TECHILA INTERCONNECT END-USER GUIDE
|
|
|
- Stanley Chase
- 10 years ago
- Views:
Transcription
1 TECHILA INTERCONNECT END-USER GUIDE 16 NOVEMBER 2015
2 TECHILA INTERCONNECT 2/17 16 NOVEMBER 2015 Disclaimer Techila Technologies Ltd. disclaims any and all warranties, express, implied or statutory regarding this document or the use of thereof by you to the full extent permitted by law. Without limiting the generality of the foregoing, this document provided by Techila Technologies Ltd. in connection therewith are provided as-is and without warranties of any kind, including, without limitation, any warranties of performance or implied warranties of merchantability, fitness for a particular purpose, title and noninfringement. Further, Techila Technologies Ltd. does not make, and has not made, any presentation or warranty that the document is accurate, complete, reliable, current, error-free, or free from harmful information. Limitation of Liability In no event shall Techila Technologies Ltd. or any of its respective directors, officers, employees, or agents, be liable to you or any other person or entity, under any theory, including without limitation negligence, for damages of any kind arising from or related to the application of this document or any information, content, or materials in or accessible through this document, including, but not limited to, direct, indirect, actual, incidental, punitive, special or consequential damages, lost income, revenue or profits, lost or damaged data, or other commercial or economic loss, that result from your use of, or inability to use, this document, even if any of those persons or entities have been advised of the possibility of such damages or such damages are foreseeable. Use of this document and copyright No part of this document may be used, reproduced, modified, or transmitted in any form or means without the prior written permission of Techila Technologies. This document and the product it describes are considered protected by copyrights and other intellectual property rights according to the applicable laws. Techila, Techila Grid, and the Techila logo are either registered trademarks or trademarks of Techila Technologies Ltd in the European Union, in the United States and/or other countries. All other trademarks are the property of their respective owners. Copyright Techila Technologies Ltd All rights reserved.
3 TECHILA INTERCONNECT 3/17 16 NOVEMBER 2015 Table of contents 1. Introduction Version Requirements Interconnect Overview Techila Interconnect Network Using Suitable Techila Workers in Your Interconnect Project Minimum Required Amount of Techila Worker CPU Cores Interconnect Functionality InitIc SendDataToJob RecvDataFromJob CloudOp CloudBc CloudSum WaitForOthers... 17
4 TECHILA INTERCONNECT 4/17 16 NOVEMBER Introduction This document introduces the Techila interconnect feature, which enables Techila Jobs to communicate with other Jobs in the same Project. This document is intended for End-Users who wish to process computational workloads in Techila that are not embarrassingly parallel. The structure of this document is as follows Chapter 2 contains information about the minimum required versions of the Techila components that are needed in order to use the Techila interconnect feature. Chapter 3 contains a general overview of the Techila interconnect feature. Chapter 4 contains a list of commands available in the Techila interconnect feature set. Also includes a more detailed description of the each command with general examples on how to utilize the features. 2. Version Requirements In order to use the Techila interconnect functionality, your Techila environment must meet following requirements for the Techila Server, Techila Worker and Techila SDK. If you are unsure about your Techila Server and Techila Worker versions, please contact your local Techila administrator for support. Component Techila Server Techila Worker Techila SDK On-Premise Required Version Cloud Techila Virtual Server installed using installation package Techila VM or newer OR Techila Server updated with Service Pack Techila Worker installed using installer or newer OR Techila Server updated with Service Pack :39:39 or newer. Version information can be found in the VERSION file in the Techila SDK. Initial Techila Server installation performed after OR Techila Server updated with Service Pack Techila Worker deployed after OR Techila Server updated with Service Pack Same as in On-Premise.
5 TECHILA INTERCONNECT 5/17 16 NOVEMBER Interconnect Overview Techila interconnect establishes an between each Job in the Project, which enables interconnect data packages to be transferred between Jobs. This allows Techila to be used in situations where computational Jobs must be able to communicate with other Jobs in the Project. Techila Jobs - No Interconnect Techila Jobs - With Interconnect Job #1 Job #1 Job #5 Job #2 Job #5 Job #2 Job #4 Job #3 Job #4 Job #3 Figure 1. Techila interconnect establishes a network, which connects each Job in the Project with all other Jobs. This can be used to transfer interconnect data packages between specific Jobs, or to broadcast data from one Job to all other Jobs in the Project. More detailed information about different types of interconnect data transfers can be found in Chapters 4.2 and 4.5. Job-to-Job Broadcast Job #1 Job #2 Job #1 Job #2 Job #3 Job #4 Job #3 Job #4 Figure 2. Techila interconnect data packets can either be broadcasted or transferred to specific Jobs.
6 TECHILA INTERCONNECT 6/17 16 NOVEMBER 2015 Native Techila interconnect functionality is currently available for the following programming languages / frameworks: MATLAB Python R C# /.NET Please see following programming language specific guides for more information and examples: Techila with MATLAB Techila with R Techila with Python Techila with CSharp 3.1. Techila Interconnect Network When using the Techila interconnect commands in a Project, an is automatically created. This will connect each Worker that participates in the Project. The will be used to transfer interconnect data between Jobs. Jobs will have a limited amount of time to join this, before the connection will timeout. The duration of the default timeout window depends on the method used to initialize the : When InitIc command (Chapter 4.1) is called separately to initialize the, the default timeout window will be 30 seconds When InitIc command is not called separately, the timeout window will be 60 seconds If needed, these default timeout windows can be overridden by specifying the desired timeout window as an input argument to the InitIc command. If any Job in the Project fails to connect to the within the timeout window, the Project will be terminated. This is to ensure that each Job in the Project will be able to communicate with all other Jobs in the Project. Note! If you specify a timeout window with a negative value (e.g. -1) when executing the InitIc command, Job execution will be allowed to continue even if they could not join the interconnect network Using Suitable Techila Workers in Your Interconnect Project By default, Jobs from a Project can be assigned to any Worker that belongs to a Workers Group that is assigned to the End-User s Techila Account. However, there is no guarantee that all of these Techila Workers can establish an, which can cause the Project to fail. This means that when creating a Project that uses Techila interconnect commands, Jobs from the Project must be assigned to Techila Workers that are able to establish an.
7 TECHILA INTERCONNECT 7/17 16 NOVEMBER 2015 This can be achieved by specifying the name of the Worker Group that contains Workers capable of establishing s as a Project parameter. Please note that such Worker Groups must be configured by a Techila Administrator before they can be used. Please contact your Local Techila Administrator for more information about what Workers Groups in your Techila environment can be used in Projects that use the interconnect functionality Minimum Required Amount of Techila Worker CPU Cores When using the Techila interconnect commands in your code, all Jobs belonging to the Project must be able to join the within the timeout window. This means that you must have a sufficient amount of available Techila Worker CPU cores to process all Jobs at the same time. Please contact your local Techila Administrator for more information about how many Techila Worker CPU Cores capable of processing interconnect Jobs are available in your Techila environment. Below are two examples that illustrate what happens when a sufficient amount of suitable CPU cores is available and what happens when not enough CPU cores are available. Example 1: The figure below illustrates a situation where a Project consisting of two interconnect Jobs is started in a Techila environment. In this example, the Techila environment has two CPU cores available. This means that each Job can be assigned to free CPU core and is able to initialize the within the timeout window. Both CPU cores free, no Jobs assigned Project 1 Started, Jobs assigned to CPU cores Jobs start initializing the P1 J1 All Jobs connected to the. Interconnect data can be transferred P1 J1 Px Jy Free CPU Core CPU Core in use by Job y from Project x P1 J2 P1 J2 Time Figure 3. A successfully established.
8 TECHILA INTERCONNECT 8/17 16 NOVEMBER 2015 Example 2: The figure below illustrates a situation where a Job from another Project (Project 2, non-interconnect) is already running on one of the CPU cores. This means that there is only one CPU core available in the Techila environment. When Project 3, which consists of two Jobs, is started, only one Job can be assigned to a CPU core and started. This Job will then try to establish the when the interconnect commands are executed in the Worker Code. This will trigger the 30 second timeout window. After 30 seconds have passed, all Jobs from Project 3 will be automatically terminated because the was not joined by all Jobs in the Project. Initial situation. One CPU core free, one CPU core in use by a Job from Project 2. Job #1 starts initializing the. Network cannot be initialized because all Jobs are not running. 30 second timeout window starts. 30 seconds later. Only 1 Job from Project 3 running. Network could not be established. Px Jy Px Jy Free CPU Core CPU Core in use by Job y from Project x Job y from Project x waiting for available CPU core P3 J2 P3 J2 P3 J2 P3 J1 P3 J1 P3 J1 P2 J3 P2 J3 P2 J3 P2 J3 P2 J3 Time Project 3 Started. Job #1 assigned to the free CPU core. Job #2 waits for available CPU core to become available. Job 1 timeouts. All Jobs from Project 3 are removed from Workers. Figure 4. In this scenario, the could not be established successfully because all Jobs from Project 3 could not be assigned to CPU cores at the same time.
9 TECHILA INTERCONNECT 9/17 16 NOVEMBER Interconnect Functionality This Chapter contains a general description of Techila interconnect functionality that is common with all programming languages. Depending on the programming language, the described functionality is typically implemented by using a function, method or a variable. Please see the programming language specific examples for details. Please note that depending on the programming language you are using, the naming convention and syntax of the function/method/variable might be different than the one described in this document InitIc The InitIc command can be used to initialize the. This will connect each Job in the Project with all other Jobs and will allow Jobs to transfer interconnect data packets between other Jobs in the same Project. Job #1 Job #2 Job #3 Job #4 Figure 5. All-to-all. Note! The InitIc command is executed automatically when calling interconnect commands (MATLAB) or when creating interconnect objects (Python). This means that you do not need to call the InitIc command separately, unless you specifically want to do so. If using R, the InitIc command must be called separately. Calling the InitIc command separately can be useful, for example, in situations where you are testing the Techila environment and want to verify that the can be successfully established. If there is a problem with forming the between Jobs, the connection will timeout after the programming language specific timeout window. If establishing the fails, the Project will be stopped and removed. When calling the InitIc command separately, it is possible to override the default timeout window.
10 TECHILA INTERCONNECT 10/17 16 NOVEMBER SendDataToJob This command is used to send interconnect data from one Job to another Job. When executing this command, you will need to specify the target Job where the data packet will be sent. Any interconnect data packages sent with this command must be received in the target Job. In other words, a SendDataToJob command in the source Job must always be paired with a corresponding RecvDataFromJob command in the target Job. Example: The figure below illustrates a situation where Job-to-Job interconnect transfers are used to transfer words Hello and Bye between Job #1 and Job #2. After both Jobs have been started, the is established between Jobs 1 and 2. After the has been established, Job #1 will send the word Hello to Job #2. Job #2 will be listening for any data originating from Job #1. After Job #2 has received the data from Job #1, Job #2 will send the word Bye to Job #1. Job #1 will be listening for any data originating from Job #2. After the data has been received by Job #2, both Jobs continue processing and will automatically terminate the process after all remaining code in the Worker Code has been executed. Job #1 Start SendDataToJob(2,'Hello') RecvDataFromJob(2) Job#1 End connection 'Hello' 'Bye' Job #2 Start RecvDataFromJob(1) SendDataToJob(1,'Bye') Job#2 End Figure 6. Each interconnect data packet transferred with SendDataToJob command must be received with a matching RecvDataFromJob command.
11 TECHILA INTERCONNECT 11/17 16 NOVEMBER RecvDataFromJob This command is used to receive data from other Jobs that has been sent with the SendDataToJob command. When executing this command, you will need to define the source Job from which data will be received. In situations where a Job needs to receive data from multiple Jobs, each interconnect data packet (sent with the SendDataToJob ) must be received with a matching RecvDataFromJob command. Data packets will be received sequentially, in the order defined by the RecvDataFromJob commands. Example: The figure below illustrates a situation where two Jobs are sending data to one Job. Both Jobs (Job #1 and Job #3) will send the interconnect data packet at the same time to Job #2, but the interconnect data packet from Job #1 will be received first. The interconnect data packet from Job #3 will be received after the interconnect data packet from Job #1 has been received. This order is which interconnect data packets are received is defined by input arguments given to the RecvDataFromJob command. The first command that is executed is RecvDataFromJob(1), which defines that data from Job #1 will be received. The second command that is executed is RecvDataFromJob(3), which in turn defines that data from Job #3 will be received. Initialize Job #1 Start interconnect SendDataToJob(2,'Hello') Job#1 End network Interconnect network connection 'Hello' Initialize Job #2 Start interconnect RecvDataFromJob(1) RecvDataFromJob(3) Job#2 End network Interconnect network connection 'Bye' Job #3 Start Initialize interconnect network Wait for matching RecvDataFromJob, then execute: SendDataToJob(2,'Bye') Figure 7. The order in which in interconnect data packets are received is determined by the execution order of RecvDataFromJob commands. Job#3 End
12 TECHILA INTERCONNECT 12/17 16 NOVEMBER CloudOp The CloudOp command executes defined operations in all Jobs belonging to the same Project. After the operation has been executed in all Jobs, the result of the operation will be broadcasted to all Jobs and returned as the return value of the CloudOp command. This operation can for example be used to find the minimum or maximum value of a parameter that is defined in all Jobs. This operation can also be a reference to a function defined by an End- User, meaning the operations are not limited to basic arithmetic operations. When using CloudOp, data is transferred between Jobs using a binary tree structure. The figure below illustrates how the data is transferred in an example situation where six Jobs use the CloudOp operation. The numbers in the arrows indicate the order in which the transfers are executed. Arrows labeled with 1 will happen first, followed by arrows labeled with 2 and so forth. When a Job receives new data, the operation defined in CloudOp command will be executed in the Job. The result of the operation will then be sent according to the binary tree to the next Job, which will again perform the defined operation. Each Job can have only one active send or receive transmission. If multiple Jobs wish to send data to the same Job, the Jobs will transfer the data sequentially. Computational Data Aggregation Result Data Distribution Job 1 Job Job 2 Job 3 Job 2 Job Job 4 Job 5 Job 6 Job 4 Job 5 Job 6 Figure 8. The image labelled Computational Data Aggregation shows how information is transferred using a binary tree structure while the operation defined in the CloudOp command is performed. The image labelled Result Data Distribution shows how the result data is transferred to Jobs, after the operations have been completed. Below is another example illustration of what takes place in Jobs when searching for the smallest value of a variable. Each Job sets the value of variable a to be different, 10 in Job #1, 1 in Job #2 and 12 in Job #3. The CloudOp command is then used to find the smallest of these values (1),
13 TECHILA INTERCONNECT 13/17 16 NOVEMBER 2015 which will then be transferred to each Job and returned as the output value. This means that the value of variable a will be 1 in all Jobs after the command has been executed. Job #1 Start of a to 10: a=10 a=cloudop(@min,a) Value of a: 1 Job #2 Start of a to 1: a=1 a=cloudop(@min,a) Value of a: 1 Job #3 Start of a to 12: a=12 a=cloudop(@min,a) Figure 9. Example scenario where the smallest value of variable a is searched. Value of a: 1
14 TECHILA INTERCONNECT 14/17 16 NOVEMBER CloudBc The CloudBc command broadcasts data from one Job to all the other Jobs in the same Project. By default, the CloudBc command will broadcast the data from Job #1 to all other Jobs. The example figure below shows a situation where Job #1 broadcasts data to all other Jobs. Job #1 Broadcasting Job Job 2 Job Job 4 Job 5 Job 6 Figure 10. Job #1 broadcasting data using a binary tree structure. If you do not want Job #1 to broadcast the data, you can define a different Job when calling the CloudBc command. If another Job is defined to broadcast the data, the specified Job will start by sending the data to Job #1, which will then broadcast the data to all other Jobs using the binary tree structure. The example figure below shows a situation where Job #6 broadcasts data to all other Jobs. Job #6 Broadcasting Job Job 2 Job Job 4 Job 5 Job 6 Figure 11. When another Job is configured to broadcast data, the data will be transferred one additional step (to Job #1).
15 TECHILA INTERCONNECT 15/17 16 NOVEMBER 2015 Example: Below is an illustration of what takes place in Jobs when Job #3 broadcasts the value of a variable. Each Job starts by setting the value of variable a to be different: 10 in Job #1, 1 in Job #2 and 12 in Job #3. The CloudBc command is then used to broadcast the value of the variable from Job #3 to all other Jobs in the Project. This broadcasted value is returned by the CloudBc command and stored in the variable a. This means that the value of variable a will be 12 in all Jobs after the CloudBc command has been executed. Job #1 Start of a to 10: a=10 a=cloudbc(a,3) Value of a: 12 Job #2 Start of a to 1: a=1 a=cloudbc(a,3) Value of a: 12 Job #3 Start of a to 12: a=12 Figure 12.CloudBc can be used to broadcast data to all Jobs. a=cloudbc(a,3) Value of a: 12
16 TECHILA INTERCONNECT 16/17 16 NOVEMBER CloudSum The CloudSum command sums the values of variables in all Jobs and returns the summation result as the output value. Interconnect data packets are transferred by using a binary tree structure, similar to the one described in Chapter 4.4. Example: Below is an illustration of what takes place in Jobs when the values of variable a are summed. Each Job starts by setting the value of variable a to be different: 10 in Job #1, 1 in Job #2 and 12 in Job #3. The CloudSum command is then used to sum the values of variable a ( =23). The summation result is returned as the output value of the CloudSum command, which in this example is stored in variable res. The value of the res variable will be 23 in all Jobs after the CloudSum command has been executed. Job #1 Start of a to 10: a=10 res=cloudsum(a) Value of res: 23 Job #2 Start of a to 1: a=1 res=cloudsum(a) Value of res: 23 Job #3 Start of a to 12: a=12 res=clousum(a) Value of res: 23 Figure 13. CloudSum can be used to sum the value of a variable that is defined in the Worker Code and return the value of the summation to all Jobs.
17 TECHILA INTERCONNECT 17/17 16 NOVEMBER WaitForOthers The WaitForOthers command acts as a synchronization point for all the Jobs in the Project. When this command is executed in a Job, the Job will send a synchronization data package to all other Jobs in the Project. After sending the package, the Job will start to wait until it has received similar synchronization packages from all other Jobs. Example: The figure below illustrates a situation where three Jobs are performing computations that require a different amount of time to perform: 10 seconds for Job #1, 20 seconds for Job #2 and 30 seconds for Job #3. After the computations are complete, each Job will execute the WaitForOthers command, which will synchronize the Jobs and prevent any Job from continuing before all Jobs have executed the WaitForOthers command. This means that Job #1 will remain waiting for 20 seconds, Job #2 will remain waiting for 10 seconds. Job #1 Time Job #1 Start Perform computation: 10 s WaitForOthers(): Send synchronization info. Wait 20 seconds Job #1 Continues Job #2 Sync info Sync info Sync info Job #2 Start Perform computation: 20 s WaitForOthers(): Send synchronization info. Wait 10 seconds Job #2 Continues Job #3 Sync info Sync info Sync info Job #3 Start Perform computation: 30 s WaitForOthers(): Send synchronization info. Continue. Job #3 Continues Figure 14. WaitForOthers can be used to synchronize each Job in the Project.
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Quick Connect Express for Active Directory
Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,
How to Deploy Models using Statistica SVB Nodes
How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,
ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
ChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Introduction to Version Control in
Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any
Security Analytics Engine 1.0. Help Desk User Guide
2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Dell One Identity Manager Scalability and Performance
Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Quest vworkspace Virtual Desktop Extensions for Linux
Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.
Object Level Authentication
Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required
Partners in Care Welch Allyn Connex Software Development Kit License Agreement
This Software Development Kit End User ( Agreement ) is between Welch Allyn, Inc. ( Welch Allyn ) and the Customer identified in the purchase order ( Customer or You ), and it governs the Software Development
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations
New Features and Enhancements
Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements
4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note
KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
Dell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Dell One Identity Quick Connect for Cloud Services 3.6.1
Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved
Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide
Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
APPLICATION NOTE. AT16268: JD Smart Cloud Based Smart Plug Getting. Started Guide ATSAMW25. Introduction. Features
APPLICATION NOTE AT16268: JD Smart Cloud Based Smart Plug Getting Started Guide ATSAMW25 Introduction This application note aims to help readers to get started with the Atmel smart plug reference design
Desktop Authority vs. Group Policy Preferences
Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft
8.7. Resource Kit User Guide
8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under
Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated
Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary
FOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide
Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
Purchase Order Management Magento Module By:
Purchase Order Management Magento Module By: User Guide 8/1/2014 Section 1: Installation: Via your FTP program, upload the contents of the.zip you downloaded after purchase to your site s base folder.
Dell One Identity Quick Connect for Cloud Services 3.6.0
Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved
GEO Sticky DNS. GEO Sticky DNS. Feature Description
GEO Sticky DNS Feature Description VERSION: 5.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo
Top 10 Most Popular Reports in Enterprise Reporter
Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software
Promotion Model. CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010. March Hare Software Ltd
CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010 March Hare Software Ltd Legal Notices Legal Notices There are various product or company names used herein that are the trademarks, service marks, or
Dell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
Dell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Go beyond basic up/down monitoring
Go beyond basic up/down monitoring Extending the value of SCOM with Foglight for SQL Server Introduction Microsoft Systems Center Operations Manager (SCOM) allows IT professionals to manage and monitor
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
Quest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
Organized, Hybridized Network Monitoring
Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically
Quest Collaboration Services 3.5. How it Works Guide
Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
Logging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
The Top 10 Things DBAs Should Know About Toad for IBM DB2
The Top 10 Things DBAs Should Know About Toad for IBM DB2 Written by Jeff Podlasek, senior product architect, Dell Software Abstract Toad for IBM DB2 is a powerful tool for the database administrator.
Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015
Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015 THIS IS A LEGAL AGREEMENT between "you", the individual, company, or organisation utilising Procon Frostbite
TERMS AND CONDITIONS
TERMS AND CONDITIONS These Terms and Conditions are applicable to the use of this website (the Website ), regardless of how You accessed it. You or any derivation thereof, as used herein refers to a user
Cloud Identity Management Tool Quick Start Guide
Cloud Identity Management Tool Quick Start Guide Software version 2.0.0 October 2013 General Information: [email protected] Online Support: [email protected] Copyright 2013 CionSystems Inc., All
Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide
Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected
Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide
Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant [email protected] Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
Self Help Guides. Create a New User in a Domain
Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,
MODFLEX MINI GATEWAY ETHERNET USER S GUIDE
MODFLEX MINI GATEWAY ETHERNET Last updated March 15 th, 2012 330-0076-R1.0 Copyright 2011-2012 LS Research, LLC Page 1 of 19 Table of Contents 1 Introduction... 3 1.1 Purpose & Scope... 3 1.2 Applicable
MAGNAVIEW SOFTWARE SUPPORT & MAINTENANCE. TERMS & CONDITIONS September 3, 2015 version
MAGNAVIEW SOFTWARE SUPPORT & MAINTENANCE TERMS & CONDITIONS September 3, 2015 version DEFINITIONS Agreement means (i) these Software Support & Maintenance Terms & Conditions, (ii) any exhibits and amendments
SharePlex for SQL Server
SharePlex for SQL Server Improving analytics and reporting with near real-time data replication Written by Susan Wong, principal solutions architect, Dell Software Abstract Many organizations today rely
Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide
Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
Copy Tool For Dynamics CRM 2013
Copy Tool For Dynamics CRM 2013 Page 1 of 15 Copy Tool 2013 Copyright Warranty disclaimer Limitation of liability License agreement Copyright 2013 Dynamics Professional Solutions. All rights reserved.
Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide
Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
CA Nimsoft Monitor. Probe Guide for Performance Collector. perfmon v1.5 series
CA Nimsoft Monitor Probe Guide for Performance Collector perfmon v1.5 series CA Nimsoft Monitor Copyright Notice This online help system (the "System") is for your informational purposes only and is subject
Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview
Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview May 2015 Overview Functional highlights Functional details Legal notices Overview Support for Dell SonicWALL malware detection
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
END- USER LICENSE AGREEMENT FOR Helpdesk Pilot
END- USER LICENSE AGREEMENT FOR Helpdesk Pilot Last Updated: 01st May 2014 IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE CONTINUING WITH THIS PROGRAM INSTALL.
Hyper-V Installation Guide. Version 8.0.0
Hyper-V Installation Guide Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Documentation and Training... 1 1.3. About the AXS GUARD... 1 1.3.1. Introduction... 1
How To Use Shareplex
Data consolidation and distribution with SharePlex database replication Written by Sujith Kumar, Chief Technologist Executive summary In today s fast-paced mobile age, data continues to accrue by leaps
RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES
RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES The following constitute the terms and conditions of access and use of the Services, as defined hereunder, which shall be deemed to have been read and
Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide
Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
Software Hosting and End-User License Subscription Agreement
Software Hosting and End-User License Subscription Agreement (Last Updated October 31, 2015) IMPORTANT! The Contrail software (the "SOFTWARE") that you seek to use was developed by OneRain Incorporated
Terms and Conditions- OnAER Remote Monitoring Service
Terms and Conditions- OnAER Remote Monitoring Service TERMS OF SERVICE Please read these terms of user ( Agreement or Terms of Service ) carefully before using the services offered by AERCO International,
Identifying Problematic SQL in Sybase ASE. Abstract. Introduction
Identifying Problematic SQL in Sybase ASE Written by Darren Mallette, Senior Technical Consultant, Dell Software Abstract Database administrators (DBAs), developers, quality assurance (QA) analysts and
High Availability Configuration Guide Version 9
High Availability Configuration Guide Version 9 Document version 9402-1.0-08/11/2006 2 HA Configuration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
AvePoint Tags 1.1 for Microsoft Dynamics CRM. Installation and Configuration Guide
AvePoint Tags 1.1 for Microsoft Dynamics CRM Installation and Configuration Guide Revision G Issued August 2014 Table of Contents About AvePoint Tags for Microsoft Dynamics CRM... 3 Required Permissions...
Understanding and Configuring Password Manager for Maximum Benefits
Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password
Dell One Identity Manager 7.0. Help Desk Module Administration Guide
Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure
Host OS Compatibility Guide
Host OS Compatibility Guide Last Updated: December 16, 2014 For more information go to vmware.com. Host Operating System Compatibility Microsoft Windows 7 Supported s Windows 7 vsphere Client (Windows)4.1
ALM Works End-User License Agreement for Structure Plugin
ALM Works End-User License Agreement for Structure Plugin IMPORTANT - READ CAREFULLY: This End-User License Agreement (EULA) is a legal agreement between you (either an individual or a single legal entity)
MDM Zinc 3.0 End User License Agreement (EULA)
MDM Zinc 3.0 End User License Agreement (EULA) THIS AGREEMENT (or "EULA") IS A LEGAL AGREEMENT BETWEEN THE PERSON, COMPANY, OR ORGANIZATION THAT HAS LICENSED THIS SOFTWARE ("YOU" OR "CUSTOMER") AND MULTIDMEDIA
Virtual LAN Configuration Guide Version 9
Virtual LAN Configuration Guide Version 9 Document version 96-1.0-12/05/2009 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement
Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement IMPORTANT: DO NOT INSTALL THE ENCLOSED OR DOWNLOADED SOFTWARE UNTIL YOU HAVE READ THIS PERVASIVE PSQL LICENSE AGREEMENT ( AGREEMENT
2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
Foglight. Managing Hyper-V Systems User and Reference Guide
Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
ZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
Using the RS232 serial evaluation boards on a USB port
Document information Info Content Keywords Serial evaluation Board, PN512,PN532, MFRC663, MFRC522, MFRC523, MFRC52x, MFRD522, MFRD523, MFRD52x MIFARE Contactless Smart Card Reader Reference Design, MIFARE
LS Retail Customer Agreement for Software Products in Microsoft Managed Service
LS Retail Customer Agreement for Software Products in Microsoft Managed Service This Customer Agreement governs the Customer s use of an LS Retail Software Product (hereafter the Software Product ). The
Self Help Guides. Setup Exchange Email with Outlook
Self Help Guides Setup Exchange Email with Outlook Setting up Exchange Email Connection This document is to be used as a guide to setting up an Exchange Email connection with Outlook; 1. Microsoft Outlook
Remote Firewall Deployment
StoneGate How-To Remote Firewall Deployment StoneGate Firewall 3.0 and Management Center 3.5 Table of Contents The Scenario............................... page 3 Adjusting the Access Rules and NAT rules..........
ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT
ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT (THIS AGREEMENT ) IS DATED FOR REFERENCE PURPOSES ONLY AS OF MARCH 26, 2009, AND IS BY AND BETWEEN ALL WEATHER,
