The TEK System: Browsing the Web in Low- Connectivity Communities

Size: px
Start display at page:

Download "The TEK System: Browsing the Web in Low- Connectivity Communities"

Transcription

1 The System: Browsing the Web in Low- Connectivity Communities Bill Thies, Libby Levison, Saman Amarasinghe MIT Laboratory for Computer Science

2 Web Browsing: Current Method

3 Web Browsing: Current Method 1. Connect to

4 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply

5 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results

6 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend

7 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend

8 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply

9 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply

10 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply 6. Read through site

11 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply 6. Read through site 7. If site down or not useful, look for other sites

12 Web Browsing: Current Method 1. Connect to 2. Send query to search engine, wait for reply 3. Read through results 4. If results bad, revise query and resend 5. If results good, click on site, wait for reply 6. Read through site 7. If site down or not useful, look for other sites

13 Web Browsing: Current Method What are the barriers to access? 1. High telephone fees 2. High fees 3. Low-Bandwidth 4. Low-Connectivity

14 Web Browsing: Current Method What are the barriers to access? 1. High telephone fees 2. High fees 3. Low-Bandwidth 4. Low-Connectivity Should minimize time online

15 Web Browsing: Current Method What are the barriers to access? 1. High telephone fees 2. High fees 3. Low-Bandwidth 4. Low-Connectivity Should minimize time online Should minimize data transfer

16 Web Browsing: Current Method What are the barriers to access? 1. High telephone fees Should minimize time online 2. High fees 3. Low-Bandwidth Should minimize data transfer 4. Low-Connectivity Current method is inappropriate!

17 Web Browsing: Approach Solution has two components:

18 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results

19 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web

20 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web

21 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web

22 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web

23 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web

24 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web

25 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web

26 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web

27 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web

28 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web

29 Web Browsing: Approach Solution has two components: 1. Server returns low-bandwidth results 2. Transfer all data through , not http - Connect only to send/receive , not to browse web : Time Equals Knowledge

30 Outline Protocol Details Rationale Server Details Current Status / Demo

31 Outline Protocol Details Rationale Server Details Current Status / Demo

32 Protocol Details

33 Protocol Details PROXY 0. Install proxy server on machine

34 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy

35 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected

36 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy

37 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy

38 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy

39 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy

40 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

41 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

42 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

43 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

44 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

45 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

46 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries

47 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

48 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

49 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

50 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

51 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

52 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

53 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

54 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

55 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

56 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

57 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

58 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies

59 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies 6. Administrator finds results in and opens them

60 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies 6. Administrator finds results in and opens them

61 Protocol Details PROXY 0. Install proxy server on machine 1. Users start web browser and login to proxy 2. Browse local web pages as if they were connected 3. If page is not local, enqueue a search query in proxy 4. When convenient, proxy connects to and sends queries 5. Server performs search, filters results and replies 6. Administrator finds results in and opens them 7. Users can view results on future logins

62 Protocol Details PROXY Additional features 1. Accumulates digital reference library on client 2. Reliable -based communication protocol

63 Outline Protocol Details Rationale Server Details Current Status / Demo

64 Rationale I: Decreased Cost accounts cheaper than web access Phone lines are cheaper, clearer, and more stable during off-peak hours Connection time is shorter User reads pages offline, not while connected Content is direct from, not a distant server Results are more compact due to Server Local web cache can prevent some searches

65 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

66 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

67 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

68 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

69 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

70 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

71 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

72 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

73 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

74 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

75 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

76 Rationale II: Improved Reliability reduces dependence on network Never need continuous path from client to server

77 Rationale III: Improved Convenience Sending at night: Frees telephone for other daytime uses Avoids daytime traffic in connecting to Offline viewing of results is quick and reliable More people can use computer during daytime More relevant results thanks to server

78 Outline Protocol Details Rationale Server Details Current Status / Demo

79 Server Details Extensive server-side processing Optimized for bandwidth, not speed Gathers pages from other search engines Filtering Removes duplicate or similar pages Looks for paragraph text, not just links Dither or remove images Compresses the result set Keeps track of each Avoids sending a page twice to a given machine Enables more intelligent page ranking

80 Outline Protocol Details Rationale Server Details Current Status / Demo

81 Status Fully-functional prototype of system Implemented in Java Looking for s by summer 2002 Future Work More intelligent query-builder on client Consider multi-language interfaces Demo

Searching the World Wide Web in Low-Connectivity Communities

Searching the World Wide Web in Low-Connectivity Communities Searching the World Wide Web in Low-Connectivity Communities William Thies, Janelle Prevost, Tazeen Mahtab, Genevieve T. Cuevas, Saad Shakhshir, Alexandro Artola, Binh D. Vo, Yuliya Litvak, Sheldon Chan,

More information

Providing Web Search Capability for Low-Connectivity Communities

Providing Web Search Capability for Low-Connectivity Communities Providing Web Search Capability for Low-Connectivity Communities Libby Levison, William Thies, Saman Amarasinghe MIT Laboratory for Computer Science libby@mit.edu, thies@mit.edu, saman@lcs.mit.edu Abstract

More information

Internet Content Distribution

Internet Content Distribution Internet Content Distribution Chapter 2: Server-Side Techniques (TUD Student Use Only) Chapter Outline Server-side techniques for content distribution Goals Mirrors Server farms Surrogates DNS load balancing

More information

Cyclope Internet Filtering Proxy. - Installation Guide -

Cyclope Internet Filtering Proxy. - Installation Guide - Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code. Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...

More information

DOSarrest Security Services (DSS) Version 4.0

DOSarrest Security Services (DSS) Version 4.0 DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that

More information

A Tool for Evaluation and Optimization of Web Application Performance

A Tool for Evaluation and Optimization of Web Application Performance A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 cernyto3@fel.cvut.cz Michael J. Donahoo 2 jeff_donahoo@baylor.edu Abstract: One of the main goals of web application

More information

Siemens HiPath ProCenter Multimedia

Siemens HiPath ProCenter Multimedia Siemens HiPath ProCenter Multimedia Today s business climate is tougher than ever, and chances are your competitors are no longer just a local concern. All this means finding ways of improving customer

More information

Building native mobile apps for Digital Factory

Building native mobile apps for Digital Factory DIGITAL FACTORY 7.0 Building native mobile apps for Digital Factory Rooted in Open Source CMS, Jahia s Digital Industrialization paradigm is about streamlining Enterprise digital projects across channels

More information

User Guide FOR TOSHIBA STORAGE PLACE

User Guide FOR TOSHIBA STORAGE PLACE User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

What Is Ad-Aware Update Server?

What Is Ad-Aware Update Server? Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying

More information

CSSEA Helpdesk User Guide

CSSEA Helpdesk User Guide CSSEA Helpdesk User Guide Contents I. Creating tickets... 3 1. Creating a New Ticket via Email... 3 a. Email format... 3 b. New ticket reply... 3 2. Creating a New ticket via the Website... 4 a. Browse

More information

Websense Web Security Gateway: What to do when a Web site does not load as expected

Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.

More information

Global Server Load Balancing

Global Server Load Balancing White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject

More information

How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server

How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server How to configure the Panda GateDefender Performa explicit proxy in a Local User Database or in a LDAP server Copyright notice Panda Security 2010. All rights reserved. Neither the documents nor the programs

More information

Networks and the Internet A Primer for Prosecutors and Investigators

Networks and the Internet A Primer for Prosecutors and Investigators Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()

More information

NETWORKS AND THE INTERNET

NETWORKS AND THE INTERNET NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place

More information

How To Export Data From Exchange To A Mailbox On A Pc Or Macintosh (For Free) With A Gpl Or Ipa (For A Free) Or Ipo (For Cheap) With An Outlook 2003 Or Outlook 2007 (For An Ub

How To Export Data From Exchange To A Mailbox On A Pc Or Macintosh (For Free) With A Gpl Or Ipa (For A Free) Or Ipo (For Cheap) With An Outlook 2003 Or Outlook 2007 (For An Ub Exchange Client Quick Start Guide GAPC Hosted Exchange Client Guide Page 1 of 12 Client Requirements Hosted Exchange requires Outlook 2003 and Windows XP for MAPI access to your hosted Exchange mailboxes,

More information

Internet Safety for Kids and Adults

Internet Safety for Kids and Adults Net@office Net@office differs from Proxy in two significant areas: features & configurability. Net@office has advanced features like web page caching, site filtering, privacy options, traffic logging and

More information

Web Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony

Web Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony Web Tap: Detecting Covert Web Traffic Presented By: Adam Anthony Outline Problem Description Web Tap's Goals Web Tap's Significance Threat Model Implementation Evaluation Future Work Conclusion Typical

More information

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack. Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.

More information

Technical Guide for Remote access

Technical Guide for Remote access Technical Guide for Remote access Frequently Asked Questions about using EZ Proxy to access Library resources off campus. Login Help Who is allowed access? I m having trouble logging in. Finding Articles

More information

Configuring Microsoft IIS 5.0 With Pramati Server

Configuring Microsoft IIS 5.0 With Pramati Server Configuring Microsoft IIS 5.0 With Pramati Server 46 Microsoft Internet Information Services 5.0 is a built-in web server that comes with Windows 2000 operating system. An earlier version, IIS 4.0, is

More information

Remote Access and Control of the. Programmer/Controller. Version 1.0 9/07/05

Remote Access and Control of the. Programmer/Controller. Version 1.0 9/07/05 Remote Access and Control of the Programmer/Controller Version 1.0 9/07/05 Remote Access and Control... 3 Introduction... 3 Installing Remote Access Viewer... 4 System Requirements... 4 Activate Java console...

More information

Using email over FleetBroadband

Using email over FleetBroadband Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

P&WC Portal Settings. 1) Portal Language Setting:

P&WC Portal Settings. 1) Portal Language Setting: P&WC Portal Settings In order to set your Internet Explorer Browser and to resolve a few specific issues that users of the P&WC Portal might have, we recommend that you change a few settings in your browser.

More information

How-to setup a proxy in the cloud

How-to setup a proxy in the cloud This article describes the setup of a proxy-server in a cloud. You can use a proxy like this from everywhere through the internet. Reasons to do this could be: Your internet access is filtered but you

More information

So in order to grab all the visitors requests we add to our workbench a non-test-element of the proxy type.

So in order to grab all the visitors requests we add to our workbench a non-test-element of the proxy type. First in oder to configure our test case, we need to reproduce our typical browsing path containing all the pages visited by the visitors on our systems. So in order to grab all the visitors requests we

More information

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA

Axapta Object Server MICROSOFT BUSINESS SOLUTIONS AXAPTA MICROSOFT BUSINESS SOLUTIONS AXAPTA Axapta Object Server Microsoft Business Solutions Axapta Object Server minimises bandwidth requirements and ensures easy, efficient and homogeneous client deployment.

More information

Lab 8.3.2 Conducting a Network Capture with Wireshark

Lab 8.3.2 Conducting a Network Capture with Wireshark Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web

More information

Cyclope Internet Filtering Proxy

Cyclope Internet Filtering Proxy Cyclope Internet Filtering Proxy - Installation Guide - Cyclope-Series - 2010 - Table of contents 1. Overview - 3-2. Installation - 4-2.1. System requirements - 4-2.2. Cyclope Internet Filtering Proxy

More information

Installation Guide For ChoiceMail Enterprise Edition

Installation Guide For ChoiceMail Enterprise Edition Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004

More information

IAS Portal Staff User Guide

IAS Portal Staff User Guide IAS Portal Staff User Guide Division of Information Technology February 2016 Contents Document Management History... 3 Navigating This Guide... 4 Introduction... 4 Getting Started... 4 Using the IAS Portal...

More information

Elluminate Live! Access Guide. Page 1 of 7

Elluminate Live! Access Guide. Page 1 of 7 This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document

More information

Building Java Servlets with Oracle JDeveloper

Building Java Servlets with Oracle JDeveloper Building Java Servlets with Oracle JDeveloper Chris Schalk Oracle Corporation Introduction Developers today face a formidable task. They need to create large, distributed business applications. The actual

More information

User Documentation Web Traffic Security. University of Stavanger

User Documentation Web Traffic Security. University of Stavanger User Documentation Web Traffic Security University of Stavanger Table of content User Documentation... 1 Web Traffic Security... 1 University of Stavanger... 1 UiS Web Traffic Security... 3 Background...

More information

TIBCO Spotfire Metrics Prerequisites and Installation

TIBCO Spotfire Metrics Prerequisites and Installation TIBCO Spotfire Metrics Prerequisites and Installation Software Release 6.0 November 2013 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF

More information

CA APM Cloud Monitor. Scripting Guide. Release 8.2

CA APM Cloud Monitor. Scripting Guide. Release 8.2 CA APM Cloud Monitor Scripting Guide Release 8.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

Development of Open Source RESTful WHOIS. Haikuo Zhang

Development of Open Source RESTful WHOIS. Haikuo Zhang Development of Open Source RESTful WHOIS Haikuo Zhang Why We Need a New WHOIS Protocol WHOIS Protocol (RFC 3912) has problems WHOIS has never been internationalized WHOIS was defined for ASCII only WHOIS

More information

SurfCop for Microsoft ISA Server. System Administrator s Guide

SurfCop for Microsoft ISA Server. System Administrator s Guide SurfCop for Microsoft ISA Server System Administrator s Guide Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

A Reliable Low Bandwidth Email-based Communication Protocol

A Reliable Low Bandwidth Email-based Communication Protocol A Reliable Low Bandwidth Email-based Communication Protocol by Janelle Kenty-Joan Prevost S.B., Mathematics Massachusetts Institute of Technology (2000) Submitted to the Department of Electrical Engineering

More information

DOSarrest Security Services (DSS) Version 4.0

DOSarrest Security Services (DSS) Version 4.0 DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that

More information

MSGCU SECURE MESSAGE CENTER

MSGCU SECURE MESSAGE CENTER MSGCU SECURE MESSAGE CENTER Welcome to the MSGCU Secure Message Center. Email is convenient, but is it secure? Before reaching the intended recipient, email travels across a variety of public servers and

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

V Series Rapid Deployment Version 7.5

V Series Rapid Deployment Version 7.5 V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation

More information

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1 Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example

More information

Elluminate Live! Access Guide. Page 1 of 7

Elluminate Live! Access Guide. Page 1 of 7 This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document

More information

Proxies. Chapter 4. Network & Security Gildas Avoine

Proxies. Chapter 4. Network & Security Gildas Avoine Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open

More information

IBM Aspera Add-in for Microsoft Outlook 1.3.2

IBM Aspera Add-in for Microsoft Outlook 1.3.2 IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6

More information

Zimbra Connector for Outlook User Guide. Release 6.0

Zimbra Connector for Outlook User Guide. Release 6.0 Zimbra Connector for Outlook User Guide Release 6.0 Network Edition August 2010 Legal Notices Copyright 2005-2010 Zimbra, Inc. All rights reserved. Zimbra and the Zimbra logo are trademarks of Zimbra.

More information

CSA Helpdesk User Guide

CSA Helpdesk User Guide CSA Helpdesk User Guide CSA Helpdesk User Guide 1 Creating Tickets 1.1 1.2 Creating a New Ticket via Email 4 Creating a New Ticket via the Website 7 2 Account Management 2.1 2.2 2.3 Logging in to your

More information

Content Distribution Networks (CDN)

Content Distribution Networks (CDN) 229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the

More information

Working with your NTU email off campus

Working with your NTU email off campus Working with your NTU email off campus When you are working on a laptop or at home you can access your email via a number of methods. Using Outlook Web Access or NOW, you can access your email via any

More information

Understanding SofaWare Management Portal URL Filtering. S-box Solutions. Rolf Wagner

Understanding SofaWare Management Portal URL Filtering. S-box Solutions. Rolf Wagner Understanding SofaWare Management Portal URL Filtering S-box Solutions Prepared by Rolf Wagner Document Date: 3/16/2002 Check Point Software Technologies Inc. Three Lagoon Drive Redwood City, CA 94065

More information

Tutorial: Load Testing with CLIF

Tutorial: Load Testing with CLIF Tutorial: Load Testing with CLIF Bruno Dillenseger, Orange Labs Learning the basic concepts and manipulation of the CLIF load testing platform. Focus on the Eclipse-based GUI. Menu Introduction about Load

More information

Getting Started Guide

Getting Started Guide Cove r Business-Oriented Network Management Solution Getting Started Guide (UPM 4.1) Copyright 2015 Colasoft LLC. All rights reserved. 0 UPM Activation Input the IP address of UPM server in the address

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

Help. F-Secure Online Backup

Help. F-Secure Online Backup Help F-Secure Online Backup F-Secure Online Backup Help... 3 Introduction... 3 What is F-Secure Online Backup?... 3 How does the program work?... 3 Using the service for the first time... 3 Activating

More information

SYSTEM DEVELOPMENT AND IMPLEMENTATION

SYSTEM DEVELOPMENT AND IMPLEMENTATION CHAPTER 6 SYSTEM DEVELOPMENT AND IMPLEMENTATION 6.0 Introduction This chapter discusses about the development and implementation process of EPUM web-based system. The process is based on the system design

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

A Guide to Getting Started with Successful Load Testing

A Guide to Getting Started with Successful Load Testing Ingenieurbüro David Fischer AG A Company of the Apica Group http://www.proxy-sniffer.com A Guide to Getting Started with Successful Load Testing English Edition 2007 All Rights Reserved Table of Contents

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration

More information

<Insert Picture Here> Oracle Web Cache 11g Overview

<Insert Picture Here> Oracle Web Cache 11g Overview Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content

More information

Northwestern University Dell Kace Patch Management

Northwestern University Dell Kace Patch Management Northwestern University Dell Kace Patch Management Desktop Patch Management Best Practices Table of Contents: 1. Audience 2. Definition 3. Patch Approaches 4. Guidelines for Review, Test, and Deploy 5.

More information

Zimbra Connector for Outlook User Guide. Release 6.0

Zimbra Connector for Outlook User Guide. Release 6.0 Zimbra Connector for Outlook User Guide Release 6.0 Network Edition August 2009 Legal Notices Copyright 2009. Yahoo! Inc. All rights reserved. Zimbra is a trademark of Yahoo!. No part of this document

More information

Fast Innovation requires Fast IT

Fast Innovation requires Fast IT Fast Innovation requires Fast IT 2014 Cisco and/or its affiliates. All rights reserved. 2 2014 Cisco and/or its affiliates. All rights reserved. 3 IoT World Forum Architecture Committee 2013 Cisco and/or

More information

Checking Browser Settings, and Basic System Requirements for QuestionPoint

Checking Browser Settings, and Basic System Requirements for QuestionPoint Checking Browser Settings, and Basic System Requirements for QuestionPoint This document covers basic IE settings and system requirements necessary for QuestionPoint. These settings and requirements apply

More information

Configuring Network Load Balancing with Cerberus FTP Server

Configuring Network Load Balancing with Cerberus FTP Server Configuring Network Load Balancing with Cerberus FTP Server May 2016 Version 1.0 1 Introduction Purpose This guide will discuss how to install and configure Network Load Balancing on Windows Server 2012

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

How To Install A New Database On A 2008 R2 System With A New Version Of Aql Server 2008 R 2 On A Windows Xp Server 2008 (Windows) R2 (Windows Xp) (Windows 8) (Powerpoint) (Mysql

How To Install A New Database On A 2008 R2 System With A New Version Of Aql Server 2008 R 2 On A Windows Xp Server 2008 (Windows) R2 (Windows Xp) (Windows 8) (Powerpoint) (Mysql Microsoft SQL Server Express 2008 R2 Install on Windows Server 2008 r2 for HoleBASE SI The following guide covers setting up a SQL server Express 2008 R2 system and adding a new database and user for HoleBASE

More information

On the Deficiencies of Active Network Discovery Systems

On the Deficiencies of Active Network Discovery Systems On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized

More information

Created by: David Marriner. Updated by: Cliff Nicolai Version no: V1.2 Date Last Modified: November 2010

Created by: David Marriner. Updated by: Cliff Nicolai Version no: V1.2 Date Last Modified: November 2010 ICT SECURITY RESPONDING TO WEBSITES THAT YOU NEED TO BLOCK IN EDUCONNECT FS 150-12 Created by: David Marriner. Updated by: Cliff Nicolai Version no: V1.2 Date Last Modified: November 2010 RESPONDING TO

More information

Anonymity on the Internet Over Proxy Servers

Anonymity on the Internet Over Proxy Servers Anonymity on the Internet Over Proxy Servers Final Product Fábio Rodrigues ei08116@fe.up.pt Matej Bulić ei12010@fe.up.pt Introduction user always leaves digital sign need for security and anonymity Proxy

More information

Deploying the BIG-IP System with Oracle E-Business Suite 11i

Deploying the BIG-IP System with Oracle E-Business Suite 11i Deploying the BIG-IP System with Oracle E-Business Suite 11i Introducing the BIG-IP and Oracle 11i configuration Configuring the BIG-IP system for deployment with Oracle 11i Configuring the BIG-IP system

More information

BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3

BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3 BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3 Aim: To give an introduction to HTTP, SMTP, & DNS, and observe the packets in a LAN network. HTTP (Hypertext

More information

Zimbra Connector for Microsoft Outlook User Guide 7.1

Zimbra Connector for Microsoft Outlook User Guide 7.1 Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual

More information

AppLoader7. Windows Server 2008 Injector Optimization. Protocol Independent Load Testing

AppLoader7. Windows Server 2008 Injector Optimization. Protocol Independent Load Testing AppLoader7 Windows Server 2008 Injector Optimization Protocol Independent Load Testing CONTENTS PREREQUISITES... 3 INTRODUCTION... 3 INJECTOR OPTIMIZATIONS... 3 GROUP POLICY CONFIGURATIONS... 3 Internet

More information

HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common

More information

Java Secure Application Manager

Java Secure Application Manager Java Secure Application Manager How-to Introduction:...1 Overview:...1 Operation:...1 Example configuration:...2 JSAM Standard application support:...6 a) Citrix Web Interface for MetaFrame (NFuse Classic)...6

More information

Apache Traffic Server Extensible Host Resolution

Apache Traffic Server Extensible Host Resolution Apache Traffic Server Extensible Host Resolution at ApacheCon NA 2014 Speaker Alan M. Carroll, Apache Member, PMC Started working on Traffic Server in summer 2010. Implemented Transparency, IPv6, range

More information

How To Set Up An Openfire With Libap On A Cdd (Dns) On A Pc Or Mac Or Ipad (Dnt) On An Ipad Or Ipa (Dn) On Your Pc Or Ipo (D

How To Set Up An Openfire With Libap On A Cdd (Dns) On A Pc Or Mac Or Ipad (Dnt) On An Ipad Or Ipa (Dn) On Your Pc Or Ipo (D 1 of 8 2/6/2012 8:52 AM Home OpenFire XMPP (Jabber) Server OpenFire Active Directory LDAP integration Sat, 01/05/2010-09:49 uvigii Contents 1. Scenario 2. A brief introduction to LDAP protocol 3. Configure

More information

Interpreting Web Analytics Data

Interpreting Web Analytics Data Interpreting Web Analytics Data Whitepaper 8650 Commerce Park Place, Suite G Indianapolis, Indiana 46268 (317) 875-0910 info@pentera.com www.pentera.com Interpreting Web Analytics Data At some point in

More information

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically

More information

Intelligent Video Analytics. Server Installation Guide. - Windows - Linux

Intelligent Video Analytics. Server Installation Guide. - Windows - Linux Intelligent Video Analytics Server Installation Guide - Windows - Linux 1) General Information... 2 2) Viasys on Windows PCs... 3 3) Viasys on Linux PCs... 7 4) Viasys Server Support Package... 10 Offices:

More information

Secure Global Desktop (SGD)

Secure Global Desktop (SGD) Secure Global Desktop (SGD) Table of Contents Checking your Java Version...3 Preparing Your Desktop Computer...3 Accessing SGD...5 Logging into SGD...6 Using SGD to Access Your Desktop...7 Using SGD to

More information

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It

More information

CORE Enterprise on a WAN

CORE Enterprise on a WAN CORE Enterprise on a WAN CORE Product and Process Engineering Solutions Copyright 2006-2007 Vitech Corporation. All rights reserved. No part of this document may be reproduced in any form, including, but

More information

Support to Reading Groups

Support to Reading Groups Support to Reading Groups Purpose: To set out the basis on which stock is supplied to Reading Groups and to outline other forms of support offered. Libraries & Information will support Reading Groups by

More information

Data Discovery on the Information Highway

Data Discovery on the Information Highway Data Discovery on the Information Highway Susan Gauch Introduction Information overload on the Web Many possible search engines Need intelligent help to select best information sources customize results

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0

Zimbra Connector for Microsoft Outlook User Guide. Network Edition 7.0 Zimbra Connector for Microsoft Outlook User Guide Network Edition 7.0 February 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international

More information

Best practice for SwiftBroadband

Best practice for SwiftBroadband Best practice for SwiftBroadband Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

www.wit.tafensw.edu.au

www.wit.tafensw.edu.au CONNECTING TO WIRELESS NETWORK TAFE WESTERN CONNECTING TO WIRELESS NETWORK iphone/ipod Touch, ipad, Internet Explorer, Firefox TAFE Western provides wireless access for staff and students via the TAFE-Guest

More information

HP WebInspect Tutorial

HP WebInspect Tutorial HP WebInspect Tutorial Introduction: With the exponential increase in internet usage, companies around the world are now obsessed about having a web application of their own which would provide all the

More information

McAfee Product Entitlement Definitions

McAfee Product Entitlement Definitions McAfee Product Entitlement Definitions McAfee. Part of Intel Security. 2821 Mission College Blvd Santa Clara, CA 95054 www.intelsecurity.com Application Server CPU CPU Core Database An Application Server

More information

Carisbrooke. End User Guide

Carisbrooke. End User Guide Carisbrooke Contents Contents... 2 Introduction... 3 Negotiate Kerberos/NTLM... 4 Scope... 4 What s changed... 4 What hasn t changed... 5 Multi-Tenant Categories... 6 Scope... 6 What s changed... 6 What

More information

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.

Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt. USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure

More information