Software licensing, made simple.

Size: px
Start display at page:

Download "Software licensing, made simple."

Transcription

1 Software licensing, made simple. SELECT Server XM Edition A Bentley Software White Paper Executive Overview Engineering software is no longer considered an overhead; indeed many CIOs tell Bentley that their engineering software is functionally required for their success in the design, construction, and operation of the world s infrastructure. Bentley believes that this cultural shift in perceived value of engineering software from helpful to fundamental demands a new licensing paradigm that will never obstruct the progress of mission-critical work. Bentley has long believed that its engineering software should enable teams to achieve a higher quality product while realizing more value from the time and money invested during design, construction, and operation. It was this desire - to maximize the value derived from its software - that led Bentley to implement the first SELECT Server in Designed for software license pooling, the first SELECT Server enabled Bentley users to install applications on every desktop in an organization and license them from a site-based server on a first-come-first-served basis. The SELECT Server approach to license management has since been adopted by a large majority of Bentley software users to great effect. Indeed having witnessed software license administration being made simple by the deployment of SELECT Server, the attention of our users turned to another concern; software license management. As a functional requirement of their business CIOs told Bentley that they want software license compliance and requested assistance from Bentley. CIOs tell Bentley that their engineering software is a functional requirement for the successful design, constuction, and operation of the world s infrasctructure. SELECT Server XM Edition is Bentley s response to these CIOs. In the XM edition version, SELECT Server s current license management model has been exchanged for a new reporting model. This change means that the cap on license usage is removed, and all license usages will be automatically tracked and reported. Each month a usage report will be made available to key nominated individuals at the organization, providing the benefit of absolute transparency of software use and enabling easier transitions to higher software usage while managing compliance.

2 Table of Contents: The Value of Engineering Software The Impact of Software Protection Real Pain Encountered by Users Trust Licensing: SELECT Server XM Edition SELECT Server XM Edition Disconnected Use of XM Edition Applications Usage Reporting Privacy Policy Multi-Site License Management Outsource your License Management Summarizing SELECT Server XM Edition Software licensing, made simple. p. 2

3 The Value of Engineering Software Many CIOs tell Bentley that their engineering software is a functional requirement for the successful in the design, construction and operation of the world s infrastructure. Bentley believes that this cultural shift in perceived value of engineering software from helpful to fundamental demands a new licensing paradigm that will never obstruct the progress of mission-critical work. The essence of the SELECT Server XM Edition strategy is Bentley s trust in its users integrity. The Impact of Software Protection The position adopted by senior industry executives today is clearly different from the one they adopted 10 years ago, when they regarded all software generally as overhead and considered that it may provide a competitive advantage to them. Traditionally, software companies adopted a similar position and licensed their software applications accordingly: adopting an enforcement-model to license software. It should, therefore, be of little surprise that software piracy protection became central to a software developer s business. While this approach worked well for non-mission-critical usage, it did cause problems for companies where software is an absolute necessity and progress is impossible without access to the right applications. Therefore, a great deal of attention was given to addressing the problems caused and, over the years, combinations of products, best practices, and copyright laws have been implemented to balance access versus restriction with varied levels of success. Bentley, like most software vendors, is serious about improving the process of protecting against the loss of its own intellectual property. Just as importantly, though, Bentley is serious about protecting against the loss of its own users ability and right to access their own intellectual property: their design data. Real Pain Encountered by Users So what happens when vendors efforts to protect software get in the way of AEC professionals doing their work? Work slows down. How do you measure the productivity that is lost when an engineer cannot obtain a license for the use of a mission-critical application? Bentley has made changes to the XM edition of SELECT Server so that users will no longer encounter such pain. Bentley s focus for license management with SELECT Server XM Edition is liberation rather than restriction. Trust Licensing: SELECT Server XM Edition When you purchase a Bentley software license you are investing in Bentley software and, in return, Bentley commits to protect your investment through responsible licensing management. SELECT Server XM Edition will: Ensure that users have access to mission-critical software whenever they need it Monitor, log, and report application usage Focus on automated systems that allow self service Software licensing, made simple. p. 3

4 Bentley s trust in the integrity of its users is the foundation of this new business strategy. As you manage a responsible business, Bentley believes that you should always have access to your software investment. SELECT Server XM Edition will always grant your users access to your applications and each month it will report your actual usage. Your ability to meet your own deadlines, therefore, is never inhibited by software availability. Trust licensing depends upon usage logs being sent to Bentley SELECT Server XM Edition The SELECT Server XM Edition licensing implementation is built upon the general understanding that being disconnected from a network is a routine requirement for our users. SELECT Server XM Edition addresses the reality of asynchronous transmissions and eliminates dependence on (and risk from) real-time infrastructure. A number of compelling new developments mark SELECT Server s XM Edition, including: 1. Disconnected use 2. A new reporting infrastructure 3. The ability to manage multiple sites from a single SELECT Server 4. The option of a Bentley-hosted license management service Disconnected Use of XM Edition Applications Although network access is assumed to be nearly universal, there are times when a network is just not available: 1. When traveling away from the office 2. At a construction site 3. When working from home Bentley s XM Edition applications do not require a real-time connection to SELECT Server. This ability to run in a disconnected state is enabled by an industry-standard concept called product activation, which is part of all XM Edition applications. In practice, activating MicroStation V8 XM Edition introduces an additional mode of failsafe operation, allowing MicroStation to run full-featured for up to 30 days without connecting to the SELECT Server. Should you continue to operate in isolation from your SELECT Server for more than 30 days, then your product will revert to working like an unlicensed copy and will require a restart every 15 minutes. Through SELECT, subscribers can pool licenses for desktop engineering applications by using SELECT Server XM Edition. SELECT Server XM Edition will always grant a users application request for a license, it will log the request and add the log to a master report that will be automatically forwarded to key individuals each month. SELECT Server usage reporting will, therefore, Software licensing, made simple. p. 4

5 inform you when you exceed usage counts in a given period. Bentley trusts that you ll take steps necessary to remain complaint, for example, by adding a temporary subscription for more licenses if excessive license usage is likely to persist or buy buying extra licenses to add to the pool. Usage Reporting Application use is reported to Bentley in a routine communication by SELECT Server XM Edition after the reporting applications have posted their individual usage logs. This occurs as a result of two key factors: 1. SELECT Server XM Edition is aware of the sites it manages, the applications it licenses, and the users it serves. 2. The applications you own are licensed and activated against a specific site. Application usage is always recorded locally on desktop computers and posted daily to SELECT Server XM Edition, when a connection is available, over standard HTTP network protocol. The reports present the applications in use, as well as the people who are using them. A nuance of the system is that usage reports become more accurate as they age. That is, since SELECT Server XM Edition does not require a real-time connection, at any given point in time, there could be a number of users who are disconnected from the system. The majority of usage information is readily available, although an account of the entire system may only be feasible once all users have reported back in. So the reports will become more accurate as more desktops post logs to the server. You may not be able to tell exactly who is using what applications at this moment, but as long as users connect daily, as the system encourages, then an accurate daily account is automatic. A number of reports can be produced by SELECT Server: 1. The Summary Report accounts for peak utilization of pooled applications, including the number of machines and the date the peak occurred. 2. Daily Pooled Usage counts application utilization each day, including specific versions used. 3. The Application Usage report details what applications ran on which machines. 4. The Machine Usage report confirms which machines used a particular application. Named User Reports include: 5. Application by User, which lists each application in use that requires a named user license and the user who used them throughout the reporting period. Software licensing, made simple. p. 5

6 6. A monthly summary of the number of named users accessing Bentley tools. 7. A summary of total server right-to-run licenses used during the reporting period. Enterprise License Subscribers SM (ELS) can incorporate multiple, site-based usage logs into a single, enterprise-wide usage report. The transmission of usage logs to Bentley is a requirement with the advent of the SELECT Server XM Edition licensing configuration. Previous versions of SELECT Server have compiled and reported application usage but none have allowed for disconnected working as a default. SELECT Server XM Edition therefore introduces a brand new infrastructure and process for report transmission, automating the process and, thereby, removing any demands on the administrator s time. This reporting function is very important to Bentley, as this detailed knowledge helps inform Bentley regarding: 1. What products are in use 2. Where to direct future development efforts to the benefit of the user base 3. How to resource for future support services Furthermore, long-range development priorities can be also be better validated when Bentley understands how many users will benefit from a compelling new product or feature. Manage your own SELECT Server XM Edition or alternatively have Bentley host the license pool for you Privacy Policy No proprietary or personal information is included in usage reports that are transmitted to Bentley. All communication between SELECT Server XM Edition and Bentley s Web Services are controlled by the account. SELECT Server XM Edition uses Secure Socket Layer (SSL) and/or Secure HTTP (HTTPS) protocols. Moreover, report transmissions to Bentley are pushed from the SELECT Server. Bentley has no ability to initiate any contact with a server in a secure user network. Hence, your information and your network are safe and secure. Multi-Site License Management Bentley SELECT agreements are generally executed and administered by geographic site. One of the long-standing requirements of the agreement is to administer licenses at the same granularity. Until now, this has meant running a SELECT Server at every site. A major benefit with SELECT Server XM Edition is the introduction of multi-site license management from a single application server. This eliminates the necessity to run a separate SELECT Server at each and every office. SELECT Server XM Edition keeps track of applications and their usage per site. Therefore, users obtain licenses and report usage at the site where they work. System administrators can view status and manage all sites from a single SELECT Server interface. This also reduces the motivation to operate redundant SELECT Servers, since fewer are required to manage the same number of sites. Software licensing, made simple. p. 6

7 Outsource your License Management Bentley SELECT subscribers have traditionally deployed SELECT Server in their own network infrastructures. This placed the responsibility of license management and additional hardware resources on each subscriber. If managing software licenses is something you would rather not have to do you may opt to have Bentley manage your licenses. With SELECT Server XM Edition, Bentley has introduced the option to utilize a hosted SELECT Server, located and operated in Bentley s state-of-the-art data center. Hosted licensing offers the same pooled licenses and usage reporting as a deployed SELECT Server, but does not require the same hardware, software, or personnel investment. The requirements for desktop connectivity for V8 XM edition applications are no different for hosted licensing - you simply have to be able to connect at least once a month to ensure that the application remains activated. Non-SELECT Bentley users will be required to activate their V8 XM edition applications online via a hosted service. Once activation has been completed, applications are in full use and further connections are not required. Of course, the pooling of licenses, user-defined checked-out licenses, and many other features enabled by SELECT Server XM Edition are not entitlements offered to non-select users. Summarizing SELECT Server XM Edition Bentley s V8 XM Edition applications no longer need a real-time connection to SELECT Server. There is a 30-day failsafe mode that ensures immediate use of Bentley applications while also providing plenty of time to resolve any issues with connectivity. Bentley applications will run every time anyone needs them. Even pre-v8 XM edition applications are supported by the new SELECT Server Usage report transmission to Bentley is required on a regular basis. No inclusion of any proprietary information is ever included in this transmission. Information about application usage helps Bentley make informed decisions regarding future development and support priorities. SELECT Server XM Edition is easier to install and requires fewer servers to manage licenses. In fact, Bentley will host licenses as a service of the SELECT program. All V8 XM edition applications will need to use the new SELECT Server XM Edition. Pre-V8 XM edition applications do not require a change; the new SELECT Server XM Edition can manage pre-v8 XM edition applications as well. SELECT Server XM Edition can extend several benefits of the new license management model to existing applications, including: A one-time, 30-day evaluation mode, extended periods for checked-out licenses And the reliability of a system built on standard, Web-based server technology. Take advantage of the new SELECT Server XM Edition today, for all of your Bentley applications Bentley Systems, Incorporated. Bentley, the Bentley B logo, Bentley SELECT, Enterprise License Subscription, MicroStation, SELECT, and SELECT Server are either registered or unregistered trademarks or service marks of Bentley Systems, Incorporated or one of its direct or indirect wholly-owned subsidiaries. Other brands and product names are trademarks of their respective owners. DAA /0001 Software licensing, made simple. p. 7

Outgoing VDI Gateways:

Outgoing VDI Gateways: ` Outgoing VDI Gateways: Creating a Unified Outgoing Virtual Desktop Infrastructure with Windows Server 2008 R2 and ObserveIT Daniel Petri January 2010 Copyright 2010 ObserveIT Ltd. 2 Table of Contents

More information

WebEx Security Overview Security Documentation

WebEx Security Overview Security Documentation WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication

More information

Top 10 Questions to Ask when Choosing a Secure File Transfer Solution

Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Companies that have made an investment in a Secure File Transfer

More information

Steps to Migrating to a Private Cloud

Steps to Migrating to a Private Cloud Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime

More information

Protecting Data with a Unified Platform

Protecting Data with a Unified Platform Protecting Data with a Unified Platform The Essentials Series sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime has produced dozens and dozens

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

Software As A Service

Software As A Service Software As A Service What Is ERP Hosting? Hosting is a software deployment and subscription model in which an application resides on the software provider s remote servers, rather than the customer s

More information

Eight Ways Better Software Deployment and Management Can Save You Money

Eight Ways Better Software Deployment and Management Can Save You Money Eight Ways Better Software Deployment and Management Can Save You Money Introduction Software management and deployment are perhaps among the most difficult and time-consuming activities undertaken by

More information

NEC s Carrier-Grade Cloud Platform

NEC s Carrier-Grade Cloud Platform NEC s Carrier-Grade Cloud Platform Deploying Virtualized Network Functions in Cloud INDEX 1. Paving the way to Telecom Network Function Virtualization P.3 2. Open Carrier-grade Hypervisor P.3 Latency and

More information

SDN. Expectations. February 2015. Independent Market Research Commissioned by

SDN. Expectations. February 2015. Independent Market Research Commissioned by SDN Expectations Independent Market Research Commissioned by February 05 Executive Summary: Service configuration (83%), application performance (8%) and network management (63%) are the Top 3 problem

More information

Cloud computing: Innovative solutions for test environments

Cloud computing: Innovative solutions for test environments IBM Global Services April 2009 Cloud computing: Innovative solutions for test environments Speed test cycles and reduce cost to gain a competitive edge Page No.2 Contents 2 Executive summary 3 Leading

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

ereview Security Overview Security Overview

ereview Security Overview Security Overview Security Overview 1 This description is for information purpose only. Web4, a division of netguru, Inc., reserves the right to alter this description or to adapt it to technical conditions at any time.

More information

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition WhatsUpGold v14.2 Getting Started with WhatsUp Gold MSP Edition Getting Started with MSP Edition In This Guide About WhatsUp Gold MSP Edition... 1 User interfaces... 2 About the MSP Edition reporting capabilities...

More information

About Contract Management

About Contract Management Contract Management System Architecture Data Sheet June 2015 About Contract Management Oracle Primavera Contract Management is a multi-user, multi-project Web-based application that manages all aspects

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by En suring Desktop Virtualization Success... 1 Siz ing Your Desktop Virtualization Environment... 2 Ap

More information

How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution

How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution Virtualization Backup and Recovery Solutions for the SMB Market The Essentials Series How Traditional Physical Backup Imaging Technology Fits Into a Virtual Backup Solution sponsored by Introduction to

More information

Desktop Virtualization Technologies and Implementation

Desktop Virtualization Technologies and Implementation ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method

More information

Affordable Remote Data Replication

Affordable Remote Data Replication SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted

More information

An Oracle White Paper February 2010. Rapid Bottleneck Identification - A Better Way to do Load Testing

An Oracle White Paper February 2010. Rapid Bottleneck Identification - A Better Way to do Load Testing An Oracle White Paper February 2010 Rapid Bottleneck Identification - A Better Way to do Load Testing Introduction You re ready to launch a critical Web application. Ensuring good application performance

More information

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2009

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2009 Rapid Bottleneck Identification A Better Way to do Load Testing An Oracle White Paper June 2009 Rapid Bottleneck Identification A Better Way to do Load Testing. RBI combines a comprehensive understanding

More information

Comparing Fax Servers to Outsourced Messaging Services. April 28, 2005

Comparing Fax Servers to Outsourced Messaging Services. April 28, 2005 Comparing Fax Servers to Outsourced Messaging Services April 28, 2005 Comparing Fax Servers to Outsourced Messaging Services Abstract Faxes are embedded into the workflow of many business processes: in

More information

Field Service Management in the Cloud

Field Service Management in the Cloud Field Service Management in the Cloud The Rise of Cloud Applications for Mission-Critical Tasks ORACLE WHITE PAPER DECEMBER 2014 Introduction Since the introduction of cloud applications for customer relationship

More information

QAD Enterprise Applications. Training Guide Demand Management 6.1 Technical Training

QAD Enterprise Applications. Training Guide Demand Management 6.1 Technical Training QAD Enterprise Applications Training Guide Demand Management 6.1 Technical Training 70-3248-6.1 QAD Enterprise Applications February 2012 This document contains proprietary information that is protected

More information

WHITE PAPER Ten Things You Need to Know about Virtualization

WHITE PAPER Ten Things You Need to Know about Virtualization WHITE PAPER WHITE PAPER Ten Things You Need to Know about Virtualization As many already know, virtualization is big, and it continues to grow in popularity. Users are now actively seeking complementary

More information

Memory-to-memory session replication

Memory-to-memory session replication Memory-to-memory session replication IBM WebSphere Application Server V7 This presentation will cover memory-to-memory session replication in WebSphere Application Server V7. WASv7_MemorytoMemoryReplication.ppt

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

The Cross-Media Contact Center

The Cross-Media Contact Center Whitepaper The Cross-Media Contact Center The Next-Generation Replacement for the Traditional Call Center Intel in Communications Executive Summary Because call centers are a principal point of contact

More information

White Paper: Vendor Selection for Your Life Science Company Cloud

White Paper: Vendor Selection for Your Life Science Company Cloud White Paper: Vendor Selection for Your Life Science Company Cloud GlobalSubmit 123 South Broad Street, Suite 1850 Philadelphia, PA 19109 www.globalsubmit.com Methodsense, Inc. P.O. Box 110352 Durham, NC

More information

The ABCs of DaaS. Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting.

The ABCs of DaaS. Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting. The ABCs of DaaS Enabling Data as a Service for Application Delivery, Business Intelligence, and Compliance Reporting White Paper The ABCs of DaaS Enabling Data as a Service Application Delivery, Business

More information

HITS HR & PAYROLL CLOUD MODEL WHITEPAPER

HITS HR & PAYROLL CLOUD MODEL WHITEPAPER HITS HR & PAYROLL CLOUD MODEL WHITEPAPER Deciphering Total Cost of Ownership Total Cost of Ownership, or TCO, is commonly defined as the estimate of all direct and indirect costs associated with an asset

More information

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises

More information

Consolidate and Virtualize Your Windows Environment with NetApp and VMware

Consolidate and Virtualize Your Windows Environment with NetApp and VMware White Paper Consolidate and Virtualize Your Windows Environment with NetApp and VMware Sachin Chheda, NetApp and Gaetan Castelein, VMware October 2009 WP-7086-1009 TABLE OF CONTENTS 1 EXECUTIVE SUMMARY...

More information

using version control in system administration

using version control in system administration LUKE KANIES using version control in system administration Luke Kanies runs Reductive Labs (http://reductivelabs.com), a startup producing OSS software for centralized, automated server administration.

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Best Practices for Implementing iscsi Storage in a Virtual Server Environment

Best Practices for Implementing iscsi Storage in a Virtual Server Environment white paper Best Practices for Implementing iscsi Storage in a Virtual Server Environment Server virtualization is becoming a no-brainer for any that runs more than one application on servers. Nowadays,

More information

Enterprise Cloud Solutions

Enterprise Cloud Solutions IT(O) IT Outsourcing Options Enterprise Cloud Solutions CloudAgile Select Partner PDF v2.2 9/11/12 Cloud Computing with Latisys With the Latisys Cloud, your Enterprise can: Achieve unprecedented control,

More information

Security Overview Introduction Application Firewall Compatibility

Security Overview Introduction Application Firewall Compatibility Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging

More information

Making the Business and IT Case for Dedicated Hosting

Making the Business and IT Case for Dedicated Hosting Making the Business and IT Case for Dedicated Hosting Overview Dedicated hosting is a popular way to operate servers and devices without owning the hardware and running a private data centre. Dedicated

More information

How To Get A Client Side Virtualization Solution For Your Financial Services Business

How To Get A Client Side Virtualization Solution For Your Financial Services Business SOLUTION BRIEF Financial Services Industry 2nd Generation Intel Core i5 vpro and Core i7 vpro Processors Benefits of Client-Side Virtualization A Flexible, New Solution for Improving Manageability, Security,

More information

GFI Cloud User Guide A guide to administer GFI Cloud and its services

GFI Cloud User Guide A guide to administer GFI Cloud and its services GFI Cloud User Guide A guide to administer GFI Cloud and its services Contents 1 Introduction to GFI Cloud 5 1.1 The aim of this guide 6 1.2 What is GFI Cloud? 6 1.3 GFI Cloud features 6 1.4 How it works

More information

Secure Access Link. Table of Contents. Introduction. Background. avaya.com. Introduction... 1. Background... 1. Secure Access Link...

Secure Access Link. Table of Contents. Introduction. Background. avaya.com. Introduction... 1. Background... 1. Secure Access Link... Secure Access Link Table of Contents Introduction... 1 Background... 1 Secure Access Link... 2 Components... 3 Aggregated Traffic... 5 Flexible Authentication. and Authorization... 6 Complete Control over.

More information

Special Edition for FastTrack Software

Special Edition for FastTrack Software 08/14 The magazine for professional system and networkadministration Special Edition for FastTrack Software Tested: FastTrack Automation Studio www.it-administrator.com TESTS I FastTrack Automation Studio

More information

Accelerate Private Clouds with an Optimized Network

Accelerate Private Clouds with an Optimized Network Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization

More information

Successfully managing geographically distributed development

Successfully managing geographically distributed development IBM Rational SCM solutions for distributed development August 2004 Successfully managing geographically distributed development Karen Wade SCM Product Marketing Manager IBM Software Group Page 2 Contents

More information

SharePoint 2013 Logical Architecture

SharePoint 2013 Logical Architecture SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.

More information

axsguard Gatekeeper Internet Redundancy How To v1.2

axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH

More information

Driving Down the High Cost of Storage. Pillar Axiom 600

Driving Down the High Cost of Storage. Pillar Axiom 600 Driving Down the High Cost of Storage Pillar Axiom 600 Accelerate Initial Time to Value, and Control Costs over the Long Term Make a storage investment that will pay off in rapid time to value and low

More information

Zeus Extensible Traffic Manager in Virtualized Hosting Environments.

Zeus Extensible Traffic Manager in Virtualized Hosting Environments. Zeus Extensible Traffic Manager in Virtualized Hosting Environments. Zeus Technology Limited Sales: +44 (0)1223 568555 The Jeffreys Building Main: +44 (0)1223 525000 Cowley Road Fax: +44 (0)1223 525100

More information

IT@Intel. Developing an Enterprise Client Virtualization Strategy

IT@Intel. Developing an Enterprise Client Virtualization Strategy White Paper Intel Information Technology Computer Manufacturing Client Virtualization Developing an Enterprise Client Virtualization Strategy Intel IT is investigating virtualization because it has the

More information

White Paper. CCRM Services on Cloud Benefits of Private Cloud for CCRM Services. Abstract. - Krishna Vaddadi

White Paper. CCRM Services on Cloud Benefits of Private Cloud for CCRM Services. Abstract. - Krishna Vaddadi White Paper CCRM Services on Cloud Benefits of Private Cloud for CCRM Services - Krishna Vaddadi Abstract Configuration, Change and Release Management (CCRM) activities are the primary deliverables in

More information

Real World Considerations for Implementing Desktop Virtualization

Real World Considerations for Implementing Desktop Virtualization Real World Considerations for Implementing Desktop Virtualization The Essentials Series sponsored by Intro duction to Desktop Virtualization for the IT Pro... 1 What Is Desktop Virtualization?... 2 VDI

More information

Realizing the IT Management Value of Infrastructure Management

Realizing the IT Management Value of Infrastructure Management The Essentials Series: Infrastructure Management Realizing the IT Management Value of Infrastructure Management sponsored by by Chad Marshall Realizing the IT Management Value of Infrastructure Management...1

More information

INS is End-to-End Provider 3 Customer Profile: YMCA 4 Cloud Computing & Disasters 5

INS is End-to-End Provider 3 Customer Profile: YMCA 4 Cloud Computing & Disasters 5 VOLUME 2 ISSUE 1 BUSINESS CONNECTIONS INS is End-to-End Provider 3 Customer Profile: YMCA 4 Cloud Computing & Disasters 5 Storage Area Network at DMU 6 FAQs about SAN 6 New 10 Gigabit Ethernet Ring 7 BUSINESS

More information

Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property

Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property Overview Country or Region: United States Industry: Manufacturing Customer Profile Dow Corning is a global leader in

More information

Cisco Unified Intelligent Contact Management Enterprise 7.2

Cisco Unified Intelligent Contact Management Enterprise 7.2 Cisco Unified Intelligent Contact Management Enterprise 7.2 Cisco Unified Intelligent Contact Management Enterprise-an integral component of the Cisco Unified Communications system-delivers an integrated

More information

TECHNOLOGY WHITE PAPER. Application Performance Management. Introduction to Adaptive Instrumentation with VERITAS Indepth for J2EE

TECHNOLOGY WHITE PAPER. Application Performance Management. Introduction to Adaptive Instrumentation with VERITAS Indepth for J2EE TECHNOLOGY WHITE PAPER Application Performance Management Introduction to Adaptive Instrumentation with VERITAS Indepth for J2EE TABLE OF CONTENTS ABOUT ADAPTIVE INSTRUMENTATION 3 WHY ADAPTIVE INSTRUMENTATION?

More information

Choosing a Server to Fit Your Business. A step-by-step guide to help businesses maximize the benefits of Intel. Xeon -based server solutions.

Choosing a Server to Fit Your Business. A step-by-step guide to help businesses maximize the benefits of Intel. Xeon -based server solutions. Choosing a Server to Fit Your Business. A step-by-step guide to help businesses maximize the benefits of Intel Xeon -based server solutions. Copyright 2005 Intel Corporation. All rights reserved. Intel,

More information

Controlling and Managing Security with Performance Tools

Controlling and Managing Security with Performance Tools Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance

More information

Virtual Machine Environments: Data Protection and Recovery Solutions

Virtual Machine Environments: Data Protection and Recovery Solutions The Essentials Series: The Evolving Landscape of Enterprise Data Protection Virtual Machine Environments: Data Protection and Recovery Solutions sponsored by by Dan Sullivan Vir tual Machine Environments:

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

The Advantages of Security as a Service versus On-Premise Security

The Advantages of Security as a Service versus On-Premise Security The Advantages of Security as a Service versus On-Premise Security ABSTRACT: This document explores the growing trend of hosted/managed security as a service and why the cloud is quickly becoming the preferred

More information

The objective of WebSphere MQ clustering is to make this system as easy to administer and scale as the Single Queue Manager solution.

The objective of WebSphere MQ clustering is to make this system as easy to administer and scale as the Single Queue Manager solution. 1 2 It would be nice if we could place all the queues in one place. We could then add processing capacity around this single Queue manager as required and start multiple servers on each of the processors.

More information

How To Use Mts Bondspro From A Computer To A Trading System

How To Use Mts Bondspro From A Computer To A Trading System MTS BONDS- PRO API: OPENING NEW DOORS MTS Markets International Inc. is the US subsidiary of the MTS Group. In the US corporate bond space they manage an ATS called BondsPro (formerly known as Bonds.com).

More information

OVERVIEW. DIGIPASS Authentication for Office 365

OVERVIEW. DIGIPASS Authentication for Office 365 OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility

More information

INTERNET For noncommercial. Organisations

INTERNET For noncommercial. Organisations . SOPAC Franck Martin Consultant SOPAC Private Mail Bag, GPO Suva, Fiji Fax:+679 370 040 Franck@sopac.org.fj INTERNET For noncommercial Organisations.......... Network Affiliate Membership Application

More information

Managing SSL Security

Managing SSL Security May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited

More information

Maximizing Your Desktop and Application Virtualization Implementation

Maximizing Your Desktop and Application Virtualization Implementation Maximizing Your Desktop and Application Virtualization Implementation The Essentials Series sponsored by David Davis Article 1: Using Hosted Applications with Desktop Virtualization... 1 The State of Desktop

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide

Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide September 2015 Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX,

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

White Paper. Next Generation Historians. Improve historical data access and analysis while reducing costs. What s Inside:

White Paper. Next Generation Historians. Improve historical data access and analysis while reducing costs. What s Inside: White Paper Next Generation s Author: Mike Brost, Consulting Systems Engineer, Invensys Operations Management What s Inside: 1. Introduction 2. Historical Data Types, Usage and Management Challenges 3.

More information

Unit 9: License Management

Unit 9: License Management Unit 9: License Management 9-1 Introduction This unit provides instructions for the tasks involved in creating and maintaining license entitlement information and licenses for products. Objectives Objectives

More information

Business Value Reporting and Analytics

Business Value Reporting and Analytics IP Telephony Contact Centers Mobility Services WHITE PAPER Business Value Reporting and Analytics Avaya Operational Analyst April 2005 avaya.com Table of Contents Section 1: Introduction... 1 Section 2:

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

Invest in your business with Ubuntu Advantage.

Invest in your business with Ubuntu Advantage. Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

http://support.oracle.com/

http://support.oracle.com/ Contract Management System Architecture Data Sheet October 2012 Legal Notices Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle

More information

Rapid Bottleneck Identification

Rapid Bottleneck Identification Rapid Bottleneck Identification TM A Better Way to Load Test WHITEPAPER You re getting ready to launch or upgrade a critical Web application. Quality is crucial, but time is short. How can you make the

More information

White Paper: Managing Security on Mobile Phones

White Paper: Managing Security on Mobile Phones White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile

More information

Network Management Systems Today

Network Management Systems Today White Paper Telecom Network Management AdvancedTCA Network Management Systems Today Meeting the Challenges of Complexity, Flexibility, and Customer Assurance with AdvancedTCA Technology Executive Summary

More information

Enterprise Report Management CA View, CA Deliver, CA Dispatch, CA Bundl, CA Spool, CA Output Management Web Viewer

Enterprise Report Management CA View, CA Deliver, CA Dispatch, CA Bundl, CA Spool, CA Output Management Web Viewer PRODUCT FAMILY SHEET Enterprise Report Management Enterprise Report Management CA View, CA Deliver, CA Dispatch, CA Bundl, CA Spool, CA Output Management Web Viewer CA Technologies provides leading software

More information

IBM Tivoli Network Manager software

IBM Tivoli Network Manager software Perform real-time network discovery, topology visualization and root-cause analysis IBM Tivoli Network Manager software Highlights Help increase the availability and performance of critical business services

More information

Navigating the Enterprise Database Selection Process: A Comparison of RDMS Acquisition Costs Abstract

Navigating the Enterprise Database Selection Process: A Comparison of RDMS Acquisition Costs Abstract Navigating the Enterprise Database Selection Process: A Comparison of RDMS Acquisition Costs Abstract Companies considering a new enterprise-level database system must navigate a number of variables which

More information

Desktop Activity Intelligence

Desktop Activity Intelligence Desktop Activity Intelligence Table of Contents Cicero Discovery Delivers Activity Intelligence... 1 Cicero Discovery Modules... 1 System Monitor... 2 Session Monitor... 3 Activity Monitor... 3 Business

More information

Resonate Central Dispatch

Resonate Central Dispatch Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and

More information

IBM Tivoli License Manager. Intelligent software license management to help optimize business value

IBM Tivoli License Manager. Intelligent software license management to help optimize business value A technical discussion of software license management April 2003 IBM Tivoli License Manager Intelligent software license management to help optimize business value 2 Preface As companies worldwide continue

More information

Cronacle. Introduction

Cronacle. Introduction Cronacle An event-driven job scheduling solution, enabling systems administrators and operators to easily manage distributed and heterogeneous business systems. Cronacle Making complex processes easy to

More information

CUSTOMER FLOW MANAGEMENT A QMATIC WHITEPAPER PART I: INTRODUCING CFM

CUSTOMER FLOW MANAGEMENT A QMATIC WHITEPAPER PART I: INTRODUCING CFM CUSTOMER FLOW MANAGEMENT PART I: INTRODUCING CFM A QMATIC WHITEPAPER This whitepaper is the first part of three in a series of whitepapers aimed at explaining customer flow management, how it fits into

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software.

Mapping Your Path to the Cloud. A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Mapping Your Path to the Cloud A Guide to Getting your Dental Practice Set to Transition to Cloud-Based Practice Management Software. Table of Contents Why the Cloud? Mapping Your Path to the Cloud...4

More information

THE WINDOWS AZURE PROGRAMMING MODEL

THE WINDOWS AZURE PROGRAMMING MODEL THE WINDOWS AZURE PROGRAMMING MODEL DAVID CHAPPELL OCTOBER 2010 SPONSORED BY MICROSOFT CORPORATION CONTENTS Why Create a New Programming Model?... 3 The Three Rules of the Windows Azure Programming Model...

More information

Hosted Vs. In-House for Microsoft Exchange: Five Myths Debunked

Hosted Vs. In-House for Microsoft Exchange: Five Myths Debunked Hosted Vs. In-House for Microsoft Exchange: Five Myths Debunked Email has become the single most important tool for business communication, period. In a recent King Research survey of mid-market IT professionals

More information

How To Compare Fax Servers To A Hosted Fax Server

How To Compare Fax Servers To A Hosted Fax Server faxing simplified. anytime. anywhere. Comparing Fax Servers to Hosted Fax Solutions www.myfax.com Comparing Fax Servers to Hosted Fax Solutions Abstract Today faxing continues to be a dominant communications

More information

Pre-Installation Instructions

Pre-Installation Instructions Agile Product Lifecycle Management PLM Mobile Release Notes Release 2.0 E49504-02 October 2014 These Release Notes provide technical information about Oracle Product Lifecycle Management (PLM) Mobile 2.0.

More information

Microsoft IT Deploys and Manages Office 365 ProPlus

Microsoft IT Deploys and Manages Office 365 ProPlus Microsoft IT Deploys and Manages Office 365 ProPlus Technical White Paper Published: June 2013 The following content may no longer reflect Microsoft s current position or infrastructure. This content should

More information

Load Balancing 101: Firewall Sandwiches

Load Balancing 101: Firewall Sandwiches F5 White Paper Load Balancing 101: Firewall Sandwiches There are many advantages to deploying firewalls, in particular, behind Application Delivery Controllers. This white paper will show how you can implement

More information

The Integration Between EAI and SOA - Part I

The Integration Between EAI and SOA - Part I by Jose Luiz Berg, Project Manager and Systems Architect at Enterprise Application Integration (EAI) SERVICE TECHNOLOGY MAGAZINE Issue XLIX April 2011 Introduction This article is intended to present the

More information