Verifying the Availability of Cloud Applications

Size: px
Start display at page:

Download "Verifying the Availability of Cloud Applications"

Transcription

1 Melaie Siebehaar, Olga Wege, Roy Has, Hasa Terca, Ralf Steimetz: Verifyig the Availability of Cloud Applicatios. I: Proceedigs of the 3rd Iteratioal Coferece o Cloud Computig ad Services Sciece (CLOSER 2013), May Verifyig the Availability of Cloud Applicatios Melaie Siebehaar, Olga Wege, Roy Has, Hasa Terca, ad Ralf Steimetz Multimedia Commuicatios Lab (KOM), Techische Uiversita t Darmstadt, Germay firstame.lastame@kom.tu-darmstadt.de Keywords: Cloud Computig, Service Level Agreemets, Verificatio, Moitorig, Performace, Availability Abstract: Cloud-based services provide a high level of flexibility ad elimiate large up-frot IT ivestmets by tradig capital expediture for operatioal expediture. However, performace, availability, ad security still remai domiat barriers whe decidig whether to move to the cloud or ot. Although cloud providers already try to tackle these issues by offerig SLAs ad correspodig moitorig solutios, the ability of these solutios to cotrol the performace of cloud-based services is still cosidered as usatisfactory by cosumers. I this paper, we preset a approach for verifyig availability guaratees from a cosumer s perspective, sice availability is oe of the very few performace parameters that is cosidered i the SLAs of today s cloud providers. The aim of our research is to facilitate the verificatio of performace guaratees idepedetly from a cloud provider, which will help to icrease cloud service adoptio i the future. 1 INTRODUCTION Cloud computig promises to provide a high level of flexibility whe usig cloud-based services. Highly cofigurable computig resources are provided odemad ad with miimal maagemet effort over the Iteret (Mell ad Grace, 2011) similar to utilities like electricity or water (Buyya et al., 2009). However, this also icludes a shift of resposibility to the cloud provider ad thus, a loss of cotrol for the cloud cosumer. I order for a cloud cosumer to still maitai cotrol, cloud providers typically offer so-called service level agreemets (SLAs). Basically, a service level agreemet represets a cotract betwee a cloud provider ad a cloud cosumer ad specifies certai quality levels a cloud provider is willig to provide (e.g., miimum values for performace parameters such as availability ) ad the pealties i case of violatig the specified guaratees. However, this solutio does ot seem to be sufficiet. Accordig to a cloud market maturity study coducted by the Cloud Security Alliace ad ISACA i the secod quarter of 2012, there is oly a low degree of cofidece o cosumer side, that providers effectively moitor performace agaist SLAs (CSA ad ISACA, 2012). (Patel et al., 2009) also state that cosumers may ot completely trust these measuremets ad that cloud providers ofte put the burde of reportig SLA violatios o their customers. Although cloud providers ofte implemet particular moitorig solutios ad provide some moitorig iformatio to their customers, these solutios caot be perceived to provide a sufficiet ad idepedet evidece base for reliably detectig ad documetig SLA violatios from a cosumer s perspective. Whe solely relyig o provider-specific moitorig solutios, cloud providers ca modify some moitorig data or restrict the provided iformatio so that it becomes very hard to prove SLA violatios. This raises the questio how compliace with SLAs ca be verified from a cosumer s perspective. Such a solutio ot oly requires to obtai reliable data of a cloud-based service, but also requires to provide a holistic view of the edto-ed performace of a cloud-based service to cosumers. I this paper, we preset such a approach for verifyig the availability of cloud applicatios from a cosumer s perspective, sice availability is oe of the very few performace parameters that are part of the SLAs of today s cloud providers. The remaider of the paper is structured as follows. Sectio 2 discusses related approaches to our work. Sectio 3 describes the curret SLA ladscape, itroduces some basic iformatio about availability ad presets a taxoomy for dowtimes of cloud applicatios. Sectio 4 describes our approach for availability verificatio ad Sectio 5 presets the correspodig prototypical implemetatio as well as some experimetal results. The paper closes with a coclusio ad future directios i Sectio 6. The documets distributed by this server have bee provided by the cotributig authors as a meas to esure timely dissemiatio of scholarly ad techical work o a o-commercial basis. Copyright ad all rights therei are maitaied by the authors or by other copyright holders, ot withstadig that they have offered their works here electroically. It is uderstood that all persos copyig this iformatio will adhere to the terms ad costraits ivoked by each author's copyright. These works may ot be reposted without the explicit permissio of the copyright holder.

2 2 RELATED WORK Although several moitorig approaches i the field of cloud computig have bee proposed so far, oly a few approaches exist which address the problem of SLA verificatio from a cosumer s perspective. (Chazalet, 2010) presets a geeric framework that does ot deped o a specific cloud service model. However, the framework focuses either o server-side or cliet-side moitorig. I (Haberkor ad Trivedi, 2007), the authors preset a geeric approach for moitorig highavailability systems that cosist of differet compoets. Agai, o cliet-side moitorig is cosidered. A performace model based o rutime moitorig data is suggested by (Shao ad Wag, 2011). Availability is calculated based o the umber of successful requests. Hece, a sufficiet umber of requests is required i order to obtai accurate results. (Michlmayr et al., 2009) apply cliet-side ad server-side moitorig for SLA violatio detectio. It is ot clear, how the authors combie the results from both moitors to determie the overall performace. Agai, availability is oly calculated based o the umber of successful requests. (Mastelic et al., 2012) preset a geeric approach for moitorig applicatio level metrics i resourceshared cloud eviromets. Availability ad clietside moitorig are ot part of their work. I cotrast, our approach allows to verify availability from a cosumer s perspective ad to achieve visibility of the etire cloud service delivery chai. 3 AVAILABILITY OF CLOUD APPLICATIONS 3.1 SLA Ladscape ad Availability I compariso to, e.g., Web services, cloud services exhibit a higher complexity due to the three differet service models (Mell ad Grace, 2011), software as a service (SaaS), platform as a service (PaaS), ad ifrastructure as a service (IaaS), ad the fact that cloud applicatios o the upper SaaS layer ofte comprise several differet compoets. The complexity further icreases due to the utilizatio of virtualizatio so that surroudig coditios may chage i the backgroud without beig oticed by cosumers. Ufortuately, curret cloud SLAs do ot completely cover this ew iheret complexity. There is ofte a gap betwee lower-level moitorig data collected by providers ad higher-level guaratees provided to cosumers (CSCC, 2012). Hece, besides the demad for more specific SLAs, also correspodig meas for moitorig higher-level metrics of cloudbased services must be provided to cosumers. The paper at had focuses o the availability of cloud applicatios, sice availability is busiess critical ad oe of the very few performace guaratees that are curretly offered by cloud providers (e.g., Elastic Compute Cloud (EC2) by (Amazo, 2008)). I order to develop a availability moitorig approach, availability must be defied i a cloud computig cotext. (Jai, 1991) basically defies the availability of a system as the fractio of the time the system is available to service users requests. He further states that it is ofte more reasoable to use the mea uptime (MTTF), because small uptime ad dowtime combiatios may result i highavailability values although the service caot be delivered. Usig MTTF ad MTTR as the mea dowtime results i the followig formula: MT T F availability = (1) MT T F + MT T R Sice errors o differet layers or failures of compoets ca lead to dowtimes of the cloud applicatio, differet types of availability must be combied i order to measure the overall availability. Hece, the reasos for dowtimes must be aalyzed first i order to derive a appropriate defiitio. 3.2 Reasos for Dowtimes I order to successfully ivoke a specific fuctioality, i the followig deoted as service, provided by a cloud applicatio, cosumer s require workig IT systems o-premise ad a proper etwork coectivity to the cloud provider. Furthermore, due to the variety of resources ivolved i service delivery, may reasos for dowtimes exist. I the followig, we preset a taxoomy for dowtimes of cloud applicatios from a cosumer s perspective (Figure 1). Cosumer- Side Provider- Side ISP-Side Locatio Software Virtual Machie Physical Machie Network Failure Overload Outage Migratio Maiteace Dowtime Resource Icidet Itet Sigificace Uplaed Plaed Attack SLA Violatio No SLA Violatio Figure 1: Taxoomy for dowtimes of cloud applicatios First of all, dowtimes ca be distiguished accordig to the locatio, where icidets happe. There-

3 fore, we describe their locatio accordig to the followig spheres of cotrol: cosumer, Iteret service provider (ISP), ad cloud provider. Furthermore, differet types of resources ca be resposible for causig dowtimes due to several icidets. Hece, we added the two categories resource ad icidet to our taxoomy. Besides the actual dowtimes, also their pre- ad postcoditios must be take ito accout i order to determie if a SLA violatio occurred. Basically, dowtimes ca happe with or without itet, ad eve with crimial itet whe a system is uder attack. Depedig o the egotiated terms, all three types of itet ca either be covered by SLAs or ot. For example, SLAs ca specify a maximum legth of time for plaed dowtimes such as scheduled maiteace, uplaed dowtimes ca either refer to failures of physical machies or to emergecy maiteace, ad eve attacks ca happe due to egligece of cosumers or due to a isufficiet amout of implemeted security mechaisms by providers. Therefore, dowtimes must always be cosidered i cojuctio with the egotiated SLAs. Moreover, our solutio must be able to attribute icidets to their root cause, sice cloud providers ca oly make guaratees with respect to their ow IT systems. 4 A HYBRID APPROACH FOR AVAILABILITY VERIFICATION We will ow elaborate o how to use the kowledge about dowtimes preseted before i order to develop a approach for verifyig the availability of cloud applicatios from a cosumer s perspective. I this paper, we will focus o uplaed dowtime oly, sice plaed dowtimes will be usually aouced by cloud providers i advace ad the detectio of attacks is ot i the scope of our work. The ext sectio presets the requiremets for such a approach. 4.1 Requiremets First of all, our approach should be able to detect all relevat dowtimes precisely without affectig the overall performace ad should be still applicable whe the umber of users ad compoets chages. A SLA violatio is cosidered to be relevat either if the duratio of a sigle dowtime or the aggregatio of several dowtimes may exceed the threshold defied i the respective SLA. Furthermore, our solutio should be able to compute the overall availability. Fially, a trusted third party could geerally provide the compoets of our moitorig approach to cosumers i order to esure reliability. 4.2 Desig Now, cosiderig all the requiremets stated above, we propose a hybrid moitorig approach that combies cosumer- ad cloud-side moitorig. I additio, we make use of a broker actig as a coordiatig etity that collects ad aggregates all data (Figure 2). Cosumer-side Moitor A Broker Cosumer-side Moitor B Cloud-side App VM Moitor Moitor VM 1 cloud applicatios VM 2 push to pull from Figure 2: Overview of the moitorig framework Cosumer-Side Moitorig: The cosumer-side moitor ivokes predefied services (e.g., specified i the SLAs) that are essetial for the proper fuctioig of a cloud applicatio usig a periodical pull model. The moitorig frequecy ca be adapted to the required resolutio of a applicatio s availability. We cosider a cloud applicatio to be uavailable if oe of the essetial services fails (i.e., o/icorrect respose). I order to determie the overall availability, the cosumer-side moitor commuicates with the broker usig a evet-based push approach. Wheever a cosumer-side moitor is started or the start or the ed of a dowtime is detected, a message is set to the broker. Failures i the etwork could also prevet cosumers from detectig all dowtimes. Hece, we assume that a eterprise uses two differet moitors at differet etwork domais. Sice a high moitorig frequecy (e.g., i case of may cosumers) will affect system performace, additioal cloud-side moitorig must be cosidered. Cloud-Side Moitorig: For our approach we assume that a cosumer has access to the VM where a cloud applicatio is hosted. Sice a moitor placed o this VM 1 would ot be able to report ay dowtimes if the VM 1 crashes, we eed a additioal VM 2 withi the provider s data ceter i order to place our cloud-side moitor. Nevertheless, we also require access to the VM 1 i order to check the status of predefied processes that are essetial for ruig the cloud applicatio. Therefore, a lightweight software compoet (VM moitor) must be istalled o the VM 1. We apply a periodical pull model i order to ivoke the VM moitor from the cloud-side moitor ad a evet-based push model to sed data to the broker.

4 4.3 Broker ad Availability Calculatio The broker maitais a dowtime list for each moitor ad periodically computes the overall availability. For this purpose, the broker first determies the overlap of the dowtimes reported by both cosumer-side moitors i order to separate cloud applicatio dowtimes from etwork errors ad afterwards, merges the cosolidated dowtimes with the dowtimes of the cloud-side moitor. For the latter, we assume that wheever two detected dowtime itervals from cosumer- ad cloud-side overlap, these dowtime itervals belog to the same outage. I this case, the broker decides which dowtime iterval better reflects the real dowtime by evaluatig the followig coditios. T represets the differece betwee the reciprocals of the moitorig frequecies (i.e., T = 1/ f ) of both moitors ad dc ad d p are the duratios of the dowtime moitored at cosumer- ad provider-side, respectively. > T cosumer-side moitor (2) (dc d p ) = T cloud-side moitor < impossible T The coditios above result from the differece i precisio of both moitors. They express that wheever the differece betwee the duratios is ot caused by the iaccuracy of the cosumer-side moitors (case 2), the dowtime of some essetial services of the applicatio must exceed the dowtime of the uderlyig processes moitored at cloud-side (case 1). Fially, the broker obtais a list of dowtimes ad calculates the overall availability based o the calculatio proposed by (Haberkor ad Trivedi, 2007) as described i the followig. For the calculatio, we itroduce a set of variables (Table 1). Figure 3: Us at dowtime (Haberkor ad Trivedi, 2007) Figure 4: Us at uptime (Haberkor ad Trivedi, 2007) Whe calculatig the availability durig a uptime, Us has to be calculated as follows: 0 Us = (Ts Ds ) + u (4) I cotrast, whe calculatig the availability durig a dowtime, Us ca be determied as follows: 00 0 Us = (Ts Ds ) = (Ts di d ) (5) i=1 Fially, the overall availability ca be calculated usig Equatio 1 (Haberkor ad Trivedi, 2007): MT T F = 5 Us m ad MT T R = Ds (6) EXPERIMENTS Table 1: Variables for calculatig the overall availability Ts Ds Us m d1,..., d u1,..., um total service time aggregated dowtime aggregated uptime umber of dowtime itervals umber of uptime itervals completed dowtime itervals completed uptime itervals The aggregated dowtime Ds ad uptime Us of a cloud applicatio ca the be calculated as follows: Ds = di ad Us = Ts Ds (3) i=1 Sice Us varies depedig o whether the overall availability is calculated durig a dowtime or a up0 00 time (Figures 3 ad 4), two differet cases Us ad Us must be distiguished (Haberkor ad Trivedi, 2007). Our approach has bee prototypically implemeted usig the (Kaltura, 2012) video platform, that we deployed o a VM i our blade ceter. O this VM, we also istalled our VM moitor ad o a secod VM, we deployed our cloud-side moitor. Furthermore, we placed cosumer-side moitor A as well as the broker o a local desktop computer ad cosumerside moitor B o a laptop. The techical specificatio is show i Table 2. Table 2: Techical setup of the implemetatio App VM CetOS 51 2 vcpu GHz 4 GB Cloud Mo. VM Wi. 7 2 vcpu 2.13 GHz 2 GB Mo. A PC Wi. 7 4 CPU 2.67 GHz 4 GB Mo. B Laptop Wi. 7 1 CPU 2 GHz 4 GB

5 We used Java as programmig laguage to implemet all compoets of our moitorig framework. The commuicatio betwee the differet moitorig compoets is realized by TCP/IP sockets, except for the ivocatio of the cloud services provided by the Kaltura cloud applicatio. These service ivocatios are based o REST ad HTTP. For cloud-side moitorig, we used httpd, mysql, ad memcached as essetial processes resposible for a proper Web server fuctioality, database access, ad memory cachig. O cosumer-side, we used a small sample video file that we uploaded to the Kaltura platform ad that was also stored locally at cosumer-side. Based o this sample video file, we periodically set a first request to the Kaltura platform to retrieve the metadata of this video file ad a secod request to dowload the video file. I doig so, our solutio verified the storage access ad trasmissio capabilities of the platform. 5.1 Setup The experimets have bee performed usig moitorig itervals of 3 miutes for the cosumer-side moitors ad 5 secods for the cloud-side moitor. Every 60 secods, the broker calculates the overall availability. The timeouts at cosumer-side ad cloud-side for receivig resposes are set to 15 secods ad 4 secods, respectively. I order to simulate outages of the cloud applicatio as well as etwork impairmets, we have used the wide area etwork emulator (WANem, 2011). I the first two experimets, we have simulated dowtimes i order to evaluate the detectio rate of our framework ad i the last experimet, we have simulated etwork impairmets i order to evaluate the behaviour uder real etwork coditios. 5.2 Short, Periodical Dowtimes I this experimet, we simulated short, periodical dowtimes over a period of 15 miutes with each dowtime ad uptime lastig 20 secods ad 60 secods, respectively. We have repeated this experimet for 5 times. While the cloud-moitor detected all 11 dowtimes i each ru, the cosumer-side moitors oly detected 1.8 dowtimes o average. The results (Figure 5) show that our moitorig framework is basically able to detect all dowtimes, but also poit out the lower precisio of cosumer-side moitorig. All i all, our moitorig framework oly achieved a deviatio of 0.826% from the real availability due to the accurate cloud-side moitorig. However, the ext experimet will show that the cloud-side moitor 1 CetOS: free Liux based o Red Hat Eterprise 2 vcpu: virtual CPU assiged to a VM Figure 5: Differece i precisio of both moitor types ot always delivers reliable results, which emphasizes the eed for a hybrid approach. 5.3 Higher Precisio at Cosumer-Side The secod experimet simulates oly a sigle dowtime of 6 miutes durig a total service time of 11 miutes. Agai, this experimet has bee repeated for 5 times. From the perspective of the cloud-side moitor, the failure of the cloud applicatio is corrected after 78 secods o average durig each ru. Figure 6 shows that the cosumer-side moitors show a higher precisio tha the cloud-side moitor. Figure 6: More precise detectio by cosumer moitor Although our framework chose the correct dowtime, i.e., the result from the cosumer-side moitors i order to calculate the availability, the resultig deviatio of 6.03% from the real value is quite high, so that the moitorig itervals for cosumer-side moitorig should be further decreased. 5.4 Network Impairmets This experimet was coducted to evaluate our moitorig framework uder differet etwork coditios. For this purpose, we applied WANem to iduce several impairmets ito the etwork. As a prerequisite for our experimet, we defied six differet etwork quality classes ragig from a etwork without ay impairmets T 0 to a etwork T 1500 with a delay of 1500ms, 10% packet loss, ad 10% corrupted packets. Differet tests, each lastig 530 secods ad simulatig a dowtime of 130 secods, were coducted at each quality level. The impairmets were iduced i all etworks iside ad outside the cloud. Although the actual availability of % of the cloud applicatio did ot chage durig the tests, Figure 7 shows that the differece betwee the actual availability ad the moitored availability cosiderably decreases (to

6 56.63%) with a icreasig amout of etwork impairmets. This experimet shows that our moitorig approach is very sesitive to failures i the etwork, which have to be addressed i future work. Figure 7: Precisio decreases with etwork impairmets 6 CONCLUSION AND OUTLOOK I this paper, we itroduced a taxoomy for dowtimes of cloud applicatios ad preseted a hybrid approach for verifyig the availability of cloud applicatios from a cosumer s perspective. The approach combies cosumer- ad cloud-side moitorig i order to be able to attribute dowtimes to their root cause ad to distiguish SLA violatios from other types of dowtimes. Our framework periodically provides a updated overall availability to cosumers. The results of our experimets reveal that a hybrid approach is ideed required i order to allow for a precise calculatio of the overall availability. However, the experimets also reveal that i case of etwork impairmets, the detectio accuracy decreases. Hece, we will develop approaches to icrease the robustess of our moitorig framework i future work. Furthermore, we will coduct experimets i real cloud eviromets ad we will explore how to determie a appropriate ratio betwee the moitorig frequecies o cosumer- ad cloud-side. ACKNOWLEDGEMENTS The work preseted i this paper was partially fuded by the Germa Federal Miistry of Educatio ad Research (BMBF) uder grat o. 01 C10S05 i the cotext of the Software-Cluster project SWINNG ( I additio, this work is supported i part by E-Fiace Lab Frakfurt am Mai e.v. ( The authors assume resposibility for the cotet. REFERENCES Amazo (2008). Amazo EC2 Service Level Agreemet. [last access: 3 December 2012]. Buyya, R., Yeo, C. S., Veugopal, S., Broberg, J., ad Bradic, I. (2009). Cloud Computig ad Emergig IT Platforms: Visio, Hype, ad Reality for Deliverig Computig as the 5th Utility. Future Geeratio Computer Systems, 25(6): Chazalet, A. (2010). Service Level Checkig i the Cloud Computig Cotext. I Proceedigs of the 3rd IEEE Iteratioal Coferece o Cloud Computig, pages CSA ad ISACA (2012). Cloud Computig Market Maturity. Study Results. Cloud Security Alliace ad ISACA. Ceter/Research/Documets/2012-Cloud- Computig-Market-Maturity-Study-Results.pdf, [last access: 28 November 2012]. CSCC (2012). Practical Guide to Cloud Service Level Agreemets. Cloud Stadards Customer Coucil htm, [last access: 30 November 2012]. Haberkor, M. ad Trivedi, K. (2007). Availability Moitor for a Software Based System. I Proceedigs of the 10th IEEE High Assurace Systems Egieerig Symposium (HASE 2007), pages Jai, R. (1991). The Art of Computer Systems Performace Aalysis. Wiley. Kaltura (2012). Kaltura Ic. [last access: 3 December 2012]. Mastelic, T., Emeakaroha, V. C., Maurer, M., ad Bradic, I. (2012). M4Cloud - Geeric Applicatio Level Moitorig for Resource-shared Cloud Eviromets. I Proceedigs of the 2d Iteratioal Coferece o Cloud Computig ad Services Sciece (CLOSER 2012), pages Mell, P. ad Grace, T. (2011). The NIST Defiitio of Cloud Computig. istpubs/ /sp pdf, [Last access: 28 November 2012]. Michlmayr, A., Roseberg, F., Leiter, P., ad Dustdar, S. (2009). Comprehesive QoS Moitorig of Web Services ad Evet-Based SLA Violatio Detectio. I Proceedigs of the 4th Iteratioal Workshop o Middleware for Service Orieted Computig (MW- SOC 2009), pages 1 6. Patel, P., Raabahu, A., ad Sheth, A. (2009). Service Level Agreemet i Cloud Computig. Techical report, Koesis Ceter, Wright State Uiversity, USA. Shao, J. ad Wag, Q. (2011). A Performace Guaratee Approach for Cloud Applicatios Based o Moitorig. I Proceedigs of the 35th Aual Computer Software ad Applicatios Coferece Workshops (COMPSACW 2011), pages WANem (2011). The Wide Area Network Emulator. Performace Egieerig Research Cetre, TATA Cosultacy Services. [last access: 5 December 2012].

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes

More information

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV) Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

Creating an Agile BI Environment

Creating an Agile BI Environment White Paper Creatig a Agile BI Eviromet The rapidly chagig IT ecoomy has iflueced the Busiess Itelligece (BI) systems to look at iovative ways to be equally fast ad flexible. There is a eed to be more

More information

France caters to innovative companies and offers the best research tax credit in Europe

France caters to innovative companies and offers the best research tax credit in Europe 1/5 The Frech Govermet has three objectives : > improve Frace s fiscal competitiveess > cosolidate R&D activities > make Frace a attractive coutry for iovatio Tax icetives have become a key elemet of public

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval 1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

HCL Dynamic Spiking Protocol

HCL Dynamic Spiking Protocol ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Mobile Application Testing

Mobile Application Testing White Paper Mobile Applicatio Testig Device ad platform diversity, short release cycles, lack of mature testig tools ad the variety of etwork coectivity optios result i frequet cost overrus ad missed deadlies

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Skytron Asset Manager

Skytron Asset Manager Skytro Asset Maager Meet Asset Maager Skytro Asset Maager is a wireless, pateted RFID asset trackig techology specifically desiged for hospital facilities to deliver istat ROI withi a easy to istall, fully

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

IntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs.

IntelliSOURCE Comverge s enterprise software platform provides the foundation for deploying integrated demand management programs. ItelliSOURCE Comverge s eterprise software platform provides the foudatio for deployig itegrated demad maagemet programs. ItelliSOURCE Demad maagemet programs such as demad respose, eergy efficiecy, ad

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

ContactPro Desktop for Multi-Media Contact Center

ContactPro Desktop for Multi-Media Contact Center CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers

More information

Desktop Management. Desktop Management Tools

Desktop Management. Desktop Management Tools Desktop Maagemet 9 Desktop Maagemet Tools Mac OS X icludes three desktop maagemet tools that you might fid helpful to work more efficietly ad productively: u Stacks puts expadable folders i the Dock. Clickig

More information

CHAPTER 7: Central Limit Theorem: CLT for Averages (Means)

CHAPTER 7: Central Limit Theorem: CLT for Averages (Means) CHAPTER 7: Cetral Limit Theorem: CLT for Averages (Meas) X = the umber obtaied whe rollig oe six sided die oce. If we roll a six sided die oce, the mea of the probability distributio is X P(X = x) Simulatio:

More information

On-Premise CRM to Salesforce Migration - Benefits, Challenges and Best Practices

On-Premise CRM to Salesforce Migration - Benefits, Challenges and Best Practices White Paper O-Premise CRM to Salesforce Migratio - Beefits, Challeges ad Best Practices With the advet of cloud computig, orgaizatios are lookig to move their Customer Relatioship Maagemet (CRM) applicatios

More information

Managed Services Catalogue (HE)

Managed Services Catalogue (HE) Maaged Services Catalogue (HE) New legislatio ad ew statutory requiremets come i regularly so it is essetial for us to have a flexible system which ca cope with the chages required ad the frequecy of the

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place.

PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place. PENSION ANNUITY Policy Coditios Documet referece: PPAS1(7) This is a importat documet. Please keep it i a safe place. Pesio Auity Policy Coditios Welcome to LV=, ad thak you for choosig our Pesio Auity.

More information

Locating Performance Monitoring Mobile Agents in Scalable Active Networks

Locating Performance Monitoring Mobile Agents in Scalable Active Networks Locatig Performace Moitorig Mobile Agets i Scalable Active Networks Amir Hossei Hadad, Mehdi Dehgha, ad Hossei Pedram Amirkabir Uiversity, Computer Sciece Faculty, Tehra, Ira a_haddad@itrc.ac.ir, {dehgha,

More information

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

IT Support. 020 8269 6878 n www.premierchoiceinternet.com n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

CREATIVE MARKETING PROJECT 2016

CREATIVE MARKETING PROJECT 2016 CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members

More information

Web Services QoS: External SLAs and Internal Policies Or: How do we deliver what we promise?

Web Services QoS: External SLAs and Internal Policies Or: How do we deliver what we promise? Web s QoS: Exteral SLAs ad Iteral Policies Or: How do we deliver what we promise? Heiko Ludwig IBM T.J. Watso Research Ceter hludwig@us.ibm.com Abstract With Web services startig to be deployed withi orgaizatios

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

COMPUSOFT, An international journal of advanced computer technology, 3 (3), March-2014 (Volume-III, Issue-III)

COMPUSOFT, An international journal of advanced computer technology, 3 (3), March-2014 (Volume-III, Issue-III) COMPUSOFT, A iteratioal joural of advaced computer techology, 3 (3), March-2014 (Volume-III, Issue-III) ISSN:2320-0790 Adaptive Workload Maagemet for Efficiet Eergy Utilizatio o Cloud M.Prabakara 1, M.

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

A Secure Implementation of Java Inner Classes

A Secure Implementation of Java Inner Classes A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio

More information

FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS

FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS STRATEGIC OUTCOMES PRACTICE TECHNICAL ADVISORY BULLETIN February 2011 FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS www.willis.com Natioal Fire Protectio Associatio (NFPA) #25 a mai

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

client communication

client communication CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.

More information

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1 Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

1. C. The formula for the confidence interval for a population mean is: x t, which was

1. C. The formula for the confidence interval for a population mean is: x t, which was s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Simulation-based Analysis of Surface Jobsite Logistics in Mechanized Tunneling

Simulation-based Analysis of Surface Jobsite Logistics in Mechanized Tunneling Simulatio-based Aalysis of Surface Jobsite Logistics i Mechaized Tuelig Markus Scheffer 1,a, Tobias Rahm 1,b ad Markus Köig 1,c 1 Chair of Computig i Egieerig, Faculty of Civil ad Evirometal Egieerig,

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy

QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy QUADRO tech FSA Migrator 2.6 File Server Migratios - Made Easy FSA Migrator Cosolidate your archived ad o-archived File Server data - with ease! May orgaisatios struggle with the cotiuous growth of their

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot QUADRO tech PST Flightdeck Put your PST Migratio o autopilot Put your PST Migratio o Autopilot A moder aircraft hardly remids its pilots of the early days of air traffic. It is desiged to eable flyig as

More information

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites Digital Eterprise Uit White Paper Web Aalytics Measuremet for Resposive Websites About the Authors Vishal Machewad Vishal Machewad has over 13 years of experiece i sales ad marketig, havig worked as a

More information

A Flexible Elastic Control Plane for Private Clouds

A Flexible Elastic Control Plane for Private Clouds A Flexible Elastic otrol Plae for Private louds Upedra Sharma IBM Watso usharma@us.ibm.com Prashat Sheoy Dept. of omputer Sciece Amherst MA 01003 sheoy@cs.umass.edu Sambit Sahu IBM Watso sambits@us.ibm.com

More information

1 Correlation and Regression Analysis

1 Correlation and Regression Analysis 1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

PUBLIC RELATIONS PROJECT 2016

PUBLIC RELATIONS PROJECT 2016 PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig

More information

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles

More information

Using Four Types Of Notches For Comparison Between Chezy s Constant(C) And Manning s Constant (N)

Using Four Types Of Notches For Comparison Between Chezy s Constant(C) And Manning s Constant (N) INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH OLUME, ISSUE, OCTOBER ISSN - Usig Four Types Of Notches For Compariso Betwee Chezy s Costat(C) Ad Maig s Costat (N) Joyce Edwi Bategeleza, Deepak

More information

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean 1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.

More information

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers

FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers FUEL / VEHICLE TRACKING UNIT GPS trackig ad fuel moitorig solutio providers fuel moitorig ow olie.. Fu ckig el Tra ow o lie www.fueltracksidia.com 20 Chael GPS Receiver GSM/GPRS Commuicatio PRODUCT FEATURES

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Supply Chain Management

Supply Chain Management Supply Chai Maagemet LOA Uiversity October 9, 205 Distributio D Distributio Authorized to Departmet of Defese ad U.S. DoD Cotractors Oly Aim High Fly - Fight - Wi Who am I? Dr. William A Cuigham PhD Ecoomics

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

E-Plex Enterprise Access Control System

E-Plex Enterprise Access Control System Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

Symantec AntiVirus for Network Attached Storage Integration Guide

Symantec AntiVirus for Network Attached Storage Integration Guide Symatec AtiVirus for Network Attached Storage Itegratio Guide 2 Symatec AtiVirus for Network Attached Storage Itegratio Guide The software described i this book is furished uder a licese agreemet ad may

More information

Section 11.3: The Integral Test

Section 11.3: The Integral Test Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult

More information

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized?

5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized? 5.4 Amortizatio Questio 1: How do you fid the preset value of a auity? Questio 2: How is a loa amortized? Questio 3: How do you make a amortizatio table? Oe of the most commo fiacial istrumets a perso

More information

15.075 Exam 3. Instructor: Cynthia Rudin TA: Dimitrios Bisias. November 22, 2011

15.075 Exam 3. Instructor: Cynthia Rudin TA: Dimitrios Bisias. November 22, 2011 15.075 Exam 3 Istructor: Cythia Rudi TA: Dimitrios Bisias November 22, 2011 Gradig is based o demostratio of coceptual uderstadig, so you eed to show all of your work. Problem 1 A compay makes high-defiitio

More information

Investing in Stocks WHAT ARE THE DIFFERENT CLASSIFICATIONS OF STOCKS? WHY INVEST IN STOCKS? CAN YOU LOSE MONEY?

Investing in Stocks WHAT ARE THE DIFFERENT CLASSIFICATIONS OF STOCKS? WHY INVEST IN STOCKS? CAN YOU LOSE MONEY? Ivestig i Stocks Ivestig i Stocks Busiesses sell shares of stock to ivestors as a way to raise moey to fiace expasio, pay off debt ad provide operatig capital. Ecoomic coditios: Employmet, iflatio, ivetory

More information

Extending Your Management Reach to Remote Users

Extending Your Management Reach to Remote Users Extedig Your Maagemet Reach to Remote Users White Paper LANDESK WHITE PAPER : Extedig Your Maagemet Reach to Remote Users Table of Cotets Executive Summary... 3 Obstacles to Cost-Effective Remote Maagemet...

More information

Best of security and convenience

Best of security and convenience Get More with Additioal Cardholders. Importat iformatio. Add a co-applicat or authorized user to your accout ad you ca take advatage of the followig beefits: RBC Royal Bak Visa Customer Service Cosolidate

More information

Case Study. Normal and t Distributions. Density Plot. Normal Distributions

Case Study. Normal and t Distributions. Density Plot. Normal Distributions Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

Comparative Analysis of Round Robin VM Load Balancing With Modified Round Robin VM Load Balancing Algorithms in Cloud Computing

Comparative Analysis of Round Robin VM Load Balancing With Modified Round Robin VM Load Balancing Algorithms in Cloud Computing Iteratioal Joural of Egieerig, Maagemet & Scieces (IJEMS) Comparative Aalysis of Roud Robi Balacig With Modified Roud Robi Balacig s i Cloud Computig Areeba Samee, D.K Budhwat Abstract Cloud computig is

More information

Smart Connected Products & The Internet of Things

Smart Connected Products & The Internet of Things Smart Coected Products & The Iteret of Thigs Who we are Taget delivers Talet Globally. Established for 40 years we specialise i delivery of iovative & tailored talet solutios to customers aroud the world.

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

Wells Fargo Insurance Services Claim Consulting Capabilities

Wells Fargo Insurance Services Claim Consulting Capabilities Wells Fargo Isurace Services Claim Cosultig Capabilities Claim Cosultig Claims are a uwelcome part of America busiess. I a recet survey coducted by Fulbright & Jaworski L.L.P., large U.S. compaies face

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Saudi Aramco Suppliers Safety Management System

Saudi Aramco Suppliers Safety Management System Saudi Aramco Suppliers Safety Maagemet System SAFETY is Protectio (if oly we follow the rules) ''To live each day ijury ad violatio free, o ad off the job'' Foreword Foreword Saudi Aramco has developed

More information