System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks

Size: px
Start display at page:

Download "System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks"

Transcription

1 System Requirement Specification for A Distributed Desktop Search and Document Sharing Tool for Local Area Networks OnurSoft Onur Tolga Şehitoğlu November 10, 2012 v1.0

2 Contents 1 Introduction Purpose Project Scope Definitions, Acronyms, and Abbreviations Overview Background Document Management Systems Desktop Search Tools Peer to Peer Networking Overall Description Product Perspective Product Functions User Types, Constraints and Dependencies Product Features External Interfaces Authentication File System Network Search Request Network Download Request User Interface, Search User Interface, Download User Interface, Settings User Interface, Connections User Interface, Logs Software Functions Search index construction Authentication Authorization Distributed search Distributed download

3 4.2.6 Version management Performance requirements and Design constraints Performance Security Flexibility References 20 2

4 Chapter 1 Introduction 1.1 Purpose This document describes the requirements of a distributed desktop search and document sharing software called DistShare. It aims to describe the required product features, constraints, dependencies and form a basis for design and development phases of the project. 1.2 Project Scope Document exchange among members of a project is a daily routine activity which is in the core of the project life cycle. DistShare project proposes a solution to store and share documents through peer to peer communication facilitated with distributed content (i.e. keyword, meta-data) search and authentication. DistShare is a tool to share local documents of a desktop user with other members in the local area network. It is mostly a combination of desktop search tools and document management systems. DistShare watches the documents of a local user and constructs a document index as any desktop search tool. It also keeps track of sharing properties of documents, in other words who can access the documents. Then it enables users to execute a distributed content search on all computers in the DistShare network where users can see all documents containing the search words that are accessible to them. After the search, users use DistShare peer to peer download service to receive the documents. If same documents are available on multiple hosts, it is downloaded in parallel. 3

5 1.3 Definitions, Acronyms, and Abbreviations Document management system: A platform for storing, accessing, sharing documents. Most systems include mechanisms for authentication, version control of documents. Desktop search tool: A software to keep track of documents on local disk and provides means of fast access of documents through name, metadata and content keywords. P2P: Peer to peer network. 1.4 Overview This document describes the software requirements specification for Dist- Share. In the next chapter overall description of the project, main functions, dependencies and constraints are given. In Third chapter specific requirements of the project, system interfaces, functional requirements, performance and design requirements are given. 4

6 Chapter 2 Background 2.1 Document Management Systems A document management system is a document store providing access to multiple users. They are usually realized as central web based repositories that can be accessed through web browsers. They also have remote file system links so that user will be able to access documents on repository as if they were local documents. A document management system has the following components [10]: document meta-data integration (direct access through file system or other application) indexing searching versioning storage retrieval security distribution workflow capture (printed documents, fax, OCR) collaboration publishing 5

7 reproduction First eight items above also holds in the purpose of DistShare. The remaining items are mostly related to printed documents and business flow of documents so out of the scope of this project. Content management systems are similar to document management systems that are focused on especially web content and documents. Some existing document management tools are: [1, 3, 2]. 2.2 Desktop Search Tools Desktop search tools provide quick access to documents through previously generated indexes. As number of files on local filesystems increase, searching a specific file name, file attribute or content keyword becomes a common and repeated task. In order to accelerate this operation, desktop search software generates a local index to map search items to document paths. Basic indexing items are file names and file attributes. In addition to these, meta-data of documents like singer information of a music file or author of a text file can be extracted from document content and indexed. Another type of index is reverse index of a document which maps individual words contained in the document to documents as web search engines do. A well known framework for document indexing is Lucene [7]. In order to create indexes, a desktop search tool scans all local documents and generates the database. After creating the initial index, these tools keep the index up to date through periodic rescans or listening on file change events of the system. Beagle [8], Metatracker [9] and Google desktop are example of such tools. DistShare needs to repeat most of the tasks of a desktop search tool for a group of user supplied share directories. In addition, it needs to keep track of the authentication information of the documents. 2.3 Peer to Peer Networking One major drawback of central file sharing is the large volume of data and bandwidth requirements. However on a distributed environment copies of a documents can be distributed over a group of smaller capacity hosts and on demand, it can be downloaded in parallel from multiple hosts with smaller bandwidth. This idea is realized in peer to peer networks where each client is also a server for an object and shares it through peer to peer connections in contrast to all clients containing to a single master location. This allows more resilient operation and redundancy in nature. If some of the nodes or links fail, a peer to peer network can operate on remaining nodes and links. 6

8 Objects in a peer to peer network is addressed through a Distributed Hash Table which is basically a document digest to document meta-data mapping stored, searched and redistributed among all nodes of the network. DistShare aims to let everyone share documents with everyone else in the network, it is by nature suitable for peer to peer networking. Although authentication/authorization issues needs to be solved. Also a distributed search facility is needed. There are many frameworks and tools for peer to peer networking like [4, 5, 6]. 7

9 Chapter 3 Overall Description 3.1 Product Perspective DistShare is a tool working on a desktop computer, interacting with local filesystem, user for setup and a peer to peer network for search and download facilities. It may work along with existing desktop search tools, i.e. use their databases, or maintain its own search functionality. Besides that, it will work as a self contained tool. It will have some functions of a document management system like search and retrieval of documents, marking them to be shared etc. It will use one of the existing protocols for maintaining a distributed hash table of documents and distributed search and download facilities. 3.2 Product Functions DistShare consists of the following basics tasks: 1. Search index construction 2. Authorization 3. Authentication 4. Distributed search 5. Distributed download 6. Version management Search index construction is the on demand construction and incremental maintenance of document indexes. 8

10 Authorization is setting local documents sharing features so that they will be accessible to specific group of authenticated users remotely. Otherwise documents are not going to be displayed searches initiated by other hosts, nor they will be downloadable. Authentication is the mechanism of users to prove their identity to remote hosts. DistShare needs means of making sure that the host making the request is carrying the operation on behalf of the correct users. Distributed search is the tools ability to retrieve search results from other hosts in the P2P network. A search unstated in local host is repeated on other P2P hosts and results collected. Distributed download is executed when user asks download of a searched file. If same exact file is copied across multiple hosts, it will be downloaded in parallel to utilize network bandwidth. Version control is systems ability to maintain multiple revisions of the same file. System keeps track of local changes and try to associate the file with is origin. So that when the file is searched, results with version options could be returned. 3.3 User Types, Constraints and Dependencies Users of the system is desktop users working on a local area network or Internet. All users are in the same class. Operating environment is a desktop computer. Any of Linux, Windows or MacOs can be considered as target platform. Interoperability could be expected as platform independent documents are to be shared. A desktop with graphical interfaces are expected for user friendliness. Major constraint in the system is the security. Ordinary users should not be able to access documents of the desktop user. Another constraint is the lack of central control. As in other P2P applications almost all information should be kept in network nodes, not on a central server. There should be no central control other than an authentication server. There are freely available libraries for document indexing, P2P and authentication. Project depends on such libraries. 9

11 Chapter 4 Product Features 4.1 External Interfaces Authentication Each user of software needs to be authenticated in order to access other hosts. Authentication information should be sharable among other members of the P2P network. Authentication can be operating system/workgroup based or network based. Depending on the design choices, multiple authentication mechanisms could be supported. Input is the operating system or a network service. Output is the identification of the user File System All files that are marked to be shared should be watched on the filesystem. On manual invocation, periodic invocation or as files change, system needs to update information about the file. Input is the file on a local file system and output is the database keeping search indexes Network Search Request System should wait for network requests to answer remote search requests. Input is a group of search sentence and identity of the remote user. Output is the list of matching files Network Download Request When a matched document is requested, it is served by the local file holders. Software needs to serve such requests. 10

12 Input is the file locator and identity of the remote user. Output is the file content probably in fragments User Interface, Search Major operation in graphical user interface is the search. Search operation consists of a search sentence, i.e. list of keywords to search or a specific syntax for search. This search is sent to active members of P2P network and local host. Input is the search sentence, output is the list of files that are matched, their details and their locators (locations they can be downloaded) User Interface, Download User clicks the file to be downloaded and file is downloaded from probably multiple locations. Input is the file locators, output is the file download progress and the status of the download User Interface, Settings Authorization and other settings of local files can be configured by the user. The authorization and watch settings per directory/file can be carried out in user interface. Input is the file or directory and settings to be applied User Interface, Connections Existing connections, live hosts and users should be displayed. Input is the network and system state, output is the list of hosts, users and ongoing connections User Interface, Logs History of recent activity, executed searches, remotely activated searches, downloaded files, files downloaded by remote hosts are listed. Input is the system log database, output is the list of logs. 11

13 4.2 Software Functions Search index construction Meta-data extraction For each file, software shall extract meta data and keywords and update the index accordingly. Meta-data include text documents, office documents, image, music, video and other possible meta-data types based on file type. Activated internally. Input is a file path. Based on file type, result is written on search index database. severity: must Index reconstruction On demand, software shall browse all local files and extract meta-data and construct indexes. Activated by user. Input is all files to be watched is invoked Index update When a local file under share control is updated, the database should be incrementally updated. Update can be instantaneous if system supports or through periodic rescans for changed files and updates. Activated internally by system on file change is repeated for file and database updated Authentication System authentication In case of system supporting workgroup of network based authentication trust. System authentication can provide identity. Software should take this authentication information from system Activated by user on first execution. Operating system and environment is interacted. Result is success of failure and users identity. 12

14 Third party authentication All members of network can be authenticated through a trusted third party. Single login servers, kerberos authentication are examples. Activated by user on first execution. An external service is interacted. Result is success of failure and users identity. severity demanded Public key authentication Public key exchange through P2P confirmation as in PGP is another mechanism for authentication. Software might support this authentication via user to user pairing. This mechanism might work as in the social networks as connection requests confirmed by two parties. Activated by user. Input are the users identity information and the other user to connect. Other user gets the request. If approves authentication is successful and process repeated automatically without user invocation afterwords. Otherwise fails. severity nice to have Authorization Individual user permissions User shall give individual users to search and download files. Activated by user. Input is a file and user identity. Authorization database is updated User grouping User should be able to group users and define permission based on user groups as well. Activated by user. Input is a group of users and group name. Authorization database is updated. Group add, delete, users group member modification cases are handled. severity demanded 13

15 Public and authenticated groups Authorization can be granted as public in case everyone can download without authentication and authenticated where anyone that is authenticated to the system. These groups should be supported. severity demanded User/group exclusion User should be able to define permissions to exclude users and groups in permissions as everyone but selected users can access. severity demanded Directory based permissions User should be able to define directories to have default permissions so that files under that directory recursively will have a default set of permissions. User initiated. Input is a directory and set of permissions. Authorization database updated. All filenames under directory inherits the permissions afterwards. severity demanded Multiple access levels Permission can be given for multiple levels. For example operations like search, download, and create revision can be granted as different levels. severity demanded Distributed search Keeping track of alive hosts System shall keep track of currently active software that are connected. Depending on the underlying mechanism, hosts in broadcast network, registered hosts, hosts through P2P host exchange should be monitored for being alive. Activated periodically. Repeat host search, collect status results, store. 14

16 Local query execution Local user can invoke a query on local search database and resulting files are listed. Query can be on filename, meta-data or file content. Activated by user. Search query is the input. Search is executed on local database, results are output Query language support Queries can be guided through a query language. Partial matches, full matches, multiple work matches, meta-data matches can be supported. Input is search sentence. Sentence is parsed, verified. As a result, a query procedure is generated. severity demanded Query executed by a remote user Software shall wait on a network port and carry out the queries sent by remote users. Query results are filtered for the identity of the user. Only permitted results are shown. Activated by network user. Identity of user and search sentence are input. Query executed as in and result is returned on network Query executed on a remote host Software shall repeat users query on all alive hosts, collect the results and display. Activated by user. Input is search sentence. List of alive hosts are retrieved. For each host query is executed as in and results shown in user interface Search result detail Based on the search query and type of match the information of each match is displayed. This information contain filename, owner and metadata. 15

17 Internally activated. Input is the matched file and the query. Output is the detailed information about the file and query type Result snippets In case of keyword match, the portion of the matched file containing the keywords, or a document summary is to be displayed. Internally activated. Input is the matched file and the query. Output is the snippet text. severity nice to have Query result caching Results of the last executed queries are cached in case of repetition and for history revisit. Internally activated. Input is the search result. Result is written on cache database. Effects , severity nice to have Distributed download Keeping track of the files to download Search results contain a locator, probably a distributed hash table identity of the file. This identity should be searchable through all alive hosts. Multiple hosts may contain the same file. Results respect to users identity and authorization, if user is not authorized file is not displayed. Each promoted file to DHT should contain necessary information for download access Handling of file download request Software shall serve the request to download a portion of a file if the request coming from an authorized user. Activated over network. Input are the file locator, identity of the requester and the part of the file to be requested. The requested file part is transferred over P2P. 16

18 Downloading a file from remote hosts A download request initiated by user should be sent to remote hosts containing the file and file should be downloaded. P2P download semantics are followed. Initiated by user. Input is the file selected by user. File request is sent to remote hosts containing the file. If multiple, requests are sent as parts. File download executed in background and success status is displayed to user when available File integrity control File locator and DHT should contain a file and fragments digest. 1 This digest information should be used to control if fragments downloaded correctly. P2P frameworks have mechanisms for this. File download is only completed when all parts of the file pass integrity check. Internal operation. Input is the meta-data of the file containing fragment checksums, the fragment that is just received. Output is mark of the fragment as complete or not Download auto share User should set up if the downloaded file inherits the permissions and shared for other users to download Internal operation. Input is the file path that completed download. The file is added on search index of shared files. severity demanded Version management Version tracking When file is changed on disk, user is asked if a new revision is to be created. Documents link to its original file is kept and revision semantics is followed in all operations of search and download. Initiated by system on file write on shared directory. Input is the new file 1 most P2P applications support fragmentation of large files and keep a summary of integrity information per fragment 17

19 and old file information. Output is the new revision stored on search index. severity nice to have Automated Versioning User can configure a specific file or directory to get versions with some maximum period automatically. In other words after a predefined time interval, when document is rewritten a version is automatically created without user intervention. severity nice to have All versions download When multiple version exists for a document, all versions can be downloaded with a single click by the user. Modification of with all download option downloading all revisions. severity nice to have 4.3 Performance requirements and Design constraints Performance In order to provide fair interaction, search queries should be answered in couple of seconds. This implies preconstruction of search indexes. Processing the documents on demand per query is not acceptable. Download performance should be optimized to take advantage of P2P networking Security Since most private documents of a user could be revealed, security design is utterly important in the system. Proper authentication and authorization should be provided without annoying user Flexibility Types of files supported in search is not static. For example most of the electronic document formats we are using have been introduced in last ten years and new formats are still being introduced as epub and DejaVu. 18

20 Systems ability to adapt itself as new formats introduced is ultimately important. User should not need to reinstall software in order to introduce a new format to meta-data extraction ( ). 19

21 References [1] OpenDocMan web site, [2] Dropbox web site, [3] Google docs web site, [4] Gnutella in Wikipedia, [5] Bittorrent in Wikipedia, BitTorrent. [6] Direct Connect in Wikipedia, Direct_Connect_(file_sharing). [7] Lucene web site, [8] Beagle web site, [9] Meta Tracker web site, [10], Wikipedia article on Document Management Systems en.wikipedia.org/wiki/dms/. 20

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550

How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550 How to Setup Scan to SMB to a Microsoft Vista Workstation Using a bizhub C451/ C550 Send to the SMB server You can send the data read in from the copier's ADF or the original scanning glass (scanned data)

More information

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server.

SourceAnywhere Service Configurator can be launched from Start -> All Programs -> Dynamsoft SourceAnywhere Server. Contents For Administrators... 3 Set up SourceAnywhere... 3 SourceAnywhere Service Configurator... 3 Start Service... 3 IP & Port... 3 SQL Connection... 4 SourceAnywhere Server Manager... 4 Add User...

More information

P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T

P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T, F U S I O N E D I T I O N R E L E A S E 1 1. 1. 1.x P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Uploading files to FTP server

Uploading files to FTP server V.150630 1. Overview Uploading files to FTP server The instructions in this article will explain how to upload the snapshots and videos from your camera to a FTP server. FTP is an Internet communications

More information

Insight Video Net. LLC. CMS 2.0. Quick Installation Guide

Insight Video Net. LLC. CMS 2.0. Quick Installation Guide Insight Video Net. LLC. CMS 2.0 Quick Installation Guide Table of Contents 1. CMS 2.0 Installation 1.1. Software Required 1.2. Create Default Directories 1.3. Create Upload User Account 1.4. Installing

More information

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu

PaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

Upload files to FTP server

Upload files to FTP server Upload files to FTP server V.150630 1. Overview The instructions in this article will explain how to upload the snapshots and videos from your camera to a FTP server. All Phylink cameras have the ability

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443

More information

HOW TO GUIDE. Pcounter Scan Server. For Support Click here INTRODUCTION

HOW TO GUIDE. Pcounter Scan Server. For Support Click here INTRODUCTION INTRODUCTION This document shows configuration methods of the Pcounter Scan Server on different brands of MFP. The is an FTP server application that works along with Pcounter embedded and/or MFP applications

More information

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux

Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com info@1and1.com August 2015 Copyright 2015 1&1

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

SAM XFile. Trial Installation Guide Linux. Snell OD is in the process of being rebranded SAM XFile

SAM XFile. Trial Installation Guide Linux. Snell OD is in the process of being rebranded SAM XFile SAM XFile Trial Installation Guide Linux Snell OD is in the process of being rebranded SAM XFile Version History Table 1: Version Table Date Version Released by Reason for Change 10/07/2014 1.0 Andy Gingell

More information

ReadyNAS Setup Manual

ReadyNAS Setup Manual ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

CLEARPASS ONGUARD CONFIGURATION GUIDE

CLEARPASS ONGUARD CONFIGURATION GUIDE CONFIGURATION GUIDE REVISION HISTORY Revised By Date Changes Dennis Boas July 2015 Version 1 initial release TABLE OF CONTENTS... 1 INTRODUCTION... 3 CONFIGURATION WORKFLOW... 4 CONFIGURE POSTURE POLICIES...

More information

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well.

In the same spirit, our QuickBooks 2008 Software Installation Guide has been completely revised as well. QuickBooks 2008 Software Installation Guide Welcome 3/25/09; Ver. IMD-2.1 This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in

More information

NAS 225 Introduction to FTP Explorer

NAS 225 Introduction to FTP Explorer NAS 225 Introduction to FTP Explorer Connect to FTP sites and transfer files A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to: 1. Use FTP Explorer to connect

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. venkatr20032002@gmail.com Ms. Smita Dange Lecturer,

More information

Litigation Support connector installation and integration guide for Summation

Litigation Support connector installation and integration guide for Summation Litigation Support connector installation and integration guide for Summation For AccuRoute v2.3 July 28, 2009 Omtool, Ltd. 6 Riverside Drive Andover, MA 01810 Phone: +1/1 978 327 5700 Toll-free in the

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Laptop Backup - Administrator Guide (Windows)

Laptop Backup - Administrator Guide (Windows) Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL

More information

DOCSVAULT Document Management System for everyone

DOCSVAULT Document Management System for everyone Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing

More information

VThis A PP NOTE USING ON THE SPOT MEDIA WITH TRAFFICMANAGER

VThis A PP NOTE USING ON THE SPOT MEDIA WITH TRAFFICMANAGER A PP NOTE USING ON THE SPOT MEDIA WITH TRAFFICMANAGER Introduction...2 Setting Up and Configuring EZSpot...3 Integrating On The Spot Media in Your Inbound Factory...3 Copyright and Trademark Notice...6

More information

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria

Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered

More information

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table

More information

Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab

Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab Yocto Project Developer Day San Francisco, 2013 Jessica Zhang Introduction Welcome to the Yocto Project Eclipse plug-in

More information

StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes

StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes User Guide Rev A StreamServe Persuasion SP4StreamServe Connect for SAP - Business Processes User Guide Rev A SAP, mysap.com,

More information

ThinPoint Quick Start Guide

ThinPoint Quick Start Guide ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...

More information

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM

USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM User Manual Table of Contents Introducing OWL...3 Starting to use Owl...4 The Logging in page...4 Using the browser...6 Folder structure...6 Title Bar...6

More information

CatDV Pro Workgroup Serve r

CatDV Pro Workgroup Serve r Architectural Overview CatDV Pro Workgroup Server Square Box Systems Ltd May 2003 The CatDV Pro client application is a standalone desktop application, providing video logging and media cataloging capability

More information

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014

www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Basic SQL Server operations

Basic SQL Server operations Basic SQL Server operations KB number History 22/05/2008 V1.0 By Thomas De Smet CONTENTS CONTENTS... 1 DESCRIPTION... 1 SOLUTION... 1 REQUIREMENTS...13 REFERENCES...13 APPLIES TO...13 KEYWORDS...13 DESCRIPTION

More information

EMC KAZEON E-DISCOVERY: PERFORMANCE TUNING GUIDELINES AND BEST PRACTICES

EMC KAZEON E-DISCOVERY: PERFORMANCE TUNING GUIDELINES AND BEST PRACTICES EMC KAZEON E-DISCOVERY: PERFORMANCE TUNING GUIDELINES AND BEST PRACTICES ABSTRACT EMC Kazeon performance is significantly dependent on the I/O operations performed and also on the network bandwidth. This

More information

What Is Ad-Aware Update Server?

What Is Ad-Aware Update Server? Contents What Is Ad-Aware Update Server?...2 Installation and Removal...3 System Requirements...3 Obtaining the Installation File...3 Installing Ad-Aware Update Server...3 Upgrade...4 Repairing, Modifying

More information

Leverage SharePoint with PSI:Capture

Leverage SharePoint with PSI:Capture Leverage SharePoint with PSI:Capture A White Paper Courtesy of PSIGEN Software, Inc. Table of Contents Intro to PSI:Capture... 1 Intro to PSI:Capture for SharePoint... 1 Key SharePoint Features... 2 Key

More information

SchoolBooking LDAP Integration Guide

SchoolBooking LDAP Integration Guide SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your

More information

User s Guide For Department of Facility Services

User s Guide For Department of Facility Services Doc s File Server User s Guide For Department of Facility Services For Ver : 7.2.88.1020 Rev : 1_05-27-2011 Created by : Elliott Jeyaseelan 2 Table of Contents SERVER LOGIN & AUTHENTICATION REQUIREMENTS

More information

Oracle Service Bus Examples and Tutorials

Oracle Service Bus Examples and Tutorials March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

Search and Information Retrieval

Search and Information Retrieval Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search

More information

Ekran System Help File

Ekran System Help File Ekran System Help File Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating Ekran to version 4.1... 13 Program Structure... 14 Getting Started... 15 Deployment Process... 15

More information

How to Set Up a Shared SQL Express Database with ManagePro 7 Standard version

How to Set Up a Shared SQL Express Database with ManagePro 7 Standard version How to Set Up a Shared SQL Express Database with ManagePro 7 Standard version This instruction set is provided AS IS without warranty, express or implied, including but not limited to the implied warranties

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Interoperability of Peer-To-Peer File Sharing Protocols

Interoperability of Peer-To-Peer File Sharing Protocols Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and

More information

qliqdirect Active Directory Guide

qliqdirect Active Directory Guide qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

UNICORN 6.4. Administration and Technical Manual

UNICORN 6.4. Administration and Technical Manual UNICORN 6.4 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

Publishing Reports in Tableau

Publishing Reports in Tableau Requesting Tableau System Access... 2 Terms and Definitions... 2 License Levels... 2 User Rights... 2 Permissions... 2 Viewer... 3 Interactor... 3 Editor... 3 Publisher... 3 Project Leader... 4 Custom...

More information

Manage Licenses and Updates

Manage Licenses and Updates Manage Licenses and Updates Palo Alto Networks Panorama Administrator s Guide Version 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054

More information

Oracle Enterprise Manager

Oracle Enterprise Manager Oracle Enterprise Manager System Monitoring Plug-in for Oracle TimesTen In-Memory Database Installation Guide Release 11.2.1 E13081-02 June 2009 This document was first written and published in November

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Setting Up a CLucene and PostgreSQL Federation

Setting Up a CLucene and PostgreSQL Federation Federated Desktop and File Server Search with libferris Ben Martin Abstract How to federate CLucene personal document indexes with PostgreSQL/TSearch2. The libferris project has two major goals: mounting

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

Deployment Guide: Unidesk and Hyper- V

Deployment Guide: Unidesk and Hyper- V TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4 Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory

More information

Net Services: File System Monitor

Net Services: File System Monitor Net Services: File System Monitor Settings for ExtremeZ-IP file server volumes...1 Setup of the Net Services server...2 Configuring and testing the Net Services server...3 Installing File System Monitor...4

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

Docsoft:AV Appliance. User Guide. Version: 3.0 Copyright 2005,2009 Docsoft, Inc.

Docsoft:AV Appliance. User Guide. Version: 3.0 Copyright 2005,2009 Docsoft, Inc. Docsoft:AV Appliance User Guide Version: 3.0 Copyright 2005,2009 Docsoft, Inc. 1 Table of Contents Introduction 3 Understanding Terminology 3 User Accounts 4 User Interface 4 General Tasks 4 Login/Logout

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

ReadyNAS Duo Setup Manual

ReadyNAS Duo Setup Manual ReadyNAS Duo Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA February 2008 208-10215-01 v1.0 2008 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

2.0. Installation Guide. March 2011 2.0.69637. 2011 Telestream, Inc.

2.0. Installation Guide. March 2011 2.0.69637. 2011 Telestream, Inc. 2.0 Installation Guide March 2011 2.0.69637 2011 Telestream, Inc. iii Contents Installing Vantage Start Here Common Installation Scenarios...1 Other Installation Scenarios...2 Installing or Upgrading

More information

SQL EXPRESS INSTALLATION...

SQL EXPRESS INSTALLATION... Contents SQL EXPRESS INSTALLATION... 1 INSTALLING SQL 2012 EXPRESS... 1 SQL EXPRESS CONFIGURATION... 7 BILLQUICK DATABASE... 9 SQL Express Installation The Microsoft SQL Server 2012 Express software is

More information

Studio 5.0 User s Guide

Studio 5.0 User s Guide Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

TECHNICAL REFERENCE. Version 1.0 August 2013

TECHNICAL REFERENCE. Version 1.0 August 2013 TECHNICAL REFERENCE Version 1.0 August 2013 Technical Reference IPWeb 1.0 Copyright EVS Broadcast Equipment S.A. Copyright 2013. All rights reserved. Disclaimer The information in this manual is furnished

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

What's New in SAS Data Management

What's New in SAS Data Management Paper SAS034-2014 What's New in SAS Data Management Nancy Rausch, SAS Institute Inc., Cary, NC; Mike Frost, SAS Institute Inc., Cary, NC, Mike Ames, SAS Institute Inc., Cary ABSTRACT The latest releases

More information

Backing Up CNG SAFE Version 6.0

Backing Up CNG SAFE Version 6.0 Backing Up CNG SAFE Version 6.0 The CNG-Server consists of 3 components. 1. The CNG Services (Server, Full Text Search and Workflow) 2. The data file repository 3. The SQL Server Databases The three services

More information

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started

Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...

More information

SSO Plugin. J System Solutions. Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier. http://www.javasystemsolutions.com

SSO Plugin. J System Solutions. Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier. http://www.javasystemsolutions.com SSO Plugin Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier J System Solutions JSS SSO Plugin Upgrading 3x to 4x Introduction... 3 [Prerequisite] Generate a new license... 4 [Prerequisite] Download

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

Subversion Server for Windows

Subversion Server for Windows Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend the MS Remote Desktop for Mac client.

More information

embeo Getting Started and Samples

embeo Getting Started and Samples embeo smb filesharing development kit Getting Started and Samples Getting Started Guide rev. 1.4 1 Introduction to SMB The SMB protocol, CIFS, or Windows File Sharing as it is more commonly known, is the

More information

Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015

Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Table of Contents Logging into the Drive Application 4 Log In Sign Up Access the Drive Application

More information

HP Data Protector Integration with Autonomy IDOL Server

HP Data Protector Integration with Autonomy IDOL Server HP Data Protector Integration with Autonomy IDOL Server Introducing e-discovery for HP Data Protector environments Technical white paper Table of contents Summary... 2 Introduction... 2 Integration concepts...

More information

Kofax Export Connector 8.3.0 for Microsoft SharePoint

Kofax Export Connector 8.3.0 for Microsoft SharePoint Kofax Export Connector 8.3.0 for Microsoft SharePoint Administrator's Guide 2013-02-27 2013 Kofax, Inc., 15211 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved. Use is subject to

More information

Web Conferencing Version 8.3 Troubleshooting Guide

Web Conferencing Version 8.3 Troubleshooting Guide System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which

More information

Avira Management Console AMC server configuration for managing online remote computers. HowTo

Avira Management Console AMC server configuration for managing online remote computers. HowTo Avira Management Console AMC server configuration for managing online remote computers HowTo Table of Contents 1. General... 3 2. Network layout plan... 3 3. Configuration... 4 3.1 Port forwarding...4

More information

Windows Peer-to-Peer Network Configuration Guide

Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide Windows Peer-to-Peer Network Configuration Guide for CCC Pathways Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of this publication

More information

Introduction CDR Dicom for Windows is designed as a fully functional DICOM (Digital Imaging Communications of Medicine) based client-server

Introduction CDR Dicom for Windows is designed as a fully functional DICOM (Digital Imaging Communications of Medicine) based client-server Introduction CDR Dicom for Windows is designed as a fully functional DICOM (Digital Imaging Communications of Medicine) based client-server application. The client application can, in theory, communicate

More information

PageR Enterprise Monitored Objects - AS/400-5

PageR Enterprise Monitored Objects - AS/400-5 PageR Enterprise Monitored Objects - AS/400-5 The AS/400 server is widely used by organizations around the world. It is well known for its stability and around the clock availability. PageR can help users

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations

How To Use The Correlog With The Cpl Powerpoint Powerpoint Cpl.Org Powerpoint.Org (Powerpoint) Powerpoint (Powerplst) And Powerpoint 2 (Powerstation) (Powerpoints) (Operations orrelog SQL Table Monitor Adapter Users Manual http://www.correlog.com mailto:info@correlog.com CorreLog, SQL Table Monitor Users Manual Copyright 2008-2015, CorreLog, Inc. All rights reserved. No part

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information