INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

Size: px
Start display at page:

Download "INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)"

Transcription

1 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN (Print), ISSN (Print) ISSN (Online) Volume 5, Issue 9, September (2014), pp IAEME: Journal Impact Factor (2014): (Calculated by GISI) IJCET I A E M E JAVA REMOTE CONTROL FOR LABORATORY MONITORING Akshay Shinde 1, Akash Malbari 2, Manali Killedar 3 1, 2 (Technical Analyst, Nomura Services India Pvt. Ltd.,) 3 (Department of Information Technology, Ramrao Adik Institute of Technology) ABSTRACT The proposed system of Java Remote Control for Laboratory Monitoring is an optimized and automated software model that is used as a remote control for PC's connected as a Local Area Network. This software is used to control varied resources and processes running on the remote computer. The test implications of this technology suggest that a technology supporting remote control for computers connected over Local Area Network can add value for all its end users primarily serving the computer laboratory assistants and teachers. Keywords: Java Remote Control, RMI, Skeleton. 1. INTRODUCTION We have seen many places where we have local area network and lots of people using them as per their own need. In such scenarios we need to closely monitor the computers. Many a times we need to lock the resources such as computer drivers, folder or files from these computers to restrict the users from making use of them. Sometimes we need to stop the users from using the internet or from the changing the settings or accessing the registry editor so as to secure the system from any crash due to the misuse of it. These are the common tasks that we need to do in our day to day life but for this we do not have any utility software, with this system we can serve us to achieve all these needs. 2. EXISTING SYSTEM Studies show that the lab assistants had to follow the method of locking the machine manually as well as individually, so as to prevent the users from accessing the authorized information. Go on the individual machine and lock the resources as there was no particular remote 98

2 server. Also concepts like windows group management system called as RDP (remote desktop connection), Teamviewer were used Working Systems designed previously using this concept like RDP(remote desktop connection) that gives the ability to remotely connect to a computer/pc in network. After successful connection we can control the PC as if it s our PC and we are controlling it with our keyboard and Mouse. Another example is software called Teamviewer.Teamviewer needs to have the software running on both the controlling machine and the machine being controlled, making it less convenient to operate and inefficient Drawbacks of Existing System 1. RDP needs the client and server systems to be connected in order to control the resources and to lock/unlock them. This approach is inefficient in terms of power consumption as it requires more processing power to be spent on both client and server machines. 2. The major disadvantage of the using Teamviewer is that this approach needs the software to be running on both the machines all the time. Thus this application aims to design such a system that even a layman will be able to access and control the resources on remote pc and be more efficient in resource consumption at the same time. 3. PROPOSED SYSTEM This paper implements a Java Runtime Environment (JRE) which features two virtual machines one called client and the other server. The client version is tuned for quick loading, it makes use of interpretations. The server version loads more slowly, putting more efforts into producing highly optimized Just-In-Time (JIT) compilations that yields higher performance Working Java is used a programming language since it's a simple programming language, Object oriented throughout - no coding outside of the class definitions including the main(), An extensive class library available in the core language packages, A program runs inside the virtual machine sandbox, security manager- determines what resources a class can access such as reading and writing to a local disk, Lightweight processes, called threads can easily be spun off to perform multiprocessing, Java program can be moved from one computer system to another, anywhere, anytime. Once connected in LAN one can make such a provision in Java that the user screen that is designed using java swings could appear on the server machine or appear from where it is getting connected to so that the server could get to know which resources are accessed by the user. The entire structure of the project is based on RMI (remote method invocation) architecture Architecture using Java RMI applications often comprise two separate programs, a server and a client. A typical server program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects. A typical client program obtains a remote reference to one or more remote objects on a server and then invokes methods on them. RMI provides the 99

3 mechanism by which the server and the client communicate and pass information back and forth. Such an application is sometimes referred to as a distributed object application. Distributed object applications need to do the following: 1. Locate remote objects. Applications can use various mechanisms to obtain references to remote objects. For example, an application can register its remote objects with RMI's simple naming facility, the RMI registry. Alternatively, an application can pass and return remote object references as part of other remote invocations. 2. Communicate with remote objects. Details of communication between remote objects are handled by RMI. To the programmer, remote communication looks similar to regular Java method invocations. As the application is divided into different modules where all the modules are basically RMI functions or methods which provides various functionalities as locking and unlocking the USB, managing the files on remote pc etc as discussed in the basic aim of the project. For this purpose studying the sample and basic programs on RMI was necessary. Various small programs like the Hello World programs were studies just to understand how RMI works. Mapping of modules were done to the RMI code and how RMI is going to be implemented was studied. Defining the remote interfaces. A remote interface specifies the methods that can be invoked remotely by a client. Clients program to remote interfaces, not to the implementation classes of those interfaces. The design of such interfaces includes the determination of the types of objects that will be used as the parameters and return values for these methods. If any of these interfaces or classes does not yet exist, you need to define them as well. Implementing the remote objects. Remote objects must implement one or more remote interfaces. The remote object class may include implementations of other interfaces and methods that are available only locally. If any local classes are to be used for parameters or return values of any of these methods, they must be implemented as well. Implementing the clients. Clients that use remote objects can be implemented at any time after the remote interfaces are defined, including after the remote objects have been deployed. Compiling of RMI programs required a research as the client server architecture is a naïve architecture and required logins on the same machine. The sample programs were compiled and tested (Not the actual methods) in order to check the working of client and server. The concept of how the client actually looks up the registry to check the validity of modules. This falls under the domain of Skeleton How the modules are mapped to the registry so that all methods stay in it without the use of any database and the client then looks up the registry. The major focus has been the back end as the RMI coding is complicated and requires a lot of learning and understanding. The UI is to be designed using Java swings in Netbeans which is nothing but creating the front end to basically ease the functionality of our Client server architecture Functional Overview The functional working of the system is depicted in the Fig given below : 100

4 Admin Registration / Login Authentication client machine Store File Client machine details/ IP address IP address Receive configuration Successful client process Kill/Lock.etc. Perform operation Client Fig Flow diagram 3.2. System Requirements Software Requirement (Development): Language: JDK2 Version 1.4 IDE: Eclipse/JCreator GUI: SWING OS: Windows Software Requirement (Users): Environment: JRE 1.4 As JRE features two virtual machines, one called Client and the other Server. The Client version is tuned for quick loading. It makes use of interpretation. The Server version loads more slowly, putting more effort into producing highly optimized JIT compilations that yield higher performance. Both VMs compile only often-run methods, using a configurable invocation-countthreshold to decide which methods to compile (M.A Hamilton 1996, C. Schmid 1999). Hardware Requirement (For Development and users): CPU (Pentium III onwards) Recommended P4 Platform PCs. VDU (Monitor) Standard Keyboard and Mouse RAM 128 MB Minimum Recommended 512 MB 101

5 3.3. Advantages This system is preferable to the existing systems because of clear advantages stated below: Using the proposed system you do not have to connect to the machine but still can control its resources to lock or unlock them. This way it saves the processing power of both the server and the client computers, thus speeding up the processes. Major distinguishing point between this system and the existing ones is that, this software need not be running on both the systems. Only the computer that will be controlling the remote computer needs to have this running unlike Teamviewer where both the counterparties need to have the software running, Thus this application aims to design such a system that even a layman will be able to access and control the resources on remote pc. 4. EXPERIMENTAL RESULTS The automated software system that is used as a remote control for PC's was used to conduct a trial in a particular college at the university of Mumbai where the lab assistant was assigned a central location and the students were given systems distributed across the computer laboratory. The application was installed on the lab assistant s system and all the systems belonging to the students were connected in LAN with the lab assistants PC. The application had the IP addressed of all the systems registered with it. Everyone were asked to carry out their day to day work on the system. In some time one of the systems in the LAN was found to be in hung state due to some heavy processes running on it. The Lab assistant connected to that system using the application and managed to kill the heavy process which was causing the blocking. In case II there was an ad-hoc task of installing a particular application across all the systems of the laboratory. The only requirement here was to have the setup file of that application on the Computer of the lab assistant and he could setup the application on all the systems of the laboratory using the remote control application. In the last test performed as it was the exam time in the college there was a task for the lab assistant to lock all the input drives and block all the networks on each and every system of the laboratory but using the remote control application he could block all the driver processes on the remote systems located in the laboratory and hence furnish his task. Fig. 4.1 Login Form 102

6 Fig. 4.2: Execution of UI Fig 4.3: Connecting to Remote Client 103

7 Fig. 4.4: Sample Operation (Killing Process from Remote Client) 5. CONCLUSION This system is user friendly and provides great efficiency in parallel with manpower. This will provide direct or indirect benefits to the organization. It is of immense help to grab the modem pace of automation and this software will provide easy mean for it. The software can be used on internet system. Drives/Folders/Files and Applications can be locked over internet systems.to conclude with the application build is extremely easy to operate where the lab assistant need not have any technical knowledge to run it. The simple GUI and architecture assists the lab assistant to carry out his day to day task in a timely and efficient manner. 6. REFERENCES [1] Kim Topley, core swing, 5 th ed., McGraw-Hill, New York, [2] M.A Hamilton, Java and the shift to net-centric computing, IEEE computer, vol. 29, no. 8, pp , [3] C. Schmid A remote laboratory using virtual reality on the web, simulation, vol. 73, no. 1, pp , [4] [5] [6] [7] [8] [9] 104

Online Student Attendance Management System using Android

Online Student Attendance Management System using Android Online Student Attendance Management System using Android ABSTRACT: We have seen over the years that the process of manual attendance has been carried outacross almost all educational institutions. The

More information

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,

More information

Dynamic Resource allocation in Cloud

Dynamic Resource allocation in Cloud Dynamic Resource allocation in Cloud ABSTRACT: Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from

More information

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper!

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper! Introduction... 3 Advantages of Providing Remote Access to Personal PC... 4 Disadvantages of Typical Remote Access Solutions in a Corporate Environment... 5 Why Use Leostream for Remote Access... 5 Using

More information

APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION

APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION APPLICATION OF CLOUD COMPUTING IN ACADEMIC INSTITUTION 1 PRIYANKA DUKLE, 2 TRISHALA PAWAR, 3 SNEH BHAT 1,2,3 Computer, Amrutvahini College of Engineering, Sangamner Email: bhatsneh@gmail.com 1, pawar.trishala@gmail.com

More information

NetIQ Privileged User Manager

NetIQ Privileged User Manager NetIQ Privileged User Manager Performance and Sizing Guidelines March 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

More information

Desktop Virtualization Technologies and Implementation

Desktop Virtualization Technologies and Implementation ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method

More information

Remote Desktop Access Through Android Mobile Phones and Reverse

Remote Desktop Access Through Android Mobile Phones and Reverse Reviewed Paper Volume 2 Issue 8 April 2015 Paper International Journal of Informative & Futuristic Research ISSN (Online): 2347-1697 Remote Desktop Access Through Android Mobile Phones and Reverse Paper

More information

Implementing SAAS: Cloud Computing and Android Based Application Framework for.net Programming

Implementing SAAS: Cloud Computing and Android Based Application Framework for.net Programming Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,

More information

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks

More information

Network Services Application to Controlling and Develop Institute Computer LABs

Network Services Application to Controlling and Develop Institute Computer LABs Network Services Application to Controlling and Develop Institute Computer LABs Majzoob Kamal Aldein Omer Abstract The research aims to develop a system that helps the use of computer labs devices in the

More information

Indian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved

Indian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved Indian Journal of Science International Weekly Journal for Science ISSN 2319 7730 EISSN 2319 7749 2015 Discovery Publication. All Rights Reserved Analysis Web enabled cloud library system: a conceptual

More information

Desktop Virtualization in the Educational Environment

Desktop Virtualization in the Educational Environment Desktop Virtualization in the Educational Environment The Problem High Total Cost of Ownership (TCO) for school computers. TCO goes beyond the original purchase price of hardware and software. It includes

More information

1. Introduction 1.1 Methodology

1. Introduction 1.1 Methodology Table of Contents 1. Introduction 1.1 Methodology 3 1.2 Purpose 4 1.3 Scope 4 1.4 Definitions, Acronyms and Abbreviations 5 1.5 Tools Used 6 1.6 References 7 1.7 Technologies to be used 7 1.8 Overview

More information

Scalability Factors of JMeter In Performance Testing Projects

Scalability Factors of JMeter In Performance Testing Projects Scalability Factors of JMeter In Performance Testing Projects Title Scalability Factors for JMeter In Performance Testing Projects Conference STEP-IN Conference Performance Testing 2008, PUNE Author(s)

More information

AdminToys Suite. Installation & Setup Guide

AdminToys Suite. Installation & Setup Guide AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products

More information

A Monitored Student Testing Application Using Cloud Computing

A Monitored Student Testing Application Using Cloud Computing A Monitored Student Testing Application Using Cloud Computing R. Mullapudi and G. Hsieh Department of Computer Science, Norfolk State University, Norfolk, Virginia, USA r.mullapudi@spartans.nsu.edu, ghsieh@nsu.edu

More information

Outgoing VDI Gateways:

Outgoing VDI Gateways: ` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents

More information

Comodo LoginPro Software Version 1.5

Comodo LoginPro Software Version 1.5 Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

THE VIRTUALIZATION OF AN INTERNET SERVER

THE VIRTUALIZATION OF AN INTERNET SERVER U.P.B. Sci. Bull., Series C, Vol. 76, Iss. 2, 2014 ISSN 2286 3540 THE VIRTUALIZATION OF AN INTERNET SERVER Cătălin MATEIAŞ 1, Adrian NICOLESCU 2 For security reasons, the software used for building an

More information

System Requirements Table of contents

System Requirements Table of contents Table of contents 1 Introduction... 2 2 Knoa Agent... 2 2.1 System Requirements...2 2.2 Environment Requirements...4 3 Knoa Server Architecture...4 3.1 Knoa Server Components... 4 3.2 Server Hardware Setup...5

More information

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application K. Akhila 1 B. Prathyusha 2 M. PavanKumar 3 M. Amrutha 4 Research Scholar Research Scholar Research Scholar

More information

Server Based Desktop Virtualization with Mobile Thin Clients

Server Based Desktop Virtualization with Mobile Thin Clients Server Based Desktop Virtualization with Mobile Thin Clients Prof. Sangita Chaudhari Email: sangita123sp@rediffmail.com Amod N. Narvekar Abhishek V. Potnis Pratik J. Patil Email: amod.narvekar@rediffmail.com

More information

Wlan Monitoring Using Android Phone

Wlan Monitoring Using Android Phone International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 7 (July 2014), PP.23-27 Wlan Monitoring Using Android Phone Pooja Chaudhary

More information

Agents Hands-On Exercises. Agent Hands On Exercise

Agents Hands-On Exercises. Agent Hands On Exercise Agent Hands On Exercise 2 Chapter 2 Agents Hands-On Exercises Background Information You have just been hired as the lead IT Administrator at the Florida International University (FIU) to manage the computers

More information

Studio 5.0 User s Guide

Studio 5.0 User s Guide Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

Infor Web UI Sizing and Deployment for a Thin Client Solution

Infor Web UI Sizing and Deployment for a Thin Client Solution Infor Web UI Sizing and Deployment for a Thin Client Solution Copyright 2012 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and

More information

Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services

Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services 2000 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 www.filemaker.com FileMaker

More information

Network Detective. Using the New Network Detective User Interface Quick Start Guide. 2016 RapidFire Tools, Inc. All rights reserved.

Network Detective. Using the New Network Detective User Interface Quick Start Guide. 2016 RapidFire Tools, Inc. All rights reserved. Network Detective SQL Server Assessment Module Using the New Network Detective User Interface Quick Start Guide 2016 RapidFire Tools, Inc. All rights reserved. V20160111 Ver 3F Overview The Network Detective

More information

Remote Desktop on Mobile

Remote Desktop on Mobile Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to

More information

AuditMatic Enterprise Edition Installation Specifications

AuditMatic Enterprise Edition Installation Specifications Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this

More information

Chip PC Thin-Clients Solutions for Remote Home/Business Connectivity Using PPTP ADSL Modem

Chip PC Thin-Clients Solutions for Remote Home/Business Connectivity Using PPTP ADSL Modem Advanced Remote Connectivity in Thin Client Technology Chip PC Thin-Clients Solutions for Remote Home/Business Connectivity Using PPTP ADSL Modem Application Note AN-112 Written By: Moshe Chen Chip PC

More information

Client/server is a network architecture that divides functions into client and server

Client/server is a network architecture that divides functions into client and server Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate

More information

HP OO 10.X - SiteScope Monitoring Templates

HP OO 10.X - SiteScope Monitoring Templates HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,

More information

WinMan. Utilizing Terminal Services. Quick Results. Summer, 2001. ver. 6.1.3. a d v a n c e d s y s t e m s

WinMan. Utilizing Terminal Services. Quick Results. Summer, 2001. ver. 6.1.3. a d v a n c e d s y s t e m s Utilizing Terminal Services Summer, 2001 ver. 6.1.3 a d v a n c e d s y s t e m s WinMan Quick Results 12 2 TTW s WinMan TTW WinMan Utilizing Terminal Services Advantages of having WinMan and Terminal

More information

Desktop virtualization using SaaS Architecture

Desktop virtualization using SaaS Architecture Desktop virtualization using SaaS Architecture Pranit U. Patil, Pranav S. Ambavkar, Dr.B.B.Meshram, Prof. Varshapriya VJTI, Matunga, Mumbai, India. pranit_patil@aol.in Abstract - Desktop virtualization

More information

Learning More About Load Testing

Learning More About Load Testing Welcome to this introduction to application performance testing and the LoadRunner load testing solution. This document provides a short overview of LoadRunner s features, and includes the following sections:

More information

for Windows 7 Laplink Software, Inc. Quick Start Guide h t t p : / / w w w. l a p l i n k. c o m / h e l p MN-LLG-EN-15 (REV.

for Windows 7 Laplink Software, Inc. Quick Start Guide h t t p : / / w w w. l a p l i n k. c o m / h e l p MN-LLG-EN-15 (REV. 1 for Windows 7 Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: CustomerService@laplink.com Laplink Software, Inc. 14335 NE 24th Street, Suite 201 Bellevue,

More information

Performance Comparison of Three Models in Computer Network Cost Saving

Performance Comparison of Three Models in Computer Network Cost Saving Performance Comparison of Three Models in Computer Network Cost Saving AbadiNugroho Department of Informatics, Sekolah Tinggi Teknologi ( STITEK ) Bontang, Indonesia Abstract - Computer network model will

More information

LAN Monitoring Using Android Phone

LAN Monitoring Using Android Phone LAN Monitoring Using Android Phone Prof. Rakhi Bhardwaj 1, Sandesh S. Jangam 2, Prashant N. Shinde 3, Abhijit B. Raut 4, Rajesh S. Trigune 5 Professor, Dept. of Computer Engg., KJEI s Trinity College of

More information

A closer look at HP LoadRunner software

A closer look at HP LoadRunner software Technical white paper A closer look at HP LoadRunner software Table of contents Sizing up the system 2 The limits of manual testing 2 A new take on testing: the HP LoadRunner solution 3 The HP LoadRunner

More information

Virtual Lab : Bring the Hands-on Activity to Online Courses

Virtual Lab : Bring the Hands-on Activity to Online Courses Virtual Lab : Bring the Hands-on Activity to Online Courses Biwu Yang East Carolina University Session 3220 Abstract A Virtual Lab has been implemented for several online courses with subject around Computer

More information

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide This document covers steps to configure Citrix VDI on Juniper Network s SA Series SSL VPN platforms. It also covers brief overview of

More information

Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009.

Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009. We create innovative software solutions for SharePoint, Office 365, MS Windows Remote Desktop Services, and

More information

Getting Started with Vision 6

Getting Started with Vision 6 Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop

More information

System Structures. Services Interface Structure

System Structures. Services Interface Structure System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface

More information

TIME KEEP LEGAL BILLING SOFTWARE DESIGN DOCUMENT. Mike Don Cheng-Yu. CS 524 Software Engineer Professor: Dr Liang

TIME KEEP LEGAL BILLING SOFTWARE DESIGN DOCUMENT. Mike Don Cheng-Yu. CS 524 Software Engineer Professor: Dr Liang TIME KEEP LEGAL BILLING SOFTWARE DESIGN DOCUMENT Mike Don Cheng-Yu CS 524 Software Engineer Professor: Dr Liang TABLE OF CONTENTS 1. INTRODUCTION: 2 1.1. Goals and objectives 2 1.2. Statement of scope

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations Projetex 9 Workstation Setup Quick Start Guide 1 Projetex 9 Help Table of Contents Disclaimer 2 System Requirements 2 Registration/Upgrade 3 Projetex Workstation Setup 5 User Login to Projetex Workstation

More information

Installing Emageon PACS Remote Ultravisual

Installing Emageon PACS Remote Ultravisual The PACS DICOM visualization software for Carondelet Health Network is a Java based application that is installed from the PACS Archive servers. Before proceeding with the installation please see Table

More information

Windows MultiPoint Server 2011 Deployment Guide. Document Version 1.0 March 2011

Windows MultiPoint Server 2011 Deployment Guide. Document Version 1.0 March 2011 Windows MultiPoint Server 2011 Deployment Guide Document Version 1.0 March 2011 Copyright Notice This document is provided as-is. Information and views expressed in this document, including URL and other

More information

Implementing and Managing Windows Server 2008 Hyper-V

Implementing and Managing Windows Server 2008 Hyper-V Course 6422A: Implementing and Managing Windows Server 2008 Hyper-V Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology: Windows Server 2008 Type: Course Delivery Method:

More information

NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK

NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK 1. ThinPoint solution to Access your Own PC You require your business users to access their own PC in the office remotely

More information

Remote Monitoring and Control of the R&S FSV with a Web Browser

Remote Monitoring and Control of the R&S FSV with a Web Browser Rohde & Schwarz Products: R&S FSV3, R&S FSV7, R&S FSV13, R&S FSV30 Remote Monitoring and Control of the R&S FSV with a Web Browser Application Note This application note describes remote operation or monitoring

More information

Smart Queue Management System Using GSM Technology

Smart Queue Management System Using GSM Technology Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 941-950 Research India Publications http://www.ripublication.com/aeee.htm Smart Queue Management System Using

More information

System Area Manager. Remote Management

System Area Manager. Remote Management System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 2: Operating System Structures Prof. Alan Mislove (amislove@ccs.neu.edu) Operating System Services Operating systems provide an environment for

More information

Installing NICE Windows under Parallels for Mac

Installing NICE Windows under Parallels for Mac Installing NICE Windows under Parallels for Mac 1. Prerequisites a) A Mac with OS X connected to a portable socket on the CERN general public network b) Parallels Desktop software installed from: smb://cerndata44.cern.ch/d

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI

More information

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is

More information

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide

SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide Published July 2015 This document covers steps to configure Citrix VDI on Pulse Secure s SA Series SSL VPN platforms. It also covers brief

More information

Location Based Online Ticket Application Abhishek Arware, Sonal Dumbare, Sanket Saple, Bushra Shaikh

Location Based Online Ticket Application Abhishek Arware, Sonal Dumbare, Sanket Saple, Bushra Shaikh Location Based Online Ticket Application Abhishek Arware, Sonal Dumbare, Sanket Saple, Bushra Shaikh Abstract one of the biggest challenges in the current ticketing facility is QUEUE while buying our suburban

More information

OPERATING SYSTEM SERVICES

OPERATING SYSTEM SERVICES OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered

More information

International Journal of Advanced Engineering Research and Science (IJAERS) Vol-2, Issue-11, Nov- 2015] ISSN: 2349-6495

International Journal of Advanced Engineering Research and Science (IJAERS) Vol-2, Issue-11, Nov- 2015] ISSN: 2349-6495 International Journal of Advanced Engineering Research and Science (IJAERS) Vol-2, Issue-11, Nov- 2015] Survey on Automation Testing Tools for Mobile Applications Dr.S.Gunasekaran 1, V. Bargavi 2 1 Department

More information

Restraining Execution Environments

Restraining Execution Environments Restraining Execution Environments Segurança em Sistemas Informáticos André Gonçalves Contents Overview Java Virtual Machine: Overview The Basic Parts Security Sandbox Mechanisms Sandbox Memory Native

More information

Distributed Framework for Data Mining As a Service on Private Cloud

Distributed Framework for Data Mining As a Service on Private Cloud RESEARCH ARTICLE OPEN ACCESS Distributed Framework for Data Mining As a Service on Private Cloud Shraddha Masih *, Sanjay Tanwani** *Research Scholar & Associate Professor, School of Computer Science &

More information

Oracle EXAM - 1Z0-559. Oracle Virtual Desktop Infrastructure 3 Essentials. Buy Full Product. http://www.examskey.com/1z0-559.html

Oracle EXAM - 1Z0-559. Oracle Virtual Desktop Infrastructure 3 Essentials. Buy Full Product. http://www.examskey.com/1z0-559.html Oracle EXAM - 1Z0-559 Oracle Virtual Desktop Infrastructure 3 Essentials Buy Full Product http://www.examskey.com/1z0-559.html Examskey Oracle 1Z0-559 exam demo product is here for you to test the quality

More information

Remote Monitoring and Control of the R&S FSL with a Web Browser

Remote Monitoring and Control of the R&S FSL with a Web Browser Rohde & Schwarz Products: R&S FSL3, R&S FSL6, R&S FSL18 Remote Monitoring and Control of the R&S FSL with a Web Browser Application Note This application notes describes remote operation or monitoring

More information

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools

Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the

More information

Understanding the Benefits of IBM SPSS Statistics Server

Understanding the Benefits of IBM SPSS Statistics Server IBM SPSS Statistics Server Understanding the Benefits of IBM SPSS Statistics Server Contents: 1 Introduction 2 Performance 101: Understanding the drivers of better performance 3 Why performance is faster

More information

Realization of the High-density SaaS Infrastructure with a Fine-grained Multitenant Framework

Realization of the High-density SaaS Infrastructure with a Fine-grained Multitenant Framework Realization of the High-density SaaS Infrastructure with a Fine-grained Multitenant Framework SHIMAMURA Hisashi, SOEJIMA Kenji, KURODA Takayuki, NISHIMURA Shoji Abstract In achieving a SaaS-type cloud

More information

Issues in Information Systems Volume 16, Issue I, pp. 219-225, 2015

Issues in Information Systems Volume 16, Issue I, pp. 219-225, 2015 MOVING TOWARD A SERVER-BASED VIRTUAL MACHINE HOSTING ENVIRONMENT IN SUPPORT OF UNIVERSITY INFORMATION TECHNOLOGY PROGRAMMING COURSES George Stefanek, PhD, Purdue University North Central, stefanek@pnc.edu

More information

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows

More information

Copyright www.agileload.com 1

Copyright www.agileload.com 1 Copyright www.agileload.com 1 INTRODUCTION Performance testing is a complex activity where dozens of factors contribute to its success and effective usage of all those factors is necessary to get the accurate

More information

Technical White Paper BlackBerry Enterprise Server

Technical White Paper BlackBerry Enterprise Server Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table

More information

Applets, RMI, JDBC Exam Review

Applets, RMI, JDBC Exam Review Applets, RMI, JDBC Exam Review Sara Sprenkle Announcements Quiz today Project 2 due tomorrow Exam on Thursday Web programming CPM and servlets vs JSPs Sara Sprenkle - CISC370 2 1 Division of Labor Java

More information

Network Detective. Network Assessment Module Using the New Network Detective User Interface Quick Start Guide

Network Detective. Network Assessment Module Using the New Network Detective User Interface Quick Start Guide Network Detective Network Assessment Module Using the New Network Detective User Interface Quick Start Guide 2015 RapidFire Tools, Inc. All rights reserved. V20151228 Ver 3N Overview The Network Detective

More information

A Real Time, Object Oriented Fieldbus Management System

A Real Time, Object Oriented Fieldbus Management System A Real Time, Object Oriented Fieldbus Management System Mr. Ole Cramer Nielsen Managing Director PROCES-DATA Supervisor International P-NET User Organisation Navervej 8 8600 Silkeborg Denmark pd@post4.tele.dk

More information

COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER

COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER TECHNICAL SPECIFICATIONS Communication Server 1000 Telephony Manager 3.2 Communication Server 1000 Telephony Manager 3.0 Communication

More information

Case Studies of Running the Platform. NetBeans UML Servlet JSP GlassFish EJB

Case Studies of Running the Platform. NetBeans UML Servlet JSP GlassFish EJB September Case Studies of Running the Platform NetBeans UML Servlet JSP GlassFish EJB In this project we display in the browser the Hello World, Everyone! message created in the session bean with servlets

More information

Effective Java Programming. measurement as the basis

Effective Java Programming. measurement as the basis Effective Java Programming measurement as the basis Structure measurement as the basis benchmarking micro macro profiling why you should do this? profiling tools Motto "We should forget about small efficiencies,

More information

Research Article Volume 6 Issue No. 4

Research Article Volume 6 Issue No. 4 DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha

More information

Load balancing model for Cloud Data Center ABSTRACT:

Load balancing model for Cloud Data Center ABSTRACT: Load balancing model for Cloud Data Center ABSTRACT: Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement to

More information

How To Use Softxpand (A Thin Client) On A Pc Or Laptop Or Mac Or Macbook Or Ipad (For A Powerbook)

How To Use Softxpand (A Thin Client) On A Pc Or Laptop Or Mac Or Macbook Or Ipad (For A Powerbook) SoftXpand in Thin Client Environment Prepared by MiniFrame Marketing & Sales Team What is SoftXpand? SoftXpand software turns ANY PC (desktop/server/laptop) into multiple independent workstations. It is

More information

Web Enabled Software for 8614xB-series Optical Spectrum Analyzers. Installation Guide

Web Enabled Software for 8614xB-series Optical Spectrum Analyzers. Installation Guide for 8614xB-series Optical Spectrum Analyzers Installation Guide Copyright Agilent Technologies Company 2001 All Rights Reserved. Reproduction, adaptation, or translation without prior written permission

More information

Machine control going www - Opportunities and risks when connecting a control system to the Internet

Machine control going www - Opportunities and risks when connecting a control system to the Internet B&R Industrial Automation Corp. 1325 Northmeadow Parkway, S-130 Tel: (770) 772-0400 E-mail: office.us@br-automation.com Roswell, Georgia 30076 Fax: (770) 772-0243 Internet: www.br-automation.com Machine

More information

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................

More information

Virtual Desktop Infrastructure Planning Overview

Virtual Desktop Infrastructure Planning Overview WHITEPAPER Virtual Desktop Infrastructure Planning Overview Contents What is Virtual Desktop Infrastructure?...2 Physical Corporate PCs. Where s the Beef?...3 The Benefits of VDI...4 Planning for VDI...5

More information

Directions for VMware Ready Testing for Application Software

Directions for VMware Ready Testing for Application Software Directions for VMware Ready Testing for Application Software Introduction To be awarded the VMware ready logo for your product requires a modest amount of engineering work, assuming that the pre-requisites

More information

Analysis of Virtualization Tools and Techniques

Analysis of Virtualization Tools and Techniques Analysis of Virtualization Tools and Techniques Mrs. Kavita S. 1, Mrs. Dakshyani G. 2, Mrs. Kiruthika 3 Assistant Professor, Department of Computer Engineering, FCRIT, Vashi, Navi Mumbai, India 1,2 Associate

More information

Enterprise Server. Application Sentinel for SQL Server Installation and Configuration Guide. Application Sentinel 2.0 and Higher

Enterprise Server. Application Sentinel for SQL Server Installation and Configuration Guide. Application Sentinel 2.0 and Higher Enterprise Server Application Sentinel for SQL Server Installation and Configuration Guide Application Sentinel 2.0 and Higher August 2004 Printed in USA 3832 1097 000 . Enterprise Server Application Sentinel

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information

Cloudvue Remote Desktop Client GUI User Guide

Cloudvue Remote Desktop Client GUI User Guide Cloudvue Remote Desktop Client GUI User Guide I. To connect to a Windows server - After power up, the login screen will be displayed. A. Auto Search/User Defined Use Auto Search to find available Windows

More information

Asta Powerproject Enterprise

Asta Powerproject Enterprise Asta Powerproject Enterprise Overview and System Requirements Guide Asta Development plc Kingston House Goodsons Mews Wellington Street Thame Oxfordshire OX9 3BX United Kingdom Tel: +44 (0)1844 261700

More information

Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company

Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company Implementation of Operator Authentication Processes on an Enterprise Level Mark Heard Eastman Chemical Company Presenter Mark Heard, Eastman Chemical Company Control System Engineer Experience with several

More information

Secure Private Cloud Architecture for Mobile Infrastructure as a Service

Secure Private Cloud Architecture for Mobile Infrastructure as a Service 2012 IEEE Eighth World Congress on Services Secure Private Cloud Architecture for Mobile Infrastructure as a Service Susmita Horrow Department of mathematics IIT Roorkee, India hsusmita4@gmail.com Sanchika

More information

Compiere ERP & CRM Installation Instructions Windows System - EnterpriseDB

Compiere ERP & CRM Installation Instructions Windows System - EnterpriseDB Compiere ERP & CRM Installation Instructions Windows System - EnterpriseDB Compiere Learning Services Division Copyright 2007 Compiere, inc. All rights reserved www.compiere.com Table of Contents Compiere

More information

DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering

DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL

More information

Submit to: PT. Adi Sarana Armada (Assa Rent) Proof of Concept (POC) of 2X Solution. Ver. 1.0 Mei 2011. Prepared by: PT. Netmarks Indonesia

Submit to: PT. Adi Sarana Armada (Assa Rent) Proof of Concept (POC) of 2X Solution. Ver. 1.0 Mei 2011. Prepared by: PT. Netmarks Indonesia Submit to: PT. Adi Sarana Armada (Assa Rent) Proof of Concept (POC) of 2X Solution Ver. 1.0 Mei 2011 Prepared by: 株 式 会 社 ネットマークス PT. Netmarks Indonesia Jl. Kalimantan 11B-C, Surabaya 60281 e-mail mail:

More information