The TEK System: Browsing the Web in Low- Connectivity Communities
|
|
- Malcolm Ryan
- 7 years ago
- Views:
Transcription
1 The System: Browsing the Web in Low- Connectivity Communities Bill Thies, Libby Levison, Saman Amarasinghe MIT Laboratory for Computer Science
2 Web Browsing: Current Method
3 Web Browsing: Current Method 1. Connect to
4 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply
5 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results
6 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend
7 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend
8 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply
9 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply
10 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply 6. Read through site
11 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply 6. Read through site 7. If site down or not useful, look for other sites
12 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply 6. Read through site 7. If site down or not useful, look for other sites
13 Web Browsing: Current Method What are the barriers to access? 1. High telephone fees 2. High fees 3. Low-Bandwidth 4. Low-Connectivity
14 Web Browsing: Current Method What are the barriers to access? 1. High telephone fees 2. High fees 3. Low-Bandwidth 4. Low-Connectivity Should minimize time online
15 Web Browsing: Current Method What are the barriers to access? 1. High telephone fees 2. High fees 3. Low-Bandwidth 4. Low-Connectivity Should minimize time online Should minimize data transfer
16 Web Browsing: Current Method What are the barriers to access? 1. High telephone fees Should minimize time online 2. High fees 3. Low-Bandwidth Should minimize data transfer 4. Low-Connectivity Current method is inappropriate!
17 Web Browsing: Approach Solution has two components:
18 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results
19 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web
20 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web
21 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web
22 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web
23 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web
24 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web
25 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web
26 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web
27 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web
28 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web
29 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web : Time Equals Knowledge
30 Outline Protocol Details Rationale Server Details Current Status / Demo
31 Outline Protocol Details Rationale Server Details Current Status / Demo
32 Protocol Details
33 Protocol Details PROXY 0. Install proxy server on machine
34 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy
35 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected
36 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy
37 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy
38 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy
39 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy
40 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries
41 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries
42 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries
43 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries
44 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries
45 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries
46 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries
47 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
48 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
49 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
50 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
51 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
52 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
53 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
54 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
55 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
56 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
57 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
58 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies
59 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies 6. Administrator finds results in and opens them
60 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies 6. Administrator finds results in and opens them
61 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies 6. Administrator finds results in and opens them 7. Users can view results on future logins
62 Protocol Details PROXY Additional features 1. Accumulates digital reference library on client 2. Reliable -based communication protocol
63 Outline Protocol Details Rationale Server Details Current Status / Demo
64 Rationale I: Decreased Cost accounts cheaper than web access Phone lines are cheaper, clearer, and more stable during off-peak hours Connection time is shorter User reads pages offline, not while connected Content is direct from, not a distant server Results are more compact due to Server Local web cache can prevent some searches
65 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
66 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
67 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
68 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
69 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
70 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
71 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
72 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
73 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
74 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
75 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
76 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server
77 Rationale III: Improved Convenience Sending at night: Frees telephone for other daytime uses Avoids daytime traffic in connecting to Offline viewing of results is quick and reliable More people can use computer during daytime More relevant results thanks to server
78 Outline Protocol Details Rationale Server Details Current Status / Demo
79 Server Details Extensive server-side processing Optimized for bandwidth, not speed Gathers pages from other search engines Filtering Removes duplicate or similar pages Looks for paragraph text, not just links Dither or remove images Compresses the result set Keeps track of each Avoids sending a page twice to a given machine Enables more intelligent page ranking
80 Outline Protocol Details Rationale Server Details Current Status / Demo
81 Status Fully-functional prototype of system Implemented in Java Looking for s by summer 2002 Future Work More intelligent query-builder on client Consider multi-language interfaces Demo
Searching the World Wide Web in Low-Connectivity Communities
Searching the World Wide Web in Low-Connectivity Communities William Thies, Janelle Prevost, Tazeen Mahtab, Genevieve T. Cuevas, Saad Shakhshir, Alexandro Artola, Binh D. Vo, Yuliya Litvak, Sheldon Chan,
More informationProviding Web Search Capability for Low-Connectivity Communities
Providing Web Search Capability for Low-Connectivity Communities Libby Levison, William Thies, Saman Amarasinghe MIT Laboratory for Computer Science libby@mit.edu, thies@mit.edu, saman@lcs.mit.edu Abstract
More informationInternet Content Distribution
Internet Content Distribution Chapter 2: Server-Side Techniques (TUD Student Use Only) Chapter Outline Server-side techniques for content distribution Goals Mirrors Server farms Surrogates DNS load balancing
More informationCyclope Internet Filtering Proxy. - Installation Guide -
Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6
More informationUser Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
More informationThe full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
More informationDOSarrest Security Services (DSS) Version 4.0
DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that
More informationA Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 cernyto3@fel.cvut.cz Michael J. Donahoo 2 jeff_donahoo@baylor.edu Abstract: One of the main goals of web application
More informationSiemens HiPath ProCenter Multimedia
Siemens HiPath ProCenter Multimedia Today s business climate is tougher than ever, and chances are your competitors are no longer just a local concern. All this means finding ways of improving customer
More informationBuilding native mobile apps for Digital Factory
DIGITAL FACTORY 7.0 Building native mobile apps for Digital Factory Rooted in Open Source CMS, Jahia s Digital Industrialization paradigm is about streamlining Enterprise digital projects across channels
More informationUser Guide FOR TOSHIBA STORAGE PLACE
User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationWhat Is Ad-Aware Update Server?
Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying
More informationCSSEA Helpdesk User Guide
CSSEA Helpdesk User Guide Contents I. Creating tickets... 3 1. Creating a New Ticket via Email... 3 a. Email format... 3 b. New ticket reply... 3 2. Creating a New ticket via the Website... 4 a. Browse
More informationWebsense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
More informationGlobal Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
More informationHow to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server
How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server Copyright notice Panda Security 2010. All rights reserved. Neither the documents nor the programs
More informationNetworks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
More informationNETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
More informationHow To Export Data From Exchange To A Mailbox On A Pc Or Macintosh (For Free) With A Gpl Or Ipa (For A Free) Or Ipo (For Cheap) With An Outlook 2003 Or Outlook 2007 (For An Ub
Exchange Client Quick Start Guide GAPC Hosted Exchange Client Guide Page 1 of 12 Client Requirements Hosted Exchange requires Outlook 2003 and Windows XP for MAPI access to your hosted Exchange mailboxes,
More informationInternet Safety for Kids and Adults
Net@office Net@office differs from Proxy in two significant areas: features & configurability. Net@office has advanced features like web page caching, site filtering, privacy options, traffic logging and
More informationWeb Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony
Web Tap: Detecting Covert Web Traffic Presented By: Adam Anthony Outline Problem Description Web Tap's Goals Web Tap's Significance Threat Model Implementation Evaluation Future Work Conclusion Typical
More informationRepeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
More informationTechnical Guide for Remote access
Technical Guide for Remote access Frequently Asked Questions about using EZ Proxy to access Library resources off campus. Login Help Who is allowed access? I m having trouble logging in. Finding Articles
More informationConfiguring Microsoft IIS 5.0 With Pramati Server
Configuring Microsoft IIS 5.0 With Pramati Server 46 Microsoft Internet Information Services 5.0 is a built-in web server that comes with Windows 2000 operating system. An earlier version, IIS 4.0, is
More informationRemote Access and Control of the. Programmer/Controller. Version 1.0 9/07/05
Remote Access and Control of the Programmer/Controller Version 1.0 9/07/05 Remote Access and Control... 3 Introduction... 3 Installing Remote Access Viewer... 4 System Requirements... 4 Activate Java console...
More informationUsing email over FleetBroadband
Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationP&WC Portal Settings. 1) Portal Language Setting:
P&WC Portal Settings In order to set your Internet Explorer Browser and to resolve a few specific issues that users of the P&WC Portal might have, we recommend that you change a few settings in your browser.
More informationHow-to setup a proxy in the cloud
This article describes the setup of a proxy-server in a cloud. You can use a proxy like this from everywhere through the internet. Reasons to do this could be: Your internet access is filtered but you
More informationSo in order to grab all the visitors requests we add to our workbench a non-test-element of the proxy type.
First in oder to configure our test case, we need to reproduce our typical browsing path containing all the pages visited by the visitors on our systems. So in order to grab all the visitors requests we
More informationAxapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA
MICROSOFT BUSINESS SOLUTIONS AXAPTA Axapta Object Server Microsoft Business Solutions Axapta Object Server minimises bandwidth requirements and ensures easy, efficient and homogeneous client deployment.
More informationLab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
More informationCyclope Internet Filtering Proxy
Cyclope Internet Filtering Proxy - Installation Guide - Cyclope-Series - 2010 - Table of contents 1. Overview - 3-2. Installation - 4-2.1. System requirements - 4-2.2. Cyclope Internet Filtering Proxy
More informationInstallation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
More informationIAS Portal Staff User Guide
IAS Portal Staff User Guide Division of Information Technology February 2016 Contents Document Management History... 3 Navigating This Guide... 4 Introduction... 4 Getting Started... 4 Using the IAS Portal...
More informationElluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
More informationBuilding Java Servlets with Oracle JDeveloper
Building Java Servlets with Oracle JDeveloper Chris Schalk Oracle Corporation Introduction Developers today face a formidable task. They need to create large, distributed business applications. The actual
More informationUser Documentation Web Traffic Security. University of Stavanger
User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...
More informationTIBCO Spotfire Metrics Prerequisites and Installation
TIBCO Spotfire Metrics Prerequisites and Installation Software Release 6.0 November 2013 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF
More informationCA APM Cloud Monitor. Scripting Guide. Release 8.2
CA APM Cloud Monitor Scripting Guide Release 8.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for
More informationDevelopment of Open Source RESTful WHOIS. Haikuo Zhang
Development of Open Source RESTful WHOIS Haikuo Zhang Why We Need a New WHOIS Protocol WHOIS Protocol (RFC 3912) has problems WHOIS has never been internationalized WHOIS was defined for ASCII only WHOIS
More informationSurfCop for Microsoft ISA Server. System Administrator s Guide
SurfCop for Microsoft ISA Server System Administrator s Guide Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know
More informationCA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
More informationA Reliable Low Bandwidth Email-based Communication Protocol
A Reliable Low Bandwidth Email-based Communication Protocol by Janelle Kenty-Joan Prevost S.B., Mathematics Massachusetts Institute of Technology (2000) Submitted to the Department of Electrical Engineering
More informationDOSarrest Security Services (DSS) Version 4.0
DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that
More informationMSGCU SECURE MESSAGE CENTER
MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and
More informationAspera Connect User Guide
Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect
More informationV Series Rapid Deployment Version 7.5
V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation
More informationPass Through Proxy. How-to. Overview:..1 Why PTP?...1
Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example
More informationElluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
More informationProxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
More informationIBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
More informationZimbra Connector for Outlook User Guide. Release 6.0
Zimbra Connector for Outlook User Guide Release 6.0 Network Edition August 2010 Legal Notices Copyright 2005-2010 Zimbra, Inc. All rights reserved. Zimbra and the Zimbra logo are trademarks of Zimbra.
More informationCSA Helpdesk User Guide
CSA Helpdesk User Guide CSA Helpdesk User Guide 1 Creating Tickets 1.1 1.2 Creating a New Ticket via Email 4 Creating a New Ticket via the Website 7 2 Account Management 2.1 2.2 2.3 Logging in to your
More informationContent Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
More informationWorking with your NTU email off campus
Working with your NTU email off campus When you are working on a laptop or at home you can access your email via a number of methods. Using Outlook Web Access or NOW, you can access your email via any
More informationUnderstanding SofaWare Management Portal URL Filtering. S-box Solutions. Rolf Wagner
Understanding SofaWare Management Portal URL Filtering S-box Solutions Prepared by Rolf Wagner Document Date: 3/16/2002 Check Point Software Technologies Inc. Three Lagoon Drive Redwood City, CA 94065
More informationTutorial: Load Testing with CLIF
Tutorial: Load Testing with CLIF Bruno Dillenseger, Orange Labs Learning the basic concepts and manipulation of the CLIF load testing platform. Focus on the Eclipse-based GUI. Menu Introduction about Load
More informationGetting Started Guide
Cove r Business-Oriented Network Management Solution Getting Started Guide (UPM 4.1) Copyright 2015 Colasoft LLC. All rights reserved. 0 UPM Activation Input the IP address of UPM server in the address
More informationDEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
More informationHelp. F-Secure Online Backup
Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating
More informationSYSTEM DEVELOPMENT AND IMPLEMENTATION
CHAPTER 6 SYSTEM DEVELOPMENT AND IMPLEMENTATION 6.0 Introduction This chapter discusses about the development and implementation process of EPUM web-based system. The process is based on the system design
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationA Guide to Getting Started with Successful Load Testing
Ingenieurbüro David Fischer AG A Company of the Apica Group http://www.proxy-sniffer.com A Guide to Getting Started with Successful Load Testing English Edition 2007 All Rights Reserved Table of Contents
More informationDEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
More information<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
More informationNorthwestern University Dell Kace Patch Management
Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.
More informationZimbra Connector for Outlook User Guide. Release 6.0
Zimbra Connector for Outlook User Guide Release 6.0 Network Edition August 2009 Legal Notices Copyright 2009. Yahoo! Inc. All rights reserved. Zimbra is a trademark of Yahoo!. No part of this document
More informationFast Innovation requires Fast IT
Fast Innovation requires Fast IT 2014 Cisco and/or its affiliates. All rights reserved. 2 2014 Cisco and/or its affiliates. All rights reserved. 3 IoT World Forum Architecture Committee 2013 Cisco and/or
More informationChecking Browser Settings, and Basic System Requirements for QuestionPoint
Checking Browser Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply
More informationConfiguring Network Load Balancing with Cerberus FTP Server
Configuring Network Load Balancing with Cerberus FTP Server May 2016 Version 1.0 1 Introduction Purpose This guide will discuss how to install and configure Network Load Balancing on Windows Server 2012
More informationQuick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
More informationHow To Install A New Database On A 2008 R2 System With A New Version Of Aql Server 2008 R 2 On A Windows Xp Server 2008 (Windows) R2 (Windows Xp) (Windows 8) (Powerpoint) (Mysql
Microsoft SQL Server Express 2008 R2 Install on Windows Server 2008 r2 for HoleBASE SI The following guide covers setting up a SQL server Express 2008 R2 system and adding a new database and user for HoleBASE
More informationOn the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
More informationCreated by: David Marriner. Updated by: Cliff Nicolai Version no: V1.2 Date Last Modified: November 2010
ICT SECURITY RESPONDING TO WEBSITES THAT YOU NEED TO BLOCK IN EDUCONNECT FS 150-12 Created by: David Marriner. Updated by: Cliff Nicolai Version no: V1.2 Date Last Modified: November 2010 RESPONDING TO
More informationAnonymity on the Internet Over Proxy Servers
Anonymity on the Internet Over Proxy Servers Final Product Fábio Rodrigues ei08116@fe.up.pt Matej Bulić ei12010@fe.up.pt Introduction user always leaves digital sign need for security and anonymity Proxy
More informationDeploying the BIG-IP System with Oracle E-Business Suite 11i
Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system
More informationBITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3
BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3 Aim: To give an introduction to HTTP, SMTP, & DNS, and observe the packets in a LAN network. HTTP (Hypertext
More informationZimbra Connector for Microsoft Outlook User Guide 7.1
Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
More informationAppLoader7. Windows Server 2008 Injector Optimization. Protocol Independent Load Testing
AppLoader7 Windows Server 2008 Injector Optimization Protocol Independent Load Testing CONTENTS PREREQUISITES... 3 INTRODUCTION... 3 INJECTOR OPTIMIZATIONS... 3 GROUP POLICY CONFIGURATIONS... 3 Internet
More informationHTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
More informationJava Secure Application Manager
Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6
More informationApache Traffic Server Extensible Host Resolution
Apache Traffic Server Extensible Host Resolution at ApacheCon NA 2014 Speaker Alan M. Carroll, Apache Member, PMC Started working on Traffic Server in summer 2010. Implemented Transparency, IPv6, range
More informationHow To Set Up An Openfire With Libap On A Cdd (Dns) On A Pc Or Mac Or Ipad (Dnt) On An Ipad Or Ipa (Dn) On Your Pc Or Ipo (D
1 of 8 2/6/2012 8:52 AM Home OpenFire XMPP (Jabber) Server OpenFire Active Directory LDAP integration Sat, 01/05/2010-09:49 uvigii Contents 1. Scenario 2. A brief introduction to LDAP protocol 3. Configure
More informationInterpreting Web Analytics Data
Interpreting Web Analytics Data Whitepaper 8650 Commerce Park Place, Suite G Indianapolis, Indiana 46268 (317) 875-0910 info@pentera.com www.pentera.com Interpreting Web Analytics Data At some point in
More informationVersion 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform
Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically
More informationIntelligent Video Analytics. Server Installation Guide. - Windows - Linux
Intelligent Video Analytics Server Installation Guide - Windows - Linux 1) General Information... 2 2) Viasys on Windows PCs... 3 3) Viasys on Linux PCs... 7 4) Viasys Server Support Package... 10 Offices:
More informationSecure Global Desktop (SGD)
Secure Global Desktop (SGD) Table of Contents Checking your Java Version...3 Preparing Your Desktop Computer...3 Accessing SGD...5 Logging into SGD...6 Using SGD to Access Your Desktop...7 Using SGD to
More informationHOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It
More informationCORE Enterprise on a WAN
CORE Enterprise on a WAN CORE Product and Process Engineering Solutions Copyright 2006-2007 Vitech Corporation. All rights reserved. No part of this document may be reproduced in any form, including, but
More informationSupport to Reading Groups
Support to Reading Groups Purpose: To set out the basis on which stock is supplied to Reading Groups and to outline other forms of support offered. Libraries & Information will support Reading Groups by
More informationData Discovery on the Information Highway
Data Discovery on the Information Highway Susan Gauch Introduction Information overload on the Web Many possible search engines Need intelligent help to select best information sources customize results
More informationFAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
More informationZimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0
Zimbra Connector for Microsoft Outlook User Guide Network Edition 7.0 February 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international
More informationBest practice for SwiftBroadband
Best practice for SwiftBroadband Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationwww.wit.tafensw.edu.au
CONNECTING TO WIRELESS NETWORK TAFE WESTERN CONNECTING TO WIRELESS NETWORK iphone/ipod Touch, ipad, Internet Explorer, Firefox TAFE Western provides wireless access for staff and students via the TAFE-Guest
More informationHP WebInspect Tutorial
HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the
More informationMcAfee Product Entitlement Definitions
McAfee Product Entitlement Definitions McAfee. Part of Intel Security. 2821 Mission College Blvd Santa Clara, CA 95054 www.intelsecurity.com Application Server CPU CPU Core Database An Application Server
More informationCarisbrooke. End User Guide
Carisbrooke Contents Contents... 2 Introduction... 3 Negotiate Kerberos/NTLM... 4 Scope... 4 What s changed... 4 What hasn t changed... 5 Multi-Tenant Categories... 6 Scope... 6 What s changed... 6 What
More informationNote that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.
USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure
More information