Case for Electronic Health Records (Laboratory Result Reporting) March 19, 2006 Harmonized Use Case for Electronic Health Records (Laboratory Result Reporting) March 19, 2006 Office of the National Coordinator for Health Information Technology (ONC) Table of Contents American Health

More information

TtEDSC Digital Media Repository V 2.0 Documentation

TtEDSC Digital Media Repository V 2.0 Documentation Page 1 TtEDSC Digital Media Repository V 2.0 Documentation TECHNICAL DESCRIPTION... 2 Storage... 2 Code base... 2 Transcoding... 2 SCHOOL ADMINISTRATION... 2 Getting started - Setting up School Administration...

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

BBFC Web Ratings Tool

BBFC Web Ratings Tool BBFC Web Ratings Tool V1.0 BBFC 18 th March 2015 1 BBFC Web Ratings Tool User Guide About the Web ratings tool The BBFC s free Web Ratings Tool has been designed for use by distributors to ensure that

More information

Software Requirement Specification for Web Based Integrated Development Environment. DEVCLOUD Web Based Integrated Development Environment.

Software Requirement Specification for Web Based Integrated Development Environment. DEVCLOUD Web Based Integrated Development Environment. Software Requirement Specification for Web Based Integrated Development Environment DEVCLOUD Web Based Integrated Development Environment TinTin Alican Güçlükol Anıl Paçacı Meriç Taze Serbay Arslanhan

More information

Tabit. University of Arkansas CSCE Department Capstone I Final Proposal Fall 2014. Martin Bruckner, Brandon Foster, Nicolas Nunez, Adrian Ordorica

Tabit. University of Arkansas CSCE Department Capstone I Final Proposal Fall 2014. Martin Bruckner, Brandon Foster, Nicolas Nunez, Adrian Ordorica University of Arkansas CSCE Department Capstone I Final Proposal Fall 2014 Tabit Martin Bruckner, Brandon Foster, Nicolas Nunez, Adrian Ordorica Abstract The goal of the project is to create business management

More information

Online Help StruxureWare Data Center Expert

Online Help StruxureWare Data Center Expert Online Help StruxureWare Data Center Expert Version 7.2.1 What's New in StruxureWare Data Center Expert 7.2.x Learn more about the new features available in the StruxureWare Data Center Expert 7.2.x release.

More information

How to login with the RSA Token?

How to login with the RSA Token? How to login with the RSA Token? How does the RSA Token work? To log on to your online trading account, you need to enter your existing username and password as usual, followed by the unique security code

More information

IMS Software Requirement Specification

IMS Software Requirement Specification IMS Software Requirement Specification GRUPPE 3 Alexandrow Paul Fruhwirth Clemens Gombotz Robert Jelinek Alexander

More information

Software Requirements Specification

Software Requirements Specification METU DEPARTMENT OF COMPUTER ENGINEERING Software Requirements Specification SNMP Agent & Network Simulator Mustafa İlhan Osman Tahsin Berktaş Mehmet Elgin Akpınar 05.12.2010 Table of Contents 1. Introduction...

More information

This Deployment Guide is intended for administrators in charge of planning, implementing and

This Deployment Guide is intended for administrators in charge of planning, implementing and YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Enterprise Edition Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining the deployment

More information

Last Updated: July 2011. STATISTICA Enterprise Server Security

Last Updated: July 2011. STATISTICA Enterprise Server Security Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...

More information

TIBCO Spotfire Platform IT Brief

TIBCO Spotfire Platform IT Brief Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily

More information

Online Payroll Remittance Manual for Employers

Online Payroll Remittance Manual for Employers Online Payroll Remittance Manual for Employers Before you start using the online payroll website Fraud Filter and Bank Changes Depending on your bank s ACH fraud filtering mechanisms you may need to identify

More information

The deployment of OHMS TM. in private cloud

The deployment of OHMS TM. in private cloud Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere

More information

Fax User Guide 07/31/2014 USER GUIDE

Fax User Guide 07/31/2014 USER GUIDE Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section

More information

Priority: Medium Channel to Actor: Graphical User Interface (GUI) Usage Frequency: Weekly Secondary Actors: Database, Brisk Application

Priority: Medium Channel to Actor: Graphical User Interface (GUI) Usage Frequency: Weekly Secondary Actors: Database, Brisk Application University of Arkansas CSCE Department Capstone I Preliminary Report Spring 2015 Abstract Brisk - Intelligent Time Management Riley Turben, Daniel Pumford, Eric Hall, Ryan McAlister Managing teams of people

More information

Social Media in the Process Automation Industry

Social Media in the Process Automation Industry Social Media in the Process Automation Industry Distributed Software Development Design Document Version 0.1 In co-operation with: Title: Social Media in the Process Automation Industry Product name: ABBConnect

More information

Software Requirements Specification

Software Requirements Specification CSL740 Software Engineering Course, IIT Delhi Software Requirements Specification Submitted By Abhishek Srivastava (2011EEY7511) Anil Kumar (2009CS10180) Jagjeet Singh Dhaliwal (2008CS50212) Ierum Shanaya

More information

International Journal of Engineering Technology, Management and Applied Sciences. www.ijetmas.com November 2014, Volume 2 Issue 6, ISSN 2349-4476

International Journal of Engineering Technology, Management and Applied Sciences. www.ijetmas.com November 2014, Volume 2 Issue 6, ISSN 2349-4476 ERP SYSYTEM Nitika Jain 1 Niriksha 2 1 Student, RKGITW 2 Student, RKGITW Uttar Pradesh Tech. University Uttar Pradesh Tech. University Ghaziabad, U.P., India Ghaziabad, U.P., India ABSTRACT Student ERP

More information

Instant Chime for IBM Sametime For IBM Websphere and IBM DB2 Installation Guide

Instant Chime for IBM Sametime For IBM Websphere and IBM DB2 Installation Guide Instant Chime for IBM Sametime For IBM Websphere and IBM DB2 Installation Guide Fall 2014 Page 1 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license

More information

Redpaper Axel Buecker Kenny Chow Jenny Wong

Redpaper Axel Buecker Kenny Chow Jenny Wong Redpaper Axel Buecker Kenny Chow Jenny Wong A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On Introduction IBM Security Access Manager for Enterprise Single

More information

PAN 2013 User Guide for the Virtual Machines

PAN 2013 User Guide for the Virtual Machines PAN 2013 User Guide for the Virtual Machines 1 Welcome Welcome to the PAN 2013 evaluation lab. A novelty this year is that PAN switches from the submission of runs (say, the output of a piece of software)

More information

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide This document covers steps to configure Citrix VDI on Juniper Network s SA Series SSL VPN platforms. It also covers brief overview of

More information

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9) Nessus Enterprise Cloud User Guide October 2, 2014 (Revision 9) Table of Contents Introduction... 3 Nessus Enterprise Cloud... 3 Subscription and Activation... 3 Multi Scanner Support... 4 Customer Scanning

More information

Getting Started with HC Exchange Module

Getting Started with HC Exchange Module Getting Started with HC Exchange Module HOSTING CONTROLLER WWW.HOSTINGCONROLLER.COM HOSTING CONTROLLER Contents Introduction...1 Minimum System Requirements for Exchange 2013...1 Hardware Requirements...1

More information

Desktop and Professional Editions

Desktop and Professional Editions YOUR AUTOMATED EMPLOYEE Foxtrot Deployment Guide Desktop and Professional Editions Introduction This Deployment Guide is intended for administrators in charge of planning, implementing and maintaining

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...

Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts... Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...

More information

Skybot Scheduler Release Notes

Skybot Scheduler Release Notes Skybot Scheduler Release Notes The following is a list of new features and enhancements included in each release of Skybot Scheduler. Skybot Scheduler 3.3 Oracle interface The new Skybot Scheduler Oracle

More information

GARDEN STATE APARTMENTS LLC. CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM (FINAL MILESTONE)

GARDEN STATE APARTMENTS LLC. CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM (FINAL MILESTONE) GARDEN STATE APARTMENTS LLC. CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM (FINAL MILESTONE) GROUP #7: James Edward Bell Mark Dudek Michael DiCroce Curtis Hammell December 13, 2013 1 Table of Contents SECTION

More information

Best Practices: Extending Enterprise Applications to Mobile Devices

Best Practices: Extending Enterprise Applications to Mobile Devices Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations

More information

Enhancing Document Review Efficiency with OmniX

Enhancing Document Review Efficiency with OmniX Xerox Litigation Services OmniX Platform Review Technical Brief Enhancing Document Review Efficiency with OmniX Xerox Litigation Services delivers a flexible suite of end-to-end technology-driven services,

More information

Virtual Contact Center

Virtual Contact Center Virtual Contact Center MS Dynamics CRM Integration Configuration Guide Version 7.0 Revision 1.0 Copyright 2012, 8x8, Inc. All rights reserved. This document is provided for information purposes only and

More information

PAN Virtual Machine User Guide for Software Submissions

PAN Virtual Machine User Guide for Software Submissions PAN Virtual Machine User Guide for Software Submissions 1 Welcome Welcome to the PAN evaluation lab. PAN ist the first lab to switch from the submission of runs (say, the output of a piece of software)

More information

Preventing credit card numbers from escaping your network

Preventing credit card numbers from escaping your network Preventing credit card numbers from escaping your network The following recipe describes how to configure your FortiGate to use DLP (Data Loss Prevention) so that credit card numbers cannot be sent out

More information

Realfax Service User Manual Version 4

Realfax Service User Manual Version 4 Realfax Service User Manual Version 4 COMMUNICATE FROM EVERYWHERE TO EVERYWHERE Table of Contents Features and Benefits... 1 Using the Service... 2 How Realfax works... 2 Sending Faxes... 2 Receiving Faxes...

More information

CSc 230 Software System Engineering FINAL REPORT. Project Management System. Prof.: Doan Nguyen. Submitted By: Parita Shah Ajinkya Ladkhedkar

CSc 230 Software System Engineering FINAL REPORT. Project Management System. Prof.: Doan Nguyen. Submitted By: Parita Shah Ajinkya Ladkhedkar CSc 230 Software System Engineering FINAL REPORT Project Management System Prof.: Doan Nguyen Submitted By: Parita Shah Ajinkya Ladkhedkar Spring 2015 1 Table of Content Title Page No 1. Customer Statement

More information

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016 Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

SCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0

SCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0 SCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0 OCTOBER 28, 2001 REVISION CHART Version Primary Author(s) Description of Version Date Completed Draft Johnny

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

A Monitored Student Testing Application Using Cloud Computing

A Monitored Student Testing Application Using Cloud Computing A Monitored Student Testing Application Using Cloud Computing R. Mullapudi and G. Hsieh Department of Computer Science, Norfolk State University, Norfolk, Virginia, USA r.mullapudi@spartans.nsu.edu, ghsieh@nsu.edu

More information

I. ECAS Account Initialization

I. ECAS Account Initialization NEW ECAS AUTHENTICATION METHOD Summary As of mid-october, a new authentication system, known as ECAS (European Commission Authentication Service), will be used to register to the Erasmus for Young Entrepreneurs

More information

RFG Secure FTP. Web Interface

RFG Secure FTP. Web Interface RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken

More information

Software Architecture Document

Software Architecture Document Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

How to pull content from the PMP into Core Publisher

How to pull content from the PMP into Core Publisher How to pull content from the PMP into Core Publisher Below you will find step-by-step instructions on how to set up pulling or retrieving content from the Public Media Platform, or PMP, and publish it

More information

Dr. Pat Mirenda. Software Design Specification Document

Dr. Pat Mirenda. Software Design Specification Document CPSC 319 Team 2 Dr. Pat Mirenda Software Design Specification Document Version: 1.2 Date: (03/17/2006) 2Communicate SDS Revisions Version Primary Author(s) Description of Version Date Completed 1.0 Wei

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Driving force. What future software needs. Potential research topics

Driving force. What future software needs. Potential research topics Improving Software Robustness and Efficiency Driving force Processor core clock speed reach practical limit ~4GHz (power issue) Percentage of sustainable # of active transistors decrease; Increase in #

More information

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide Published July 2015 This document covers steps to configure Citrix VDI on Pulse Secure s SA Series SSL VPN platforms. It also covers brief

More information

Healthcare Documentation Fundamental and Practice Transcription Exercise Students Module Users Guide

Healthcare Documentation Fundamental and Practice Transcription Exercise Students Module Users Guide Healthcare Documentation Fundamental and Practice Transcription Exercise Students Module Users Guide Contents Introduction... 1 Overview... 1 Key Terms... 2 Installation... 4 Updates... 4 Getting Started...

More information

How To Use Syntheticys User Management On A Pc Or Mac Or Macbook Powerbook (For Mac) On A Computer Or Mac (For Pc Or Pc) On Your Computer Or Ipa (For Ipa) On An Pc Or Ipad

How To Use Syntheticys User Management On A Pc Or Mac Or Macbook Powerbook (For Mac) On A Computer Or Mac (For Pc Or Pc) On Your Computer Or Ipa (For Ipa) On An Pc Or Ipad SYNTHESYS MANAGEMENT User Management Synthesys.Net User Management 1 SYNTHESYS.NET USER MANAGEMENT INTRODUCTION...3 STARTING SYNTHESYS USER MANAGEMENT...4 Viewing User Details... 5 Locating individual

More information

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Software Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007

Software Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007 Software Requirements Specification for VODKA Version 1.1 Approved April 24, 2007 Prepared by: Archit Baweja, Drew Hall, Sunny Huynh, Kevin Lynch, and Kanwarpreet Sethi Drexel University Revision History

More information

Q: What browsers will be supported? A: Internet Explorer (from version 6), Firefox (from version 3.0), Safari, Chrome

Q: What browsers will be supported? A: Internet Explorer (from version 6), Firefox (from version 3.0), Safari, Chrome CCV Renewal FAQ General Q: Why is the CCV building a new application? A: The current application was built in 2002, using the latest web technology available at that time. Over the last ten years the number

More information

Configuring WMI Performance Monitors

Configuring WMI Performance Monitors Configuring WMI Performance Monitors With WMI, WhatsUp Gold Premium Edition monitors and sends alerts based on performance counters that are reported from Microsoft Windows devices. The data collected

More information

Database Management Systems [COP5725] Project Deliverable 2. SaferDC. Submitted By: Group 1

Database Management Systems [COP5725] Project Deliverable 2. SaferDC. Submitted By: Group 1 Database Management Systems [COP5725] Project Deliverable 2 SaferDC Submitted By: Group 1 Armando Leon [UF ID: 43568722] Nitin Agrahara [UF ID: 73714398] Neeraj Rao [UF ID: 37737151] Rahul Bhoopalam [UF

More information

Using MailStore to Archive MDaemon Email

Using MailStore to Archive MDaemon Email Using MailStore to Archive MDaemon Email This guide details how to archive all inbound and outbound email using MailStore, as well as archiving any emails currently found in the users accounts in MDaemon.

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

CRM Quick Reference Guide

CRM Quick Reference Guide CRM Quick Reference Guide AMS Distributor Customers 2013 Internet Pipeline, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Remark FTP Utility. For Remark Office OMR. User s Guide

Remark FTP Utility. For Remark Office OMR. User s Guide Remark FTP Utility For Remark Office OMR User s Guide Remark Products Group 301 Lindenwood Drive, Suite 100 Malvern, PA 19355-1772 USA www.gravic.com Disclaimer The information contained in this document

More information

How To Test For Elulla

How To Test For Elulla EQUELLA Whitepaper Performance Testing Carl Hoffmann Senior Technical Consultant Contents 1 EQUELLA Performance Testing 3 1.1 Introduction 3 1.2 Overview of performance testing 3 2 Why do performance testing?

More information

EDI Support Services

EDI Support Services EDI Support Services Iowa Medicaid Web Portal The web portal uses the Internet to transport transactions for the Iowa Medicaid line of business only. The web portal provides access to submit and receive

More information

KM Embedded. Configuration Guide. AIT Ltd 2 Hawthorn Park Coal Road Leeds LS14 1PQ UK

KM Embedded. Configuration Guide. AIT Ltd 2 Hawthorn Park Coal Road Leeds LS14 1PQ UK KM Embedded Configuration Guide AIT Ltd 2 Hawthorn Park Coal Road Leeds LS14 1PQ UK T: 0113 2730300 F: 0113 2730302 E: info@altman.co.uk W: www.altman.co.uk Table of Contents Table of Contents... 2 Requirements...

More information

1. On the Careers page, click on the "Click here to Register" link. You will then be taken to the Register page.

1. On the Careers page, click on the Click here to Register link. You will then be taken to the Register page. Recommended Browsers for the recruiting system: Internet Explorer 7, 8, or 9 on Microsoft Windows Firefox 3.x on Microsoft Windows, UNIX, Linux, and Mac OSX Apple Safari 3.6 on Mac OS X Document Resources

More information

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11

IaaS Federation. Contrail project. IaaS Federation! Objectives and Challenges! & SLA management in Federations 5/23/11 Cloud Computing (IV) s and SPD Course 19-20/05/2011 Massimo Coppola IaaS! Objectives and Challenges! & management in s Adapted from two presentations! by Massimo Coppola (CNR) and Lorenzo Blasi (HP) Italy)!

More information

Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015

Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015 Software Requirements Specification. for Day Health Manager Version 1.1 Prepared by 4yourhealth Senior Project 2015 2/10/2015 Table of Contents Table of Contents Revision History Introduction Purpose Document

More information

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R

More information

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved

Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a

More information

VERALAB LDAP Configuration Guide

VERALAB LDAP Configuration Guide VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

PROJECT MANAGEMENT SYSTEM

PROJECT MANAGEMENT SYSTEM Requirement Analysis Document v.2 14.12.2009 CENG-401 SOFTWARE ENGINEER PROJECT MANAGEMENT SYSTEM (Project Manager) Ahmet Edip SEÇKİN 07010555 (Developer) Erhan ŞEN 07010507 (Developer) Semih Serdar CENGİZOĞLU

More information

MAYO CLINIC JOB APPLICATION HELP

MAYO CLINIC JOB APPLICATION HELP MAYO CLINIC JOB APPLICATION HELP Table of contents Quick start External applicants... 3 Introduction...3 Job application summary...3 Step 1 Search... 4 Step 2 Register for the Talent Community... 5 Step

More information

ESMO ONLINE EVENT REGISTRATION INSTRUCTION REGISTER YOURSELF

ESMO ONLINE EVENT REGISTRATION INSTRUCTION REGISTER YOURSELF ESMO ONLINE EVENT REGISTRATION INSTRUCTION REGISTER YOURSELF INDEX Preliminary information Registration requirements... Page 2 Individual registration 1. Account with ESMO... Page 3 2. Login into your

More information

HelpSystems Web Server User Guide

HelpSystems Web Server User Guide HelpSystems Web Server User Guide Copyright Copyright HelpSystems, LLC. Robot is a division of HelpSystems. HelpSystems Web Server, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Microsoft Exchange Server 2007

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Microsoft Exchange Server 2007 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Microsoft Exchange Server 2007 Table of Contents Table of Contents Deploying F5 devices with Microsoft Exchange Server 2007 Client Access Servers Prerequisites

More information

Signiant Agent installation

Signiant Agent installation Signiant Agent installation Release 11.3.0 March 2015 ABSTRACT Guidelines to install the Signiant Agent software for the WCPApp. The following instructions are adapted from the Signiant original documentation

More information

How To Use The Rss Feeder On Firstclass (First Class) And First Class (Firstclass) For Free

How To Use The Rss Feeder On Firstclass (First Class) And First Class (Firstclass) For Free RSS Feeder - Administrator Guide for OpenText Social Workplace and FirstClass Werner de Jong, Senior Solutions Architect 8 July 2011 Abstract This document is an administrator s guide to the installation

More information

Nexio Connectus with Nexio G-Scribe

Nexio Connectus with Nexio G-Scribe Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and

More information

Application Performance Testing Basics

Application Performance Testing Basics Application Performance Testing Basics ABSTRACT Todays the web is playing a critical role in all the business domains such as entertainment, finance, healthcare etc. It is much important to ensure hassle-free

More information

Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance

Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance 3.1 Introduction This research has been conducted at back office of a medical billing company situated in a custom

More information

E-LEARNING STUDENT S MANUAL

E-LEARNING STUDENT S MANUAL E-LEARNING STUDENT S MANUAL By Williams College E-Learning is the College s Online Learning Environment, designed to enhance your learning experience by providing access to online course materials, activities,

More information

Index Data Security in Microsoft Windows Environments for X1 Enterprise Search Suite

Index Data Security in Microsoft Windows Environments for X1 Enterprise Search Suite Index Data Security in Microsoft Windows Environments for X1 Enterprise Search Suite X1 Technologies, Inc. 130 W. Union Street Pasadena, CA 91103 phone: 626.585.6900 fax: 626.535.2701 www.x1.com Contents

More information

Scheduling in SAS 9.4 Second Edition

Scheduling in SAS 9.4 Second Edition Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute

More information

DSI File Server Client Documentation

DSI File Server Client Documentation Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING

More information

Developing an On-Demand Web Report Platform Using Stored Processes and SAS Web Application Server

Developing an On-Demand Web Report Platform Using Stored Processes and SAS Web Application Server Paper 10740-2016 Developing an On-Demand Web Report Platform Using Stored Processes and SAS Web Application Server ABSTRACT Romain Miralles, Genomic Health. As SAS programmers, we often develop listings,

More information

Nelson Mandela Bay Waste Exchange User Manual

Nelson Mandela Bay Waste Exchange User Manual Nelson Mandela Bay Waste Exchange User Manual 1. Waste wanted and Waste available 2. Successful w aste exchanges 3. User Registration 4. User Login 5. Add a new listing 6. My listings 7. Update m y details

More information