XSEDE Canonical Use Case 2: Managed File Transfer
|
|
|
- Egbert Gordon
- 10 years ago
- Views:
Transcription
1 XSEDE Canonical Use Case 2: Managed File Transfer March 20, 2014 Version 1.2 XSEDE Canonical Use Case 2 Page 1
2 XSEDE Canonical Use Case 2 Page 2
3 Table of Contents A. Document History B. Document Scope C. Glossary D. Canonical Use Case 2 XSEDE Canonical Use Case 2 Page 3
4 A. Document History Overall Document Authors: Ian Foster The University of Chicago and Argonne National Laboratory Argonne, IL Morris Riedel Jülich Supercomputing Centre Forschungszentrum Jülich GmbH D Jülich Germany Felix Bachmann Carnegie Mellon University th Avenue Pittsburgh, PA Andrew Grimshaw University of Virginia PO Box Charlottesville VA David Lifka Cornell University 512 Frank H. T. Rhodes Hall Ithaca, NY Version Date Changes Author First use case draft 0.1 3/21/2013 Document created Foster, Grimshaw, Hossain, Lifka, XSEDE Canonical Use Case 2 Page 4
5 Formatted draft /08/13 Applied standard formatting Revised draft /25/13 Cleaned up draft; ready for archiving Revised draft /29/13 Separated from UCCAN 1&3; ready to be archived Revised /8/13 Revisions based on review by stakeholders (C. Jordan, J.P. Navarro, S. Sakai, S. Smallen, D. Simmel, V. Hazelwood) Revised title 1.2 3/20/14 Changed title to Managed File Transfer Riedel, Tuecke Hossain Hossain Brown, Hossain Liming Liming XSEDE Canonical Use Case 2 Page 5
6 B. Document Scope This document is both a user-facing document (publically accessible) and an internal working document intended to define user needs and use cases that fall within the overall activities of 1 XSEDE. The definition of use cases is based on a template from Malan and Bredemeyer. In general it is in keeping with the approaches and philosophy outlined in Software architecture in practice. 2 This document is one component of a process that generates at least the following documents, some of which are user-facing, some are as of now intended to be internal working documents: This document - A description of use cases [User facing] A set of level 3 decomposition documents, which include: Quality Attributes descriptions Connections diagram in UML The use cases are presented here using the following format, derived from the Malan and Bredemeyer white paper 1 as follows: Use Case Description References Actors Prerequisites (Dependencies ) & Assumptions Steps Variations (optional) Quality Attributes Non-functional Use case identifier and reference number and modification history Goal to be achieved by use case and sources for requirement References and citations relevant to use case List of actors involved in use case Conditions that must be true for use case to be possible Conditions that must be true for use case to terminate successfully Interactions between actors and system that are necessary to achieve goal Any variations in the steps of a use case List of non-functional requirements that the use case must meet 1 Malan, R., and D. Bredemeyer Functional requirements and use cases. 2 Bass, L., P Paul Clements, and Rick Kazman XSEDE Canonical Use Case 2 Page 6
7 (optional) Issues List of issues that remain to be resolved XSEDE Canonical Use Case 2 Page 7
8 C. Glossary Please refer to the Glossary of Terms for Canonical Use Cases document. XSEDE Canonical Use Case 2 Page 8
9 D. Canonical Use Case 2 Use Case UC CAN 2 Description References Managed File Transfer The user instructs the system to transfer one or more files and/or directories from one file system to another and the system accomplishes it. The following documents are available via the XSEDE Use Case Registry, XSEDE Campus Bridging Use Cases, v1.5, 16 March XSEDE Federation and Interoperation Use Cases, v0.3, 22 January XSEDE Data Analytics Use Cases, v0.3, 14 June XSEDE Data Management Use Cases, v1.5, 24 April Visualization Use Cases, v1.3, 5 March XSEDE Scientific Workflow Use Cases, v0.3, 3 April XSEDE Science Gateway Use Cases, v0.4, 25 October Actors User: The user initiates the file transfer activity and presents a valid file transfer request. The user may be interacting directly with a command line interface, a Web browser, or an application such as a gateway, shell script, or Java, C, or Python program. Prerequisites (Dependencies) & Assumptions Steps a) The user knows the address of the file transfer service. b) The user is properly authenticated. c) The user has generated a file transfer request in the appropriate format, specifying the file(s) and/or directory(s) that are to be transferred, and the source and destination file systems. d) The source file(s) and directory(s) named in the request exist and the user is authorized to read them. e) There is sufficient space for those file(s) and directory(s) on the destination file system, and the user is authorized to write at the specified destination location. f) The file transfer service, source file system, destination file system, and intervening network do not fail during execution of the file transfer. 1. The user sends a file transfer request to the file transfer service and receives some form of request identifier in return. 2. (optional) The user polls the file transfer service periodically to determine the status of the transfer: for example, the amount of data and number of files that have been transferred successfully, and XSEDE Canonical Use Case 2 Page 9
10 whether the transfer has started, completed, or failed. 3. (optional) The user registers with the file transfer service to receive notifications of file transfer state change. 4. The file transfer service begins execution of the transfer. 5. (optional) The user cancels the transfer. This could occur either before or after step The transfer completes. 7. (optional) The user queries the transfer service to obtain the transfer s performance information, including total transfer time, number of bytes and files transferred, and bandwidth utilization data. Variations (optional) Quality Attributes [Note: The original variations (a) and (b) were treated elsewhere in this document.] c) Instead of specifying a list of files/directories to be transferred, the user may request that a source file or directory and a destination file or directory be synchronized, meaning that only files that differ between the source and destination are transferred. a) Any request to the file transfer service is acknowledged within one second.[source: campus bridging] b) The file transfer service can support, XSEDE-wide, a request rate of up to 1 request/second in aggregate from all users without error. [Source: A&D] c) The file transfer service can support XSEDE-wide, without error, at least 1,000 active transfer requests (i.e., under management, could be pending, active, etc) requests. [Source: A&D] d) Once a file transfer completes, the user may check its status for at least one month. [Source: A&D.] e) Request patterns that exceed the stated request submission rate or total active request limits are handled gracefully: e.g., by declining to accept further requests.[source: campus bridging] f) The file transfer service can be restarted (e.g., following failure or system administrator action) without losing track of file transfer requests that are queued or active at three Sigma.[source: campus bridging] g) Valid file transfer requests complete at two sigma. [source:campus bridging] h) The file transfer service will be available at three Sigma. [source: campus bridging] i) The file transfer service can restart a transfer that is interrupted by transient failures. [source: campus bridging] j) The combination of transfer efficiency and impact of failures and restarts provides efficiency that is at least as good as 50% of peak theoretically possible throughput of optimal network path and storage systems. [source: campus bridging] [The A&D team feels that this is a difficult to measure attribute, in particular, peak bandwidth of XSEDE Canonical Use Case 2 Page 10
11 end-to-end system.] k) If a user s request can not be accommodated by the transfer service (for example, if the user attempts to access a file system for which access is not authorized or if there is insufficient storage on the destination), the error message returned should be consistent, meaningful, and helpful. [source: campus bridging] l) The transfer service should provide at most once semantics, meaning that if the user submits the same file transfer request more than once (e.g., because an earlier submission was not acknowledged), the transfer will be executed at most once. m) The transfer service must provide a user-selectable option for requesting that the destination preserves the modification and access timestamps and mode bits (assuming Unix on both ends) from the original file(s) n) The transfer service must provide a user-selectable option for enabling confidentiality in the transfer request. I.e., cryptographic methods are used to prevent anyone else from eavesdropping the data being transferred. o) The transfer service must provide data integrity checking on all transfers. Non-functional (optional) Issues XSEDE Canonical Use Case 2 Page 11
XSEDE Data Management Use Cases
April 24, 2013 Version 1.5 Page 1 A B C D Table of Contents Document History... 3 Document Scope... 5 Summary of Data Movement Use Cases... 6 Data Movement Use Cases... 6 Page 2 A Document History Overall
GridFTP: A Data Transfer Protocol for the Grid
GridFTP: A Data Transfer Protocol for the Grid Grid Forum Data Working Group on GridFTP Bill Allcock, Lee Liming, Steven Tuecke ANL Ann Chervenak USC/ISI Introduction In Grid environments,
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
XSEDE Campus Bridging Cluster software distribution strategy and tactics
XSEDE Campus Bridging Cluster software distribution strategy and tactics 15 April 2013 Version 1.0 Available from: http://hdl.handle.net/2022/15459 Page i Table of Contents A. Document History... iii B.
Managing Variability in Software Architectures 1 Felix Bachmann*
Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA [email protected] Len Bass Software Engineering Institute Carnegie
Ecaccess Gateway, Tools and ectrans
Ecaccess Gateway, Tools and ectrans Dominique Lucas User Support [email protected] 18/02/2015 1 Content ECaccess concepts Ecaccess tools Ectrans Tutorial 18/02/2015 2 ECaccess - Concepts ECaccess provides
System Requirement Specifications (SRS)
(SRS) Assignment 1 Sample Solution 1 Table of Contents 1 Table of Contents... 1 2 Problem Statement... 2 3 Overview... 2 3.1 Background... 2 3.2 Overall Description... 2 4 Investigation & Analysis Methodology...
Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1
Migrating Your Windows File Server to a CTERA Cloud Gateway Cloud Attached Storage February 2015 Version 4.1 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
A Capability Maturity Model for Scientific Data Management
A Capability Maturity Model for Scientific Data Management 1 A Capability Maturity Model for Scientific Data Management Kevin Crowston & Jian Qin School of Information Studies, Syracuse University July
Siebel Application Deployment Manager Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013
Siebel Application Deployment Manager Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related
Archiving, Indexing and Accessing Web Materials: Solutions for large amounts of data
Archiving, Indexing and Accessing Web Materials: Solutions for large amounts of data David Minor 1, Reagan Moore 2, Bing Zhu, Charles Cowart 4 1. (88)4-104 [email protected] San Diego Supercomputer Center
JobScheduler Web Services Executing JobScheduler commands
JobScheduler - Job Execution and Scheduling System JobScheduler Web Services Executing JobScheduler commands Technical Reference March 2015 March 2015 JobScheduler Web Services page: 1 JobScheduler Web
CHAPTER 20 TESING WEB APPLICATIONS. Overview
CHAPTER 20 TESING WEB APPLICATIONS Overview The chapter describes the Web testing. Web testing is a collection of activities whose purpose is to uncover errors in WebApp content, function, usability, navigability,
nitrobit update server
nitrobit update server Administrator's Guide 2011 analytiq consulting gmbh. All rights reserved. Page 2 nitrobit update server Administrator's Guide Content I. Introduction... 4 Overview... 4 Components
An Approach to Software Architecture Description Using UML
An Approach to Software Architecture Description Using UML Henrik Bærbak Christensen, Aino Corry, and Klaus Marius Hansen Department of Computer Science, University of Aarhus Aabogade 34, 8200 Århus N,
Business Process Design As-Is and To-Be Checklists Introduction
Business Process Design As-Is and To-Be Checklists Introduction These business process design checklists were developed to help Federal IT staff, Records Managers, and Program Managers identify records
Going Google... with Gaggle!!!!
Going Google... with Gaggle!!!! Challenges of "Going Google" WRPS had been using Gaggle.net for student email. We were pleased with the filtering and notification- Google did not provide this level of
IBM Tivoli Netcool Configuration Manager 6.3 Administration and Implementation
IBM Tivoli Netcool Configuration Manager 6.3 Administration and Implementation Duración: 5 Días Código del Curso: TN550G Temario: This course provides a comprehensive set of skills needed to install, configure,
SQL Server Business Intelligence
SQL Server Business Intelligence Setup and Configuration Guide Himanshu Gupta Technology Solutions Professional Data Platform Contents 1. OVERVIEW... 3 2. OBJECTIVES... 3 3. ASSUMPTIONS... 4 4. CONFIGURE
Xcalibur. Foundation. Administrator Guide. Software Version 3.0
Xcalibur Foundation Administrator Guide Software Version 3.0 XCALI-97520 Revision A May 2013 2013 Thermo Fisher Scientific Inc. All rights reserved. LCquan, Watson LIMS, and Web Access are trademarks,
Data Management, Analysis Tools, and Analysis Mechanics
Chapter 2 Data Management, Analysis Tools, and Analysis Mechanics This chapter explores different tools and techniques for handling data for research purposes. This chapter assumes that a research problem
Connectivity Pack for Microsoft Guide
HP Vertica Analytic Database Software Version: 7.0.x Document Release Date: 2/20/2015 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
Functional Requirements and Use Cases
A R C H IT E C T U R E R For Enterprise Advantage http://www.bredemeyer.com E S O U R C E S B REDEMEYER CONSULTING, Tel: (812) 335-1653 Architecture Architects Architecting Functional Requirements and
Tracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
Microsoft Enterprise Search for IT Professionals Course 10802A; 3 Days, Instructor-led
Microsoft Enterprise Search for IT Professionals Course 10802A; 3 Days, Instructor-led Course Description This three day course prepares IT Professionals to administer enterprise search solutions using
Grid Scheduling Dictionary of Terms and Keywords
Grid Scheduling Dictionary Working Group M. Roehrig, Sandia National Laboratories W. Ziegler, Fraunhofer-Institute for Algorithms and Scientific Computing Document: Category: Informational June 2002 Status
Brown University Libraries Technology Plan, 2015-2017
Brown University Libraries Technology Plan, 2015-2017 Technology Vision Brown University Library creates, develops, promotes, and uses technology to further the Library s mission and strategic directions
Cornell University Center for Advanced Computing A Sustainable Business Model for Advanced Research Computing
Cornell University Center for Advanced Computing A Sustainable Business Model for Advanced Research Computing David A. Lifka [email protected] 4/20/13 www.cac.cornell.edu 1 My Background 2007 Cornell
High Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
Use Cases for Argonaut Project. Version 1.1
Page 1 Use Cases for Argonaut Project Version 1.1 July 31, 2015 Page 2 Revision History Date Version Number Summary of Changes 7/31/15 V 1.1 Modifications to use case 5, responsive to needs for clarification
Microsoft Project Server Integration with SharePoint 2010
Microsoft Project Server Integration with SharePoint 2010 Microsoft Project Server 2010: brings together the business collaboration platform services of SharePoint Server 2010 with structured execution
Software Requirements. Specification. Day Health Manager. for. Version 1.1. Prepared by 4yourhealth 2/10/2015
Software Requirements Specification. for Day Health Manager Version 1.1 Prepared by 4yourhealth Senior Project 2015 2/10/2015 Table of Contents Table of Contents Revision History Introduction Purpose Document
SOSFTP Managed File Transfer
Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP
JobScheduler Installation by Copying
JobScheduler - Job Execution and Scheduling System JobScheduler Installation by Copying Deployment of multiple JobSchedulers on distributed servers by copying a template JobScheduler March 2015 March 2015
Computer Science. 232 Computer Science. Degrees and Certificates Awarded. A.S. Degree Requirements. Program Student Outcomes. Department Offices
232 Computer Science Computer Science (See Computer Information Systems section for additional computer courses.) We are in the Computer Age. Virtually every occupation in the world today has an interface
TDDC88 Lab 2 Unified Modeling Language (UML)
TDDC88 Lab 2 Unified Modeling Language (UML) Introduction What is UML? Unified Modeling Language (UML) is a collection of graphical notations, which are defined using a single meta-model. UML can be used
How To Run A Cloud At Cornell Cac
On-Demand Research Computing Infrastructure as a Service Software as a Service Cloud Storage Solutions David A. Lifka Cornell Center for Advanced Computing [email protected] www.cac.cornell.edu 1 Cornell
SYSTEM REQUIREMENTS SPECIFICATION (SRS) February, 13, 2012 Version 3.1
SYSTEM REQUIREMENTS SPECIFICATION (SRS) February, 13, 2012 Version 3.1 i TABLE OF CONTENTS SYSTEM REQUIREMENTS SPECIFICATION (SRS)... i A Document History... A-4 B Scope... B-5 B.1 How to read this SRS....
Building CSIRT Capabilities
Building CSIRT Capabilities CERT CSIRT Development Team CERT Training and Education Center CERT Program Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 2005 by Carnegie Mellon
Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata
Implementing Network Attached Storage Ken Fallon Bill Bullers Impactdata Abstract The Network Peripheral Adapter (NPA) is an intelligent controller and optimized file server that enables network-attached
Software Architecture Action Guide. Why do we care about Software Architecture?
Software Action Guide Dana Bredemeyer Bredemeyer Consulting Tel: (812) 335-1653 Fax: (812) 335-1652 Email: [email protected] Web: Why do we care about Software? Because we want to be a dominant player
December 21, 2012. The services being procured through the proposed amendment are Hosting Services, and Application Development and Support for CITSS.
Justification for a Contract Amendment to Contract 2012-01: Interim Hosting and Jurisdiction Functionality for the Compliance Instrument Tracking System Service (CITSS) December 21, 2012 Introduction WCI,
Software development life cycle. Software Engineering - II ITNP92 - Object Oriented Software Design. Requirements. Requirements. Dr Andrea Bracciali
Software development life cycle Software life cycle: Software Engineering - II ITNP92 - Object Oriented Software Design Dr Andrea Bracciali Module Co-ordinator 4B86 [email protected] Spring 2014 (elicitation)
Hadoop Distributed File System. T-111.5550 Seminar On Multimedia 2009-11-11 Eero Kurkela
Hadoop Distributed File System T-111.5550 Seminar On Multimedia 2009-11-11 Eero Kurkela Agenda Introduction Flesh and bones of HDFS Architecture Accessing data Data replication strategy Fault tolerance
How Programmers Use Internet Resources to Aid Programming
How Programmers Use Internet Resources to Aid Programming Jeffrey Stylos Brad A. Myers Computer Science Department and Human-Computer Interaction Institute Carnegie Mellon University 5000 Forbes Ave Pittsburgh,
TIBCO Spotfire Statistics Services Installation and Administration Guide. Software Release 5.0 November 2012
TIBCO Spotfire Statistics Services Installation and Administration Guide Software Release 5.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH
Scheduling in SAS 9.3
Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006
/30/2006 2 3 4 5 6 7 8 9 0 2 3 4 5 6 7 8 9 20 2 22 23 24 25 26 27 28 29 30 3 32 33 34 35 36 37 38 39 = required; 2 = optional; 3 = not required functional requirements Discovery tools available to end-users:
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
The Direct Project Overview
The Direct Project Overview October 11, 2010 Abstract: The Direct Project specifies a simple, secure, scalable, standards-based way for participants to send authenticated, encrypted health information
Scheduling in SAS 9.4 Second Edition
Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute
Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard
Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2
Messaging over IP (MoIP) 6.1 Training Programs. Catalog of Course Descriptions
Messaging over IP (MoIP) 6.1 Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 3 MESSAGING-OVER-IP (MOIP) 6.1 SYSTEM SURVEY... 4 MESSAGING-OVER-IP (MOIP)
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
VMware Software Manager - Download Service User's Guide
VMware Software Manager - Download Service User's Guide VMware Software Manager 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is
SOA Standards - Patterns
SOA Standards - Patterns Contents 1 Message Exchange Patterns... 1 1.1 Synchronous request/response... 1 1.2 Synchronous Request/Acknowledgement... 1 1.3 Request/Acknowledgement/Poll... 2 1.4 Request/Acknowledgement/Callback...
StreamServe Persuasion SP5 Control Center
StreamServe Persuasion SP5 Control Center User Guide Rev C StreamServe Persuasion SP5 Control Center User Guide Rev C OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents
SharePoint 2013 - Comparison of Features
2013 - Comparison of Features 2013 Features User Authentication and Authorization Foundation 2013 Server 2013 Standard Server 2013 Enterprise User authentication in 2013 is the process that verifies the
How To Use A Siebel Email Response On A Microsoft Ipa 2.2.2 (Aipa) With A Pf-F2 (F2) And Pf.2A (F1) On A Mac
Siebel Email Administration Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related documentation
User's Guide: Beta 1 Draft
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Lync Server Agent vnext User's Guide: Beta 1 Draft SC14-7414-02 IBM Tivoli Composite Application Manager for Microsoft Applications:
XSEDE Service Provider Software and Services Baseline. September 24, 2015 Version 1.2
XSEDE Service Provider Software and Services Baseline September 24, 2015 Version 1.2 i TABLE OF CONTENTS XSEDE Production Baseline: Service Provider Software and Services... i A. Document History... A-
Centrify DirectAudit Jump Start Service
CENTRIFY DATASHEET Centrify DirectAudit Jump Start Service What is the Centrify DirectAudit Jump Start Service? The Centrify DirectAudit Jump Start Basic Service is designed to give customers a quick start
CA SiteMinder. Agent for IIS Installation Guide. r12.0 SP3
CA SiteMinder Agent for IIS Installation Guide r12.0 SP3 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Design Authorization Systems Using SecureUML
Design Authorization Systems Using SecureUML By Rudolph Araujo & Shanit Gupta, Foundstone Professional Services February 2005 Overview This whitepaper describes the Foundstone SecureUML template, a Microsoft
Civil & Environmental Engineering
Department of Civil & Environmental Engineering Developing Leaders of Innovation At the U.Va. Department of Civil and Environmental Engineering, our faculty and students serve society s need for sustainable
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
Cloud Attached Storage 5.0
Release Notes Cloud Attached Storage 5.0 March 2015 2015 Cloud Attached Storage 5.0 Release Notes 1 1 Release Contents Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
Grid Computing in SAS 9.4 Third Edition
Grid Computing in SAS 9.4 Third Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. Grid Computing in SAS 9.4, Third Edition. Cary, NC:
Software Requirements Specification. Schlumberger Scheduling Assistant. for. Version 0.2. Prepared by Design Team A. Rice University COMP410/539
Software Requirements Specification for Schlumberger Scheduling Assistant Page 1 Software Requirements Specification for Schlumberger Scheduling Assistant Version 0.2 Prepared by Design Team A Rice University
Oracle WebCenter Sites. Backup and Recovery Guide 11g Release 1 (11.1.1)
Oracle WebCenter Sites Backup and Recovery Guide 11g Release 1 (11.1.1) April 2012 Oracle WebCenter Sites Backup and Recovery Guide, 11g Release 1 (11.1.1) Copyright 2012 Oracle and/or its affiliates.
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,
Thank you for joining today s technical webinar
Overview of Primavera Unifier & Contract Management Don McNatty, PSP Jonathan McNatty, PSP August 28, 2013 2013 Technical Webinar Series Thank you for joining today s technical webinar Mute all call in
What you don t know about industrial GSM/GPRS modem communications
What you don t know about industrial GSM/GPRS modem communications A White Paper presented by: Ira Sharp Product Marketing Lead Specialist Phoenix Contact P.O. Box 4100 Harrisburg, PA 17111-0100 Phone:
Salesforce Certified Data Architecture and Management Designer. Study Guide. Summer 16 TRAINING & CERTIFICATION
Salesforce Certified Data Architecture and Management Designer Study Guide Summer 16 Contents SECTION 1. PURPOSE OF THIS STUDY GUIDE... 2 SECTION 2. ABOUT THE SALESFORCE CERTIFIED DATA ARCHITECTURE AND
Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using
Chapter 6, The Operating System Machine Level
Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General
BPMN by example. Bizagi Suite. Copyright 2014 Bizagi
BPMN by example Bizagi Suite Recruitment and Selection 1 Table of Contents Scope... 2 BPMN 2.0 Business Process Modeling Notation... 2 Why Is It Important To Model With Bpmn?... 2 Introduction to BPMN...
Anwendungsintegration und Workflows mit UNICORE 6
Mitglied der Helmholtz-Gemeinschaft Anwendungsintegration und Workflows mit UNICORE 6 Bernd Schuller und UNICORE-Team Jülich Supercomputing Centre, Forschungszentrum Jülich GmbH 26. November 2009 D-Grid
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
Using sftp in Informatica PowerCenter
Using sftp in Informatica PowerCenter Applies to: Informatica PowerCenter Summary This article briefs about how to push/pull files using SFTP program in Informatica PowerCenter. Author Bio Author(s): Sukumar
Rational Team Concert. Guido Salvaneschi Dipartimento di Elettronica e Informazione Politecnico di Milano [email protected].
Rational Team Concert Guido Salvaneschi Dipartimento di Elettronica e Informazione Politecnico di Milano [email protected] Project Areas The project area is the system's representation of a software
