Workflow Scenario: Trouble Ticket

Size: px
Start display at page:

Download "Workflow Scenario: Trouble Ticket"

Transcription

1 Supporting Document Workflow Scenario: Trouble Ticket Nortel Supported by: University of Newcastle upon Tyne OMG Document Number bom/

2 Workflow Scenario: Trouble Ticket bom/ Copyright 1998 by Northern Telecom Copyright 1998 by University of Newcastle upon Tyne All rights reserved. The companies and organizations listed above hereby grant a royalty-free license to the Object Management Group, Inc. (OMG) for worldwide distribution of this document or any derivative works thereof, so long as the OMG reproduces the copyright notices and the below paragraphs on all distributed copies. The material in this document is submitted to the OMG for evaluation. Submission of this document does not represent a commitment to implement any portion of this specification in the products of the submitters. WHILE THE INFORMATION IN THIS PUBLICATION IS BELIEVED TO BE ACCURATE, THE COMPANIES LISTED ABOVE MAKE NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The companies listed above shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance or use of this material. The information contained in this document is subject to change without notice. This document contains information which is protected by copyright. All Rights Reserved. Except as otherwise provided herein, no part of this work may be reproduced or used in any form or by any meansgraphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems-without the permission of one of the copyright owners. All copies of this document must include the copyright and other information contained on this page. The copyright owners grant member companies of the OMG permission to make a limited number of copies of this document (up to 50 copies) for their internal use as part of the OMG evaluation process. The copyright owners also grant OMG permission to reproduce the document and to use the interfaces contained herein. RESTRICTED RIGHTS LEGEND. Use, duplication, or disclosure by government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Right in Technical Data and Computer Software Clause at DFARS Trademarks All trademarks acknowledged. 2 Workflow Scenario: Trouble Ticket

3 bom/ Workflow Scenario: Trouble Ticket Table of Contents 0. Supporting Document Information Copyright Waiver Supporting Document Contact Points Introduction Workflow Scenario: Trouble Ticket Setting The Process The Data Interaction Scenario Scenario Realization Task Structure Course Grained Structure Medium Grained Structure Fine Grained Structure Class Structure Interaction Structure References Table of Content 3

4 Workflow Scenario: Trouble Ticket bom/ Supporting Document Information 0.1 Copyright Waiver See inside front cover. 0.2 Supporting Document Contact Points John Warne Nortel London Road Harlow ESSEX CM17 9NA UK tel: fax: Stuart Wheater Department of Computing Science University of Newcastle upon Tyne Claremont Tower Newcastle upon Tyne Tyne and Wear NE1 7RU UK tel: fax: Supporting Document Information

5 bom/ Workflow Scenario: Trouble Ticket 1. Introduction The purpose of this document is to illustrate how the Workflow Management Facility proposed by Nortel and the University of Newcastle upon Tyne [1] can be used to realized the workflow scenario (version 2) provided by Keith D. Swenson, Netscape Communications Corporation [2]. A secondary purpose of this document is to form a tangible example of the slightly abstract facilities specified in the submission. The scenario comprises a description of: the process and the data, which constitutes a trouble ticket workflow application, and an interaction scenario with the workflow application. The document is structure as follows, in section 2 the trouble ticket workflow scenario is described, and in section 3 how the scenario could be realized using the proposed workflow management facility is described. Introduction 5

6 Workflow Scenario: Trouble Ticket bom/ Workflow Scenario: Trouble Ticket Copyright 1998 Netscape. This document is provided by Netscape Communications Corporation to the members of the OMG for the purpose of evaluating workflow. Permission is hereby granted for copying and redistribution of this document as long as this copyright notice remains in place. 2.1 Setting 2.2 The Process The trouble ticket scenario covers quality assurance teams or customer support teams. A "bug" or "problem" is identified; it must be recorded; the record must be checked for accuracy; from a single instance of a problem, the underlying cause is identified; a resolution is identified, which must be communicated back to the original party with the problem. The scenario has been modified in version 2 to provide for a subprocess invocation in order to be able to discuss the interoperability of two workflow systems. First we will present a process centric view of what happens to a given trouble ticket Step 1: Recording the Problem The problem may be found by an internal or external person. There are two ways that a problem can come from the external person: by phone or by . For the internal person, there must be a screen that can be called up without delay that presents a form for entering the details of the problem. Submitting this form will cause the creation of the workflow process, and at the same time generate a unique ID for the trouble ticket. A phone call from an external person will be handled by an internal person, who uses essentially the same form mentioned above, but needs to be able to search for registered customers a couple of different ways. Again, submission of the form will create the process and assign an id. The ID of the trouble ticket must be produced by the system and be immediately available (within 10 seconds) in order to let the external person know the trouble ticket ID. The ID is used as a way to call up the trouble ticket when that person calls in again to check on progress. Finally, may be sent to a particular address. This is automatically picked up, and a trouble ticket started, which includes the body of the as part of the data. No attempt is made to automatically analyze the body of the message, but the sender's address is retrieved from the header. The first step of the process is for some internal person to read the message, and to fill in some of the other fields on the form with real values, and then submit it. The system 6 Workflow Scenario: Trouble Ticket

7 bom/ Workflow Scenario: Trouble Ticket should be able to look up the registered user from the address. When the trouble ticket is submitted, a confirmation is sent to the external person, and the process goes to step 2. Step 2: Reproduce the Problem This step is designed to check the trouble ticket report, and to see if it describes accurately a reproducible problem. This activity is simply to follow the instruction on the report, and to see if the described behavior occurs. If the trouble ticket comes from an internal person, then this activity must be assigned to someone else so that the recording and reproducing of the problem are not done by the same person. If it comes from an external person, this activity may be done by the same person who enters the report. If the behavior can not be reproduced, then this process goes to step3, otherwise it goes to step 4. The problem may be identified at this stage. If there is a known solution to the problem it should be entered or referred to at this stage, and then communicated back to the originator by going to Step 6. If the problem is recognized as a duplicate of another problem, it should be able to be recorded as such, and go to step 5. Step 3: Correcting the Report This step is reached only if the problem can not be reproduced. This step is assigned to the originator if internal. If external, this must be assigned to a person who can contact the originator and get more clarification on the problem. There are two results of this step, either back to Step 2, or to give up on the process and go to step 6. Step 4: Identifying the Problem and Resolution This is where the specialist is called in. The problem details should narrow down the area of the problem. If the expert determines that the area is wrong, it should be able to be reassigned, and the person assigned to the activity should change. The problem stays in this state until a resolution is determined. Either the problem is identified and it will be fixed, or it be fixed later due to schedule constraints, or it is determined to be a misunderstanding and is actually the correct behavior. In all cases the resolution must be communicated to the originator, either via , or else through a phone call. It goes to step 5. For this organization, accomplishing this activity require invoking a subprocess. The development team has its own workflow process that handles this in a manner that fits the way they work. The exact route of this sub process is not the subject of this scenario, only that it is started, it is given data, and at some time later it reports that it is complete and returns a set of data. The subprocess for the development team was implemented before the trouble ticket scenario, so it already has a set of field with meaning appropriate to that Workflow Scenario: Trouble Ticket 7

8 Workflow Scenario: Trouble Ticket bom/ The Data task. This means that the trouble ticket process must translate the fields into the field used by the sub process. The details of this is defined below. Step 5: Verifying the Resolution When the problem is resolved, then it waits for the resolution to become available. When it is available, the resolution is verified. If the resolution was "fixed," and the problem is not actually solved, then the process can be sent back to step 4. Otherwise the process goes to step 6. Step 6: Communicate Results The results of the process are communicated back to the originator here. This step contains a rule that the result must be communicated within 3 days of being known. If not, an message is sent to the support manager. Step 7: Audit and Record This step may happen before or after Step 6, but must happen before the end of the process. It involves someone looking at the process and determine whether the question/answer should be included in a monthly newsletter to the user community. This step is started in parallel with Step 6 since it does not depend upon it, and might happen before it. This first set of data is the set of filed used within the Trouble Ticket process itself. Originator UID - a unique id if one exists Originator Name Originator Address Originator phone Originator address Submitter - the person who took the call. If internal, same as originator. Synopsis - a one line description Description - a full in depth description Source - holds the that started the process, if there is one. Severity Priority Product Area 8 Workflow Scenario: Trouble Ticket

9 bom/ Workflow Scenario: Trouble Ticket Date Received (Submitted) Date Resolved Date Verified Date Closed Attached data files (URLs to files checked into a server) Expert - the person who is the expert for the current product area. Resolution Resolution Description Status (presumably part of the workflow...) Date of last originator contact Duplicate Ticket number. This second set is the data needed by the subprocess invoked under step number four. 2.4 Interaction Scenario Day 1 ShortDescription - a one line description of the problem (like Synopsis above) QAPriority - the priority assigned by QA (like Priority above) Priority - the priority within the development team (not present in the parent process) Description - the full description of the problem (like Description above) Attached files (like above) Submitter - (like above) SubmittedDate - the date submitted to the development team. A number more data fields internal to this process. Resolution - this is a result that is passed back to the parent process. (a) An important customer calls up with a problem. Person A takes the call, and brings up the form, enters the information, submits it, and sees that it is currently assigned to Person B. Later person B sees it on the worklist, but does not call it up. Workflow Scenario: Trouble Ticket 9

10 Workflow Scenario: Trouble Ticket bom/ Day 2 (b) Person A checks on the status of the trouble ticket (where was this listed, since it is not on his worklist?), and sees that Person B has not taken any action. Person A composes an message to Person B, with the processes status page attached. (c) Person B receives the , clicks on the link to call up the process in the browser. Person B reproduces the problem, makes sure it is correctly assigned to Product X, Area 1, and then completes the activity. It disappears from B's worklist. (d) Step 4 becomes active, and it looks up in the directory to find the workflow process definition that is responsible for Product X, Area 1. It does not matter that the definition is in a different workflow engine, an instance of it is created. The data is passed to it. The subprocess determines that for Product X Area 1 the first activity on the subprocess should be assigned to user C. It appears on C's worklist, and C has specified to receive notification by , so it sends him an message. Day 3 (e) Person C gets the , and clicks on the link to bring up the sub process instance, looks at it for 5 minutes, and determines that it should be in Area 2. He changes the Area field to 2. The system finds out that person D is assigned to Area 2, so it disappears from C's worklist, appears on D's worklist, and D also receives an notification. (f) Person A checks on the progress of the case and sees that step 5 is currently active. He sees that it has a subprocess. He can navigate to the subprocess and see what step it is in there and that it is currently assigned to person D. He can read the output data from the subprocess which includes the resolution of the problem, which at this time is still empty. Day 4 (g) Person D gets the message, retrieves the process instance, but does not have the time to get to it. Instead he determines that Person E should be able to handle the task, so he delegates the activity to Person E. (h) The important customer calls up again but this time to the Vice President of the division, who talks to Person A, who checks on the status. Person A rasies the priority data field in the process in response. (i) Person E sees it immediately, and gets to work. A short time later a solution is found; he enters the resolution, and marks it fixed, completing the subprocess, passing the data back to the main process, and finally ending up at step 5. This is assigned to Person B since B was the one who reproduced the problem. B verifies the fix, and the process goes to step 6. This is assigned to Person F. 10 Workflow Scenario: Trouble Ticket

11 bom/ Workflow Scenario: Trouble Ticket Day 5 & 6 (j) Nothing happens to Step 6 (k) The newsletter editor picks up and completed Step 7, removing it from his worklist. Day 8 (l) Still nothing has happened. There is a rule that the result must be communicated back within 3 days of the fix, so a trigger goes off, causing an message to be sent to Person A, and to Person G who is the manager of Person F. (m) Person G knows that Person F is on vacation, and forgot to set up automatic forwarding of responsibility. Since this activity needs to be attended to, reassigns the task to person H (how did he claim authority to do so?) who gets an notification, and takes case of the activity completing the process. Day 9 (n) Person A checks back in on the process. The process is finished, but A is still able to access the history and final state of the process. Workflow Scenario: Trouble Ticket 11

12 Workflow Scenario: Trouble Ticket bom/ Scenario Realization 3.1 Task Structure The description of the realization of the trouble ticket scenario will involve describing three aspects: the task structure, the class structure and the interaction structure Course Grained Structure The following figures describes the course grained structure of the Trouble Ticket workflow application. It shows that the Trouble Ticket task has been decomposed into five sub-tasks (small solid boxes represent simple tasks (or if desired compound tasks) and small dotted boxes represent genesis tasks), Recording the Problem, Reproduce Problem and Correct Report, Identify and Verify Resolution, Three Day Timeout and Communicate Results, and also shows their inter-relationships (solid arrows represent data-dependencies and dotted arrows represent temporal-dependencies). Trouble Ticket Identify and Verify Resolution Reproduce Problem and Correct Report Communicate Results Recording the Problem Three Day Timeout Figure 1 Trouble ticket The Reproduce Problem and Correct Report and Identify and Verify Resolution tasks, are specified to be genesis tasks which means that the sub-task structure associated those tasks will only be instantiated when the task is started. This means that the instantiation of the trouble ticket task can be performed dynamically when needed. The following figures describes the structure of the Reproduce Problem and Correct Report task. It shows that the Reproduce the Problem task has been decomposed into three sub-task, Recording the Problem, Correcting the Report, and Reproduce Problem and Correct Report, and also shows their inter-relationships. 12 Scenario Realization

13 bom/ Workflow Scenario: Trouble Ticket Reproduce Problem and Correct Report Correcting the Report Reproduce Problem and Correct Report Reproduce the Problem Figure 2 Reproduce problem and correct report The Reproduce Problem and Correct Report sub-task within the Reproduce Problem and Correct Report task is specified to be genesis task with the same task structure as the its enclosing task. This means that the task structure is recursive. Recursion is used here to perform the iteration between step 2 and step 3. The following figures describes the structure of the Identify Problem and Verify Resolution task. It shows that the Identify Problem and Verify Resolution task has been decomposed into three sub-task, Identifying the Problem and Resolution, Verifying the Resolution and Identify Problem and Verify Resolution. Identify Problem and Verify Resolution Identify Problem and Verify Resolution Verifying the Resolution Identifying the Problem and Resolution Figure 3 Identify problem and verify resolution Once again recursion is used for iterating between steps 4 to Medium Grained Structure The following figures describes the medium grained structure of the Trouble Ticket workflow application, by describe the input and output sets of the Trouble Ticket task and it s sub-tasks, and the relationships between input and output sets. Scenario Realization 13

14 Workflow Scenario: Trouble Ticket bom/ The figure below shows that the Trouble Ticket task has two input sets (labeled ; which corresponds to starting the task with a problem from an internal person and labeled is2; which corresponds to starting the task with a problem from an external person ) and a single output set (labeled ; which corresponds to the outcome of the task). Trouble Ticket Verify Problem and Correct Report os2 Identify and Verify Resolution is2 is2 is2 Recording the Problem os3 Three Day Timeout Communicate Results is2 Figure 4 Trouble ticket The purpose of the input and output sets are described below: Recording the Problem task: Input set : Problem from internal person. Input set is2: Problem from external person. Output set : Produce report. Verify Problem and Correct Report task: Input set : Obtain Report. Output set : Unknown resolution. Output set os2: Probable known resolution. Output set os3: Known resolution. Identify and Verify Resolution task: Input set : Unknown resolution. Input set is2: Probable known resolution. Output set : Produce resolution. Three Day Timeout task: Input set : Start timer. Output set : Timer expired. Communicate Results task: Input set : Resolution. 14 Scenario Realization

15 bom/ Workflow Scenario: Trouble Ticket Input set is2: No Resolution. Output set : Outcome. This figure below describe the relationships between the input and output sets of the Verify Problem and Correct Report task and it s sub-tasks. Verify Problem and Correct Report Verify Problem and Correct Report os2 Correct the Report os3 os2 Reproduce the Problem os2 os2 os3 os3 os4 Figure 5 Verify problem and correct report The purpose of the input and output sets are described below: Reproduce the Problem task: Input set : Obtain Report. Output set : Not reproducible. Output set os2: Reproducible, unknown resolution. Output set os3: Reproducible, probable known resolution. Output set os4: Reproducible, known resolution. Correct the Report task: Input set : Obtain Report. Output set : Report corrected. Output set os2: Report not corrected. Verify Problem and Correct Report task: the input and output sets of this task are specified above. The figure below describes the relationships between the input and output sets of the Identify and Verify Resolution task and it s sub-tasks. Scenario Realization 15

16 Workflow Scenario: Trouble Ticket bom/ is2 Identify the Problem and Resolution Identify Problem and Verify Resolution Identify Problem and Verify Verify Resolution the is2 Resolution os2 Figure 6 Identify problem and verify resolution The purpose of the input and output sets are described below: Identify the Problem and Resolution task: Input set : Obtain report. Output set : Produce resolution. Verify the Resolution task: Input set : Obtain report and resolution. Output set : Resolution don t solves problem. Output set os2: Resolution solves problem. Identify Problem and Verify Resolution task: the input and output sets of this task are specified above Fine Grained Structure This section will describe the structure of the Trouble Ticket workflow application in terms of the object references which are passed between tasks. Because of the large number of interaction between tasks the interaction between only three tasks will be described, the Verify Problem and Correct Report, Identify and Verify Resolution and the Communicate Results tasks. 16 Scenario Realization

17 bom/ Workflow Scenario: Trouble Ticket Verify Problem and Correct Report o1 os2 o2 i1 i2 Identify and Verify Resolution o1 o3 i3 os3 o4 i1 Communicate Results Figure 6 Fine grained structure of application The purpose of the input and output objects are described below (see section 3.2 class definitions): Verify Problem and Correct Report task: Output set : Unknown resolution. Object o1: problem (Problem class) Output set os2: Probable known resolution. Object o2: problem (Problem class) Object o3: probable_resolution (Resolution class) Output set os3: Known resolution. Object o4: resolution (Resolution class) Identify and Verify Resolution task: Input set : Unknown resolution. Object i1: problem (Problem class) Input set is2: Probable known resolution. Object i2: problem (Problem class) Object i3: probable_resolution (Resolution class) Output set : Produce resolution. Object o1: resolution (Resolution class) Communicate Results task: Input set : Resolution. Object i1: resolution (Resolution class) Input set is2: No Resolution (not shown). Scenario Realization 17

18 Workflow Scenario: Trouble Ticket bom/ Class Structure The input set of the Communicate Results task will be triggered if either the output set os4 of the Verify Problem and Correct Report task or the of the Identify and Verify Resolution task are produced. This section will describe one possible class structure of the data specified in the trouble ticket scenario, and how existing class structures can be incorporated in to the application. The class structure is obtained by grouping information to form classes. Object references to instances for such classes are passed between tasks. The figure below shows a medium grained class structure for the trouble ticket scenario which contains five classes; Resource, Originator, Report, Problem and Resolution. Resource is the base class (base interface) of the object references which can be passed between tasks. The remaining four classes contain the trouble ticket workflow application specific information. CfWorkflow::Resource id Originator UID name address phone _address Report submitter source_ 0..* 0..1 priority date_received date_verified date_closed date_last_contact Problem synopsis description 1..* 0..1 severity product area attached_data expert Resolution resolution description date_resolved date_verified Figure 7 UML class diagram of class structure A more fine grained structure is possible which contain more classes, as is a courser grained structure which contains fewer classes. The granularity of the class structure is left to the workflow application designed. The figure below describes the incorporated into the trouble ticket application of a class called TroubleTicket which was been implemented separating for the workflow application. 18 Scenario Realization

19 bom/ Workflow Scenario: Trouble Ticket TroubleTicket short_description q_a_priority priority description attached_files submitter submitted_date resolution CfWorkflow::Resource id TroubleTicketResource Figure 8 UML class diagram of class structure As the TroubleTicketResource class is a combination of the Problem and Resolution classes a task can be constructed which take as input a Problem object reference and Resolution object reference and produce as output an object reference to TroubleTicketResource. Naturally a task can also be constructed which does the reverse. The appropriate addition of such tasks into the trouble ticket application would allow the interoperability of task constructed using the different class structures. 3.3 Interaction Structure The following interaction scenarios illustrate how the features of the workflow management facility can be used to achieve specific goals. Naturally all the following interactions would be performed by support tools, which provide the user with a higher level of abstraction. It is assumed that WorkList and support is provided. Worklist objects could be transactional ad primitive tasks could be constructed which transfer work between worklists (atomically), and send . This will ensure that a workitem will disapear from a workflow and reappear at another worklist in a reliable manner. Interaction (a): Person A finds the appropriate workflow specification in the workflow repository, an object reference to a TaskDef interface. Person A instantiates and starts a workflow instance, based on the workflow specification. The start operation is passed the initial inputs needed by the workflow instance. The object reference to the created task controller will be retained by person A, to allow monitoring of the workflow. In the first task ( Record the Problem, performed by person A), originator, report and problem objects are created, object references to these objects will be passed between subsequent tasks. Scenario Realization 19

20 Workflow Scenario: Trouble Ticket bom/ It is possible to traverse the task structure (using the get_requested_notification of the TaskControl interface) to discover that the Reproduce the Problem task has been assigned to person B and is currently active (using the get_status operation of the Task interface). Interaction (b): Person A checks the status of the workflow instance using the retained object reference to the created task controller, in the same manner as before and finds that the Reproduce the Problem task is still active. The object reference to the task controller or task (as a stringified object reference or name server entry, using the id attribute of the Task or TaskControl interface), if it was to be e- mailed) could be passed to person B to indicate that this task requires attention. Interaction (c): Person B completes the Reproduce the Problem task, causing the task object to invoke the notification operation of it s task controller (with appropriate output set), this in turn causes it s task controller to invoke notification operations of interested task controllers. At this point the task and task controller are both in StatusCompleted states. The task entering completed state would remove the task form person B s active worklist (possible adding it to a completed list, so the person B can monitor it further progress, until the task is destroyed; using the destroy operation). Interaction (d): Section 3.2 describes how task based on different class structures can interoperate. Interaction (e): The Identify and Verify Resolution task needs to be changed; this may required reassigning the locations and implementations of the task (dynamically reconfigured). To achieve this the set_status_to_setup should be invoked on the task controller to set its status to StatusSetup. In this status the set_task operation can be invoked to change the task associated with the task controller. The set_status_to_waiting should then be invoked on the task controller to set back to status to StatusWaiting. To ensure that this, and other, changes are make consistently such changes could be performed within a transaction. Interaction (f): Person A checks the status of the workflow instance using the retained object reference to the created task controller, in the same manner as before (Interaction (a)) and finds that the currently active task is assigned to person D. The get_selected_input_set operation of the task controller can be used to determine 20 Scenario Realization

21 bom/ Workflow Scenario: Trouble Ticket the input set that started the task, and the get_input_alternative can be used to find which tasks supplied the selected input objects. Interaction (g): This can be achieved using dynamic reconfiguration (see interaction (e)). Interaction (h): Person A can obtain an object reference to the report and set its priority field. Interaction (i): Section 3.1 describes how task can be coordinated. Interaction (j): Nothing happens. Interaction (k): The newsletter editor can request a notification of specific outcomes by invoking the request_notification operation of task controller which is controlling the task which is to be monitored. Interaction (l): Section 3.1 describes how a time task can trigger a task. Interaction (m): This can be achieved using dynamic reconfiguration (see interaction (e)). Interaction (n): Even after the all tasks have completed the task controllers will still respond to query operation such as get_selected_input_set, get_selected_output_set, get_input_alternative and get_task, until the destory operation is called on the task controllers. Scenario Realization 21

22 Workflow Scenario: Trouble Ticket bom/ References [1] Nortel and University of Newcastle upon Tyne, Revised Submission for Workflow Management Facility Specification, OMG Document bom/ [2] Keith D. Swenson, Netscape Communications Corporation, Trouble Ticket Workflow Scenario (Version 2), OMG Document bom/ References

Supporting Document Contact Points Toshiaki Sakaguchi, t-sakagu@sdl.hitachi.co.jp Shunsuke Akifuji, akifuji@sdl.hitachi.co.jp

Supporting Document Contact Points Toshiaki Sakaguchi, t-sakagu@sdl.hitachi.co.jp Shunsuke Akifuji, akifuji@sdl.hitachi.co.jp Supporting Document Workflow Scenario: Trouble Ticket Hitachi,Ltd. Supporting Document Contact Points Toshiaki Sakaguchi, t-sakagu@sdl.hitachi.co.jp Shunsuke Akifuji, akifuji@sdl.hitachi.co.jp Table of

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject

More information

CA Spectrum and CA Service Desk

CA Spectrum and CA Service Desk CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

Software Support Registration workflow

Software Support Registration workflow Software Support Registration workflow Schlumberger Information Solutions March 2014 Copyright Notice 2014 Schlumberger. All rights reserved. No part of this manual may be reproduced, stored in a retrieval

More information

TSI Support for Autodesk Fabrication Software on Zendesk Help Desk Platform

TSI Support for Autodesk Fabrication Software on Zendesk Help Desk Platform TSI Support for Autodesk Fabrication Software on Zendesk Help Desk Platform Table of Contents 1 Introducing TSI Support for Autodesk Fabrication Software on Zendesk Platform... 2 2 Initial Zendesk Login...

More information

Unicenter Service Desk

Unicenter Service Desk Unicenter Service Desk ITIL User Guide r11.2 This documentation (the Documentation ) and related computer software program (the Software ) (hereinafter collectively referred to as the Product ) is for

More information

Location: Site Coordinator: Phone:

Location: Site Coordinator: Phone: GOVERNMENT CONTRACTOR SOFTWARE LICENSE AGREEMENT (SITE) This Agreement is made and entered into this day of, 201, (the Effective Date ) by and between the MASSACHUSETTS INSTITUTE OF TECHNOLOGY, a corporation

More information

TIBCO MFT BusinessWorks MFT Palette

TIBCO MFT BusinessWorks MFT Palette TIBCO MFT BusinessWorks MFT Palette This is a TIBCO document from Proginet Sales & Presales Group. Consulting Services This document provides a general overview of using the MFT palette. It assumes that

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Unicenter NSM Integration for BMC Remedy. User Guide

Unicenter NSM Integration for BMC Remedy. User Guide Unicenter NSM Integration for BMC Remedy User Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational

More information

Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102

Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Intellect Platform - The Workflow Engine Basic HelpDesk Troubleticket System - A102 Interneer, Inc. Updated on 2/22/2012 Created by Erika Keresztyen Fahey 2 Workflow - A102 - Basic HelpDesk Ticketing System

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

CA Clarity PPM. Demand Management User Guide. v13.0.00

CA Clarity PPM. Demand Management User Guide. v13.0.00 CA Clarity PPM Demand Management User Guide v13.0.00 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Software Hosting and End-User License Subscription Agreement

Software Hosting and End-User License Subscription Agreement Software Hosting and End-User License Subscription Agreement (Last Updated October 31, 2015) IMPORTANT! The Contrail software (the "SOFTWARE") that you seek to use was developed by OneRain Incorporated

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack for Systems Center Operations Manager (SCOM) Concepts Guide Version 6.3 November 2012 Legal Notices Warranty EView Technology makes no warranty of any kind with regard to this

More information

Location: Site Coordinator: Phone:

Location: Site Coordinator: Phone: 8/19/99 revised 12/3/04 GOVERNMENT CONTRACTOR SOFTWARE LICENSE AGREEMENT (SITE) This Agreement is made and entered into this day of, 20, (the Effective Date ) by and between the MASSACHUSETTS INSTITUTE

More information

Intergraph's eservice Support System

Intergraph's eservice Support System User Manual for eservice Version 8.1 Support System Publish Date: Version: 2.0 19-Apr-2011 Contents Commercial-In-Confidence 1 Introduction... 4 1.1 Accessing Intergraph s eservice... 4 2 Logging in to

More information

Published April 2010. Executive Summary

Published April 2010. Executive Summary Effective Incident, Problem, and Change Management Integrating People, Process, and Technology in the Datacenter Published April 2010 Executive Summary Information technology (IT) organizations today must

More information

RealShot Manager Compression Server software

RealShot Manager Compression Server software RealShot Manager Compression Server software User Guide Software Version 1.0 RealShot Manager 2004 Sony Corporation Copyright Notice 2004 Sony Corporation. All rights reserved. This manual may not be reproduced,

More information

Partner Portal DOCUMENT. Ticketing User Guide. NTT Communications

Partner Portal DOCUMENT. Ticketing User Guide. NTT Communications DOCUMENT Partner Portal Ticketing User Guide PREPARED BY NTT Communications Copyright of this document is owned by NTT Communications Corporation. Copying a part of or whole of this document without our

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Rapid Workflow Implementation Guide 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject

More information

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

Partners in Care Welch Allyn Connex Software Development Kit License Agreement This Software Development Kit End User ( Agreement ) is between Welch Allyn, Inc. ( Welch Allyn ) and the Customer identified in the purchase order ( Customer or You ), and it governs the Software Development

More information

Web Enabled Software for 8614xB-series Optical Spectrum Analyzers. Installation Guide

Web Enabled Software for 8614xB-series Optical Spectrum Analyzers. Installation Guide for 8614xB-series Optical Spectrum Analyzers Installation Guide Copyright Agilent Technologies Company 2001 All Rights Reserved. Reproduction, adaptation, or translation without prior written permission

More information

TOPAZ. TOPAZ Technologies Enterprise Protocols TECHNOLOGIES. Integrating Science with Software TRAINING GUIDE. November 2007

TOPAZ. TOPAZ Technologies Enterprise Protocols TECHNOLOGIES. Integrating Science with Software TRAINING GUIDE. November 2007 TOPAZ Technologies Enterprise Protocols TOPAZ TECHNOLOGIES Integrating Science with Software TRAINING GUIDE Creating Protocol Requests November 2007 Version 1.06 TOPAZ TECHNOLOGIES 9601 Amberglen Blvd,

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Mobile Time Manager. Release 1.2.1

Mobile Time Manager. Release 1.2.1 Mobile Time Manager Release 1.2.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

Policy Based Encryption Essentials. Administrator Guide

Policy Based Encryption Essentials. Administrator Guide Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.

More information

VERITAS NetBackup Vault 6.0

VERITAS NetBackup Vault 6.0 VERITAS NetBackup Vault 6.0 Operator s Guide for UNIX, Windows, and Linux N15282C September 2005 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

BlackShield Authentication Service

BlackShield Authentication Service BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.

More information

Promotion Model. CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010. March Hare Software Ltd

Promotion Model. CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010. March Hare Software Ltd CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010 March Hare Software Ltd Legal Notices Legal Notices There are various product or company names used herein that are the trademarks, service marks, or

More information

EMC Documentum Business Process Suite

EMC Documentum Business Process Suite EMC Documentum Business Process Suite Version 6.5 SP1 Sample Application Tutorial P/N 300-008-170 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Change Request Process Overview

Change Request Process Overview Industry Best Practices Process Overview by Garth Wilcox This white paper outlines a process for requesting and managing changes to an application during the product development cycle. It also discusses

More information

The Gale Group Subscription and License Agreement

The Gale Group Subscription and License Agreement The Gale Group Subscription and License Agreement This legal document is an agreement between THE GALE GROUP, INC. (herein referred to as Gale ), a Thomson Corporation company, and you, the subscriber

More information

Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3

Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3 Contents Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3 Introduction... 3 How to Register a UNIX Host in a One-Way Trust Domain Environment... 4 Creating a Windows Agentless

More information

CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series

CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series CA Nimsoft Monitor Probe Guide for Active Directory Server ad_server v1.4 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

RackConnect User Guide

RackConnect User Guide RackConnect User Guide Updated: November 8, 2011 RackConnect User Guide Page 2 of 15 DISCLAIMER This RackConnect User Guide (the Guide ) is for informational purposes only and is provided AS IS. The information

More information

Administration and Business Collaboration. User Manual

Administration and Business Collaboration. User Manual Administration and Business Collaboration User Manual Copyright 2007 by Eurekify Ltd., 8 Hasadna Street Raanana 43651, ISRAEL. All Rights Reserved. This document maybe used in its complete form only and

More information

Release Notes. Acumatica ERP 5.1

Release Notes. Acumatica ERP 5.1 Release Notes Acumatica ERP 5.1 Contents 2 Contents Copyright...3 Introduction... 4 Application New Features and Improvements...5 Finance and Distribution... 5 Customer Management...7 Customer Portal...7

More information

Fixes for CrossTec ResQDesk

Fixes for CrossTec ResQDesk Fixes for CrossTec ResQDesk Fixes in CrossTec ResQDesk 5.00.0006 December 2, 2014 Resolved issue where the list of Operators on Category was not saving correctly when adding multiple Operators. Fixed issue

More information

CA Cloud Service Delivery Platform

CA Cloud Service Delivery Platform CA Cloud Service Delivery Platform Customer Onboarding Version 01.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Configuration Guide for Email Gateway emailgtw v2.7 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as

More information

Quick Start Program Advanced Manual ContactWise 9.0

Quick Start Program Advanced Manual ContactWise 9.0 Quick Start Program Advanced Manual ContactWise 9.0 Copyright 2010 GroupLink Corporation. All Rights Reserved. ContactWise is a registered trademark of GroupLink Corporation. All other trademarks are the

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Contents Firewall Monitor Overview Getting Started Setting Up Firewall Monitor Attack Alerts Viewing Firewall Monitor Attack Alerts

Contents Firewall Monitor Overview Getting Started Setting Up Firewall Monitor Attack Alerts Viewing Firewall Monitor Attack Alerts Firewall Monitor Contents Firewall Monitor Overview...1 Getting Started...1 Setting Up Firewall Monitor Attack Alerts...2 Configuring/Editing Attack Alerts...3 Enabling Attack Notification...4 Configuring

More information

PERFORCE End User License Agreement for Open Source Software Development

PERFORCE End User License Agreement for Open Source Software Development Perforce Open Source End User License Agreement Page 1 1. Introduction PERFORCE End User License Agreement for Open Source Software Development This is a License Agreement ( Agreement ) between Perforce

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

become a member (It's Free. Visit http://www.itsmsolutions.com/newsletters/dity.htm)

become a member (It's Free. Visit http://www.itsmsolutions.com/newsletters/dity.htm) itsm Solutions DITY Newsletter Reprint This is a reprint of an itsm Solutions DITY Newsletter. Our members receive our weekly DITY Newsletter, and have access to practical and often entertaining articles

More information

CA Nimsoft Monitor. Probe Guide for CA ServiceDesk Gateway. casdgtw v2.4 series

CA Nimsoft Monitor. Probe Guide for CA ServiceDesk Gateway. casdgtw v2.4 series CA Nimsoft Monitor Probe Guide for CA ServiceDesk Gateway casdgtw v2.4 series Copyright Notice This online help system (the "System") is for your informational purposes only and is subject to change or

More information

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM Abstract This paper explains how to setup Active directory service on windows server 2008.This guide also explains about how to install

More information

Ektron CMS400.NET Virtual Staging Server Manual Version 7.5, Revision 1

Ektron CMS400.NET Virtual Staging Server Manual Version 7.5, Revision 1 Ektron CMS400.NET Virtual Staging Server Manual Version 7.5, Revision 1 Ektron Inc. 542 Amherst St. Nashua, NH 03063 Tel: +1 603-594-0249 Fax: +1 603-594-0258 Email: sales@ektron.com http://www.ektron.com

More information

HP OpenView Patch Manager Using Radia

HP OpenView Patch Manager Using Radia HP OpenView Patch Manager Using Radia for the Windows and Linux operating systems Software Version: 2.0 Migration Guide February 2005 Legal Notices Warranty Hewlett-Packard makes no warranty of any kind

More information

SIEBEL PROFESSIONAL SERVICES AUTOMATION GUIDE

SIEBEL PROFESSIONAL SERVICES AUTOMATION GUIDE SIEBEL PROFESSIONAL SERVICES AUTOMATION GUIDE VERSION 7.5, REV. A 12-EEE81N JANUARY 2003 Siebel Systems, Inc., 2207 Bridgepointe Parkway, San Mateo, CA 94404 Copyright 2002 Siebel Systems, Inc. All rights

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Thirdlane User Portal 2.1. Users Guide 05/12/2008. Third Lane Technologies, LLC 39 Power Lane Fairfax, CA 94930. http://www.thirdlane.

Thirdlane User Portal 2.1. Users Guide 05/12/2008. Third Lane Technologies, LLC 39 Power Lane Fairfax, CA 94930. http://www.thirdlane. Thirdlane User Portal 2.1 Users Guide 05/12/2008 Third Lane Technologies, LLC 39 Power Lane Fairfax, CA 94930 http://www.thirdlane.com Copyright 2003-2008. Third Lane Technologies, LLC. All rights reserved.

More information

End-User Reference Guide

End-User Reference Guide Guide Websense Advanced Email Encryption v7.x Websense Advanced Email Encryption Copyright 1996-2014 Websense, Inc. All rights reserved. This document contains proprietary and confidential information

More information

Import LC Issuance Oracle FLEXCUBE Universal Banking Release 11.3.83.02.0 [April] [2014] Oracle Part Number E53607-01

Import LC Issuance Oracle FLEXCUBE Universal Banking Release 11.3.83.02.0 [April] [2014] Oracle Part Number E53607-01 Import LC Issuance Oracle FLEXCUBE Universal Banking Release 11.3.83.02.0 [April] [2014] Oracle Part Number E53607-01 Table of Contents Import LC Issuance 1. IMPORT LC ISSUANCE... 1-1 1.1 INTRODUCTION...

More information

Entering Support Requests Online with the Cubeware Online Ticket System

Entering Support Requests Online with the Cubeware Online Ticket System Entering Support Requests Online with the Cubeware Online Ticket System July 2013 Cubeware Support About this document We reserve the right to change any information contained in this document. Cubeware

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

End-User Reference Guide

End-User Reference Guide Guide Websense Advanced Email Encryption v7.6 Contents Receiving secure email....................................... 1 How do I open a secure message?............................ 1 How do I register for

More information

End-User Reference Guide

End-User Reference Guide Guide Websense Advanced Email Encryption v7.6 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary and confidential information

More information

Getting Started with Fraud Alert

Getting Started with Fraud Alert Title Page Getting Started with Fraud Alert August 2013 CyberSource Corporation HQ P.O. Box 8999 San Francisco, CA 94128-8999 Phone: 800-530-9095 CyberSource Contact Information For general information

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Accounts Payable Workflow Guide. Version 12.0

Accounts Payable Workflow Guide. Version 12.0 Accounts Payable Workflow Guide Version 12.0 Copyright Information Copyright 2014 Informa Software. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Resource Online User Guide JUNE 2013

Resource Online User Guide JUNE 2013 Resource Online User Guide JUNE 2013 CHASE PAYMENTECH SOLUTIONS MAKES NO WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES

More information

CA Nimsoft Monitor. Probe Guide for NT Event Log Monitor. ntevl v3.8 series

CA Nimsoft Monitor. Probe Guide for NT Event Log Monitor. ntevl v3.8 series CA Nimsoft Monitor Probe Guide for NT Event Log Monitor ntevl v3.8 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and

More information

NetIQ Identity Manager

NetIQ Identity Manager NetIQ Identity Manager User Application: User Guide December 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT

More information

CA Spectrum and CA Embedded Entitlements Manager

CA Spectrum and CA Embedded Entitlements Manager CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically

More information

Nimsoft Monitor Compatibility Matrix October 17, 2013

Nimsoft Monitor Compatibility Matrix October 17, 2013 Nimsoft Monitor Compatibility Matrix October 17, 2013 1 Nimsoft Monitor Compatibility Matrix Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided

More information

Siebel HelpDesk Guide. Version 8.0, Rev. C March 2010

Siebel HelpDesk Guide. Version 8.0, Rev. C March 2010 Siebel HelpDesk Guide Version 8.0, Rev. C March 2010 Copyright 2005, 2010 Oracle and/or its affiliates. All rights reserved. The Programs (which include both the software and documentation) contain proprietary

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Query and Export Guide

Query and Export Guide Query and Export Guide 011712 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,

More information

CA Change Manager Enterprise Workbench r12

CA Change Manager Enterprise Workbench r12 CA Change Manager Enterprise Workbench r12 Database Support for Microsoft SQL Server 2008 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation")

More information

Master Data Services. SQL Server 2012 Books Online

Master Data Services. SQL Server 2012 Books Online Master Data Services SQL Server 2012 Books Online Summary: Master Data Services (MDS) is the SQL Server solution for master data management. Master data management (MDM) describes the efforts made by an

More information

Usage Analysis Tools in SharePoint Products and Technologies

Usage Analysis Tools in SharePoint Products and Technologies Usage Analysis Tools in SharePoint Products and Technologies Date published: June 9, 2004 Summary: Usage analysis allows you to track how websites on your server are being used. The Internet Information

More information

Brief Solution Description

Brief Solution Description Public Brief Solution Description Aastra MX-ONE V.4.0 integration with Microsoft UC products Aastra Telecom Sweden LM Ericssons väg 30, Hägersten Box 422 14 SE-126 17 Stockholm, Sweden Doc. ASE/MXO/PM/0031/EN

More information

RedBlack CyBake Online Customer Service Desk

RedBlack CyBake Online Customer Service Desk RedBlack CyBake Online Customer Service Desk Publication Date: June 2014 Copyright Copyright 2014 RedBlack Software Ltd. All rights reserved. Complying with all applicable copyright laws is the responsibility

More information

HP Operations Orchestration Software

HP Operations Orchestration Software HP Operations Orchestration Software Software Version: 9.00 Use Cases for Integrations with HP Applications Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty The

More information

GFI White Paper: GFI FaxMaker and HIPAA compliance

GFI White Paper: GFI FaxMaker and HIPAA compliance GFI White Paper: GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax

More information

Broner Issue Tracking System User Guide

Broner Issue Tracking System User Guide Broner Issue Tracking System User Guide Preliminary Pages Address Copyright 2015, Broner Metals Solutions Ltd. All rights reserved Broner product names which are mentioned in this document and the Broner

More information

Marketing and Query Guide

Marketing and Query Guide Marketing and Query Guide 111011 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,

More information

Implementing the Ticketing System

Implementing the Ticketing System April 27, 2010 1 Description Who should use this guide? Duration Prerequisites This manual describes LivePerson's Ticketing system and the options for its implementation. Each option is explained in a

More information

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT.

PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO THE TERMS OF THIS AGREEMENT. Access Governance Suite 6 Lifecycle Manager 6 Compliance Manager 6 Software License Agreement PLEASE READ THIS AGREEMENT CAREFULLY. BY INSTALLING, DOWNLOADING OR OTHERWISE USING THE SOFTWARE, YOU AGREE

More information

CA Nimsoft Unified Management Portal

CA Nimsoft Unified Management Portal CA Nimsoft Unified Management Portal Multiple Server Configuration Guide 6.5 Document Revision History Document Version Date Changes 1.0 April 2013 Initial version for UMP 6.5. Legal Notices Copyright

More information

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook)

How To Use The Mail Control Console On A Pc Or Macbook 2.5.3 (For A Macbook) MX Control Console & Spam Quarantine Report User Guide Product Version: 2.5 Release Date: Document Version: ed_eug_2.5.3_gr Copyright 2004 MX Logic, Inc. RESTRICTION ON USE, PUBLICATION, OR DISCLOSURE

More information

CA ARCserve Replication and High Availability

CA ARCserve Replication and High Availability CA ARCserve Replication and High Availability Microsoft SharePoint Server Operation Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

SAS Task Manager 2.2. User s Guide. SAS Documentation

SAS Task Manager 2.2. User s Guide. SAS Documentation SAS Task Manager 2.2 User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS Task Manager 2.2: User's Guide. Cary, NC: SAS Institute

More information

UFR II Driver Guide. UFR II Driver Ver. 2.20 ENG

UFR II Driver Guide. UFR II Driver Ver. 2.20 ENG UFR II Driver Guide UFR II Driver Ver. 2.20 Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG 0 Ot UFR II Driver

More information

Transparent Identification of Users

Transparent Identification of Users Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

FEC Secure IPSec Client

FEC Secure IPSec Client FEC Secure IPSec Client Software Activtion User's Guide FEC Secure IPSec Client 1 Copyright Trademarks All rights are reserved. No part of this publication may be reproduced or transmitted in any form

More information

Web Publisher s Kit Getting Started Guide FOR WINDOWS

Web Publisher s Kit Getting Started Guide FOR WINDOWS Web Publisher s Kit Getting Started Guide FOR WINDOWS COPYRIGHT INFORMATION Web Publisher s Kit for Windows. Copyright 1998 Visioneer, Inc. All rights reserved. Reproduction, adaptation, or translation

More information

1. Your Acceptance 2. LKIS App Access 3. Intellectual Property Rights 4. Warranty Disclaimer

1. Your Acceptance 2. LKIS App Access 3. Intellectual Property Rights 4. Warranty Disclaimer Terms of Service 1. Your Acceptance This is an agreement between Liverpool John Moores University, the School of Sport and Exercise Sciences, the LKIS software/app (collectively, including all content

More information

Scribe Online Integration Services (IS) Tutorial

Scribe Online Integration Services (IS) Tutorial Scribe Online Integration Services (IS) Tutorial 7/6/2015 Important Notice No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, photocopying,

More information

MANAGED SOFTWARE CENTER USER S GUIDE

MANAGED SOFTWARE CENTER USER S GUIDE U N I V E R S I T Y O F S O U T H E R N C A L I F O R N I A MANAGED SOFTWARE CENTER USER S GUIDE JANUARY 2015 U N I V E R S I T Y O F S O U T H E R N C A L I F O R N I A 2015 UNIVERSITY OF SOUTHERN CALIFORNIA.

More information