Future Developments in UniGrids and NextGRID
|
|
- Lisa Farmer
- 8 years ago
- Views:
Transcription
1 Future Developments in UniGrids and NextGRID Dr. David Snelling Fujitsu Laboratories of Europe Unicore Summit Nice, France - October 2005
2 Overview Status Report New Gateway Architecture Parallel HTTP based File Transfer ETD based Virtual Organizations Update on Standards in Unicore Discussion
3 Quick Status Report UniGrids Highlights Unicore/GS V1.0 and V1.1 Released Explicit Trust Delegation Implemented Caused a small explosion in portal work Grid Programming Environment Released NextGRID Highlights Architecture White Paper Published Service Level Agreement Dynamics Semantically Enabled Workflow What Next?
4 Existing Gateway Architecture Firewall Unicore Client Unicore Gateway Network Job Supervisor WS Client Web Services Other Job Services Other Client Other Services Limitations ETD required to support the WS Web Server visiable outside the firewall Complex management Many open ports on the firewall Uincore Protocol Layer Authenticated HTTPS SSH, HTTP, GridFTP,...
5 New Gateway Architecture Unicore Client WS Client Unicore Gateway Firewall Other Web Services Web Service Enabled NJS Other Client Other Services Multi-Protocol Support UPL, HTTPS, SSH, Custom,... WS-Addressing Support Authentication and Authorization When available in the protocol Uincore Protocol Layer Authenticated HTTPS SSH, HTTP, GridFTP,...
6 Parallel HTTP File Transfer Status Quo Unicore UPL Web Services: In message body or attachments GridFTP Open Ports Requirements High performance on busy networks Parallel transfer valuable Same level of security as Unicore
7 Basic Idea UUDB Client Unicore Gateway Unicore GS Source UUDB Unicore Gateway Unicore GS Target Using Web W Service Protocols Advertise available protocols Define source and destination Monitor progress Available for use by Client or Server Extensive Testing on the NAREGI Network Simulator UPL or Web Service Authenticated HTTPS
8 Performance Comparison transferred data [MByte] GridFTP (5 streams) HTTPS (5 streams) HTTP (15 streams) Number of streams is the optimal for each protocol. HTTPS is bandwidth limited by Java based encryption. These results are for bad conditions. 100
9 Explicit Trust Delegation Unicore V4: Multi-site Job Unicore Client Job Server A Job Sub-job Dave Dave Dave Sub-job Dave Dave Server A Key: Authenticated SSL by X X Server B Sub-job Dave Job Y Job to run for and endorsed by X. Quill indicates where the Job is signed, e.g. private key available.
10 Explicit Trust Delegation Unicore V5: Portal Based Multi-site Job Web Service Client Dave Portal Job U: Dave Sub-job U: Dave Po. Po. Portal Key: Authenticated SSL by X X Server A Job U: Dave Sub-job U: Dave Po. Po. Job U:X Y Job to run for X endorsed by Y. If U:X is missing it is the same as Y. Server A Quill indicates where the Job is signed, e.g. private key available. Server B Sub-Job U: Dave Po.
11 EDT Based Virtual Organizations Aim Provide Support for Virtual Organizations Strategy Unicore User Database (UUDB) interacts with a VO Manager. ETD is needed to support sub-jobs and remote file transfer. Schedule Prototype in the next 8 months Call for requirements now! Standards needed to provide cross Grid VOs.
12 Typical VO AuthZ Process 2- ConsignJob (ID-887) 3- CheckUser (ID-887) Client ID-887 NJS UUDB: VO-554 -> uuid Run Job (VO-554): - SubJobs endorsed by the NJS 4- CheckVO(ID-887) 1- Register (ID-887) VO Manager: VO-554: ID-887, ID-675,... VO-542: ID-764, ID-675,...
13 Unicore and Standards Standards Priority Use the latest standard,... At the cost of early interoperation. Research has a role in standards development. Unicore Commits to: Infrastructure: WSRF, WSN, WS-Addressing Jobs: JSDL, BES IO: Data Transport And Supports: Btye-IO, DAI, CCDLM, ACS, SAGA, WSDM,...
14 Don t Mix Message and Content FEMA Logo: Questions?
GRIP:Creating Interoperability between Grids
GRIP:Creating Interoperability between Grids Philipp Wieder, Dietmar Erwin, Roger Menday Research Centre Jülich EuroGrid Workshop Cracow, October 29, 2003 Contents Motivation Software Base at a Glance
More informationA Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration
A Reliable and Fast Data Transfer for Grid Systems Using a Dynamic Firewall Configuration Thomas Oistrez Research Centre Juelich Juelich Supercomputing Centre August 21, 2008 1 / 16 Overview 1 UNICORE
More informationTUTORIAL. Rebecca Breu, Bastian Demuth, André Giesler, Bastian Tweddell (FZ Jülich) {r.breu, b.demuth, a.giesler, b.tweddell}@fz-juelich.
TUTORIAL Rebecca Breu, Bastian Demuth, André Giesler, Bastian Tweddell (FZ Jülich) {r.breu, b.demuth, a.giesler, b.tweddell}@fz-juelich.de September 2006 Outline Motivation & History Production UNICORE
More informationUFTP High-performance data transfer for UNICORE
Mitglied der Helmholtz-Gemeinschaft UFTP High-performance data transfer for UNICORE Dr. Bernd Schuller, Tim Pohlmann Federated Systems and Data division Jülich Supercomputer Centre Forschungszentrum Jülich
More informationSTERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
More informationFile transfer in UNICORE State of the art
Mitglied der Helmholtz-Gemeinschaft File transfer in UNICORE State of the art Bernd Schuller, Björn Hagemeier, Michael Rambadt Federated Systems and Data division Jülich Supercomputer Centre Forschungszentrum
More informationReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationA UNICORE GLOBUS INTEROPERABILITY LAYER David Snelling, Sven van den Berghe
Computing and Informatics, Vol. 21, 2002, 399 411 A UNICORE GLOBUS INTEROPERABILITY LAYER David Snelling, Sven van den Berghe Fujitsu Laboratories of Europe e-mail: snelling@fecit.co.uk, s.vandenberghe@fle.fujitsu.com
More informationUSER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
More informationRecommendations for Static Firewall Configuration in D-Grid
D-Grid Integrationsprojekt (DGI-2) Fachgebiet 3-3 Firewalls Recommendations for Static Firewall Configuration in D-Grid Version 1.5, 21. Mai 2008 D-Grid Integrationsprojekt (DGI-2) Autoren: Gian Luca Volpato
More informationA QoS-aware Method for Web Services Discovery
Journal of Geographic Information System, 2010, 2, 40-44 doi:10.4236/jgis.2010.21008 Published Online January 2010 (http://www.scirp.org/journal/jgis) A QoS-aware Method for Web Services Discovery Bian
More informationGRID COMPUTING Techniques and Applications BARRY WILKINSON
GRID COMPUTING Techniques and Applications BARRY WILKINSON Contents Preface About the Author CHAPTER 1 INTRODUCTION TO GRID COMPUTING 1 1.1 Grid Computing Concept 1 1.2 History of Distributed Computing
More informationGlobus Toolkit: Authentication and Credential Translation
Globus Toolkit: Authentication and Credential Translation JET Workshop, April 14, 2004 Frank Siebenlist franks@mcs.anl.gov http://www.globus.org/ Copyright (c) 2002 University of Chicago and The University
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationConcepts and Architecture of the Grid. Summary of Grid 2, Chapter 4
Concepts and Architecture of the Grid Summary of Grid 2, Chapter 4 Concepts of Grid Mantra: Coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations Allows
More informationPROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES
M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC
More informationCluster, Grid, Cloud Concepts
Cluster, Grid, Cloud Concepts Kalaiselvan.K Contents Section 1: Cluster Section 2: Grid Section 3: Cloud Cluster An Overview Need for a Cluster Cluster categorizations A computer cluster is a group of
More informationAlternatives to SNMP and Challenges in Management Protocols. Communication Systems Seminar Talk 10 Francesco Luminati
Alternatives to SNMP and Challenges in Management Protocols Communication Systems Seminar Talk 10 Francesco Luminati Introduction Structure Network management Management approaches SNMP Alternatives: NetConf
More informationSecuring Web Services From Encryption to a Web Service Security Infrastructure
Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager
More informationCS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
More informationEnterprise Security Interests Require SSL with telnet server from outside the LAN
Create and Use an SSL on Goals Provide secure and encrypted 5250 data stream conversations with the server (including authentication) use a digital certificate we create with Digital Manager Show a client
More informationJava Security Web Services Security (Overview) Lecture 9
Java Security Web Services Security (Overview) Lecture 9 Java 2 Cryptography Java provides API + SPI for crypto functions Java Cryptography Architecture Security related core classes Access control and
More informationLotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
More informationGS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
More informationSecurity Overview Introduction Application Firewall Compatibility
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
More informationRicoh HotSpot Printer/MFP Whitepaper Version 4_r4
Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4 Table of Contents Introduction... 3 What is a HotSpot Printer?... 3 Understanding the HotSpot System Architecture... 4 Reliability of HotSpot Service...
More informationVirtual Hosting Environments for Online Gaming TG6 TG8 Meeting Paris 2008 David Brossard Senior Researcher BT CTO
Virtual Hosting Environments for Online Gaming TG6 TG8 Meeting Paris 2008 David Brossard Senior Researcher BT CTO Involved Partners: ANDAGO, ATOS, BT, CRMPA, URJC Table of Contents 1. BEinGRID Overview
More information1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5
Table of Contents 1. Introduction 2 2. What is Axis Camera Station? 3 3. What is Viewer for Axis Camera Station? 4 4. AXIS Camera Station Service Control 5 5. Configuring Ports 7 5.1 Creating New Inbound
More informationWeb Service Robust GridFTP
Web Service Robust GridFTP Sang Lim, Geoffrey Fox, Shrideep Pallickara and Marlon Pierce Community Grid Labs, Indiana University 501 N. Morton St. Suite 224 Bloomington, IN 47404 {sblim, gcf, spallick,
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationCloud Computing. Lecture 5 Grid Case Studies 2014-2015
Cloud Computing Lecture 5 Grid Case Studies 2014-2015 Up until now Introduction. Definition of Cloud Computing. Grid Computing: Schedulers Globus Toolkit Summary Grid Case Studies: Monitoring: TeraGRID
More informationINUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
More informationThe Advantages of a Firewall Over an Interafer
FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection
More informationAgenda. How to configure
dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
More informationComputer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
More informationHow Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
More information21st Century Cyber Security Challenges
21st Century Cyber Security Challenges A Perspective From Large-Scale Global Enterprise M. Huang The Boeing Company BOEING is a trademark of Boeing Management Company. Huang, FORWARD, 2008 Real-life
More informationCA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
More informationPRACE WP4 Distributed Systems Management. Riccardo Murri, CSCS Swiss National Supercomputing Centre
PRACE WP4 Distributed Systems Management Riccardo Murri, CSCS Swiss National Supercomputing Centre PRACE WP4 WP4 is the Distributed Systems Management activity User administration and accounting Distributed
More informationForward proxy server vs reverse proxy server
Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose
More informationGrid Technology in Civil Engineering
University of Ljubljana Faculty of Civil and Geodetic Engineering, Institute of Civil Enegineering, Earthquake Engineering and Construction IT, Chair of Construction Informatics Grid Technology in Civil
More informationXSEDE Service Provider Software and Services Baseline. September 24, 2015 Version 1.2
XSEDE Service Provider Software and Services Baseline September 24, 2015 Version 1.2 i TABLE OF CONTENTS XSEDE Production Baseline: Service Provider Software and Services... i A. Document History... A-
More informationAquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
More informationHow To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
More informationGrid Computing @ Sun Carlo Nardone. Technical Systems Ambassador GSO Client Solutions
Grid Computing @ Sun Carlo Nardone Technical Systems Ambassador GSO Client Solutions Phases of Grid Computing Cluster Grids Single user community Single organization Campus Grids Multiple user communities
More informationPCI Compliance Report
PCI Compliance Report Fri Jul 17 14:38:26 CDT 2009 YahooCMA (192.168.20.192) created by FireMon This report is based on the PCI Data Security Standard version 1.2, and covers control items related to Firewall
More informationWorkday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
More informationReverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
More informationCommuniTake Remote Support (CRS) Technical FAQs
CommuniTake Remote Support (CRS) Technical FAQs INTRODUCTION The CommuniTake Remote Support (CRS) solution empowers enterprise IT personnel to centrally manage mobile device assets, deliver high quality
More informationClassic Grid Architecture
Peer-to to-peer Grids Classic Grid Architecture Resources Database Database Netsolve Collaboration Composition Content Access Computing Security Middle Tier Brokers Service Providers Middle Tier becomes
More informationB. KTT Web-based File Transfer
B. KTT Web-based File Transfer The Key Total Treasury Internet File Transfer module allows clients to upload or download data files to/from KeyBank s transmission platform using a PC and Internet browser.
More informationPcounter Mobile Guide
Pcounter Mobile Guide Pcounter Mobile Guide 2012.06.22 Page 1 of 19 1. Overview... 3 2. Pre-requisites and Requirements... 4 2.1 Gateway server requirements... 4 2.2 Mobile device requirements... 4 2.3
More informationHow To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
More informationEMR Link Server Interface Installation
EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at support@bonecomputer.com, or call
More informationEfficient use of limited bandwidth and assuring response for mission-critical applications
Bandwidth Control Bandwidth Control Function Efficient use of limited bandwidth and assuring response for mission-critical applications Allocate bandwidth by judging address, port #, applications or URLs
More informationElectronic Service Agent TM. Network and Transmission Security And Information Privacy
Electronic Service Agent TM and Transmission Security And Information Privacy Electronic Services January 2006 Introduction IBM Electronic Service Agent TM is a software application responsible for collecting
More informationOn Enabling Hydrodynamics Data Analysis of Analytical Ultracentrifugation Experiments
On Enabling Hydrodynamics Data Analysis of Analytical Ultracentrifugation Experiments 18. June 2013 Morris Reidel, Shahbaz Memon, et al. Outline Background Ultrascan Application Ultrascan Software Components
More informationGridWay: Open Source Meta-scheduling Technology for Grid Computing
: Open Source Meta-scheduling Technology for Grid Computing Ruben S. Montero dsa-research.org Open Source Grid & Cluster Oakland CA, May 2008 Contents Introduction What is? Architecture & Components Scheduling
More informationUNICORE s UNICORECC Toolbox and SDKs
.NET High Level API (NHiLA) Bridging the Gap between.net and UNICORE Torun, 07.07.2011 Authors: Michael Gerhards, Sascha Skorupa, Daniel Krott, Volker Sander FH AACHEN UNIVERSITY OF APPLIED SCIENCES DANIEL
More informationCareGiver Remote Support Information Technology FAQ
CareGiver Remote Support Information Technology FAQ CareGiver remote support Information Technology FAQ Purpose The purpose of this document is to answer Frequently Asked Questions (FAQs) regarding CareGiver
More informationThe Secure Web Access Solution Includes:
F5 - AppDome Partnership F5 and AppDome share a vision that BYOD users should benefit from secure access to enterprise internal portals for increased productivity. With the exponential growth of mobile
More informationGridFTP: A Data Transfer Protocol for the Grid
GridFTP: A Data Transfer Protocol for the Grid Grid Forum Data Working Group on GridFTP Bill Allcock, Lee Liming, Steven Tuecke ANL Ann Chervenak USC/ISI Introduction In Grid environments,
More informationA Web Services Data Analysis Grid *
A Web Services Data Analysis Grid * William A. Watson III, Ian Bird, Jie Chen, Bryan Hess, Andy Kowalski, Ying Chen Thomas Jefferson National Accelerator Facility 12000 Jefferson Av, Newport News, VA 23606,
More informationGRID Computing and Networks
A Member of the ExperTeam Group GRID Computing and Networks Karl Solchenbach Global IPv6 Summit Madrid, May 14, 2003 Pallas GmbH Hermülheimer Straße 10 D-50321 Brühl, Germany info@pallas.de http://www.pallas.com
More informationOMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration
OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration Instructor-Led Training For versions 9.0, 9.01, & 9.10 OVERVIEW This 5-day instructor-led course focuses on advanced administration topics
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505
INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this
More informationGlobus Toolkit Firewall Requirements. Abstract
Globus Toolkit Firewall Requirements Version 9 10/31/06 Von Welch, NCSA/U. of Illinois vwelch@ncsa.uiuc.edu Abstract This document provides requirements and guidance to firewall administrators at sites
More informationDreamFactory Security Whitepaper Customer Information about Privacy and Security
DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory
More informationCreating Web Services in NetBeans
Creating Web Services in NetBeans Fulvio Frati fulvio.frati@unimi.it Sesar Lab http://ra.crema.unimi.it 1 Outline Web Services Overview Creation of a Web Services Server Creation of different Web Services
More informationCVIMO Deployment of a Cyber-infrastructure on top of TRENCADIS Architecture to Share and Create DICOM Studies and Structured Reports
CVIMO Deployment of a Cyber-infrastructure on top of TRENCADIS Architecture to Share and Create DICOM Studies and Structured Reports Ignacio Blanquer Vicente Hernández Universidad Politécnica de Valencia
More informationCISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
More informationFicha técnica de curso Código: IFCAD111
Curso de: Objetivos: Managing Cisco Network Security: Building Rock-Solid Networks Dar a conocer la filosofía CISCO desde el punto de vista de la seguridad y como construir una red solidad. Como hacer
More informationTeraPaths: A QoS Collaborative Data Sharing Infrastructure for Petascale Computing Research
TeraPaths: A QoS Collaborative Data Sharing Infrastructure for Petascale Computing Research Bruce Gibbard & Dantong Yu High-Performance Network Research PI Meeting September 28-30, 2005 Brookhaven National
More informationA Web-based Portal to Access and Manage WNoDeS Virtualized Cloud Resources
A Web-based Portal to Access and Manage WNoDeS Virtualized Cloud Resources Davide Salomoni 1, Daniele Andreotti 1, Luca Cestari 2, Guido Potena 2, Peter Solagna 3 1 INFN-CNAF, Bologna, Italy 2 University
More informationOmniServer UA Interface Tutorial. A Guide to Configuring the OmniServer OPC UA Server Settings
OmniServer UA Interface Tutorial A Guide to Configuring the OmniServer OPC UA Server Settings Page 2 of 14 Table of Contents INTRODUCTION 3 Introduction to OPC UA 3 Introduction to OmniServer 4 Intended
More informationOnline Steering of HEP Applications
Online Steering of HEP Applications Daniel Lorenz University of Siegen Darmstadt, 27. 4. 2006 HEPCG Workshop Daniel Max Mustermann Lorenz Online steering Folientitel of HEP applications HEPCG Veranstaltung
More informationSecurity Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
More informationUBS KeyLink Quick reference WEB Installation Guide
ab UBS KeyLink Quick reference WEB Installation Guide Table of contents 1. Introduction 3 1.1. Why is an Installation needed? 3 1.2. Is UBS KeyLink secure? 3 1.3. Information about Secure Sockets Layer
More informationRequirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
More informationAccess control policy: Role-based access
Access control policy: Role-based access As subjects (a person or automated agent) often change roles within an organization, it is best to define an access control policy based on the roles they play.
More informationKEY FEATURES. EASY ACCESS Through web browser for both clients and administrators CLIENT MONITORING. Not dependant on access to site network
Remote monitoring of all sites in one tool Monitor energy and performance on multiple sites Statistics on energy produced Instant status overview KPI (Key Performance Indicators) Alarms Detect underperforming
More informationJPMorgan Chase Treasury Workstation. Certification Setup Guide Version 2.0
EMENTS JPMorgan Chase Treasury Workstation Certification Setup Guide Version 2.0 December 2010 TABLE OF CONTENTS Introduction... 1 About this Guide... 1 When to Create the Certificates... 2 Getting Help...
More informationWeb Services and other IVOA GWS works, Workflow,
OV France Theory Meeting 5-6 April 2006 Web Services and other IVOA GWS works, Workflow, André Schaaff, CDS André Journée Schaaff Calculs OV et France Données Theory distribués Meeting Web Services : a
More informationIntegration strategy
C3-INAD and ESGF: Integration strategy C3-INAD Middleware Team: Stephan Kindermann, Carsten Ehbrecht [DKRZ] Bernadette Fritzsch [AWI] Maik Jorra, Florian Schintke, Stefan Plantikov [ZUSE Institute] Markus
More informationSVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
More informationGV-iView HD V1 for ipad
GV-iView HD V1 for ipad Article ID: GV10-11-03-07 Release Date: 03/07/2011 GV-iView HD V1 function is introduced to support ipad for the mobile surveillance application. System Requirements Handheld Device
More informationHome Gateway Enabling Evolution of Network Services
Home Gateway Enabling Evolution of Network Services V Tomohiro Ishihara V Kiyoshi Sukegawa V Hirokazu Shimada (Manuscript received July 3, 2006) Broadband access services have spread rapidly and are now
More informationCTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
More informationCloudbuz at Glance. How to take control of your File Transfers!
How to take control of your File Transfers! A MFT solution for ALL organisations! Cloudbuz is a MFT (Managed File Transfer) platform for organisations and businesses installed On-Premise or distributed
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : 920-440 Title : nncde wireless lan Version : DEMO 1. A customer wants to access the Microsoft Outlook Web Access application through
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
More informationRequirement Priority Name Requirement Text Response Comment
N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with
More informationGlobus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
More informationintroducing The BlackBerry Collaboration Service
Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013
More informationSTUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. venkadeshkumaresan@yahoo.co.in 2 Professor-CSC
More informationmylabor Labor Management Solution for RES
mylabor Labor Management Solution for RES In efforts to streamline the task of labor management in the hospitality industry, MICROS has developed the comprehensive mylabor product. This application is
More informationRepeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
More informationSOA Blueprints Concepts
TECHNICAL SPECIFICATION Draft v0.5 (For Public Review) A move to drive industry standardization of SOA concepts and terminology http://www.middlewareresearch.com The Middleware Company Research Team Steve
More information