CHAPTER 7 RESULT ANALYSIS AND STATISTICS. 7.1 Introduction to manual Vs automated testing

Size: px
Start display at page:

Download "CHAPTER 7 RESULT ANALYSIS AND STATISTICS. 7.1 Introduction to manual Vs automated testing"

Transcription

1 CHAPTER 7 RESULT ANALYSIS AND STATISTICS 7.1 Introduction to manual Vs automated testing Testing is considered to be the most crucial part of the software development life cycle. It is very important because it really helps the users to measure different parameters of quality like correctness and robustness of a particular web service. Manual testing is so tiresome that we have to spent lot of time on analysis, identification and testing of test cases; where some tools are needed to automate the generation of test cases and implementation for web services. There are so many tools available in the market to generate test cases automatically and also which helps the user in analyzing the combination or request and response. Automated testing always concentrates on perfect generation of test cases automatically and executes such generated test cases. This kind of testing will save time and costs less effort. Sometimes we can consider this testing as model-based where initially the basic functional requirements are designed and then based on the designed and well-framed model automatically the test cases will be generated. When it comes to the manual testing, the results get compared to the expected behavior and all such observations will be recorded. Whereas in automated testing, all the cases are pre-defined. Once comparison is over, it becomes very easy to extend its functionality which is not possible in manual testing. 7.2 How to perform web services testing Testing web services from client side involves: 1. Creating a java project. 2. Consideration of web services. 3. Selecting Web service client. 4. Creating Web service project. 5. Creation of Classes. 124

2 The information related to the client will be considered as input to the web service. The Figure 7.1 a: shown is the interface which acts as barrier between the consumer and producer. When we think about component level testing; black box and white box testing comes into the picture which is necessary for each function. The practical test cases which are designed basically depend on boundary value analysis, path testing, forced error testing and equivalence partitioning. We can create a web service client by eclipse going to menu File click New click Other click Web Services click Web Service Client. The following is the interface generated by the Web service Client. Figure 7.1 a: Calculator.java - interface Client side testing is done by choosing the conceptual web services and the web service client. The java file called calaulator.java is a client which describes the functionality of the web service 125

3 which is acting as client. In order to create a client from the WSDL, you have to create both Configuration file and Java files both from WSDL. Configuration of the client talks about the bindings which allow the consumer or user to communicate with the host system. The Figure 7.1 a: talks about the Calculator acting as interface where java.lang.string can also be defined as class. We know that Strings are objects and particularly they are the instances of the class java.lang.string. Strings start their count from 0 (Zero). And its implementation is made known in Figure 7.1 b. Figure 7.1 b: Calculator.java - Implementation 126

4 Figure 7.2: CalculatorProxy.java Figure 7.2 shows the intervention of CalculatorProxy.java defined as a proxy class which usually implements different interfaces only at run time. Proxy class is often defined as public. It implements only those interfaces which are mentioned at the time of creation. The javax.xml.rpc.stub is the interface for all the classes of type Stub. There are different interfaces like Stub, Call, and Service which is also a class. This can also be considered a package which commonly contains core JAX-RPC APIs for the client. 127

5 Figure 7.3: CalculatorServiceLocator The ServiceLocator is a pattern used to identify the Enterprise Java Beans often called EJB and destinations of Java Message Service-JMS which are often called service components. The clients of J2EE communicate with them; in the process of communication they have to create their own components. Sometimes, these clients are capable of locating their service components. In order to down the complexity of the code, several clients can reuse the service locator. This behavior is shown in Figure

6 Figure 7.4: CalculatorSoapBindingStub.java More often SoapBindingStubs are automatically generated from the WSDL. We have to remember that all soap tool kits cannot contain these classes. These are client side stubs. For every specification in WSDL generating a SoapBindingStub.java is done by WSDL2Java which 129

7 is shown in Figure 7.4. It is commonly used like a stub at the client side. In order to generate the stubs you can use Apache Axis and WSDL2Java. Figure 7.5: Testing.java Here, in the Figure 7.5 the class defined is testing. The proxy is new CalculatorProxy( ). To communicate with the APIs of web services, a WS Proxy client will be used by JWS client. Invocation of WS APIs as local method is the general attitude of a proxy client. WS interfaces are always described by WSDL files. SetEndpoint( ) is a method in the proxy class, by using this we can change the url for a particular web service. Normally, the endpoint url is defined towards local host. If you won t set the endpoint url, it will consider the url in wsdl. 7.3 Understanding test results from TCG Figure 7.6: Calculator.wsdl Interface design 130

8 An interface commonly contains methods that have to be implemented. It is implemented by a class that defines all these methods. The Figure 7.6 shown here is the interface design of Calculator.wsdl file. Calculator itself acts as interface which contains different operations like add, subtract, multiply and division. Usually, interfaces contain collection of methods that implement drain body. 7.4 Statistics for response time analysis We categorize the operations into Lower, Medium, Medium Complex, Complex and High Complex. Let us take a look at the following example: The Figure 7.7 explains about the response time for a particular add request in the Calculator program. The response time is the amount of time taken to respond after a request is submitted for processing. Figure 7.7: Response time for request add operation 131

9 We identify the above categories based on number of attributes. And we assume that the business logic is involved in each operation and is directly proportional to the number of attributes. The property called number of classified attributes is the combination of input and output attributes. The response time for 3 attributes is recorded as 726 ms, if the business logic is very minimal and there are no network hassles. For other operations, like Chennai emergency services the response time is recoded as 936 ms (546 bytes) for 3 attributes due to network hassles and heavy processing logic. This behavior is shown in Figure 7.8. Figure 7.8: Response time for request - (getfire) 132

10 The Figure 7.8 talks about the response time for getting a fire station as response for the request getfire. The input given is 35 lat and 46 lon in which it gets the fire station address at these latitude and longitude as ~ ~Ambattur Fire Station~ Ambattur Estate, Chennai ~ Near Ambattur police station ~ ~ So, this is called fireresponse Load Testing Load Testing - definition The process of keeping some load on a system and asking to quantify its response is called Load Testing. Figure 7.9: Response time for request - Currency Convert 133

11 Here, you can observe the response time recorded for the request Currency Convert as 1513 ms (382 bytes). The request is given for converting USD into INR (US Dollars to Indian Rupee). The response is Now, let us create a test suite for this request, as you know that a collection of test cases is treated as test suite. Add this test request to the test suite and give a name to it. This is shown in the Figure 7.9. Figure 7.10: Creating Test Suite 134

12 Figure 7.11: Naming the test case Figure 7.10 and 7.11 shows creation of a test suite and naming the created test case. Now, when you click OK for the test suite, it will ask you to enter the name for test case, here we have given TS1 (TEST SUITE 1) and TC1 (TEST CASE 1). Sooner, you click OK; the following window appears. 135

13 Figure 7.12: Adding request to test case This is an Add Request to Test Case window which specifies the options for adding the request to a test case. As you can see here only Add SOAP response assertion, Close request window and show test case editor are highlighted. When you click OK, the first test step for the SOAP request Currency is created. This behavior is made known in Figure

14 Figure 7.13: Running test case You can run this test case made known in Figure 7.13 and after execution you ll get the following screen shot. Figure 7.14: Finished execution 137

15 Thus after executing the test case; you ll get the status FINISHED and the response time taken to execute is 2527 ms (look at the bottom of the testing window). Figure 7.15: Creating a new Load Test The Figure 7.15 shows how a load test can be performed for the test case that is created. Load test is performed only after the execution of test case. While load testing, we need to remember the characteristic properties like response time, size of the load (threads), memory utilization, CPU utilization and delay time. Delay time When the request is submitted for processing, the time it takes to receive the first byte is called delay time. 138

16 Figure 7.16: Naming Load Test The Figure 7.16 shows specifying the name for the load test LD 1. When you click OK, a new window for load testing will be created test steps. As of now, we created only one test step. Load test is usually performed under various testing environments with different tools, sometimes with several systems running multiple requests in parallel to identify the load put on several machines. 139

17 Figure 7.17: Performing Load Test The Figure 7.17 shows the window to perform load testing with test steps so that we can run these test steps along with the properties called min,max,avg,cnt,tps,bytes,err,rat.(in ms) Metrics and Parameters of Load Testing Usually the Load Test is performed with the following parameters: 1. TEST STEP 2. MIN 3. MAX 4. AVG 5. LAST 6. CNT 7. TPS 8. BYTES 140

18 9. ERR 10. RAT TEST STEP Foe each thread the start up delay will be set up. MIN MAX AVG denotes the minimum, maximum and average times the test step takes. LAST The last time for the test step. CNT Count the number spell of times that a test case is executed. TPS Transactions Per Second. BPS - Bytes Per Second. ERR Number of Assertion Errors for the test case. RAT Failed requests ratio (The total percentage of requests which are failed). Figure 7.18: Load testing of Test Step 25% test coverage The Figure 7.18 shows that the load test is performed with 5 threads; strategy selected is simple, test delay of 1000 ms and setting the time limit to 60 seconds. The test coverage is 25%. When we set the strategy to simple the delay will be configured. In this context, the test step Currency has the CNT value of 35 with a predefined time limit of 60 seconds will have a TPS of

19 which is almost negligible and sometimes considered as 3. TPS is calculated as count/time limit taken. BPS is calculated as Number of bytes/time taken. Hence, if you see BPS value, it is recorded as 889. Figure 7.19: Load testing of Test Step 50% test coverage In this context, the TPS is And the minimum and maximum response times are recorded as 629 ms and 1260 ms respectively. The TPS and BPS are recorded as 3 and 1177 respectively with 50% test coverage. So, the total number of transactions per second is 3 and 1177 bytes are processed. This description is shown in Figure

20 Figure 7.20: Load testing of Test Step 100% test coverage In this context, with 100% test coverage the TPS is recorded as 3. And the minimum and maximum response times are recorded as 622 ms and 1151 ms respectively. Similarly the BPS is recorded as It is shown that between each batch of requests the test delay is 1000 ms. This behavior is shown in Figure

21 Figure 7.21: Load Test - Second run The Figure 7.21 explains all the properties of load testing of a service for second time, where 398 entries took place in total. When you run the test case it was configured before to 60 seconds and with 5 threads. You can even alter these predefined values and run the tests. The test case generator allows the user to run the load tests with many threads and these are called users more often virtual users. They are shown as 5 here. The concept of defining number of virtual users depends on the memory, response time of final service and CPU. For every thread the test case will be processed and defines its own strategy. It accesses an exclusive photocopy of the test case and its steps in the process of solving the issues of threads. More often the test cases are based on timing constraints so that you can start and stop running these cases at any point of time. Several load tests can be performed in parallel. Once the execution is finished, the statistics of the load test can be collected and updated. 144

22 The Figure 7.22 explains about the third run of load testing a test case; Transactions Per Second (TPS) and Bytes Per Second (BPS) are recorded in the column as 1 and 686. When the actual time is passed, a test case that can run 60 seconds take over 600 requests will get a TPS of 60. And a test case that has run for 60 seconds and take over bytes will get a BPS of This case you can see only up to the limit of 60 seconds which is pre-configured. Since, there are two requests (number of transactions - 2) are on the mark per second for processing it is executing twice so the count is 122. Figure 7.22: Load Test Third run 145

23 Further, it shows the min, max, and avg are recorded as 771, 8355 and 1,711 respectively. The CNT is 122 and the number of bytes is The TPS and BPS are recorded as 1.8 and 686 respectively with a test delay of Statistical Graph for LD1 Figure 7.23: Statistics for LD1 The Figure 7.23 shows the statistical graph for the load test 1 (LD1). It explains that the thread count, error count and TPS are nominal and moderate, but the average time and BPS are more (blue and yellow colour representation), this happens to be for the third run. There are several options in this graph which enable the user to update the graph with the similar period of intervals. Here, the selected step is for total number of test steps. This graph is used to see the statistics with respect to time and be capable to identify the abrupt changes. Setting the resolution to data determines how frequently the graph is going to be updated. 146

24 Statistical History Graph for LD1 Figure 7.24: Statistics History for LD1 This graph shows the statistical history for LD1. The selected value for statistics is AVERAGE and the resolution is set to data so as to update the graph immediately and explains how regularly the update is possible. Here, we observed that the distribution of values is very less and almost negligible because of only one test step. In this case, we considered the statistical value for all steps. We can also compare the average time in the same test. When there is no change in the number threads even for the third run, there won t be any change in the response time (represented in black color).this behavior is shown in Figure

25 Figure 7.25: Change in response times (20 threads) In the Figure 7.25, we observed that there is a drastic change in the minimum, maximum and average times when compared to the previous case because of the alteration in the numeric value of threads; as the numeric value of threads is 5 before and 20 now. The response times are extremely changed including TPS and BPS with error rate Security Testing Security Testing definition A process which is used to describe and giving assurance, that a system protects the data and maintains its projected functionality. The security of the systems depends on several factors like authentication, verification, authorization etc. 148

26 Figure 7.26: Creating new Security Test Figure 7.27: Naming Security Test ST 1 149

27 Figure 7.28: Security Test for Test Step The Figure 7.28 shows the security test for the created test step. As mentioned earlier, security testing will be done under several properties like verification, authentication, authorization etc; since there is no authentication (not created), it is showing a warning message that no security scans available to run. When we use web services the security becomes the biggest problem, because the SOAP messages are usually transferred over the network. So, anyone with a sniffer which is packet or protocol analyzer may catch the SOAP message and study it. For this, the best possible solution is to use https (SSL- Secure Socket Layer) as an alternative for http so as to encrypt the message. In order to implement this, you have to install a certificate issued by an authority on your server. We need to assume and even sometimes confirm that all certificates are trusted ones. So, a SOAP platform which is based on servlet normally doesn t know about SSL. And it is the container of the servlet which thinks about the encryption and decryption. For this, you have to set up the container of the servlet for SSL. 150

28 Variation in response times for gethospital request in the example of Chennai emergency services. Figure 7.29: Response time for request gethospital 1 The figure 7.29 shows that for the request gethospital, initially the response time is recorded as 1815 ms and number of bytes in

29 Figure 7.30: Response time for request - gethospital 2 (second run) The figure 7.30 shows the response time as 3151 ms for the second run with same number of bytes as there is no change in the number of threads that was initially considered. 152

30 Figure 7.31: Response time for gethospital request Resubmission (third run) As shown in the Figure 7.29, at the initial submission of the request gethospital, the recorded response time is 1815 ms and the data transferred is 532 bytes. If you observe carefully the input given for latitude and longitude are 32 and 35 respectively. The Figure 7.30 and Figure 7.31 talks about the response times for the same request gethospital. The response time recorded in the Figure 7.30 is 3151 ms and the amount of data transferred is 532 bytes. But, when the same is submitted as input again in third run, the recorded response time is 5360 ms, and the number of processed is same. This is shown in Figure

31 By this we can say that there is a radical change in the response times and the number of bytes processed is same when the requests are submitted with same input parameters, even for the same number of attributes because responding to the submitted request is not only depends on number of attributes but also on the heavy processing logic and network hassles. 7.5 Experimental environment In a real time environment we made it possible that it has 2.8 GHz/1.96 GHz, 4 GB DDR3, 500 GB 7200 rpm HDD. Real time environment which says that we have tested web services of our own and the web services of a third party. All through the experiments, we submit randomly different inputs in terms of number of attributes; where different variations of test results are generated. 7.6 Experimental Results The experimental results are published here: Firstly, As shown in the Figure 7.32, we have taken number of attributes on X-axis and time in ms (milli seconds) on Y-axis. When you give an input, as you have seen in the previous figures 7.7, 7.8, the response time varies from input to input. Have a glance at the Figure, it talks when 2 to 3 attributes were given as input and even up to 99 attributes there is no major change in the response time. 154

32 Change in the response times Figure 7.32: Statistical graph Change in the response times Figure 7.33: Statistical graph 2 155

33 To explain further, as the number of attributes increase the response time automatically increases as you see in the Figure From the 100 th attribute there is a drastic change in the response time. Our framework has shown the best implementation of the test requests when they were submitted to the endpoint url in generating the responses. Moreover, the response time generated depends on sometimes number of attributes and more often on business logic and network hassles. The shaded portion of the figure talks about the amount of radical change in the response times Change in the response times Figure 7.34: Statistical graph 3 156

34 The Figure 7.34 shows that from 1000 to attributes, the response times radically changes from 1600 to ms. The Figure explains one such example where the response times are changing from time to time. Figure 7.35: Pie Chart 1 - representation for Number of attributes and response times As shown in the Figure 7.35; the pie chart represents the idea of number of attributes taken for consideration as input for the related response times. As you see in this Figure, the green colour depicts one attribute given for input and even up to 10 (1 to 10) and the response time recorded, it is not visible (negligible) because it is merged with the yellow colour. Next, the yellow colour shows the number of attributes from 10 to 100, the response time recorded is shown as very minimal. Similarly, the maroon colour shows that number of attributes ranging from 100 to 1000 in which the response time recorded is somewhat more when 157

35 compared to other inputs, may be between 1200 ms 2000 ms, you can see this behaviour in Figure Finally, the blue colour shows that for the attributes given from 1000 to 10,000, the response time may be in between 2000 ms to ms. Figure 7.36: Pie Chart 2 Variation in response times The Figure 7.36 shows the variations in response times when more number of attributes are considered when compared to the attributes taken in the previous pie chart. As it is shown, 5, 10, 20,100 are the amount of percentages of response times generated for 10, 100, 1000 and 10,000 numbers of attributes respectively. 158

36 7.7 Conclusion We have observed that functional testing can be made easy with our framework. It is also observed that the tester doesn t need any background knowledge about the technology. Our framework tests any web service in generating the right response when the right request is submitted. The response times are changing according to the threads, strategy and time limit. By this we can say if the time limit exceeds the defined value, the load test will fail. If the numbers of threads are increased and time limit changes, automatically there will be a change in the minimum, maximum and average response times and also in TPS and BPS values. 159

JBoss SOAP Web Services User Guide. Version: 3.3.0.M5

JBoss SOAP Web Services User Guide. Version: 3.3.0.M5 JBoss SOAP Web Services User Guide Version: 3.3.0.M5 1. JBoss SOAP Web Services Runtime and Tools support Overview... 1 1.1. Key Features of JBossWS... 1 2. Creating a Simple Web Service... 3 2.1. Generation...

More information

Using mobile phones to access Web Services in a secure way. Dan Marinescu

Using mobile phones to access Web Services in a secure way. Dan Marinescu Using mobile phones to access Web Services in a secure way Dan Marinescu March 7, 2007 Abstract Web Services is a technology that has gained in acceptance and popularity over the past years. The promise

More information

Author: Gennaro Frazzingaro Universidad Rey Juan Carlos campus de Mostòles (Madrid) GIA Grupo de Inteligencia Artificial

Author: Gennaro Frazzingaro Universidad Rey Juan Carlos campus de Mostòles (Madrid) GIA Grupo de Inteligencia Artificial Simple Implementation of a WebService using Eclipse Author: Gennaro Frazzingaro Universidad Rey Juan Carlos campus de Mostòles (Madrid) GIA Grupo de Inteligencia Artificial Contents Web Services introduction

More information

Summer Internship 2013 Group No.4-Enhancement of JMeter Week 1-Report-1 27/5/2013 Naman Choudhary

Summer Internship 2013 Group No.4-Enhancement of JMeter Week 1-Report-1 27/5/2013 Naman Choudhary Summer Internship 2013 Group No.4-Enhancement of JMeter Week 1-Report-1 27/5/2013 Naman Choudhary For the first week I was given two papers to study. The first one was Web Service Testing Tools: A Comparative

More information

PROGRESS Portal Access Whitepaper

PROGRESS Portal Access Whitepaper PROGRESS Portal Access Whitepaper Maciej Bogdanski, Michał Kosiedowski, Cezary Mazurek, Marzena Rabiega, Malgorzata Wolniewicz Poznan Supercomputing and Networking Center April 15, 2004 1 Introduction

More information

Scalability Factors of JMeter In Performance Testing Projects

Scalability Factors of JMeter In Performance Testing Projects Scalability Factors of JMeter In Performance Testing Projects Title Scalability Factors for JMeter In Performance Testing Projects Conference STEP-IN Conference Performance Testing 2008, PUNE Author(s)

More information

MSP How to guide session 2 (Resources & Cost)

MSP How to guide session 2 (Resources & Cost) MSP How to guide session 2 (Resources & Cost) 1. Introduction Before considering resourcing the schedule it is important to ask yourself one key question as it will require effort from the scheduler or

More information

Introduction to Testing Webservices

Introduction to Testing Webservices Introduction to Testing Webservices Author: Vinod R Patil Abstract Internet revolutionized the way information/data is made available to general public or business partners. Web services complement this

More information

Performance Workload Design

Performance Workload Design Performance Workload Design The goal of this paper is to show the basic principles involved in designing a workload for performance and scalability testing. We will understand how to achieve these principles

More information

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0 Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator

More information

Performance Testing and Optimization in Web-Service Based Applications

Performance Testing and Optimization in Web-Service Based Applications Performance Testing and Optimization in Web-Service Based Applications Mesfin Mulugeta mesfin.mulugeta@blackboard.com Sr. Software Performance Engineer Goals of the Presentation Brief introduction to software

More information

Configuring Nex-Gen Web Load Balancer

Configuring Nex-Gen Web Load Balancer Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Performance Analysis of Web based Applications on Single and Multi Core Servers

Performance Analysis of Web based Applications on Single and Multi Core Servers Performance Analysis of Web based Applications on Single and Multi Core Servers Gitika Khare, Diptikant Pathy, Alpana Rajan, Alok Jain, Anil Rawat Raja Ramanna Centre for Advanced Technology Department

More information

StreamServe Persuasion SP4 Service Broker

StreamServe Persuasion SP4 Service Broker StreamServe Persuasion SP4 Service Broker User Guide Rev A StreamServe Persuasion SP4 Service Broker User Guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520 No

More information

Developing Web Services with Eclipse and Open Source. Claire Rogers Developer Resources and Partner Enablement, HP February, 2004

Developing Web Services with Eclipse and Open Source. Claire Rogers Developer Resources and Partner Enablement, HP February, 2004 Developing Web Services with Eclipse and Open Source Claire Rogers Developer Resources and Partner Enablement, HP February, 2004 Introduction! Many companies investigating the use of web services! Cost

More information

Monitoring Pramati EJB Server

Monitoring Pramati EJB Server Monitoring Pramati EJB Server 17 Overview The EJB Server manages the execution of enterprise applications that run on the J2EE server. The JAR modules deployed on the Server are supported by the EJB container.

More information

SyncThru Database Migration

SyncThru Database Migration SyncThru Database Migration Overview Database Migration for SyncThru application is an intuitive tool that enables the data stored in the database of an older version of SyncThru, to be moved to the database

More information

Table of Contents INTRODUCTION... 3. Prerequisites... 3 Audience... 3 Report Metrics... 3

Table of Contents INTRODUCTION... 3. Prerequisites... 3 Audience... 3 Report Metrics... 3 Table of Contents INTRODUCTION... 3 Prerequisites... 3 Audience... 3 Report Metrics... 3 IS MY TEST CONFIGURATION (DURATION / ITERATIONS SETTING ) APPROPRIATE?... 4 Request / Response Status Summary...

More information

Craig Carpenter MCT. MCSE, MCSA

Craig Carpenter MCT. MCSE, MCSA Securing Central Administration in SharePoint 2007 Craig Carpenter MCT. MCSE, MCSA Partner Combined Knowledge SharePoint training and courseware providers. http://www.combined knowledge.com Craig Carpenter

More information

SolarWinds. Understanding SolarWinds Charts and Graphs Technical Reference

SolarWinds. Understanding SolarWinds Charts and Graphs Technical Reference SolarWinds Understanding SolarWinds Charts and Graphs Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any

More information

bbc Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO CONTENTS

bbc Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO CONTENTS TECHNICAL ARTICLE Adobe LiveCycle Data Services Using the F5 BIG-IP LTM Introduction APPLIES TO Adobe LiveCycle Enterprise Suite CONTENTS Introduction................................. 1 Edge server architecture......................

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012. Load Test Results for Submit and Approval Phases of Request Life Cycle

SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012. Load Test Results for Submit and Approval Phases of Request Life Cycle SOLUTION BRIEF: SLCM R12.7 PERFORMANCE TEST RESULTS JANUARY, 2012 Load Test Results for Submit and Approval Phases of Request Life Cycle Table of Contents Executive Summary 3 Test Environment 4 Server

More information

SysAidTM. Monitoring Guide

SysAidTM. Monitoring Guide SysAidTM Monitoring Guide Introduction... 3 Monitoring of Servers... 4 Server Configuration List...4 New Monitoring Configuration for a server...7 General Details Tab...8 Performance...9 Network Services...10

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

So in order to grab all the visitors requests we add to our workbench a non-test-element of the proxy type.

So in order to grab all the visitors requests we add to our workbench a non-test-element of the proxy type. First in oder to configure our test case, we need to reproduce our typical browsing path containing all the pages visited by the visitors on our systems. So in order to grab all the visitors requests we

More information

How to configure your Windows PC post migrating to Microsoft Office 365

How to configure your Windows PC post migrating to Microsoft Office 365 How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365

More information

Performance Optimization For Operational Risk Management Application On Azure Platform

Performance Optimization For Operational Risk Management Application On Azure Platform Performance Optimization For Operational Risk Management Application On Azure Platform Ashutosh Sabde, TCS www.cmgindia.org 1 Contents Introduction Functional Requirements Non Functional Requirements Business

More information

Web Application Testing. Web Performance Testing

Web Application Testing. Web Performance Testing Web Application Testing Web Performance Testing Objectives of Performance Testing Evaluate runtime compliance to performance requirements Check different properties such as throughput (bits/sec, packets/sec)

More information

Performance Analysis of webmethods Integrations using Apache JMeter Information Guide for JMeter Adoption

Performance Analysis of webmethods Integrations using Apache JMeter Information Guide for JMeter Adoption TORRY HARRIS BUSINESS SOLUTIONS Performance Analysis of webmethods Integrations using Apache JMeter Information Guide for JMeter Adoption Ganapathi Nanjappa 4/28/2010 2010 Torry Harris Business Solutions.

More information

Load testing with. WAPT Cloud. Quick Start Guide

Load testing with. WAPT Cloud. Quick Start Guide Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica

More information

Modifying Colors and Symbols in ArcMap

Modifying Colors and Symbols in ArcMap Modifying Colors and Symbols in ArcMap Contents Introduction... 1 Displaying Categorical Data... 3 Creating New Categories... 5 Displaying Numeric Data... 6 Graduated Colors... 6 Graduated Symbols... 9

More information

Document Capture and Distribution

Document Capture and Distribution Document Capture and Distribution WHITE PAPER SmarThru TM Workflow 2 Document Capture and Distribution Introduction This white paper describes the design and the features used by the Samsung SmarThru TM

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

Using SPSS, Chapter 2: Descriptive Statistics

Using SPSS, Chapter 2: Descriptive Statistics 1 Using SPSS, Chapter 2: Descriptive Statistics Chapters 2.1 & 2.2 Descriptive Statistics 2 Mean, Standard Deviation, Variance, Range, Minimum, Maximum 2 Mean, Median, Mode, Standard Deviation, Variance,

More information

WEBMAIL User s Manual

WEBMAIL User s Manual WEBMAIL User s Manual Overview What it is: What it is not: A convenient method of retrieving and sending mails while you re away from your home computer. A sophisticated mail client meant to be your primary

More information

P6 Analytics Reference Manual

P6 Analytics Reference Manual P6 Analytics Reference Manual Release 3.2 October 2013 Contents Getting Started... 7 About P6 Analytics... 7 Prerequisites to Use Analytics... 8 About Analyses... 9 About... 9 About Dashboards... 10 Logging

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

ManageEngine EventLog Analyzer. Best Practices Document

ManageEngine EventLog Analyzer. Best Practices Document ManageEngine EventLog Analyzer Best Practices Document Table of Contents System Requirements... 3 Up to 50 hosts... 3 Up to 100 hosts... 3 Up to 200 hosts... 3 Up to 500 hosts... 3 Above 500 hosts... 4

More information

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using

More information

Building Web Services with Apache Axis2

Building Web Services with Apache Axis2 2009 Marty Hall Building Web Services with Apache Axis2 Part I: Java-First (Bottom-Up) Services Customized Java EE Training: http://courses.coreservlets.com/ Servlets, JSP, Struts, JSF/MyFaces/Facelets,

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...

More information

Securepoint Network Access Controller (NAC)

Securepoint Network Access Controller (NAC) Securepoint Network Access Controller (NAC) Administration Guide Business Class Secure Mobility Version 1 2 Securepoint NAC Administration Guide 1 Table of contents 1 Table of contents... 2 2 Table of

More information

The FTP Monitor application performs the following main functions:

The FTP Monitor application performs the following main functions: FTP Monitor Application The FTP Monitor application performs the following main functions: 1. Periodically monitors the files to be uploaded. 2. Automatically compresses and encrypts the files to be uploaded.

More information

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief

HTTPS HTTP. ProxySG Web Server. Client. ProxySG TechBrief Reverse Proxy with SSL. 1 Technical Brief ProxySG TechBrief Reverse Proxy with SSL What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the basis for a robust and flexible reverse proxy solution. In addition to web policy management,

More information

Oracle Service Bus Examples and Tutorials

Oracle Service Bus Examples and Tutorials March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan

More information

Publishing, Consuming, Deploying and Testing Web Services

Publishing, Consuming, Deploying and Testing Web Services Publishing, Consuming, Deploying and Testing Web Services Oracle JDeveloper 10g Preview Technologies used: Web Services - UML Java Class Diagram An Oracle JDeveloper Tutorial September 2003 Content Introduction

More information

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

A Middleware-Based Approach to Mobile Web Services

A Middleware-Based Approach to Mobile Web Services Abstract A Middleware-Based Approach to Mobile Web Services Pampa Sadhukhan, Pradip K Das, Rijurekha Sen, Niladrish Chatterjee and Arijit Das Centre for Mobile Computing and Communication (CMCC), Jadavpur

More information

B6: GET /started/with/ HTTP Analysis

B6: GET /started/with/ HTTP Analysis B6: GET /started/with/ HTTP Analysis Robert Bullen Application Performance Engineer Blue Cross Blue Shield of Minnesota robert_d_bullen@bluecrossmn.com The BCBSMN Experience Who is Blue Cross Blue Shield

More information

Accessing Data with ADOBE FLEX 4.6

Accessing Data with ADOBE FLEX 4.6 Accessing Data with ADOBE FLEX 4.6 Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Chapter 1: Accessing data services overview Data

More information

What are Web Services? A BT Conferencing white paper

What are Web Services? A BT Conferencing white paper Table of contents What are Web Services? 3 Why Web Services? 3 The BT Conference Service 3 Future Development 4 Conclusion 4 2 3 What are Web Services? Web services are self-contained business functions

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Comparing Load Balancing for Server Selection Using Cloud Services

Comparing Load Balancing for Server Selection Using Cloud Services Comparing Load Balancing for Server Selection Using Cloud Services By Daksh Gupta A Project Report Submitted In Partial Fulfillment of the Requirements of the Degree of Masters of Science In Computer Science

More information

WEB SERVICES. Revised 9/29/2015

WEB SERVICES. Revised 9/29/2015 WEB SERVICES Revised 9/29/2015 This Page Intentionally Left Blank Table of Contents Web Services using WebLogic... 1 Developing Web Services on WebSphere... 2 Developing RESTful Services in Java v1.1...

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

ManageEngine EventLog Analyzer. Best Practices Document

ManageEngine EventLog Analyzer. Best Practices Document ManageEngine EventLog Analyzer Best Practices Document Table of Contents System Requirements... 3 Up to 50 hosts... 3 Up to 100 hosts... 3 Up to 200 hosts... 3 Up to 500 hosts... 3 Above 500 hosts... 4

More information

Consuming, Providing & Publishing WS

Consuming, Providing & Publishing WS Department of Computer Science Imperial College London Inverted CERN School of Computing, 2005 Geneva, Switzerland 1 The Software Environment The tools Apache Axis 2 Using WSDL2Java 3 The Software Environment

More information

Implementing Secure Sockets Layer on iseries

Implementing Secure Sockets Layer on iseries Implementing Secure Sockets Layer on iseries Presented by Barbara Brown Alliance Systems & Programming, Inc. Agenda SSL Concepts Digital Certificate Manager Local Certificate Authority Server Certificates

More information

T-110.5140 Network Application Frameworks and XML Web Services and WSDL 15.2.2010 Tancred Lindholm

T-110.5140 Network Application Frameworks and XML Web Services and WSDL 15.2.2010 Tancred Lindholm T-110.5140 Network Application Frameworks and XML Web Services and WSDL 15.2.2010 Tancred Lindholm Based on slides by Sasu Tarkoma and Pekka Nikander 1 of 20 Contents Short review of XML & related specs

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016 Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission

More information

What s new in TIBCO Spotfire 6.5

What s new in TIBCO Spotfire 6.5 What s new in TIBCO Spotfire 6.5 Contents Introduction... 3 TIBCO Spotfire Analyst... 3 Location Analytics... 3 Support for adding new map layer from WMS Server... 3 Map projections systems support...

More information

A Middleware Strategy to Survive Compute Peak Loads in Cloud

A Middleware Strategy to Survive Compute Peak Loads in Cloud A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: sashko.ristov@finki.ukim.mk

More information

WebSphere Business Monitor V6.2 KPI history and prediction lab

WebSphere Business Monitor V6.2 KPI history and prediction lab Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...

More information

Holistic Performance Analysis of J2EE Applications

Holistic Performance Analysis of J2EE Applications Holistic Performance Analysis of J2EE Applications By Madhu Tanikella In order to identify and resolve performance problems of enterprise Java Applications and reduce the time-to-market, performance analysis

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

PTC System Monitor Solution Training

PTC System Monitor Solution Training PTC System Monitor Solution Training Patrick Kulenkamp June 2012 Agenda What is PTC System Monitor (PSM)? How does it work? Terminology PSM Configuration The PTC Integrity Implementation Drilling Down

More information

Apache JMeter HTTP(S) Test Script Recorder

Apache JMeter HTTP(S) Test Script Recorder Apache JMeter HTTP(S) Test Script Recorder This tutorial attempts to explain the exact steps for recording HTTP/HTTPS. For those new to JMeter, one easy way to create a test plan is to use the Recorder.

More information

HTTP communication between Symantec Enterprise Vault and Clearwell E- Discovery

HTTP communication between Symantec Enterprise Vault and Clearwell E- Discovery Securing HTTP communication between Symantec Enterprise Vault and Clearwell E- Discovery Requesting and Applying an SSL Certificate to secure communication ion from Clearwell E-Discovery to Enterprise

More information

Java Access to Oracle CRM On Demand. By: Joerg Wallmueller Melbourne, Australia

Java Access to Oracle CRM On Demand. By: Joerg Wallmueller Melbourne, Australia Java Access to Oracle CRM On Demand Web Based CRM Software - Oracle CRM...페이지 1 / 12 Java Access to Oracle CRM On Demand By: Joerg Wallmueller Melbourne, Australia Introduction Requirements Step 1: Generate

More information

Agility Database Scalability Testing

Agility Database Scalability Testing Agility Database Scalability Testing V1.6 November 11, 2012 Prepared by on behalf of Table of Contents 1 Introduction... 4 1.1 Brief... 4 2 Scope... 5 3 Test Approach... 6 4 Test environment setup... 7

More information

You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 sales@webvisions.com

You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 sales@webvisions.com SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.

More information

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements

More information

DOSarrest Security Services (DSS) Version 4.0

DOSarrest Security Services (DSS) Version 4.0 DOSarrest Security Services (DSS) Version 4.0 DOSarrest DSS User Guide The DSS is the main customer portal where customers can view and manipulate traffic statistics from a wide variety of variables that

More information

Connecting Software. CB Mobile CRM Windows Phone 8. User Manual

Connecting Software. CB Mobile CRM Windows Phone 8. User Manual CB Mobile CRM Windows Phone 8 User Manual Summary This document describes the Windows Phone 8 Mobile CRM app functionality and available features. The document is intended for end users as user manual

More information

B M C S O F T W A R E, I N C. BASIC BEST PRACTICES. Ross Cochran Principal SW Consultant

B M C S O F T W A R E, I N C. BASIC BEST PRACTICES. Ross Cochran Principal SW Consultant B M C S O F T W A R E, I N C. PATROL FOR WEBSPHERE APPLICATION SERVER BASIC BEST PRACTICES Ross Cochran Principal SW Consultant PAT R O L F O R W E B S P H E R E A P P L I C AT I O N S E R V E R BEST PRACTICES

More information

Introduction Course in SPSS - Evening 1

Introduction Course in SPSS - Evening 1 ETH Zürich Seminar für Statistik Introduction Course in SPSS - Evening 1 Seminar für Statistik, ETH Zürich All data used during the course can be downloaded from the following ftp server: ftp://stat.ethz.ch/u/sfs/spsskurs/

More information

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

How To Backup Your Hard Drive With Pros 4 Technology Online Backup Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and

More information

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...

New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support... Informatica Corporation B2B Data Exchange Version 9.5.0 Release Notes June 2012 Copyright (c) 2006-2012 Informatica Corporation. All rights reserved. Contents New Features... 1 Installation... 3 Upgrade

More information

Chapter 2 Editor s Note:

Chapter 2 Editor s Note: [Editor s Note: The following content was excerpted from the free ebook The Tips and Tricks Guide to Securing Windows Server 2003 (Realtimepublishers.com) written by Roberta Bragg and available at http://www.netiq.com/offers/ebooks.]

More information

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy

More information

Overview of Web Services API

Overview of Web Services API 1 CHAPTER The Cisco IP Interoperability and Collaboration System (IPICS) 4.5(x) application programming interface (API) provides a web services-based API that enables the management and control of various

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

Hudson configuration manual

Hudson configuration manual Hudson configuration manual 1 Chapter 1 What is Hudson? Hudson is a powerful and widely used open source continuous integration server providing development teams with a reliable way to monitor changes

More information

Load Testing with JMeter

Load Testing with JMeter Load Testing with JMeter Presented by Matthew Stout - mat@ucsc.edu JMeter Overview Java application for load testing and measuring performance Originally for web applications but has grown to support lots

More information

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2 Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22

More information

Cloud Performance Benchmark Series

Cloud Performance Benchmark Series Cloud Performance Benchmark Series Amazon Elastic Load Balancing (ELB) Md. Borhan Uddin Bo He Radu Sion ver. 0.5b 1. Overview Experiments were performed to benchmark the Amazon Elastic Load Balancing (ELB)

More information

Web Service Development Using CXF. - Praveen Kumar Jayaram

Web Service Development Using CXF. - Praveen Kumar Jayaram Web Service Development Using CXF - Praveen Kumar Jayaram Introduction to WS Web Service define a standard way of integrating systems using XML, SOAP, WSDL and UDDI open standards over an internet protocol

More information

Project Management within ManagePro

Project Management within ManagePro Project Management within ManagePro This document describes how to do the following common project management functions with ManagePro: set-up projects, define scope/requirements, assign resources, estimate

More information

How to set up Outlook Anywhere on your home system

How to set up Outlook Anywhere on your home system How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook

More information

New Relic & JMeter - Perfect Performance Testing

New Relic & JMeter - Perfect Performance Testing TUTORIAL New Relic & JMeter - Perfect Performance Testing by David Sale Contents Introduction 3 Demo Application 4 Hooking Into New Relic 4 What Is JMeter? 6 Installation and Usage 6 Analysis In New Relic

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

Formulas, Functions and Charts

Formulas, Functions and Charts Formulas, Functions and Charts :: 167 8 Formulas, Functions and Charts 8.1 INTRODUCTION In this leson you can enter formula and functions and perform mathematical calcualtions. You will also be able to

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information