TECHILA INTERCONNECT END-USER GUIDE

Size: px
Start display at page:

Download "TECHILA INTERCONNECT END-USER GUIDE"

Transcription

1 TECHILA INTERCONNECT END-USER GUIDE 16 NOVEMBER 2015

2 TECHILA INTERCONNECT 2/17 16 NOVEMBER 2015 Disclaimer Techila Technologies Ltd. disclaims any and all warranties, express, implied or statutory regarding this document or the use of thereof by you to the full extent permitted by law. Without limiting the generality of the foregoing, this document provided by Techila Technologies Ltd. in connection therewith are provided as-is and without warranties of any kind, including, without limitation, any warranties of performance or implied warranties of merchantability, fitness for a particular purpose, title and noninfringement. Further, Techila Technologies Ltd. does not make, and has not made, any presentation or warranty that the document is accurate, complete, reliable, current, error-free, or free from harmful information. Limitation of Liability In no event shall Techila Technologies Ltd. or any of its respective directors, officers, employees, or agents, be liable to you or any other person or entity, under any theory, including without limitation negligence, for damages of any kind arising from or related to the application of this document or any information, content, or materials in or accessible through this document, including, but not limited to, direct, indirect, actual, incidental, punitive, special or consequential damages, lost income, revenue or profits, lost or damaged data, or other commercial or economic loss, that result from your use of, or inability to use, this document, even if any of those persons or entities have been advised of the possibility of such damages or such damages are foreseeable. Use of this document and copyright No part of this document may be used, reproduced, modified, or transmitted in any form or means without the prior written permission of Techila Technologies. This document and the product it describes are considered protected by copyrights and other intellectual property rights according to the applicable laws. Techila, Techila Grid, and the Techila logo are either registered trademarks or trademarks of Techila Technologies Ltd in the European Union, in the United States and/or other countries. All other trademarks are the property of their respective owners. Copyright Techila Technologies Ltd All rights reserved.

3 TECHILA INTERCONNECT 3/17 16 NOVEMBER 2015 Table of contents 1. Introduction Version Requirements Interconnect Overview Techila Interconnect Network Using Suitable Techila Workers in Your Interconnect Project Minimum Required Amount of Techila Worker CPU Cores Interconnect Functionality InitIc SendDataToJob RecvDataFromJob CloudOp CloudBc CloudSum WaitForOthers... 17

4 TECHILA INTERCONNECT 4/17 16 NOVEMBER Introduction This document introduces the Techila interconnect feature, which enables Techila Jobs to communicate with other Jobs in the same Project. This document is intended for End-Users who wish to process computational workloads in Techila that are not embarrassingly parallel. The structure of this document is as follows Chapter 2 contains information about the minimum required versions of the Techila components that are needed in order to use the Techila interconnect feature. Chapter 3 contains a general overview of the Techila interconnect feature. Chapter 4 contains a list of commands available in the Techila interconnect feature set. Also includes a more detailed description of the each command with general examples on how to utilize the features. 2. Version Requirements In order to use the Techila interconnect functionality, your Techila environment must meet following requirements for the Techila Server, Techila Worker and Techila SDK. If you are unsure about your Techila Server and Techila Worker versions, please contact your local Techila administrator for support. Component Techila Server Techila Worker Techila SDK On-Premise Required Version Cloud Techila Virtual Server installed using installation package Techila VM or newer OR Techila Server updated with Service Pack Techila Worker installed using installer or newer OR Techila Server updated with Service Pack :39:39 or newer. Version information can be found in the VERSION file in the Techila SDK. Initial Techila Server installation performed after OR Techila Server updated with Service Pack Techila Worker deployed after OR Techila Server updated with Service Pack Same as in On-Premise.

5 TECHILA INTERCONNECT 5/17 16 NOVEMBER Interconnect Overview Techila interconnect establishes an between each Job in the Project, which enables interconnect data packages to be transferred between Jobs. This allows Techila to be used in situations where computational Jobs must be able to communicate with other Jobs in the Project. Techila Jobs - No Interconnect Techila Jobs - With Interconnect Job #1 Job #1 Job #5 Job #2 Job #5 Job #2 Job #4 Job #3 Job #4 Job #3 Figure 1. Techila interconnect establishes a network, which connects each Job in the Project with all other Jobs. This can be used to transfer interconnect data packages between specific Jobs, or to broadcast data from one Job to all other Jobs in the Project. More detailed information about different types of interconnect data transfers can be found in Chapters 4.2 and 4.5. Job-to-Job Broadcast Job #1 Job #2 Job #1 Job #2 Job #3 Job #4 Job #3 Job #4 Figure 2. Techila interconnect data packets can either be broadcasted or transferred to specific Jobs.

6 TECHILA INTERCONNECT 6/17 16 NOVEMBER 2015 Native Techila interconnect functionality is currently available for the following programming languages / frameworks: MATLAB Python R C# /.NET Please see following programming language specific guides for more information and examples: Techila with MATLAB Techila with R Techila with Python Techila with CSharp 3.1. Techila Interconnect Network When using the Techila interconnect commands in a Project, an is automatically created. This will connect each Worker that participates in the Project. The will be used to transfer interconnect data between Jobs. Jobs will have a limited amount of time to join this, before the connection will timeout. The duration of the default timeout window depends on the method used to initialize the : When InitIc command (Chapter 4.1) is called separately to initialize the, the default timeout window will be 30 seconds When InitIc command is not called separately, the timeout window will be 60 seconds If needed, these default timeout windows can be overridden by specifying the desired timeout window as an input argument to the InitIc command. If any Job in the Project fails to connect to the within the timeout window, the Project will be terminated. This is to ensure that each Job in the Project will be able to communicate with all other Jobs in the Project. Note! If you specify a timeout window with a negative value (e.g. -1) when executing the InitIc command, Job execution will be allowed to continue even if they could not join the interconnect network Using Suitable Techila Workers in Your Interconnect Project By default, Jobs from a Project can be assigned to any Worker that belongs to a Workers Group that is assigned to the End-User s Techila Account. However, there is no guarantee that all of these Techila Workers can establish an, which can cause the Project to fail. This means that when creating a Project that uses Techila interconnect commands, Jobs from the Project must be assigned to Techila Workers that are able to establish an.

7 TECHILA INTERCONNECT 7/17 16 NOVEMBER 2015 This can be achieved by specifying the name of the Worker Group that contains Workers capable of establishing s as a Project parameter. Please note that such Worker Groups must be configured by a Techila Administrator before they can be used. Please contact your Local Techila Administrator for more information about what Workers Groups in your Techila environment can be used in Projects that use the interconnect functionality Minimum Required Amount of Techila Worker CPU Cores When using the Techila interconnect commands in your code, all Jobs belonging to the Project must be able to join the within the timeout window. This means that you must have a sufficient amount of available Techila Worker CPU cores to process all Jobs at the same time. Please contact your local Techila Administrator for more information about how many Techila Worker CPU Cores capable of processing interconnect Jobs are available in your Techila environment. Below are two examples that illustrate what happens when a sufficient amount of suitable CPU cores is available and what happens when not enough CPU cores are available. Example 1: The figure below illustrates a situation where a Project consisting of two interconnect Jobs is started in a Techila environment. In this example, the Techila environment has two CPU cores available. This means that each Job can be assigned to free CPU core and is able to initialize the within the timeout window. Both CPU cores free, no Jobs assigned Project 1 Started, Jobs assigned to CPU cores Jobs start initializing the P1 J1 All Jobs connected to the. Interconnect data can be transferred P1 J1 Px Jy Free CPU Core CPU Core in use by Job y from Project x P1 J2 P1 J2 Time Figure 3. A successfully established.

8 TECHILA INTERCONNECT 8/17 16 NOVEMBER 2015 Example 2: The figure below illustrates a situation where a Job from another Project (Project 2, non-interconnect) is already running on one of the CPU cores. This means that there is only one CPU core available in the Techila environment. When Project 3, which consists of two Jobs, is started, only one Job can be assigned to a CPU core and started. This Job will then try to establish the when the interconnect commands are executed in the Worker Code. This will trigger the 30 second timeout window. After 30 seconds have passed, all Jobs from Project 3 will be automatically terminated because the was not joined by all Jobs in the Project. Initial situation. One CPU core free, one CPU core in use by a Job from Project 2. Job #1 starts initializing the. Network cannot be initialized because all Jobs are not running. 30 second timeout window starts. 30 seconds later. Only 1 Job from Project 3 running. Network could not be established. Px Jy Px Jy Free CPU Core CPU Core in use by Job y from Project x Job y from Project x waiting for available CPU core P3 J2 P3 J2 P3 J2 P3 J1 P3 J1 P3 J1 P2 J3 P2 J3 P2 J3 P2 J3 P2 J3 Time Project 3 Started. Job #1 assigned to the free CPU core. Job #2 waits for available CPU core to become available. Job 1 timeouts. All Jobs from Project 3 are removed from Workers. Figure 4. In this scenario, the could not be established successfully because all Jobs from Project 3 could not be assigned to CPU cores at the same time.

9 TECHILA INTERCONNECT 9/17 16 NOVEMBER Interconnect Functionality This Chapter contains a general description of Techila interconnect functionality that is common with all programming languages. Depending on the programming language, the described functionality is typically implemented by using a function, method or a variable. Please see the programming language specific examples for details. Please note that depending on the programming language you are using, the naming convention and syntax of the function/method/variable might be different than the one described in this document InitIc The InitIc command can be used to initialize the. This will connect each Job in the Project with all other Jobs and will allow Jobs to transfer interconnect data packets between other Jobs in the same Project. Job #1 Job #2 Job #3 Job #4 Figure 5. All-to-all. Note! The InitIc command is executed automatically when calling interconnect commands (MATLAB) or when creating interconnect objects (Python). This means that you do not need to call the InitIc command separately, unless you specifically want to do so. If using R, the InitIc command must be called separately. Calling the InitIc command separately can be useful, for example, in situations where you are testing the Techila environment and want to verify that the can be successfully established. If there is a problem with forming the between Jobs, the connection will timeout after the programming language specific timeout window. If establishing the fails, the Project will be stopped and removed. When calling the InitIc command separately, it is possible to override the default timeout window.

10 TECHILA INTERCONNECT 10/17 16 NOVEMBER SendDataToJob This command is used to send interconnect data from one Job to another Job. When executing this command, you will need to specify the target Job where the data packet will be sent. Any interconnect data packages sent with this command must be received in the target Job. In other words, a SendDataToJob command in the source Job must always be paired with a corresponding RecvDataFromJob command in the target Job. Example: The figure below illustrates a situation where Job-to-Job interconnect transfers are used to transfer words Hello and Bye between Job #1 and Job #2. After both Jobs have been started, the is established between Jobs 1 and 2. After the has been established, Job #1 will send the word Hello to Job #2. Job #2 will be listening for any data originating from Job #1. After Job #2 has received the data from Job #1, Job #2 will send the word Bye to Job #1. Job #1 will be listening for any data originating from Job #2. After the data has been received by Job #2, both Jobs continue processing and will automatically terminate the process after all remaining code in the Worker Code has been executed. Job #1 Start SendDataToJob(2,'Hello') RecvDataFromJob(2) Job#1 End connection 'Hello' 'Bye' Job #2 Start RecvDataFromJob(1) SendDataToJob(1,'Bye') Job#2 End Figure 6. Each interconnect data packet transferred with SendDataToJob command must be received with a matching RecvDataFromJob command.

11 TECHILA INTERCONNECT 11/17 16 NOVEMBER RecvDataFromJob This command is used to receive data from other Jobs that has been sent with the SendDataToJob command. When executing this command, you will need to define the source Job from which data will be received. In situations where a Job needs to receive data from multiple Jobs, each interconnect data packet (sent with the SendDataToJob ) must be received with a matching RecvDataFromJob command. Data packets will be received sequentially, in the order defined by the RecvDataFromJob commands. Example: The figure below illustrates a situation where two Jobs are sending data to one Job. Both Jobs (Job #1 and Job #3) will send the interconnect data packet at the same time to Job #2, but the interconnect data packet from Job #1 will be received first. The interconnect data packet from Job #3 will be received after the interconnect data packet from Job #1 has been received. This order is which interconnect data packets are received is defined by input arguments given to the RecvDataFromJob command. The first command that is executed is RecvDataFromJob(1), which defines that data from Job #1 will be received. The second command that is executed is RecvDataFromJob(3), which in turn defines that data from Job #3 will be received. Initialize Job #1 Start interconnect SendDataToJob(2,'Hello') Job#1 End network Interconnect network connection 'Hello' Initialize Job #2 Start interconnect RecvDataFromJob(1) RecvDataFromJob(3) Job#2 End network Interconnect network connection 'Bye' Job #3 Start Initialize interconnect network Wait for matching RecvDataFromJob, then execute: SendDataToJob(2,'Bye') Figure 7. The order in which in interconnect data packets are received is determined by the execution order of RecvDataFromJob commands. Job#3 End

12 TECHILA INTERCONNECT 12/17 16 NOVEMBER CloudOp The CloudOp command executes defined operations in all Jobs belonging to the same Project. After the operation has been executed in all Jobs, the result of the operation will be broadcasted to all Jobs and returned as the return value of the CloudOp command. This operation can for example be used to find the minimum or maximum value of a parameter that is defined in all Jobs. This operation can also be a reference to a function defined by an End- User, meaning the operations are not limited to basic arithmetic operations. When using CloudOp, data is transferred between Jobs using a binary tree structure. The figure below illustrates how the data is transferred in an example situation where six Jobs use the CloudOp operation. The numbers in the arrows indicate the order in which the transfers are executed. Arrows labeled with 1 will happen first, followed by arrows labeled with 2 and so forth. When a Job receives new data, the operation defined in CloudOp command will be executed in the Job. The result of the operation will then be sent according to the binary tree to the next Job, which will again perform the defined operation. Each Job can have only one active send or receive transmission. If multiple Jobs wish to send data to the same Job, the Jobs will transfer the data sequentially. Computational Data Aggregation Result Data Distribution Job 1 Job Job 2 Job 3 Job 2 Job Job 4 Job 5 Job 6 Job 4 Job 5 Job 6 Figure 8. The image labelled Computational Data Aggregation shows how information is transferred using a binary tree structure while the operation defined in the CloudOp command is performed. The image labelled Result Data Distribution shows how the result data is transferred to Jobs, after the operations have been completed. Below is another example illustration of what takes place in Jobs when searching for the smallest value of a variable. Each Job sets the value of variable a to be different, 10 in Job #1, 1 in Job #2 and 12 in Job #3. The CloudOp command is then used to find the smallest of these values (1),

13 TECHILA INTERCONNECT 13/17 16 NOVEMBER 2015 which will then be transferred to each Job and returned as the output value. This means that the value of variable a will be 1 in all Jobs after the command has been executed. Job #1 Start of a to 10: a=10 a=cloudop(@min,a) Value of a: 1 Job #2 Start of a to 1: a=1 a=cloudop(@min,a) Value of a: 1 Job #3 Start of a to 12: a=12 a=cloudop(@min,a) Figure 9. Example scenario where the smallest value of variable a is searched. Value of a: 1

14 TECHILA INTERCONNECT 14/17 16 NOVEMBER CloudBc The CloudBc command broadcasts data from one Job to all the other Jobs in the same Project. By default, the CloudBc command will broadcast the data from Job #1 to all other Jobs. The example figure below shows a situation where Job #1 broadcasts data to all other Jobs. Job #1 Broadcasting Job Job 2 Job Job 4 Job 5 Job 6 Figure 10. Job #1 broadcasting data using a binary tree structure. If you do not want Job #1 to broadcast the data, you can define a different Job when calling the CloudBc command. If another Job is defined to broadcast the data, the specified Job will start by sending the data to Job #1, which will then broadcast the data to all other Jobs using the binary tree structure. The example figure below shows a situation where Job #6 broadcasts data to all other Jobs. Job #6 Broadcasting Job Job 2 Job Job 4 Job 5 Job 6 Figure 11. When another Job is configured to broadcast data, the data will be transferred one additional step (to Job #1).

15 TECHILA INTERCONNECT 15/17 16 NOVEMBER 2015 Example: Below is an illustration of what takes place in Jobs when Job #3 broadcasts the value of a variable. Each Job starts by setting the value of variable a to be different: 10 in Job #1, 1 in Job #2 and 12 in Job #3. The CloudBc command is then used to broadcast the value of the variable from Job #3 to all other Jobs in the Project. This broadcasted value is returned by the CloudBc command and stored in the variable a. This means that the value of variable a will be 12 in all Jobs after the CloudBc command has been executed. Job #1 Start of a to 10: a=10 a=cloudbc(a,3) Value of a: 12 Job #2 Start of a to 1: a=1 a=cloudbc(a,3) Value of a: 12 Job #3 Start of a to 12: a=12 Figure 12.CloudBc can be used to broadcast data to all Jobs. a=cloudbc(a,3) Value of a: 12

16 TECHILA INTERCONNECT 16/17 16 NOVEMBER CloudSum The CloudSum command sums the values of variables in all Jobs and returns the summation result as the output value. Interconnect data packets are transferred by using a binary tree structure, similar to the one described in Chapter 4.4. Example: Below is an illustration of what takes place in Jobs when the values of variable a are summed. Each Job starts by setting the value of variable a to be different: 10 in Job #1, 1 in Job #2 and 12 in Job #3. The CloudSum command is then used to sum the values of variable a ( =23). The summation result is returned as the output value of the CloudSum command, which in this example is stored in variable res. The value of the res variable will be 23 in all Jobs after the CloudSum command has been executed. Job #1 Start of a to 10: a=10 res=cloudsum(a) Value of res: 23 Job #2 Start of a to 1: a=1 res=cloudsum(a) Value of res: 23 Job #3 Start of a to 12: a=12 res=clousum(a) Value of res: 23 Figure 13. CloudSum can be used to sum the value of a variable that is defined in the Worker Code and return the value of the summation to all Jobs.

17 TECHILA INTERCONNECT 17/17 16 NOVEMBER WaitForOthers The WaitForOthers command acts as a synchronization point for all the Jobs in the Project. When this command is executed in a Job, the Job will send a synchronization data package to all other Jobs in the Project. After sending the package, the Job will start to wait until it has received similar synchronization packages from all other Jobs. Example: The figure below illustrates a situation where three Jobs are performing computations that require a different amount of time to perform: 10 seconds for Job #1, 20 seconds for Job #2 and 30 seconds for Job #3. After the computations are complete, each Job will execute the WaitForOthers command, which will synchronize the Jobs and prevent any Job from continuing before all Jobs have executed the WaitForOthers command. This means that Job #1 will remain waiting for 20 seconds, Job #2 will remain waiting for 10 seconds. Job #1 Time Job #1 Start Perform computation: 10 s WaitForOthers(): Send synchronization info. Wait 20 seconds Job #1 Continues Job #2 Sync info Sync info Sync info Job #2 Start Perform computation: 20 s WaitForOthers(): Send synchronization info. Wait 10 seconds Job #2 Continues Job #3 Sync info Sync info Sync info Job #3 Start Perform computation: 30 s WaitForOthers(): Send synchronization info. Continue. Job #3 Continues Figure 14. WaitForOthers can be used to synchronize each Job in the Project.

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Quick Connect Express for Active Directory

Quick Connect Express for Active Directory Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

How to Deploy Models using Statistica SVB Nodes

How to Deploy Models using Statistica SVB Nodes How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Introduction to Version Control in

Introduction to Version Control in Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell One Identity Manager Scalability and Performance

Dell One Identity Manager Scalability and Performance Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

Object Level Authentication

Object Level Authentication Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required

More information

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

Partners in Care Welch Allyn Connex Software Development Kit License Agreement This Software Development Kit End User ( Agreement ) is between Welch Allyn, Inc. ( Welch Allyn ) and the Customer identified in the purchase order ( Customer or You ), and it governs the Software Development

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

New Features and Enhancements

New Features and Enhancements Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Dell One Identity Quick Connect for Cloud Services 3.6.1

Dell One Identity Quick Connect for Cloud Services 3.6.1 Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

APPLICATION NOTE. AT16268: JD Smart Cloud Based Smart Plug Getting. Started Guide ATSAMW25. Introduction. Features

APPLICATION NOTE. AT16268: JD Smart Cloud Based Smart Plug Getting. Started Guide ATSAMW25. Introduction. Features APPLICATION NOTE AT16268: JD Smart Cloud Based Smart Plug Getting Started Guide ATSAMW25 Introduction This application note aims to help readers to get started with the Atmel smart plug reference design

More information

Desktop Authority vs. Group Policy Preferences

Desktop Authority vs. Group Policy Preferences Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Purchase Order Management Magento Module By:

Purchase Order Management Magento Module By: Purchase Order Management Magento Module By: User Guide 8/1/2014 Section 1: Installation: Via your FTP program, upload the contents of the.zip you downloaded after purchase to your site s base folder.

More information

Dell One Identity Quick Connect for Cloud Services 3.6.0

Dell One Identity Quick Connect for Cloud Services 3.6.0 Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

GEO Sticky DNS. GEO Sticky DNS. Feature Description

GEO Sticky DNS. GEO Sticky DNS. Feature Description GEO Sticky DNS Feature Description VERSION: 5.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

Top 10 Most Popular Reports in Enterprise Reporter

Top 10 Most Popular Reports in Enterprise Reporter Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software

More information

Promotion Model. CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010. March Hare Software Ltd

Promotion Model. CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010. March Hare Software Ltd CVS SUITE QUICK GUIDE 2009 Build 3701 February 2010 March Hare Software Ltd Legal Notices Legal Notices There are various product or company names used herein that are the trademarks, service marks, or

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Go beyond basic up/down monitoring

Go beyond basic up/down monitoring Go beyond basic up/down monitoring Extending the value of SCOM with Foglight for SQL Server Introduction Microsoft Systems Center Operations Manager (SCOM) allows IT professionals to manage and monitor

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Organized, Hybridized Network Monitoring

Organized, Hybridized Network Monitoring Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Logging and Alerting for the Cloud

Logging and Alerting for the Cloud Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

The Top 10 Things DBAs Should Know About Toad for IBM DB2

The Top 10 Things DBAs Should Know About Toad for IBM DB2 The Top 10 Things DBAs Should Know About Toad for IBM DB2 Written by Jeff Podlasek, senior product architect, Dell Software Abstract Toad for IBM DB2 is a powerful tool for the database administrator.

More information

Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015

Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015 Procon Frostbite 1.1 and subsequent releases End User License Agreement Revised: April 7, 2015 THIS IS A LEGAL AGREEMENT between "you", the individual, company, or organisation utilising Procon Frostbite

More information

TERMS AND CONDITIONS

TERMS AND CONDITIONS TERMS AND CONDITIONS These Terms and Conditions are applicable to the use of this website (the Website ), regardless of how You accessed it. You or any derivation thereof, as used herein refers to a user

More information

Cloud Identity Management Tool Quick Start Guide

Cloud Identity Management Tool Quick Start Guide Cloud Identity Management Tool Quick Start Guide Software version 2.0.0 October 2013 General Information: [email protected] Online Support: [email protected] Copyright 2013 CionSystems Inc., All

More information

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant [email protected] Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

Self Help Guides. Create a New User in a Domain

Self Help Guides. Create a New User in a Domain Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,

More information

MODFLEX MINI GATEWAY ETHERNET USER S GUIDE

MODFLEX MINI GATEWAY ETHERNET USER S GUIDE MODFLEX MINI GATEWAY ETHERNET Last updated March 15 th, 2012 330-0076-R1.0 Copyright 2011-2012 LS Research, LLC Page 1 of 19 Table of Contents 1 Introduction... 3 1.1 Purpose & Scope... 3 1.2 Applicable

More information

MAGNAVIEW SOFTWARE SUPPORT & MAINTENANCE. TERMS & CONDITIONS September 3, 2015 version

MAGNAVIEW SOFTWARE SUPPORT & MAINTENANCE. TERMS & CONDITIONS September 3, 2015 version MAGNAVIEW SOFTWARE SUPPORT & MAINTENANCE TERMS & CONDITIONS September 3, 2015 version DEFINITIONS Agreement means (i) these Software Support & Maintenance Terms & Conditions, (ii) any exhibits and amendments

More information

SharePlex for SQL Server

SharePlex for SQL Server SharePlex for SQL Server Improving analytics and reporting with near real-time data replication Written by Susan Wong, principal solutions architect, Dell Software Abstract Many organizations today rely

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Copy Tool For Dynamics CRM 2013

Copy Tool For Dynamics CRM 2013 Copy Tool For Dynamics CRM 2013 Page 1 of 15 Copy Tool 2013 Copyright Warranty disclaimer Limitation of liability License agreement Copyright 2013 Dynamics Professional Solutions. All rights reserved.

More information

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide

Dell NetVault Backup Plug-in for SharePoint 1.3. User s Guide Dell NetVault Backup Plug-in for 1.3 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

CA Nimsoft Monitor. Probe Guide for Performance Collector. perfmon v1.5 series

CA Nimsoft Monitor. Probe Guide for Performance Collector. perfmon v1.5 series CA Nimsoft Monitor Probe Guide for Performance Collector perfmon v1.5 series CA Nimsoft Monitor Copyright Notice This online help system (the "System") is for your informational purposes only and is subject

More information

Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview

Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview May 2015 Overview Functional highlights Functional details Legal notices Overview Support for Dell SonicWALL malware detection

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com

More information

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

END- USER LICENSE AGREEMENT FOR Helpdesk Pilot

END- USER LICENSE AGREEMENT FOR Helpdesk Pilot END- USER LICENSE AGREEMENT FOR Helpdesk Pilot Last Updated: 01st May 2014 IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE CONTINUING WITH THIS PROGRAM INSTALL.

More information

Hyper-V Installation Guide. Version 8.0.0

Hyper-V Installation Guide. Version 8.0.0 Hyper-V Installation Guide Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Documentation and Training... 1 1.3. About the AXS GUARD... 1 1.3.1. Introduction... 1

More information

How To Use Shareplex

How To Use Shareplex Data consolidation and distribution with SharePlex database replication Written by Sujith Kumar, Chief Technologist Executive summary In today s fast-paced mobile age, data continues to accrue by leaps

More information

RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES

RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES The following constitute the terms and conditions of access and use of the Services, as defined hereunder, which shall be deemed to have been read and

More information

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Software Hosting and End-User License Subscription Agreement

Software Hosting and End-User License Subscription Agreement Software Hosting and End-User License Subscription Agreement (Last Updated October 31, 2015) IMPORTANT! The Contrail software (the "SOFTWARE") that you seek to use was developed by OneRain Incorporated

More information

Terms and Conditions- OnAER Remote Monitoring Service

Terms and Conditions- OnAER Remote Monitoring Service Terms and Conditions- OnAER Remote Monitoring Service TERMS OF SERVICE Please read these terms of user ( Agreement or Terms of Service ) carefully before using the services offered by AERCO International,

More information

Identifying Problematic SQL in Sybase ASE. Abstract. Introduction

Identifying Problematic SQL in Sybase ASE. Abstract. Introduction Identifying Problematic SQL in Sybase ASE Written by Darren Mallette, Senior Technical Consultant, Dell Software Abstract Database administrators (DBAs), developers, quality assurance (QA) analysts and

More information

High Availability Configuration Guide Version 9

High Availability Configuration Guide Version 9 High Availability Configuration Guide Version 9 Document version 9402-1.0-08/11/2006 2 HA Configuration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

AvePoint Tags 1.1 for Microsoft Dynamics CRM. Installation and Configuration Guide

AvePoint Tags 1.1 for Microsoft Dynamics CRM. Installation and Configuration Guide AvePoint Tags 1.1 for Microsoft Dynamics CRM Installation and Configuration Guide Revision G Issued August 2014 Table of Contents About AvePoint Tags for Microsoft Dynamics CRM... 3 Required Permissions...

More information

Understanding and Configuring Password Manager for Maximum Benefits

Understanding and Configuring Password Manager for Maximum Benefits Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password

More information

Dell One Identity Manager 7.0. Help Desk Module Administration Guide

Dell One Identity Manager 7.0. Help Desk Module Administration Guide Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Host OS Compatibility Guide

Host OS Compatibility Guide Host OS Compatibility Guide Last Updated: December 16, 2014 For more information go to vmware.com. Host Operating System Compatibility Microsoft Windows 7 Supported s Windows 7 vsphere Client (Windows)4.1

More information

ALM Works End-User License Agreement for Structure Plugin

ALM Works End-User License Agreement for Structure Plugin ALM Works End-User License Agreement for Structure Plugin IMPORTANT - READ CAREFULLY: This End-User License Agreement (EULA) is a legal agreement between you (either an individual or a single legal entity)

More information

MDM Zinc 3.0 End User License Agreement (EULA)

MDM Zinc 3.0 End User License Agreement (EULA) MDM Zinc 3.0 End User License Agreement (EULA) THIS AGREEMENT (or "EULA") IS A LEGAL AGREEMENT BETWEEN THE PERSON, COMPANY, OR ORGANIZATION THAT HAS LICENSED THIS SOFTWARE ("YOU" OR "CUSTOMER") AND MULTIDMEDIA

More information

Virtual LAN Configuration Guide Version 9

Virtual LAN Configuration Guide Version 9 Virtual LAN Configuration Guide Version 9 Document version 96-1.0-12/05/2009 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,

More information

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement IMPORTANT: DO NOT INSTALL THE ENCLOSED OR DOWNLOADED SOFTWARE UNTIL YOU HAVE READ THIS PERVASIVE PSQL LICENSE AGREEMENT ( AGREEMENT

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

Foglight. Managing Hyper-V Systems User and Reference Guide

Foglight. Managing Hyper-V Systems User and Reference Guide Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

Using the RS232 serial evaluation boards on a USB port

Using the RS232 serial evaluation boards on a USB port Document information Info Content Keywords Serial evaluation Board, PN512,PN532, MFRC663, MFRC522, MFRC523, MFRC52x, MFRD522, MFRD523, MFRD52x MIFARE Contactless Smart Card Reader Reference Design, MIFARE

More information

LS Retail Customer Agreement for Software Products in Microsoft Managed Service

LS Retail Customer Agreement for Software Products in Microsoft Managed Service LS Retail Customer Agreement for Software Products in Microsoft Managed Service This Customer Agreement governs the Customer s use of an LS Retail Software Product (hereafter the Software Product ). The

More information

Self Help Guides. Setup Exchange Email with Outlook

Self Help Guides. Setup Exchange Email with Outlook Self Help Guides Setup Exchange Email with Outlook Setting up Exchange Email Connection This document is to be used as a guide to setting up an Exchange Email connection with Outlook; 1. Microsoft Outlook

More information

Remote Firewall Deployment

Remote Firewall Deployment StoneGate How-To Remote Firewall Deployment StoneGate Firewall 3.0 and Management Center 3.5 Table of Contents The Scenario............................... page 3 Adjusting the Access Rules and NAT rules..........

More information

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT

ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT ALL WEATHER, INC. SOFTWARE END USER LICENSE AGREEMENT THIS SOFTWARE END USER LICENSE AGREEMENT (THIS AGREEMENT ) IS DATED FOR REFERENCE PURPOSES ONLY AS OF MARCH 26, 2009, AND IS BY AND BETWEEN ALL WEATHER,

More information