Advanced ColdFusion 4.0 Application Development Server Clustering Using Bright Tiger

Size: px
Start display at page:

Download "Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger"

Transcription

1 Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment Server Custering Using Bright Tiger In this chapter What Is Custer Cats for CodFusion Appication Server 4? Understanding Custer Cats What Is Custer Cats for CodFusion Appication Server 4? Incuded with the Enterprise version of CodFusion is Custer Cats by Bright Tiger Software. A software-based oad-baancing soution, Custer Cats monitors your CodFusion Appication Server (CFAS) and can redirect requests away from a server that is beginning to enter a "busy" state. Note that Custer Cats does not work on the network ayer. When Custer Cats redirects requests to another server, it does so by redirecting to the URL of another machine in the custer. This means that if your server is competey out of commission (that is, not turned on), Custer Cats cannot communicate with it and therefore cannot redirect requests away from it. Perhaps the most attractive thing about using Custer Cats for your oad-baancing soution is its integration with the CFAS. Because Custer Cats responds to eements of the CFAS, you get oad baancing that is specific to your CodFusion-based appication. You get this benefit in addition to genera faiover and machine aerts. An important point to note about Custer Cats is that the version shipping with CFAS 4 does not incude support for repication; however, the fu version of Custer Cats, avaiabe from Bright Tiger, does have repication buit in. Repication is the abiity to put your CodFusion scripts on one machine in your custer and have those scripts update on a machines in the custer. Many administrators overook repication when panning their oad-baancing strategy. However, as code bases grow, and server architectures get more compex, repication pays a crucia roe in content synchronization. Later this chapter outines some simpe strategies to incude repication from the onset, and thus keep your job as server administrator manageabe as your server custer grows. Understanding Custer Cats As you have earned in the preceding two chapters, many different methods for custering servers are avaiabe. In particuar, the methodoogies empoyed in software-based custering differ greaty. This fact wi most definitey have an impact on how your server custer serves your appication. This section wi give you a broad overview of the methodoogies empoyed in Custer Cats. fie://j:\prodinfo\members\ma\ir046.htm 3/23/01

2 Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 2 of 7 To begin, you need to note that Custer Cats uses HTTP redirection to baance oad across a custer. Athough, in genera, this is a protoco-based redirection, it acks certain network-eve contros; therefore, I pace it in the appication ayer of the networking hierarchy. In contrast, another popuar software-based custering strategy, Convoy Custer (acquired by Microsoft in August 1998), attempts to use the network ayer by advertising muticast MAC addresses to routing equipment. Because this discussion is about Custer Cats, I wi not go into the detais of muticast MAC addressing. However, suffice it to say that Convoy makes your custer ook ike one big IP address (see Figure 3.1), whereas Custer Cats makes your custer ook ike a ot of HTTP servers grouped together (see Figure 3.2). Depending on your situation, one approach may be better than the other, but they both do the same job. FIGURE 3.1 Diagram of HTTP server redirection. FIGURE 3.2 Diagram of muticast MAC addressing. CAUTION By extension of these differing methodoogies, you must make concessions in the way you code your appication to support the type of redirection being empoyed. In some cases, this soution may be as simpe as not using absoute paths in your URL references; in other cases, you might need to make use of CodFusion s advanced Cient State management options (discussed in a ater chapter) to mitigate these server redirections. Now, take a ook at the components of Custer Cats. The software works with two primary components: the Server component and the Exporer component. Each pays a critica roe in the configuration and support of your Custer Cats custers. Note that athough you can have a custer consisting of a mix of Sun Soaris and Windows NT-based servers running Custer Cats, you must have at east one Windows NT server to run the Custer Cats Exporer. You cannot configure your custer without the Exporer component. Custer Cats Server The Custer Cats Server component runs on Windows NT 4.0 and Sun Soaris. This Server component is the heart of the custer. It contros configuration of a machine s roe in a particuar custer, handes redirection from the server in the event that oad threshods are breached, and contros access to the server based on restriction rues. The Server component must reside on a machines you are using for your custer operations. Custer Cats Exporer The Custer Cats Exporer component runs ony on Windows NT 4.0. It contros configuration of Custer Cats custers. I found that it was best to configure the server that the Exporer sits on as the primary server for a your incoming HTTP requests. I ike to ca it the "Controer Server." Its purpose is to hande a the incoming HTTP requests first and then redirect to other machines in the custer as needed. Tasks handed by the Custer Cats Exporer incude the foowing: fie://j:\prodinfo\members\ma\ir046.htm 3/23/01

3 Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 3 of 7 Creating and removing custers Adding and removing servers from a custer and setting server oad threshod eves Restricting or providing access to servers Registering custer administrators Seecting events for aarms and specifying the recipients of aarm emai distributions How Custer Cats Works As mentioned previousy, Custer Cats uses HTTP redirection as its principa methodoogy for distributing oad across a custer. This means that the user s request is sent to another machine in the custer and stays there unti that machine needs to redirect the request to yet another machine. For exampe, if a request comes to and www is too busy to hande new requests, it sends that request to www2 (or another machine based on avaiabiity of a machines in the custer). The URL in the browser ocation box now reads www2.yourcompany.com (refer to Figure 3.1). Therefore, subsequent requests wi go to www2 unti that machine cannot accept more requests. At that point, www2 wi attempt to redirect the request to another machine based on the information it has about other machine avaiabiity. CAUTION In the preceding exampe, the custer essentiay "cedes" contro of redirections to the HTTP protoco. This means that there is no way to contro what happens after that redirect is issued. If the target server crashes or otherwise does not respond to requests at a, a redirect fais with a Server unavaiabe response to the user. As of the writing of this book, the CFAS 4 impementation of Custer Cats does not provide catastrophic server faiover capabiities. This capabiity is expected in a ater reease of CFAS 4 and wi mitigate this diemma. With catastrophic server faiover in pace, the Custer Cats HTTP redirection woud know whether a server is avaiabe and thus not redirect a request to a faied server. This resut is accompished via each server istening for a heartbeat from other servers in the custer. If a machine does not respond to the heartbeat within a specific period of time, another machine in the custer assumes the IP address of the down machine (a process otherwise known as IP aiasing). Let me contrast this shortcoming of Custer Cats in the CFAS 4 impementation: If your server is up and running, and you just want to take it out of the custer for a whie for maintenance, you can restrict that server. Restricting a server in a Custer Cats custer causes a requests to that server to be sent to other machines automaticay. Sampe Appication Say that you have a CodFusion appication that needs to be custered across two CodFusion appication servers. This appication does not use session variabes but instead empoys a "custer neutra" method of saving state: cient cookies. The name of the Web site you are custering is fie://j:\prodinfo\members\ma\ir046.htm 3/23/01

4 Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 4 of 7 and you wi be using machines www1.mycompany.com and www2.mycompany.com in the configuration. To provide two ayers of oad baancing, you can empoy round-robin DNS in addition to Custer Cats. By doing so, you can distribute genera requests to both servers in the custer. In this configuration, you can keep a oad from initiay being directed at one machine and better use resources. Athough this resut may seem inconsequentia in the context of what s being described, it wi have an impact on what you set in the oad threshod eve section of each custer member. Creating Your Appication Custer Begin by instaing the integrated Custer Cats software incuded with CodFusion 4 on both machines. If you are using Windows NT on both machines, the setup routine instas the Custer Cats Exporer. In this exampe, you wi use the Custer Cats Exporer ony on www1.mycompany.com. After you insta the software, you wi see a new service (in addition to the CodFusion 4 services) named Bright Tiger Server service in the Service Contro Manager. It must be set to Automatic and shoud be running so that Custer Cats can work propery. You shoud aways check the Service Contro Pane after a significant instaation. Doing so heps you understand the components of your server appication. From the www1.mycompany.com consoe, open the Custer Cats Exporer. Your screen shoud ook ike Figure 3.1. Right-cick the Custer Manager icon in the eft pane of the Custer Cats Exporer. You then see a diaog box that ooks ike the one in Figure 3.3. FIGURE 3.3 The Create New Custer diaog box. You need to enter the Custer Name (see the foowing sidebar), the Server Name, which is the name of the primary server in your custer, and the License Key incuded in your CodFusion 4 Administrator Guide. Be sure to enter the Fuy Quaified Host Name of the first machine in your custer in the Server Name box. In the exampe, you woud enter www1.mycompany.com. Naming, and Why It Is Important Note that the first name you enter in the Create New Custer diaog box wi become the defaut administrative manager for the custer. The administrative manager is responsibe for aowing other Web servers to be added and deeted from the SmartCuster. Apart from this, you aso need to name your SmartCuster something that is specific to your task. For exampe, if you pan to host severa CodFusion appications responding to mutipe IP addresses on your server, you might want to create custers that have the same name that exists in your CFAPPLICATION tag. Doing so heps you baance oad based on appication and not just on the server. If you have a particuar appication that is CPU intensive, for exampe, you can give it more of a particuar machine in your custer and redirect other appication requests away. Creating Custer Members After you create your initia custer member from the Create New Custer diaog box, you can add fie://j:\prodinfo\members\ma\ir046.htm 3/23/01

5 Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 5 of 7 other custer members by right-cicking on your custer name, choosing New, and then seecting Custer Member. In the resuting diaog box (see Figure 3.4), enter the Fuy Quaified Host Name. In the exampe, you woud enter www2.mycompany.com. FIGURE 3.4 The Add New Server to Custer diaog box. At this point, you shoud have two servers isted in the Custer Cats for CodFusion Exporer. Custer Cats might take a few seconds to connect to the servers in your custer, depending on the size of your custer or network oad. I found this process to be uneventfu, and after the custer is synchronized, it does not have an impact on performance at a. Figure 3.5 shows an exampe of a custer in use at my company. FIGURE 3.5 Custer Cats Exporer with two active servers. Setting Load Threshod Leves You can set each server in your custer to respond to two oad threshods: Load Threshod Gradua Redirection Threshod Load Threshod is the top eve you aow your server to accept before it enters a busy state. When this situation occurs, Custer Cats begins redirecting requests to other servers in the custer based on their avaiabiity. Custer Cats continues redirecting requests unti the actua machine oad dips beneath this ine. Gradua Redirection Threshod defines a secondary threshod at which user requests start being redirected. As the name impies, if the Gradua Redirection Threshod is reached, Custer Cats redirects a portion of the oad--but not a of the oad--to avaiabe machines in the custer. The Gradua Redirection Threshod and the Load Threshod work together to provide a smooth transition of oad (see Figure 3.6). FIGURE 3.6 Custer Cats Load Monitor with exampes of both types of redirection set. NOTE Be sure to remember the reationship of the Load Threshod to the Gradua Redirection Threshod. If the Gradua Redirection Threshod is set cose to the Load Threshod, a greater number of requests is redirected from the server. Conversey, if the Gradua Redirection Threshod is set far from the Load Threshod, fewer requests are redirected from the server. Repication: Keeping Your Content in Sync Unfortunatey, the repication features buit into the Bright Tiger impementation of Custer Cats are not incuded in the version shipping with CFAS 4. Repication is a mechanism empoyed to keep content on a your servers in sync with a centra source. Anyone who runs mutipe Web servers, grouped in a custer, needs to be abe to repicate content. Fortunatey, many shareware and freeware fie://j:\prodinfo\members\ma\ir046.htm 3/23/01

6 Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 6 of 7 utiities are avaiabe to hep you synchronize your content. I ike to use a utiity named Robocopy from the Windows NT Resource Kit. Sampe Repication Strategy Using Robocopy Robocopy and AT (the Windows NT Scheduer service) can combine to be a very effective repication strategy. Robocopy copies ony changed fies from a centra source to target sources. It has an extremey arge number of switches that aow you to customize your synchronization rues. Because Robocopy is a command-ine utiity, you can script fairy eaborate interactions with fie systems using UNC names and the program s switches. To use Robocopy, you must have the Windows NT Resource Kit. The foowing is an exampe of a Robocopy script I use to repicate content to another Web server and backup RAID drive. Note that I aso use the command-ine utiity caed bat to send an emai of the Robocopy og back to a centra administration desk. If you are writing scripts ike these, you woud be wise to incude some contact information at the top; this way, if your script fais, systems staff know whom they shoud contact. cs echo off echo ********************************************************** echo *****This is a G. Triad Automated Maintenance Script ***** echo *****Report Probems to gerry@gtriad.com ***** echo *****or ***** echo ********************************************************** de C:\temp\atest2Rep.txt de C:\temp\atest3Rep.txt echo Repication to Server 2 Initiated...working... robocopy D:\Inetpub\wwwroot\ \\Server2\90195 /E /PURGE >> C:\Temp\atest2Rep.txt echo Repication to Server2 competed. echo Repication to Server3 Initiated... (BackingUp)... robocopy D:\Inetpub\wwwroot\ \\Server3\90195 /E /PURGE >> C:\Temp\atest3Rep.txt echo Repication to Server3 competed. echo Notifying centra administration... bat C:\temp\atest2Rep.txt -s "[MAINT] Server2 Repication Competed" -t gerry@gtriad.com bat C:\temp\atest3Rep.txt -s "[MAINT] Server3 Repication Competed" -t gerry@gtriad.com echo Notification Competed. Strategies for Custering with Custer Cats Because Custer Cats works on the HTTP eve, you can easiy ayer oad-baancing strategies on top of the system. Combining hardware-based oad baancing or round-robin DNS with Custer Cats creates a two-tiered soution that can be configured in numerous detaied ways. Custer Cats aso provides a means for deaing with Web appications that require use of CodFusion s session variabes. Deaing with Cient State in Custer Cats CFAS 4 uses certain types of cient state variabes that are written into the memory of a Web server. They are known as session and appication variabes. These variabes appy to a user s session or gobay to an appication defined with the CFAPPLICATION tag. Obviousy, if a user s session is reiant on persistent variabes stored on a particuar server in your custer, you have to keep the user on the same server. If the CodFusion appication you are custering fie://j:\prodinfo\members\ma\ir046.htm 3/23/01

7 Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 7 of 7 requires that you not redirect users after they initiay access a Web server, you can enabe sessionaware custering. Do so by right-cicking the custer you want to enabe it for, seecting Configure, and seecting Administration (see Figure 3.7). FIGURE 3.7 The Administration tab in the Custer Cats Exporer. Seecting this option simpy keeps users confined to the same server after they initiay hit the server. No redirections are performed. CAUTION Using session-aware custering has a direct impact on how you baance oad between the servers in your custer. I beieve it is best to set a Load Threshod of approximatey 60 percent. Adjust this setting according to the oad that your CodFusion appication generates. Using Round-Robin DNS Round-robin DNS (RRDNS), as you earned in Chapter 1, "Monitoring Server Performance," aternates requests from Web server to Web server based on entries found in your DNS server. In the exampe here, if you want to set up your custer for RRDNS, you woud enter two entries for the www machine: one pointing to www1.mycompany.com and another pointing to www2.mycompany.com. Thus, resoution requests for woud aternate between the two servers in the custer. The big probem with RRDNS has been that if you have to take a server offine, every other new request to wi hit a dead machine. With Custer Cats, you can simpy put that machine into a busy state and redirect requests. This type of genera faiover is incuded in the version of Custer Cats shipping with CFAS 4. Layering RRDNS on top of Custer Cats provides a wider spread of oad to your custer. Whereas RRDNS never truy provides a true baance, Custer Cats can hep make that baance a itte smoother by redirecting requests based on machine oad. This oad can then be controed by the Load and Gradua Redirection Threshods. fie://j:\prodinfo\members\ma\ir046.htm 3/23/01

Setting Up Your Internet Connection

Setting Up Your Internet Connection 4 CONNECTING TO CHANCES ARE, you aready have Internet access and are using the Web or sending emai. If you downoaded your instaation fies or instaed esigna from the web, you can be sure that you re set

More information

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,

More information

NCH Software BroadCam Video Streaming Server

NCH Software BroadCam Video Streaming Server NCH Software BroadCam Video Streaming Server This user guide has been created for use with BroadCam Video Streaming Server Version 2.xx NCH Software Technica Support If you have difficuties using BroadCam

More information

Teach yourself Android application development - Part I: Creating Android products

Teach yourself Android application development - Part I: Creating Android products Teach yoursef Android appication deveopment - Part I: Creating Android products Page 1 of 7 Part of the EE Times Network A Artices Products Course TechPaper Webinars Login Register Wecome, Guest HOME DESIGN

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

NCH Software Express Accounts Accounting Software

NCH Software Express Accounts Accounting Software NCH Software Express Accounts Accounting Software This user guide has been created for use with Express Accounts Accounting Software Version 5.xx NCH Software Technica Support If you have difficuties using

More information

SNMP Reference Guide for Avaya Communication Manager

SNMP Reference Guide for Avaya Communication Manager SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this

More information

eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

NCH Software MoneyLine

NCH Software MoneyLine NCH Software MoneyLine This user guide has been created for use with MoneyLine Version 2.xx NCH Software Technica Support If you have difficuties using MoneyLine pease read the appicabe topic before requesting

More information

NCH Software FlexiServer

NCH Software FlexiServer NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

Lexmark ESF Applications Guide

Lexmark ESF Applications Guide Lexmark ESF Appications Guide Hep your customers bring out the fu potentia of their Lexmark soutions-enabed singe-function and mutifunction printers Lexmark Appications have been designed to hep businesses

More information

S E C U R I T Y A D M I N I S T R A T I O N G U I D E

S E C U R I T Y A D M I N I S T R A T I O N G U I D E H Y P E R I O N R E L E A S E 9. 3. 1 S E C U R I T Y A D M I N I S T R A T I O N G U I D E P / N : D H 0 9 9 9 3 0 1 A Hyperion Shared Services Security Administration Guide, 9.3.1 Copyright 2006, 2009,

More information

Introduction to XSL. Max Froumentin - W3C

Introduction to XSL. Max Froumentin - W3C Introduction to XSL Max Froumentin - W3C Introduction to XSL XML Documents Stying XML Documents XSL Exampe I: Hamet Exampe II: Mixed Writing Modes Exampe III: database Other Exampes How do they do that?

More information

mi-rm mi-recruitment Manager the recruitment solution for Talent Managers everywhere

mi-rm mi-recruitment Manager the recruitment solution for Talent Managers everywhere mi-rm mi-recruitme Manager the recruitme soution for Tae Managers everywhere mi-rm mi-recruitme Manager Your very own tae manager First Choice Software has been a eading suppier of recruitme software since

More information

Hyperion Enterprise. Installation Guide RELEASE 6.5.1.1.000

Hyperion Enterprise. Installation Guide RELEASE 6.5.1.1.000 Hyperion Enterprise Instaation Guide RELEASE 6.5.1.1.000 Hyperion Enterprise Instaation Guide, 6.5.1.1.000 Copyright 1991, 2012, Orace and/or its affiiates. A rights reserved. Authors: EPM Information

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Application and Desktop Virtualization

Application and Desktop Virtualization Appication and Desktop Virtuaization Content 1) Why Appication and Desktop Virtuaization 2) Some terms reated to vapp and vdesktop 3) Appication and Desktop Deivery 4) Appication Virtuaization 5)- Type

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

Design Considerations

Design Considerations Chapter 2: Basic Virtua Private Network Depoyment Page 1 of 12 Chapter 2: Basic Virtua Private Network Depoyment Before discussing the features of Windows 2000 tunneing technoogy, it is important to estabish

More information

How To Protect Yoursef Onine From Being Hacked Onine

How To Protect Yoursef Onine From Being Hacked Onine Onine Security Savings What is onine security? This booket is designed to make you aware of some of the atest threats that exist when managing your money onine so you can protect your money in the same

More information

WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS

WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS Password Reset Process Navigate to the og in screen Seect the Forgot Password ink You wi be asked to enter the emai address you registered with

More information

WINMAG Graphics Management System

WINMAG Graphics Management System SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic

More information

Oracle Project Financial Planning. User's Guide Release 11.1.2.2

Oracle Project Financial Planning. User's Guide Release 11.1.2.2 Orace Project Financia Panning User's Guide Reease 11.1.2.2 Project Financia Panning User's Guide, 11.1.2.2 Copyright 2012, Orace and/or its affiiates. A rights reserved. Authors: EPM Information Deveopment

More information

Driving Accountability Through Disciplined Planning with Hyperion Planning and Essbase

Driving Accountability Through Disciplined Planning with Hyperion Planning and Essbase THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP summer 2012 Driving Accountabiity Through Discipined Panning with Hyperion Panning and Essbase Introduction to Master Data and Master Data

More information

Chapter 3: Authentication and Resource Protection in Windows 2000

Chapter 3: Authentication and Resource Protection in Windows 2000 Chapter 3: Authentication and Resource Protection in Windows 2000 Page 1 of 23 Chapter 3: Authentication and Resource Protection in Windows 2000 Because this is a user administration book, not a security

More information

MCITP. Duration:- 6 Months. 1. 70-680 Windows 7

MCITP. Duration:- 6 Months. 1. 70-680 Windows 7 MCITP Duration:- 6 Months 1. 70-680 Windows 7 Instaing, Upgrading, and Migrating to Windows 7 Describe the key features, editions, and hardware requirements of Windows 7 Perform a cean instaation of Windows

More information

APIS Software Training /Consulting

APIS Software Training /Consulting APIS Software Training /Consuting IQ-Software Services APIS Informationstechnoogien GmbH The information contained in this document is subject to change without prior notice. It does not represent any

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

Eaton Intelligent Power Protector (IPP) Quick Start Installation Manual

Eaton Intelligent Power Protector (IPP) Quick Start Installation Manual Eaton Inteigent Power Protector (IPP) Quick Start Instaation Manua Eaton is a registered trademarks of Eaton Corporation or its subsidiaries and affiiates. Googe Chrome is a trademark of Googe, Inc. HyperTermina

More information

IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM

IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM The New Jersey Department of Human Services Division of Deveopmenta Disabiities 1 IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM Eizabeth M. Shea Assistant Commissioner Thomas S.

More information

NCH Software Copper Point of Sale Software

NCH Software Copper Point of Sale Software NCH Software Copper Point of Sae Software This user guide has been created for use with Copper Point of Sae Software Version 1.xx NCH Software Technica Support If you have difficuties using Copper Point

More information

New Features in Cisco IOS 12.4

New Features in Cisco IOS 12.4 Page 1 of 5 New Features in Cisco IOS 12.4 Peter J. Wecher Introduction I'm writing this in mid-august. Things have been hot (business, weather). That means its time for my more-or-ess annua artice about

More information

The growth of online Internet services during the past decade has

The growth of online Internet services during the past decade has IEEE DS Onine, Voume 2, Number 4 Designing an Adaptive CORBA Load Baancing Service Using TAO Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

A Conversation with enx@pacbell.net enx@pacbell.net www.enxmag.com

A Conversation with enx@pacbell.net enx@pacbell.net www.enxmag.com The #1 Sourcing Pubication in the Document Imaging Industry The #1 Sourcing Voume 11 Pubication No.7 in the Document Imaging Industry The #1 Sourcing Pubication in the Document Imaging Industry Sourcing

More information

NCH Software Warp Speed PC Tune-up Software

NCH Software Warp Speed PC Tune-up Software NCH Software Warp Speed PC Tune-up Software This user guide has been created for use with Warp Speed PC Tune-up Software Version 1.xx NCH Software Technica Support If you have difficuties using Warp Speed

More information

The BBC s management of its Digital Media Initiative

The BBC s management of its Digital Media Initiative The BBC s management of its Digita Media Initiative Report by the Comptroer and Auditor Genera presented to the BBC Trust s Finance and Compiance Committee, 13 January 2011 Department for Cuture, Media

More information

LADDER SAFETY Table of Contents

LADDER SAFETY Table of Contents Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3

More information

INDUSTRIAL AND COMMERCIAL

INDUSTRIAL AND COMMERCIAL Finance TM NEW YORK CITY DEPARTMENT OF FINANCE TAX & PARKING PROGRAM OPERATIONS DIVISION INDUSTRIAL AND COMMERCIAL ABATEMENT PROGRAM PRELIMINARY APPLICATION AND INSTRUCTIONS Mai to: NYC Department of Finance,

More information

Vision Helpdesk Client Portal User Guide

Vision Helpdesk Client Portal User Guide Hepdesk Hepdesk Vision Hepdesk Cient Porta User Guide VISION HELPDESK v3 User Guide (for Cient) CLIENT PORTAL DETAILS VISION HELPDESK v3 User Guide (for Cient) Hepdesk Index Cient Porta.....................................................

More information

IT Governance Principles & Key Metrics

IT Governance Principles & Key Metrics IT Governance Principes & Key Metrics Smawood Maike & Associates, Inc. 9393 W. 110th Street 51 Corporate Woods, Suite 500 Overand Park, KS 66210 Office: 913-451-6790 Good governance processes that moves

More information

Technical Support Guide for online instrumental lessons

Technical Support Guide for online instrumental lessons Technica Support Guide for onine instrumenta essons This is a technica guide for Music Education Hubs, Schoos and other organisations participating in onine music essons. The guidance is based on the technica

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

NCH Software Crescendo Music Notation Editor

NCH Software Crescendo Music Notation Editor NCH Software Crescendo Music Notation Editor This user guide has been created for use with Crescendo Music Notation Editor Version 1.xx NCH Software Technica Support If you have difficuties using Crescendo

More information

Business Banking. A guide for franchises

Business Banking. A guide for franchises Business Banking A guide for franchises Hep with your franchise business, right on your doorstep A true understanding of the needs of your business: that s what makes RBS the right choice for financia

More information

SPOTLIGHT. A year of transformation

SPOTLIGHT. A year of transformation WINTER ISSUE 2014 2015 SPOTLIGHT Wecome to the winter issue of Oasis Spotight. These newsetters are designed to keep you upto-date with news about the Oasis community. This quartery issue features an artice

More information

Eaton Intelligent Power Manager (IPM) Quick Start Installation Manual

Eaton Intelligent Power Manager (IPM) Quick Start Installation Manual Eaton Inteigent Power Manager (IPM) Quick Start Instaation Manua Cass A EMC Statements FCC Information This equipment has been tested and found to compy with the imits for a Cass A digita device, pursuant

More information

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan Let s get usabe! Usabiity studies for indexes Susan C. Oason The artice discusses a series of usabiity studies on indexes from a systems engineering and human factors perspective. The purpose of these

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

(12) United States Patent Rune

(12) United States Patent Rune (12) United States Patent Rune US006304913B1 (10) Patent N0.: (45) Date of Patent: US 6,304,913 B1 on. 16, 2001 (54) INTERNET SYSTEM AND METHOD FOR SELECTING A CLOSEST SERVER FROM A PLURALITY OF ALTERNATIVE

More information

How to deal with personal financial problems

How to deal with personal financial problems How to dea with persona financia probems D I S P U T E R E S O L U T I O N Introduction Heping you face the future with confidence In 2014, the eve of consumer debt in the UK grew to reach a seven-year

More information

How To Make An Audio Fie On Mixpad

How To Make An Audio Fie On Mixpad NCH Software MixPad Mutitrack Recording Software This user guide has been created for use with MixPad Mutitrack Recording Software Version 3.xx NCH Software Technica Support If you have difficuties using

More information

Eaton Power Xpert Gateway PXGX UPS Card. User's Guide

Eaton Power Xpert Gateway PXGX UPS Card. User's Guide Eaton Power Xpert Gateway PXGX UPS Card User's Guide Cass A EMC Statements FCC Part 15 This equipment has been tested and found to compy with the imits for a Cass A digita device, pursuant to part 15 of

More information

Eaton Intelligent Power Protector (IPP) User s Guide

Eaton Intelligent Power Protector (IPP) User s Guide Eaton Inteigent Power Protector (IPP) User s Guide Eaton is a registered trademarks of Eaton Corporation or its subsidiaries and affiiates. Googe Chrome is a trademark of Googe, Inc. HyperTermina is a

More information

Sage Accounts Production Range

Sage Accounts Production Range Sage Accounts Production Range The abiity to dri-down from the face of the accounts makes reviewing accounts so easy. Sage Accounts Production Software As individua as you and your cients Jim O Leary,

More information

MICROSOFT DYNAMICS CRM

MICROSOFT DYNAMICS CRM biztech TM MICROSOFT DYNAMICS CRM Experienced professionas, proven toos and methodoogies, tempates, acceerators and vertica specific soutions maximizing the vaue of your Customer Reationships Competency

More information

I FaxMemo. Manual. Voice Processina Solutjons I. Issue 1 Release 2.0 January 1996

I FaxMemo. Manual. Voice Processina Solutjons I. Issue 1 Release 2.0 January 1996 Issue 1 Reease 2.0 January 1996 Voice Processina Soutjons I I FaxMemo Manua TM, @-Trademark of Mite1 Corporation 0 Copyright 1996, Mite1 Corporation A rights reserved. Printed in Canada. Tabe of Contents

More information

Vital Steps. A cooperative feasibility study guide. U.S. Department of Agriculture Rural Business-Cooperative Service Service Report 58

Vital Steps. A cooperative feasibility study guide. U.S. Department of Agriculture Rural Business-Cooperative Service Service Report 58 Vita Steps A cooperative feasibiity study guide U.S. Department of Agricuture Rura Business-Cooperative Service Service Report 58 Abstract This guide provides rura residents with information about cooperative

More information

Planning your OpenStack Cloud. Tom Fifield tom@openstack.org @TomFifield

Planning your OpenStack Cloud. Tom Fifield tom@openstack.org @TomFifield Panning your OpenStack Coud Tom Fified tom@openstack.org @TomFified Introduction Software Engineering Partice Physics Buiding Couds OpenStack Community Manager Much of this presentation is based on the

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH DMS PDMG-RH Partia discharge monitor for GIS Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Unrivaed PDM feature set

More information

ADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES

ADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES ADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES Product Features 1. System 2. Saes Ledger Unimited companies with password protection User security Muti-user system: 1 user comes as standard, up to

More information

Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998

Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998 GAO United States Genera Accounting Office Washington, D.C. 20548 Resources, Community, and Economic Deveopment Division B-276660 Apri 25, 1997 The Honorabe Pete V. Domenici Chairman The Honorabe Harry

More information

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services 2012 Before You Buy A Description of the Caifornia Partnership for Long-Term Care Prepared by the Caifornia Department of Heath Care Services Page 1 of 13 Ony ong-term care insurance poicies bearing any

More information

AA Fixed Rate ISA Savings

AA Fixed Rate ISA Savings AA Fixed Rate ISA Savings For the road ahead The Financia Services Authority is the independent financia services reguator. It requires us to give you this important information to hep you to decide whether

More information

Qualifications, professional development and probation

Qualifications, professional development and probation UCU Continuing Professiona Deveopment Quaifications, professiona deveopment and probation Initia training and further education teaching quaifications Since September 2007 a newy appointed FE ecturers,

More information

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE AN APPROACH TO THE STANDARDSATON OF ACCDENT AND NJURY REGSTRATON SYSTEMS (STARS) N EUROPE R. Ross P. Thomas Vehice Safety Research Centre Loughborough University B. Sexton Transport Research Laboratory

More information

A short guide to making a medical negligence claim

A short guide to making a medical negligence claim A short guide to making a medica negigence caim Introduction Suffering from an incident of medica negigence is traumatic and can have a serious ong-term impact on both the physica and menta heath of affected

More information

The Domain Name System (DNS)

The Domain Name System (DNS) D 1 The Domain Name System (D) Prof. Jean-Yves Le Boudec Prof. ndrzej Duda IC, EPFL CH-1015 Ecubens http://cawww.epf.ch o o Domain Name System: D Objective of D support user friendy naming of resources:

More information

The growth of online Internet services during the past decade has increased the

The growth of online Internet services during the past decade has increased the IEEE DS Onine, Voume 2, Number 3 March 2001 Strategies for CORBA Middeware-Based Load Baancing Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

Load Balancing in Distributed Web Server Systems with Partial Document Replication *

Load Balancing in Distributed Web Server Systems with Partial Document Replication * Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong

More information

Oracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus

Oracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus N o r w e g i a n S e a White 60ûN ATLANTIC OCEAN UNITED KINGDOM Rio Douro Hebrid Bay of Biscay Garonne Faroe Isands Shetand Isands Orkney Isands North Loire ine Rhone Rhine Po Ebe Adriatic Batic Guf of

More information

NCH Software WavePad Sound Editor

NCH Software WavePad Sound Editor NCH Software WavePad Sound Editor This user guide has been created for use with WavePad Sound Editor Version 6.xx NCH Software Technica Support If you have difficuties using WavePad Sound Editor pease

More information

NCH Software PlayPad Media Player

NCH Software PlayPad Media Player NCH Software PayPad Media Payer This user guide has been created for use with PayPad Media Payer Version 2.xx NCH Software Technica Support If you have difficuties using PayPad Media Payer pease read the

More information

READING A CREDIT REPORT

READING A CREDIT REPORT Name Date CHAPTER 6 STUDENT ACTIVITY SHEET READING A CREDIT REPORT Review the sampe credit report. Then search for a sampe credit report onine, print it off, and answer the questions beow. This activity

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

NCH Software Bolt PDF Printer

NCH Software Bolt PDF Printer NCH Software Bot PDF Printer This user guide has been created for use with Bot PDF Printer Version 1.xx NCH Software Technica Support If you have difficuties using Bot PDF Printer pease read the appicabe

More information

INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005

INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005 INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005 Steven J Manchester BRE Fire and Security E-mai: manchesters@bre.co.uk The aim of this paper is to inform

More information

Remote Feature Activation Getting Started with Remote Feature Activation (RFA)

Remote Feature Activation Getting Started with Remote Feature Activation (RFA) Remote Feature Activation Getting Started with Remote Feature Activation (RFA) 03-300484 Issue 4.1 November 007 Contents Chapter 1: Remote Feature Activation Overview............. 7 RFA user requirements................................

More information

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning Monitoring and Evauation Unit Learning from evauations Processes and instruments used by GIZ as a earning organisation and their contribution to interorganisationa earning Contents 1.3Learning from evauations

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Leadership & Management Certificate Programs

Leadership & Management Certificate Programs MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J

More information

The Productive Therapist and The Productive Clinic Peter R. Kovacek, MSA, PT

The Productive Therapist and The Productive Clinic Peter R. Kovacek, MSA, PT The Productive Therapist and The Productive Cinic Peter R. Kovacek, MSA, PT Format Interactive Discussions among equa peers Constructive argument Reaity Oriented Mutua Accountabiity Expectation Panning

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

WHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons

WHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons Understanding the Vaue of Visua Data Discovery A Guide to Visuaizations WHITE Tabe of Contents Executive Summary... 3 Chapter 1 - Datawatch Visuaizations... 4 Chapter 2 - Snapshot Visuaizations... 5 Bar

More information

Information Systems Technician Training Series

Information Systems Technician Training Series NONRESIDENT TRAINING COURSE Information Systems Technician Training Series Modue 1 Administration and Security NAVEDTRA 14222 IMPORTANT Any future change to this course can be found at https://www.advancement.cnet.navy.mi,

More information

The guaranteed selection. For certainty in uncertain times

The guaranteed selection. For certainty in uncertain times The guaranteed seection For certainty in uncertain times Making the right investment choice If you can t afford to take a ot of risk with your money it can be hard to find the right investment, especiay

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

We are XMA and Viglen.

We are XMA and Viglen. alearn with Microsoft 16pp 21.07_Layout 1 22/12/2014 10:49 Page 1 FRONT COVER alearn with Microsoft We are XMA and Vigen. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow

More information

Informatica PowerCenter

Informatica PowerCenter Brochure Informatica PowerCenter Benefits Support better business decisions with the right information at the right time Acceerate projects in days vs. months with improved staff productivity and coaboration

More information