Using the dspace Data Dictionary in a Multi-User Environment. Version: 1.0
|
|
- Eustace White
- 7 years ago
- Views:
Transcription
1 Using the dspace Data Dictionary in a Multi-User Environment Version: 1.0 January 2006
2 How to Contact dspace Mail dspace GmbH Technologiepark 25 D Paderborn Germany Phone Fax Web Subscription to newsletter Technical support Software Updates and Patches dspace strongly recommends that you download and install the most recent patches for your current dspace installation. Visit for software updates and patches. Important Notice This document contains proprietary information that is protected by copyright. All rights are reserved. Neither the documentation nor software may be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form, in whole or in part, without the prior written consent of dspace GmbH. Copyright by: dspace GmbH Technologiepark 25 D Paderborn Germany This publication and the contents hereof are subject to change without notice. dspace GmbH makes no warranty of any kind with regard to this publication, including but not limited to the implied warranties of merchantability or fitness for a particular purpose. dspace GmbH shall not be liable for errors contained herein or direct, indirect, special, incidental, or consequential damage in connection with the furnishing, performance, or use of this publication. Brand names or product names are trademarks or registered trademarks of their respective companies or organizations.
3 Contents Contents Abstract 4 Basic Concept 5 Setting up the Environment 7 Creation of a Global DSDD FILE... 7 Data Dictionary Objects for Code Generation... 8 Setting Access Rights for Protection... 8 Export of DSDD Files... 8 Creation of a Local DSDD File Associating DD and Model for the Local Developer Configuration of the Local DSDD File Typical Workflow 12 Data Handling by the Individual Developer Data Handling by the Administrator Appendix 15 Reference Abbreviations
4 Abstract Abstract TargetLink, the automatic production code generator from dspace, is fully integrated in the MATLAB /Simulink /Stateflow environment and performs highly efficient C code generation for microcontrollers in electronic control units (ECUs). For ECU development, TargetLink is often used by multiple users in one development department. The users work simultaneously on different models, which are finally combined in one ECU application. Special support must be given to such multi-user environments, since administering the data and keeping it consistent is an important objective. The dspace Data Dictionary (DSDD), which was introduced with TargetLink 2.0, provides new features for supporting multi-user environments. This application note describes how to set up TargetLink in a multi-user environment to ensure a consistent workflow for all users and how to work in that framework.
5 Basic Concept Basic Concept In multi-user environments it is necessary to ensure that the workflow is consistent for all users and that the environment can be easily adapted to new project configurations. Project-related information and data must be kept in data repositories, for which the dspace Data Dictionary (DSDD) is used in combination with TargetLink. It is also recommended to use more than one DSDD to store the information. Figure 1 shows the basic concept.. Figure 1: Use of various data dictionaries (DSDDs) in a multi-user environment. Global data relevant for all developers is stored in a global DSDD (optionally, multiple global DSDDs can be used). The data in the global DSDD is then made available and kept up to date for each individual developer (only one is displayed here) via the data dictionary include mechanism. 5
6 Basic Concept The process involves a global DSDD, which stores data that has to be made available to each developer working on an individual part of the ECU application. Global data is information which must not be altered or set by the individual developer but has global significance for the entire project or ECU application. This might involve interface variables, their scalings, typedefs, etc., which should be stored in the global DSDD. The challenge is to keep the global data up to date and consistent for all individual developers with minimum maintenance effort. This is achieved by the DSDD include mechanism, which makes the data in the global DSDD available to all users. The global DSDD and the data in it must be maintained by an administrator. Each local user (developer) working on an individual model (part) uses a local DSDD which not only stores the data relevant to that model (part) but also provides access to the global information defined in the global DSDD. Access is established by the include mechanism of the DSDD, which ensures that the local DSDD contains all the relevant information from the global DSDD and keeps it up to data, i.e., as defined by the administrator. Any modifications to the global data require only changes in the global DSDD, which are reflected almost immediately in the local DSDD files of the individual developers. The application note is divided into two main chapters: Setting up the Environment Typical Workflow The first chapter describes all the tasks an administrator and local users have to perform before starting actual development. The typical workflow using the DSDDs is described in the second chapter. 6
7 Setting up the Environment Setting up the Environment Creation of a Global DSDD FILE First the administrator has to create the global DSDD file which stores all the global data that have to be made available consistently for all developers. A new data dictionary file can be created from scratch most easily by using the data dictionary Manager (DSDDMAN), see Figure 2, which is a graphical user interface for handling DSDDs. The DSDDMAN also provides some predefined templates to support you in creating data dictionary files from scratch. The templates contain a number of predefined DSDD objects like scalings, typedefs, variable classes, etc., which are generally useful and can serve as starting points for the creation of project-specific data dictionary objects. Figure 2: To open the data dictionary manager, enter dsddman on the MATLAB command line. A new DSDD file is created via the menu item New DD Project File and the subsequent selection of a data dictionary template. The Advanced Template provides the maximum number of predefined data dictionary objects for the file to be created. 7
8 Setting up the Environment Data Dictionary Objects for Code Generation Most of the data needed for production code generation is stored in the Pool area of the data dictionary (path /Pool), where you can create variable classes, scalings, typedefs, function classes, templates, and RTOS-related data to specify code generation properties for TargetLink. All the variables, global scalings, typedefs that must be available for all developers have to be created in the Pool area of the global DSDD. This should be performed by the administrator, who is then also responsible for maintaining the objects whenever changes are necessary. The Data Dictionary Manager is also the best way to create and modify objects in the data dictionary, see Figure 3. Figure 3: The Pool area of a DSDD file displayed with the data dictionary manager. DSDD objects like variables, scalings, variable classes, etc., that must be accessible to all developers, should be created in the global DSDD. Setting Access Rights for Protection The Data Dictionary supports the use of different roles and associated access rights to protect data dictionary objects from undesired modification or deletion. The roles that are supported are that of an administrator of a DSDD file and that of an ordinary user. Read and write access to individual areas of a DSDD file is then granted by the administrator. In addition, a password can be specified to prevent swapping to the administrator mode. This mechanism can be used to protect the global DSDD file, i.e., global data required for all developers, from undesired modifications. The administrator must have full read/write access to all data in the global DSDD, but write permission to the global data should be denied to individual developers, see Figure 4. Export of DSDD Files Once a global DSDD file has been created, it is useful to store the contents of its individual branches, like those for variables, typedefs, scalings, etc., in separate files, see Figure 5. This enables the data dictionary include mechanism to be used to include the branches of the global DSDD in local data dictionary files. Since the data dictionary files must be accessible to all local developers, they should be stored on a network drive. Then everyone can work with the same settings of the global DSDD file. 8
9 Setting up the Environment Figure 4: The access rights for individual branches of the DSDD can be set via the access dialog, which is opened by right-clicking an object. Read and write access can be specified separately for administrators and ordinary users. Changing from User mode to Admin mode via the menu can be protected by an admin password (menu item Set Admin Password). Figure 5: To grant each developer access to the global DSDD objects, the branches for scalings, typedefs, variables should be stored in separate files. The Save as option is available after the proper branch has been selected and a consecutive right mouse click. 9
10 Setting up the Environment Creation of a Local DSDD File In addition to the global data dictionary, all developers need their individual local DSDD files to store data that is specific to their model (part). Access to the required global data is provided via the data dictionary include mechanism. The TargetLink model that a developer is working on must be associated with the local DSDD file. Since the preparations for all local developers are identical, it might make sense to automate the procedure to set up the local DSDD file via a MATLAB M script that makes use of the DSDD s and TargetLink s M-API. This ensures correct settings for all models in the ECU application. The following steps demonstrate how to set up the local DSDD manually for an individual developer for use in the multi-user environment. Associating DSDD and Model for the Local Developer A data dictionary file for an individual developer can be created as described in a previous section. However, there is a difference in that the local DSDD is used directly for working with TargetLink models. The data dictionary file must therefore also be associated with the corresponding model, see Figure 6. Figure 6: To associate a TargetLink model with a data dictionary file, select Associate model with fixed DD project file from the Options tab of the TargetLink Main Dialog. If the data dictionary does not yet exist, it can be created from scratch, for instance by using one of the templates provided. 10
11 Setting up the Environment Configuration of the Local DSDD File To make the global data available to all (local) developers, correct information on including branches of the global DSDD files has to be entered, see Figure 7. This involves specifying the data dictionary files to be included, their locations where the files must be hooked into the local data dictionary tree, and options specifying the automatic loading and saving of the included files after the local DSDD file is opened/saved. After these preparations, the DSDDs have been properly set up. Figure 7: Specifying the include file mechanism in the /Config/DDIncludeFile area of the local DSDD: The DSDD files to be included are those containing global scaling, typedef, variable, etc., objects and they must be specified via the FileName property. The hook where the files are included in the local DSDD is specified via DDPath. The options for AutoLoad and AutoSave determine whether updates to/from the global DSDD files are retrieved/sent automatically whenever the local DSDD file is saved or opened. The presence of included branches in the data dictionary is signaled via changed icons, see the GlobalScaling object, which is included from an external file. 11
12 Typical Workflow Typical Workflow Preparing a TargetLink model for code generation involves not only specifying a lot of code generation options on the block diagram level but also creating and referencing numerous data dictionary objects, such as variables and scalings. The typical workflow for working with global/local data dictionary objects is described in this chapter. Data Handling by the Individual Developer A lot of the code generation settings in TargetLink involve specifications via data dictionary objects, for example variables and variable classes. These objects reside in the /Pool area of the data dictionary. Objects which have only local relevance, i.e. for individual developers, should be created by developers themselves for example, specific scaling formulas. 12 Figure 8: Data Dictionary objects with relevance only for local developers, in this case a scaling object, are created by the developers themselves in the /Pool area of the local DSDD.
13 Typical Workflow After the object in the local DSDD file has been created, it can be referenced from within TargetLink block dialogs to define the code generation options for a particular variable, see Figure 9. As a result, code is generated exactly as specified by the referenced object in the data dictionary. Figure 9: In order to set code generation properties for a subsequent code generation step, the developer references data dictionary objects (here a scaling object) from within TargetLink block dialogs. Other DSDD objects like types, variable classes, or variables can of course also be referenced from the data dictionary to specify code generation options. Access to DSDD objects with global relevance is granted to local developers through the include mechanism, which maps the global DSDD objects onto the tree of the local DSDD. As long as no additional objects with global relevance are required, developers simply work with their local DSDDs. If changes to the global data are required, they have to be performed by the administrator in the global DSDD files, as described in the next section. After the modifications have been completed by the administrator, they are included in the local data dictionary files via the include mechanism as soon as developers reopen their local DSDD files. The DSDD also supports a validation mechanism, which should be applied by both local developers and administrators. This is described in the next section. 13
14 Typical Workflow Data Handling by the Administrator Whenever modifications to the global data are required, they should be performed by the administrator of the global DSDD file(s). For instance, if an additional scaling formula with global relevance is required at any time during the project, a scaling object must be created in the /pool/scalings branch of the global DSDD. The modified branch of the global DSDD must then be saved to the file which is included by the local developers. Following this procedure, the changes made by the administrator are reflected in the local DSDD files, where the new scaling object appears as soon as the local DSDD file is reopened. The data dictionary supports a validation mechanism which checks the consistency of the objects against the data model of the data dictionary. It is generally good practice to check the validity of the DSDD objects from time to time to get feedback on the changes made, see Figure 10. During development, it is important to ensure data consistency in all cases. All modifications in the included files, i.e., the DSDD files exported from the global DSDD file, affect the local DSDD. Both the administrator and the developers must therefore be careful when updating these files because of the risk of potential side effects for the individual developers. However, the include mechanism significantly simplifies data administration in a multi-user environment. Figure 10: Validation performed on the data dictionary file to check the validity and consistency of the objects. Only the selected branch of the DSDD is validated. 14
15 Appendix Appendix Reference TargetLink Production Code Generation Guide, dspace GmbH TargetLink Advanced Practices Guide, dspace GmbH Using TargetLink 2.0 in a MultiUser Development Environment, dspace GmbH, published at Electronica Embedded, Feb Abbreviations DSDD dspace Data Dictionary DD Data Dictionary DSDDMAN dspace Data Dictionary Manager 15
HP ThinShell. Administrator Guide
HP ThinShell Administrator Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of the Microsoft group of companies. Confidential computer
More information2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
More informationCMG 7.5. Quick Guide InConference. Makes your extension a conference room. Rev A4
Quick Guide InConference Makes your extension a conference room Rev A4 2013 Aastra Technologies Limited. All rights reserved. This document contains proprietary information, which is protected by copyright.
More informationtechnical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
More informationJanuary 23, 2010 McAfee SaaS Email Continuity User Guide
January 23, 2010 McAfee SaaS Email Continuity User Guide COPYRIGHT Copyright 2001 2010 McAfee, Inc. All Rights Reserved. This document contains proprietary information of McAfee Inc. and is subject to
More informationCA Cloud Service Delivery Platform
CA Cloud Service Delivery Platform Customer Onboarding Version 01.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
More informationDell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationQuest InTrust for Active Directory. Product Overview Version 2.5
Quest InTrust for Active Directory Product Overview Version 2.5 Copyright Quest Software, Inc. 2006. All rights reserved. This guide contains proprietary information, which is protected by copyright. The
More informationWHITE PAPER. HP Guide to System Recovery and Restore
WHITE PAPER January 2003 Prepared By PSG Product Software Engineering Hewlett-Packard Company CONTENTS Purpose3 Using Safe Mode To Diagnose And Correct Problems 4 Using the Recovery Console To Repair Damaged
More informationBLUECIELO MERIDIAN ASSET MANAGEMENT MODULE 2014
BLUECIELO MERIDIAN ASSET MANAGEMENT MODULE 2014 User's Guide Manual BlueCielo ECM Solutions bluecieloecm.com December 09 2014 LEGAL NOTICE 2014 BlueCielo ECM Solutions B. V. Polarisavenue 1 2132 JH Hoofddorp
More information2-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual
2-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75211R/VPMA-75211R) Operates... 1 1-1 SteelVine
More informationHow To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)
CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationCA VPN Client. User Guide for Windows 1.0.2.2
CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
More information4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
More informationAuditing UML Models. This booklet explains the Auditing feature of Enterprise Architect. Copyright 1998-2010 Sparx Systems Pty Ltd
Auditing UML Models Enterprise Architect is an intuitive, flexible and powerful UML analysis and design tool for building robust and maintainable software. This booklet explains the Auditing feature of
More informationUser Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19
CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance
More informationACT! by Sage. Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility
ACT! by Sage Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility ACT! by Sage Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility Copyright
More informationDisaster Recovery. Websense Web Security Web Security Gateway. v7.6
Disaster Recovery Websense Web Security Web Security Gateway v7.6 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2011 The products and/or methods
More informationCitrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
More informationMicrosoft Office Live Meeting Events User s Guide
Microsoft Office Live Meeting Events User s Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies,
More informationEvent Manager. LANDesk Service Desk
Event Manager LANDesk Service Desk LANDESK SERVICE DESK EVENT MANAGER GUIDE This document contains information that is the proprietary and confidential property of LANDesk Software, Inc. and/or its affiliated
More information5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual
5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75511R/VPMA-75511R) Operates... 1 1-1 SteelVine
More informationNovell ZENworks 10 Configuration Management SP3
AUTHORIZED DOCUMENTATION Software Distribution Reference Novell ZENworks 10 Configuration Management SP3 10.3 November 17, 2011 www.novell.com Legal Notices Novell, Inc., makes no representations or warranties
More informationObject Level Authentication
Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required
More informationChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell SE2716H Monitor Dell Display Manager User s Guide
Dell SE2716H Monitor Dell Display Manager User s Guide Model: SE2716H Regulatory model: SE2716Ht NOTE: A NOTE indicates important information that helps you make better use of your computer. Copyright
More informationQuick Start Program Advanced Manual ContactWise 9.0
Quick Start Program Advanced Manual ContactWise 9.0 Copyright 2010 GroupLink Corporation. All Rights Reserved. ContactWise is a registered trademark of GroupLink Corporation. All other trademarks are the
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Light Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationWeb Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
More informationBy the Citrix Publications Department. Citrix Systems, Inc.
Licensing: The License Management Console By the Citrix Publications Department Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS
More informationThirdlane User Portal 2.1. Users Guide 05/12/2008. Third Lane Technologies, LLC 39 Power Lane Fairfax, CA 94930. http://www.thirdlane.
Thirdlane User Portal 2.1 Users Guide 05/12/2008 Third Lane Technologies, LLC 39 Power Lane Fairfax, CA 94930 http://www.thirdlane.com Copyright 2003-2008. Third Lane Technologies, LLC. All rights reserved.
More informationFOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationAdeptia Suite LDAP Integration Guide
Adeptia Suite LDAP Integration Guide Version 6.2 Release Date February 24, 2015 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 DOCUMENT INFORMATION Adeptia
More informationDell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationFor Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationDeploying the Workspace Application for Microsoft SharePoint Online
Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This
More informationhp digital home networking wireless USB network adapter hn210w quick start guide
hp digital home networking wireless USB network adapter hn210w quick start guide Revision #: 15 Page: 1 of 11 Printed: 08/15/01 04:44 PM The Hewlett-Packard Company makes no warranty of any kind with regard
More informationInfor LN Service User Guide for Contract Management
Infor LN Service User Guide for Contract Management Copyright 2015 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and contains
More informationPulse Redundancy. User Guide
Pulse Redundancy User Guide August 2014 Copyright The information in this document is subject to change without prior notice and does not represent a commitment on the part of AFCON Control and Automation
More informationCA APM Cloud Monitor. Scripting Guide. Release 8.2
CA APM Cloud Monitor Scripting Guide Release 8.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for
More informationCA NetQoS Performance Center
CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,
More informationQAD Enterprise Applications. Training Guide Demand Management 6.1 Technical Training
QAD Enterprise Applications Training Guide Demand Management 6.1 Technical Training 70-3248-6.1 QAD Enterprise Applications February 2012 This document contains proprietary information that is protected
More informationTIBCO Silver Fabric Continuity User s Guide
TIBCO Silver Fabric Continuity User s Guide Software Release 1.0 November 2014 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
More informationCA Nimsoft Monitor. Probe Guide for Cloud Monitoring Gateway. cuegtw v1.0 series
CA Nimsoft Monitor Probe Guide for Cloud Monitoring Gateway cuegtw v1.0 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal
More informationOption Network Management Software for UPS UNMS II
Option Network Management Software for UPS UNMS II AEG Power Supply Systems GmbH Department: PSS E1 Name: Brandt/Rogge Revision: 00 Date: 20.05.2006 Operating Instructions...6000004951 BAL, en Legal Information
More informationBrightStor ARCserve Backup for Linux
BrightStor ARCserve Backup for Linux Agent for MySQL Guide r11.5 D01213-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's
More informationAbout This Guide... 4. Signature Manager Outlook Edition Overview... 5
Contents About This Guide... 4 Signature Manager Outlook Edition Overview... 5 How does it work?... 5 But That's Not All...... 6 And There's More...... 6 Licensing... 7 Licensing Information... 7 System
More informationUniversal Management Service 2015
Universal Management Service 2015 UMS 2015 Help All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,
More informationDell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationApplication Note Siemens and SIMATIC Manager S7
Application Note Siemens and SIMATIC Manager S7 This document guides you through the setup of proprietary vendor specific software installed on you PC. Your supervisor may provide you with additional or
More informationCA Workload Automation Agent for Microsoft SQL Server
CA Workload Automation Agent for Microsoft SQL Server Release Notes r11.3.1, Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter
More informationSUPPORT GUIDE FOR NOKIA PC SYNC
SUPPORT GUIDE FOR NOKIA PC SYNC Copyright Nokia Mobile Phones 2002. All rights reserved Issue 4 Contents 1. INTRODUCTION...1 2. SYSTEM REQUIREMENTS...1 3. CONFIGURATION...1 4. SYNCHRONIZATION...6 5. FREQUENTLY
More informationSection 8 Scheduler. Alcatel-Lucent OmniVista 4760 Network Management System
Alcatel-Lucent OmniVista 4760 Network Management System Section 8 Scheduler Alcatel-Lucent OmniVista 4760 Network Management System All Rights Reserved Alcatel-Lucent 2011 Legal notice: Alcatel, Lucent,
More informationIntroduction to Version Control in
Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any
More informationScribe Demonstration Script Web Leads to Dynamics CRM. October 4, 2010 www.scribesoft.com
Scribe Demonstration Script Web Leads to Dynamics CRM October 4, 2010 www.scribesoft.com Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in
More informationCA Desktop Migration Manager
CA Desktop Migration Manager DMM Deployment Setup Guide 12.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationRoss Video Limited. DashBoard Server and User Rights Management User Manual
Ross Video Limited DashBoard Server and User Rights Management User Manual DashBoard Server and User Rights Management User Manual Ross Part Number: 8351DR-004A-01 Release Date: March 22, 2011. Printed
More informationStarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008
StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008 www.starwindsoftware.com Copyright 2008-2012. All rights reserved. COPYRIGHT Copyright 2008-2012. All rights reserved.
More informationCreating Network Administrative Installation Package to Apply Office Service Packs Using Hercules Remediation Hercules v2.2.0
Creating Network Administrative Installation Package to Apply Office Service Packs Using Hercules Remediation Hercules v2.2.0 Citadel Security Software, Inc. 8750 North Central Expressway Suite 100 Dallas,
More informationInstalling Act! for New Users
Installing Act! for New Users Installing Act! for New Users 2014 Swiftpage ACT! LLC. All Rights Reserved. Swiftpage, Act!, and the Swiftpage product and service names mentioned herein are registered trademarks
More informationAIMMS User s Guide - Advanced Data Management
AIMMS User s Guide - Advanced Data Management This file contains only one chapter of the book. For a free download of the complete book in pdf format, please visit www.aimms.com or order your hardcopy
More informationCA Nimsoft Monitor Snap
CA Nimsoft Monitor Snap Configuration Guide for Email Gateway emailgtw v2.7 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as
More informationConnector for CA Unicenter Asset Portfolio Management Product Guide - On Premise. Service Pack 02.0.02
Connector for CA Unicenter Asset Portfolio Management Product Guide - On Premise Service Pack 02.0.02 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter
More informationSecureW2 Client for Windows User Guide. Version 3.1
SecureW2 Client for Windows User Guide Version 3.1 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright
More informationJob Scheduler User Guide IGSS Version 11.0
Job Scheduler User Guide IGSS Version 11.0 The information provided in this documentation contains general descriptions and/or technical characteristics of the performance of the products contained therein.
More informationInstalling Sage ACT! 2013 for New Users
Installing Sage ACT! 2013 for New Users Installing Sage ACT! 2013 for New Users Copyright 2012 Sage Software, Inc. All Rights Reserved. Sage, the Sage logos, ACT!, and the Sage product and service names
More informationBitrix Site Manager 4.1. User Guide
Bitrix Site Manager 4.1 User Guide 2 Contents REGISTRATION AND AUTHORISATION...3 SITE SECTIONS...5 Creating a section...6 Changing the section properties...8 SITE PAGES...9 Creating a page...10 Editing
More informationTIBCO MFT BusinessWorks MFT Palette
TIBCO MFT BusinessWorks MFT Palette This is a TIBCO document from Proginet Sales & Presales Group. Consulting Services This document provides a general overview of using the MFT palette. It assumes that
More informationStone Edge Integration Guide
Stone Edge Integration Guide Revised May 25, 2007 Modular Merchant: Terms of Service Modular Merchant Developed by Stepping Stone Media, LLC 30 East Broadway STE 210 Eugene, OR 97401 www.modularmerchant.com
More informationBusiness Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0
Business Portal for Microsoft Dynamics GP Key Performance Indicators Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the
More information2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions
6.7 Feature Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationMAXIS ONE TECHNOLOGIES, L.L.C. MAXIS ONE TECHNOLOGIES, L.L.C. CLOUD-BASED VIRTUAL HOSTED PBX USER S MANUAL
MAXIS ONE TECHNOLOGIES, L.L.C. WWW.MAXISONE.COM BRINGING THE NEXT GENERATION OF VOICE TECHNOLOGY TO YOU CLOUD-BASED VIRTUAL HOSTED PBX USER S MANUAL July 27, 2015 MAXIS ONE TECHNOLOGIES, L.L.C. A Service-Disabled
More informationPromotion Model. CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010. March Hare Software Ltd
CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010 March Hare Software Ltd Legal Notices Legal Notices There are various product or company names used herein that are the trademarks, service marks, or
More informationFoglight. Dashboard Support Guide
Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationCA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
More informationWhere Do I Start With Virtual Desktops?
The Essentials Series: Important Questions in Implementing Virtual Desktops Where Do I Start With Virtual Desktops? sponsored by by W here Do I Start with Virtual Desktops?... 1 W hat Is a Virtual Desktop?...
More informationTIBCO Fulfillment Provisioning Session Layer for FTP Installation
TIBCO Fulfillment Provisioning Session Layer for FTP Installation Software Release 3.8.1 August 2015 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
More informationChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationUsing Flow Control with the HEAD Recorder
03/15 Using with the HEAD Recorder The HEAD Recorder is a data acquisition software program that features an editable Flow Control function. This function allows complex program sequences to be predefined,
More informationHP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide
HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management
More informationDIGIPASS Authentication for Windows Logon Getting Started Guide 1.1
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or
More informationInfor ERP BaanIV / Baan 5.0 / LN 6.1. User's Guide for Worktop 2.4
Infor ERP BaanIV / Baan 5.0 / LN 6.1 User's Guide for Worktop 2.4 Copyright 2008 Infor All rights reserved. The word and design marks set forth herein are trademarks and/or registered trademarks of Infor
More informationNetVault : Backup. for Exchange Server. Recovery Manager Integration Guide. Application Plugin Module (APM) version 4.5 MEG-103-4.
NetVault : Backup Application Plugin Module (APM) for Exchange Server version 4.5 Recovery Manager Integration Guide MEG-103-4.5-EN-01 03/31/11 Copyrights NetVault: Backup APM for Exchange Server Recovery
More informationFoglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide
Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationPipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com
Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring
More informationBatch and Import Guide
Batch and Import Guide 020411 Enterprise CRM, version 2.9 US 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or
More information6.9. Administrator Guide
6.9 Administrator Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2010 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2010 Users The software described in this book is furnished under a license agreement
More informationConfiguring Microsoft Internet Information Service (IIS6 & IIS7)
Configuring Microsoft Internet Information Service (IIS6 & IIS7) Configuring Microsoft Internet Information Service (IIS6 & IIS7) Guide Last revised: June 25, 2012 Copyright 2012 Nexent Innovations Inc.
More informationSecurity Explorer 9.5. User Guide
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationUniversal Tracking Application Reference and Training Guide
Universal Tracking Application Reference and Training Guide Software Version: 4.21 Guide Version: 2.7 Universal Tracking Application Reference and Training Guide Reference and Training Guide All Trademarks
More information8.3. Competitive Comparison vs. Microsoft ADMT 3.1
8.3 Competitive Comparison vs. Microsoft ADMT 3.1 Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described
More informationUpgrade Guide. CA Application Delivery Analysis 10.1
Upgrade Guide CA Application Delivery Analysis 10.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationProject management integrated into Outlook
y Project management integrated into Outlook InLoox PM 7.x Help for the configuration for MySQL-Server An InLoox Whitepaper Published: October 2011 Copyright: InLoox GmbH 2011 You find up-to-date information
More informationContents Firewall Monitor Overview Getting Started Setting Up Firewall Monitor Attack Alerts Viewing Firewall Monitor Attack Alerts
Firewall Monitor Contents Firewall Monitor Overview...1 Getting Started...1 Setting Up Firewall Monitor Attack Alerts...2 Configuring/Editing Attack Alerts...3 Enabling Attack Notification...4 Configuring
More informationCA Performance Center
CA Performance Center Release Notes Release 2.3.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for
More information