APPLICATION TO MANAGEMENT OF MEDICAL IMAGES BACKUP USING MOBILE DEVICES BY SSH TUNNELING
|
|
|
- Terence Harrell
- 10 years ago
- Views:
Transcription
1 APPLICATION TO MANAGEMENT OF MEDICAL IMAGES BACKUP USING MOBILE DEVICES BY SSH TUNNELING Felipe Rodrigues Martinêz Basile 1, Flávio Cezar Amate 1,2 1 Núcleo de Pesquisas Tecnológicas, Mogi das Cruzes University, Mogi das Cruzes, Brazil 2 Instituto Federal de Educação, Ciência e Tecnologia de São Paulo, Bragança Paulista, Brazil Abstract: Considering the growing use of mobile devices on health area, we can observe that studies are necessary about viability of use of these new techologies to transmission of medical images over secure and reliable network environment. Because of this we purpose the development of software using shell script language to transmission of medical images, using mobile devices, attending security rules defined by national and international regulations. Through implementation of rsync linux command, SSH-2 tunneling, private and public keys on android and linux environment. In the comparison of transmission using different RSA cryptographic keys (1024 and 4096 bits), there isn't significant statistical difference using Student's t tests (p>0.05) in the performance considering total time and rate transmision in all 30 experiments. Finally, we can demonstrate the viability of transmission of medical images using mobile device to backup of medical information between two medical images servers considering performance, confiability and security. Keywords: Hospital Information Systems, Medical Informatics, Network Communication Protocols, Telemedicine. Resumo: Diante da crescente utilização de dispositivos móveis na área da saúde, observa-se a necessidade de estudos relacionados a viabilidade do emprego dessas novas tecnologias, para a transmissão de imagens médicas em um ambiente seguro e confiável. Por isso propomos o desenvolvimento de um software em linguagem shell script para transmissão de imagens médicas, utilizando-se dispositivos móveis, atendendo normas nacionais e internacionais em telemedicina, por meio da implementação do comando rsync, de um túnel criptografado com o protocolo SSH-2 e de chaves públicas e privadas em ambiente linux e android. Em todos os 30 experimentos não houve diferença estatística significativa (p>0.05) utilizando Teste t Student na comparação de desempenho utilizando chaves criptográficas com algoritmo RSA (1024 e 4096 bits), considerando tempo total gasto e taxa de transferência. Desse modo demonstrou-se a viabilidade da utilização de dispositivos móveis para a cópia de informações médicas entre dois servidores considerando desempenho, confiabilidade e segurança. Palavras-chave: Sistemas de Informação em Hospitais, Informática Médica, Redes de Comunicação de Computadores, Telemedicina. Introduction The process of digitalization of medical images become possible the archivment and transmission of these images by different computer systems¹. Hospitals and medical centers use hardware and software through PACS (Picture Archivment Communication Systems) to integrity patients information including exams and electronic health records². Considering the evolution of technology, we can observe the growing use of mobile devices on health area. At the same time that occur the development of mobile society, where there will the use of mobile devices with wireless network at the telemedicine³. In this context, the telemedicine can be employed on different areas as: electric engineering, computer science, biomedical engineering and medicine 4. Studies are necessary to promote the development of hospital information systems to understand new ways about transmission of medical information, helping health professionals to easy access of clinical records and fast transmission of medical images on real time 5,6. 1
2 In the transmission of medical information is very important maintainment of secret and confidentially, once time there are much information that can't be revealed as (HIV result tests, the use of drugs and alcohol and psych records 7 ). On January 15, 2009, the brazil federal council of medicine established resolutions 8 that regulate the main aspects to the transmission of electronic medical information at the country. This resolution was based on Tel Aviv Declaration (1999) 9 considering important points as: the establishment of an apropriated infra-structure where can be possible implements confidentially, private and professional secret aspects in the transmission of medical information. Studies were developed to analyze the viability of transmission of medical images using the process of SSH (Secure Shell) tunneling to cryptography of all information between remote computers using the SSH protocol version Comparing the performance between computers on different networks using HTTP (HyperText Transfer Protocol) and SSH protocols in the transmission of medical images over the internet. Moreover studies demonstrate the implementation of security aspects using SSH protocol version 2 with private and public keys to applied of secure authentication 10,11. Another important study was made about the development of an open source software based on Java and Shell script language implemented to linux environment to transmission of medical images using SSH tunneling 12. For this reason, studies are very necessary to understand new techniques about the transmission of medical information and development of hospital information systems to telemedicine services. Using different network communication protocols and attending national and international resolutions on telemedicine. Applying the use of mobile technologies to maintainment and update of computer services, and transmission of medical information between servers machine using SSH protocol, considering important aspects of computer communications as: performance, confiability and security 13. Methods Software Development Process First, we used the software development process to create our program to transmission of medical images. In the software development process is recommend some fundamental steps 14. Requirements (functional and non-functional), analyze and project, implementation and tests. Functional requirements are defined as: copy images and access server, as well as, non-functional requirements as: linux operating system, SSH protocol version 2, shell script language, wireless and local network, mobile device, indeed the external android application called ConnectBot. After this step, we made the analyze of requirements defining main software functionalities. As result of this, we built a software project based on functional requirements and development of use case context diagram that demonstrates functionalities of software without internal aspects by high level of comprehension. (See Figure 1) Figure 1: Use case context diagram 2
3 On the implementation step we wrote a shell script language inside linux operating system using text editor called Vim to write the source code. The command rsync was implemented with SSH-2 tunneling to run copy of images between two servers machines (See Figure 2). Figure 2: Rsync command implemented over SSH protocol version 2 After implementation steps, we did some functionalities tests called as black box tests. These tests verified software funcionalities without worried about internal aspects related to source code application 15. In view of that we created a script to running functional tests considering the use of rsync command (See Figure 3). Figure 3: Script to run functional test Experiments Second, we did some experiments considering the implementation of hardware architecture with the following materials: one tablet pc and two computers inside of WLAN (Wireless Local Area Network)(See Figure 4). The mobile device used on experiments was Tablet PC (Motorola Xoom) with the following characteristics : 1 GBytes of RAM memory, Hard Disk with 32 GBytes of capacity, dual-core processor technology, android operating system (Ice Cream Sandwich 4.0). The computer 1 (Medical Image Server A) has 2 GBytes of RAM memory, single-core processor technology (AMD Athlon 64 Processor 3000+) with linux operating system (Ubuntu Lucid bits). Together with the computer 2 (Medical Image Server B) which has 512 MBytes of RAM memory, Hard Disk with 20 GBytes, pentium 4 processor with 1.90 GHz, with linux operating system (Ubuntu Precise Pangolin LTS). Figure 4: Hardware Implementation Diagram Public and private keys was created based on concepts of SSH-2 protocol to authentication process between mobile device and medical images server A, likewise between medical images server A and medical images server B. 3
4 These keys were created using RSA cryptographic algorithm with 1024 bits and 4096 bits. These two keys with diferent values of bits was created to verify if the increase of bits number on key can will modify performance aspects on transmission of medical images between machines. Another important point of use of these keys is related to the authentication process without manual password typing, considering a secure authentication in communication between devices. The Android application connectbot 16 was used to establishment of a remote connection between mobile device and medical server A. This application allowed a secure remote connection by the implementation of SSH-2 tunneling, together with configuration of sshd_config file changing deafult number of communication port to improve security. The Figure 5 has a screen of mobile device that contain linux terminal of medical image server A. Figure 5: Screen of mobile device that contain linux terminal of medical images server A. Immediately, we used the software developed based on shell scripts language to transmission of medical images from server A to server B, using rsync command implemented over SSH protocol version 2. Results We did 60 experiments considering transmission of medical images by SSH-2 tunneling between two medical images servers with MB of data sent and received. We used the RSA cryptographic key with 1024 bits in 30 experiments and RSA cryptographic key with 4096 bits in others 30 experiments. In an effort to compare performance, observing the total time (s) and transmission rates (Mbytes/s) with different sizes of cryptographic keys. In accordance with statistical analyzes there isn't significative difference using Student's test t (p>0.05) when we compared average transmission rates using crypotographic key with 1024 bits with cryptographic key with 4096 bits and in the same way in the comparison of total time spent on transmissions. In the Table 1 is the comparative table related to performance using different cryptographic keys based on RSA algorithm. Table 1: Performance of transmissions with different cryptographic keys Cryptographic Algorithm Average Total time (s) Average transmission rates (MB/s) RSA 1024 bits RSA 4096 bits
5 Discussion The high level of security was established by SSH-2 tunneling with RSA cryptographic key of 4096 bits compared with another RSA crytographic key with 1024 bits. And results show that the increase of security by strong key didn't change the performance of transmission between machines on wireless local area network. Equally important we implemented the use of mobile devices to access medical image servers on telemedicine 3,4. We did all experiments following international and national regulations about appropriated infra-structure to transmission of electronic health information 8,9. And at the same time we applied secure concepts on development of software as: profissional secret and confidentially 7 by implementation of SSH-2 tunneling 10,11,12 used on experiments. Conclusion A new software based on software development process with SSH-2 tunneling using high level of security with strong RSA cryptographic keys of 4096 bits, and the use of rsync linux command can demonstrate the viability of transmission of medical images using mobile device, on android environment, to backup of medical information between two medical images servers considering performance, confiability and security. Acknowledgements The authors thank to FAEP (Fundação de Amparo a Pesquisa) and CAPES (Coordenação de Aperfeiçoamento de Pessoal e Nível Superior) by all financial support. References [1] Aach, T.; Schiebel, U.; Spekowius, G. Digital image acquisition and processing in medical x-ray imaging. Journal of Electronic Imaging.1999;8(1):7-22. [2] Armbrust, L. J. PACS and Image Storage. Veterinary Clinics of North America-Small Animal Practice. 2009;39(4): [3] Varshney, U. Pervasive healthcare and wireless health monitoring. Mobile Networks & Applications. 2007;12(2-3): [4] Lin, C-F. Mobile Telemedicine: A Survey Study. Journal of Medical Systems p [5] Liu, BJ, Zhou Z, Gutierrez, MA, Documet J, Chan L, HUANG, H. K. International Internet2 connectivity and performance in medical imaging applications: Bridging the Americas to Asia. Journal of High Speed Networks 2007;16(1): p [6] Ohashi K, Sakamoto N, Watanabe M, Mizushima H, Tanaka H. Development of a telediagnosis endoscopy system over secure Internet. Methods of Information in Medicine 2008; 47(2): [7] Kobayashi LOM, Furuie SS. Segurança em informações médicas: visão introdutória e panorama atual. Revista Brasileira de Engenharia Biomédica 2007;23(1): [8] Conselho Federal de Medicina - CFM. Define e Normatiza a Telerradiologia. Resolução n. 1890, de 15 de janeiro de Diário Oficial da União nº 12-19/01/2009 (Segunda-feira) - Seção 1 - Pág. 94. [9] Assembléia Geral da Associação Médica Mundial. Declaração de Tel Aviv. Sobre Responsabilidades e normas éticas na utilização da Telemedicina Tel Aviv, Israel. 5
6 [10] Basile FRM, Amate FC. Viability of Secure Transmission of medical images by SSH tunneling in the computer network. In: 4th IADIS International Conference e-society, Avila, Spain March [11] Basile FRM, Amate FC, Secure Transmission of medical images by SSH Tunneling. Proceedings in the Communications in Computer and Information Science (CCIS), 9-14 July 2011, Florida, USA. [12] Basile, F R M, Amate, FC. Open Source Application to secure transmission of medical images. In: V Congresso Latino Americano de Ingenería Biomédica, Havana, Cuba Mayo [13] Forouzan BA. Comunicação de dados e redes de computadores. 4a ed. São Paulo: McGraw-Hill; p.7. [14] Bezerra E. Visão Geral. Modelagem de Sistemas de Software. Princípios de Análise de Sistemas com UML. Rio de Janeiro: Campus; [15] Myers GJ, Wiley & Sons J. The Art of Software Testing, 2, Nova Jersey: [16] Root K, Sharkey J. ConnectBot Available at: Access on 02 march Contacts Author: Felipe Rodrigues Martinêz Basile. [email protected] Author: Flávio Cezar Amate [email protected] 6
TEACHING CALCULUS USING E-LEARNING IN A MOODLE PLATFORM
TEACHING CALCULUS USING E-LEARNING IN A MOODLE PLATFORM Caridade C.M.R., Faulhaber M.C., Rosa P.M., Silva P.M., Baeta N.S. Coimbra Institute of Engineering [email protected]; [email protected]; [email protected];
DEVELOPMENT AND IMPLEMENTATION OF AN AUTOMATED SYSTEM TO EXCHANGE ATTENUATORS OF THE OB85/1 GAMMA IRRADIATOR
2011 International Nuclear Atlantic Conference - INAC 2011 Belo Horizonte,MG, Brazil, October 24-28, 2011 ASSOCIAÇÃO BRASILEIRA DE ENERGIA NUCLEAR - ABEN ISBN: 978-85-99141-04-5 DEVELOPMENT AND IMPLEMENTATION
PERFORMANCE EVALUATION OF THE REFERENCE SYSTEM FOR CALIBRATION OF IPEN ACTIVIMETERS
2011 International Nuclear Atlantic Conference - INAC 2011 Belo Horizonte,MG, Brazil, October 24-28, 2011 ASSOCIAÇÃO BRASILEIRA DE ENERGIA NUCLEAR - ABEN ISBN: 978-85-99141-04-5 PERFORMANCE EVALUATION
AuditMatic Enterprise Edition Installation Specifications
Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this
Public Funding and the Beginning of a New Era in Higher Education in Brazil
80 Comparative & International Higher Education 5 (2013) Public Funding and the Beginning of a New Era in Higher Education in Brazil Danilo de Melo Costa a,* a Federal University of Minas Gerais, Brazil
Marcelo L. Braunstein Business Development Manager IBM Latin America [email protected]
Marcelo L. Braunstein Business Development Manager IBM Latin America [email protected] Education Research LA Grid Collaboration Talent Development 1 Education Research Collaboration Talent Development
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
Mconf: Global Webconferencing based on Open Source
Mconf: Global Webconferencing based on Open Source Felipe Cecagno ([email protected]) NRENs in the Dissemination of Innovative Low Cost Global Solutions: From Universities to the World Denver, April 9th
Streamlining Case Management Workflow
Streamlining Case Management Workflow Application Note Introduction The clinical data captured by AEDs and advanced life support monitor/defibrillators during resuscitation and transport is extremely valuable.
How To Model A Hexapod Robot With Six Legs
Thiago Augusto Ferreira 1, Armando Carlos de Pina Filho 2, Aloísio Carlos de Pina 3 1 Universidade Federal do Rio de Janeiro, Mechanical Engineering Department, Polytechnic School, Rio de Janeiro - RJ,
TA3 Dosimetry and Instrumentation. Evaluation of the Field Size in Dental Diagnostic Radiology System ANDRADE PS 1, POTIENS MP 1
TA3 Dosimetry and Instrumentation Evaluation of the Field Size in Dental Diagnostic Radiology System ANDRADE PS 1, POTIENS MP 1 1 Instituto de Pesquisas Energéticas e Nucleares, São Paulo, Brazil. ABSTRACT
An On-Line Medical Imaging Management for Shared Research in the Web using Pattern Features
An On-Line Medical Imaging Management for Shared Research in the Web using Pattern Features Gustavo Molitor Porcides [email protected] Terumi Kamada [email protected] Gilson Antonio Giraldi National
Sage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
inforouter V8.0 Server & Client Requirements
inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended
Migration of virtual machine to cloud using Openstack Python API Clients
Migration of virtual machine to cloud using Openstack Python API Clients Jyoti Joshi 1, Manasi Thakur 2, Saurabh Mhatre 3, Pradnya Usatkar 4, Afrin Parmar 5 1 Assistant Professor Computer, R.A.I.T., University
MANAGEMENT SYSTEM FOR A FLEET OF VEHICLES BASED ON GPS. João André Correia Telo de Oliveira
MANAGEMENT SYSTEM FOR A FLEET OF VEHICLES BASED ON GPS João André Correia Telo de Oliveira Author Affiliation(s) Instituto Superior Técnico, University of Lisbon, Portugal ABSTRACT This dissertation was
Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com [email protected] August 2015 Copyright 2015 1&1
GBD IAAS Manager: A Tool for Managing Infrastructure-as-a-Service for Private and Hybrid Clouds
GBD IAAS Manager: A Tool for Managing Infrastructure-as-a-Service for Private and Hybrid Clouds Carlos Roberto Valêncio [email protected] Diogo Lemos Guimarães [email protected] Andrielson Ferreira
Ambiente de Armazenamento
03 infra TI Ambiente de Armazenamento Principais componentes de Hosts e Armazenamento; Tipos de conectividade PCI, IDE/ATA, SCSI etc.; Componentes de um drive de disco; Desempenho de drives de disco; Sistemas
DIGITAL CERTIFICATION IN TELERADIOLOGY: A NECESSARY WARNING*
Teleradiology Digital certification in teleradiology: a necessary warning DIGITAL CERTIFICATION IN TELERADIOLOGY: A NECESSARY WARNING* Luiz Felipe Nobre 1, Aldo von Wangenheim 2, Rafael Simon Maia 3, Levi
ITA Mail Archive Setup Guide
This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than
Microsoft Office Outlook 2013: Part 1
Microsoft Office Outlook 2013: Part 1 Course Specifications Course Length: 1 day Overview: Email has become one of the most widely used methods of communication, whether for personal or business communications.
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
How To Improve Service Management For Effective It Governance
Universidade de São Paulo Brasil Centro de Computação Eletrônica (CCE) Improving Service Management for Effective IT Governance Mauro Cesar Bernardes [email protected] Tereza Cristina M.B. Carvalho [email protected]
Determination of the Effective Energy in X-rays Standard Beams, Mammography Level
Determination of the Effective Energy in X-rays Standard Beams, Mammography Level Eduardo de Lima Corrêa 1, Vitor Vivolo 1, Maria da Penha A. Potiens 1 1 Instituto de Pesquisas Energéticas e Nucleares
CQG Trader Technical Specifications. December 1, 2014 Version 2014-05
CQG Trader Technical Specifications December 1, 2014 Version 2014-05 Copyright 2014 CQG Inc. All rights reserved. Information in this document is subject to change without notice. Windows Vista, Windows,
Hardware and Software Requirements Engeman. Version 2015/01
Hardware and Software Requirements Engeman Version 2015/01 Hardware and Software Requirements for the operation of the solution Engeman This descriptive has as objective to specify the requirements of
Minimum System Requirements
NOTE Consider the information presented in this document as minimum requirements. Your organization may need a more robust configuration for optimal performance. Contact MD EMR Systems before finalizing
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
MedInformatix System Requirements
MedInformatix System Requirements Acentec, Inc. A MedInformatix installation requires a workstation for each user who will access the system and a central server to store and process the data. A large
OS Installation Guide Red Hat Linux 9.0
OS Installation Guide Red Hat Linux 9.0 C o n t e n t s Contents 3 About This Guide 5 1 Planning Your Installation 7 Requirements 7 2 Installing Red Hat 9.0 Error! Bookmark not defined. What s Next? 19
REDES DE ARMAZENAMENTO E ALTA DISPONIBILIDADE
REDES DE ARMAZENAMENTO E ALTA DISPONIBILIDADE O que é SAN? SAN Storage Área Network Rede de armazenamento. É uma rede de alta velocidade dedicada que possui servidores e recursos compartilhados de STORAGE
CloudBackup Installer Guide Linux. System Requirements. Get Started - Linux
System Requirements Operating System (RedHat, SuSE, Debain and Debain based systems such as Ubuntu) Solaris 10 Solaris 11 Hardware Resources PC with 1 Gigahertz (GHz) or higher processor clock speed recommended
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
Hard Disk Drive vs. Kingston SSDNow V+ 200 Series 240GB: Comparative Test
Hard Disk Drive vs. Kingston Now V+ 200 Series 240GB: Comparative Test Contents Hard Disk Drive vs. Kingston Now V+ 200 Series 240GB: Comparative Test... 1 Hard Disk Drive vs. Solid State Drive: Comparative
How To Get A Phd In Computer Science
Grupo de Pesquisa em Redes de Computadores DCC/UFMG José Marcos Silva Nogueira Workshop de Telecom Unicamp, Campinas, 2015 Universidade Federal de Minas Gerais - UFMG Universidade Federal de Minas Founded
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Hypervisor by Chronos Specifications
Hypervisor by Chronos Specifications Hypervisor is an astronomical hub. It is the connection between the user s computer, smartphone or tablet and your observatory appliances. Hypervisor is a Linux-based
Microsoft Office Outlook 2010: Level 1
Microsoft Office Outlook 2010: Level 1 Course Specifications Course length: 8 hours Course Description Course Objective: You will use Outlook to compose and send email, schedule appointments and meetings,
System of Monitoring/Management of resources and security for a Grid based on Globus Toolkit
System of Monitoring/Management of resources and security for a Grid based on Globus Toolkit Luis Rodrigo de Oliveira Gonçalves [email protected] Laboratório Nacional de Computação Científica LNCC 2 June
Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V.
EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management
Requirements. System Requirements. System Requirements, page 1 Port Requirements, page 4 Supported Codecs, page 5
System, page 1 Port, page 4 Supported Codecs, page 5 System Each of the components listed in the following table must meet the requirements. Use of unsupported components can result in a nonfunctional
Secure Access Using VPN
Secure Access Using VPN WHAT IS CISCO SSL VPN? Cisco is the brand name of the VPN appliance (hardware). The SSL VPN stands for Secure Sockets Layer Virtual Private Network. SSL VPN is a service that allows
Hardware and Software Requirements for Sage 50 v15 to v22
Hardware and Software Requirements for Sage 50 v15 to v22 Sage 50 Accounts v22 Note: The Sage Data Service has the same system requirements as Sage 50 Accounts v22. Note: For more information on support
Table 1. Requirements for Domain Controller. You will need a Microsoft Active Directory domain. Microsoft SQL Server. SQL Server Reporting Services
The following tables provide the various requirements and recommendations needed to optimize JustWare system performance. Note that the specifications provided in this section are only minimum specifications.
1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM
1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM 1.1 PRECONDITIONS FOR USING HAL E-BANK: An appropriate PC with Windows XP, Windows 2003, Windows Vista or Windows 7 operating system installed;
Ivara EXP Installation Prerequisites
Ivara EXP Installation Prerequisites Copyright 2013 Bentley Systems, Incorporated. All rights reserved. Including software, file formats, and audiovisual displays; may only be used pursuant to applicable
Installing Emageon PACS Remote Ultravisual
The PACS DICOM visualization software for Carondelet Health Network is a Java based application that is installed from the PACS Archive servers. Before proceeding with the installation please see Table
Minimum System Requirements
GE Healthcare Minimum System Requirements January 2013 Site Definitions System requirements can vary, depending on the size of your site. Site Size Small Medium Large Definition 1 25 providers or 1 75
DEVELOPMENT OF A SECURE FILE TRANSFER PROTOCOL FOR AN ENTERPRISE AND CAMPUS NETWORK
ADVANCES IN SCIENTIFIC AND TECHNOLOGICAL RESEARCH (ASTR) VOL. 1(2), pp. 74-87, MAY 2014 REF NUMBER: ONLINE: http://www.projournals.org/astr -------------------------------------------------------------------------------------------------------------------------------
RSA AUTHENTICATION AGENTS FOR MICROSOFT WINDOWS
RSA AUTHENTICATION AGENTS FOR MICROSOFT WINDOWS Components Available with Each Version of RSA Agents for Microsoft Windows Agent Local Authentication Client RSA Authentication Agent 6.1.3 Remote Authentication
Evaluation of the image quality in computed tomography: different phantoms
Artigo Original Revista Brasileira de Física Médica.2011;5(1):67-72. Evaluation of the image quality in computed tomography: different phantoms Avaliação da qualidade de imagem na tomografia computadorizada:
Softline VIP Payroll System Requirements v2.9a January 2010
i Softline VIP Payroll System Requirements v2.9a January 2010 Table of Contents Introduction... 1 Assumptions... 1 Standalone Requirements... 2 Note:Peer-to-peer Network Installations... 2 Peer-to-peer
Remote Desktop on Mobile
Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to
Document management and exchange system supporting education process
Document management and exchange system supporting education process Emil Egredzija, Bozidar Kovacic Information system development department, Information Technology Institute City of Rijeka Korzo 16,
intertrax Suite resource MGR Web
intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;
PORTUGAL: Total EC Funding: 86M (1.4% of total) Total number of participations: 247 (1.7% of total) Number of project co-ordinations: 17
Portugal ICT R&D In 2009, business expenditure on R&D (BERD) in the ICT sectors amounted to 399M, up from 386M the year before. The share of ICT in total BERD is quite high, at around 31%; In 2011, public
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
CAMAvision v18.5.x System Specification Guide 7/23/2014
The computer industry is very fast moving, with larger and faster technologies supplanting previous hardware releases within six to nine months. Some of the specifications listed may no longer be available,
Curriculum Vitae. Sílvia Barcellos Southwick
Curriculum Vitae Sílvia Barcellos Southwick updated January 2010 401 Amber Pine St., Apt. 206 Las Vegas, NV 89144 email: [email protected] website: http://faculty.unlv.edu/ssouthwick Phone: (702)
System Requirements for Computer-Based Testing AzMERIT
System Requirements for Computer-Based ing AzMERIT This document contains basic technology requirements for online testing using American Institutes for Research s (AIR) systems for the 2015 2016 test
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
IUCLID 5 Guidance and support. Installation Guide Distributed Version. Linux - Apache Tomcat - PostgreSQL
IUCLID 5 Guidance and support Installation Guide Distributed Version Linux - Apache Tomcat - PostgreSQL June 2009 Legal Notice Neither the European Chemicals Agency nor any person acting on behalf of the
COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER
COMMUNICATION SERVER 1000 COMMUNICATION SERVER 1000 TELEPHONY MANAGER TECHNICAL SPECIFICATIONS Communication Server 1000 Telephony Manager 3.2 Communication Server 1000 Telephony Manager 3.0 Communication
File Protection using rsync. Setup guide
File Protection using rsync Setup guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync technology... 3 Terminology... 3 Implementation... 3 3. Rsync data hosts...
SECURELINK.COM REMOTE SUPPORT NETWORK
REMOTE SUPPORT NETWORK I. INTRODUCTION EXECUTIVE SUMMARY MANAGING REMOTE SUPPORT IN A SECURE ENVIRONMENT Enterprise software vendors strive to maximize support efficiency log on to the customer system,
A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application
A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application K. Akhila 1 B. Prathyusha 2 M. PavanKumar 3 M. Amrutha 4 Research Scholar Research Scholar Research Scholar
JAMF Software Server Installation and Configuration Guide for Windows. Version 9.3
JAMF Software Server Installation and Configuration Guide for Windows Version 9.3 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this
Historical overview University main fields Degree programs Campus Organic units Bachelor degrees Master s degrees. Contents
Historical overview University main fields Degree programs Campus Organic units Bachelor degrees Master s degrees Contents Historic overview Public university established in 1972 Member of Foundation of
Computer Virtualization in Practice
Computer Virtualization in Practice [ life between virtual and physical ] A. Németh University of Applied Sciences, Oulu, Finland [email protected] ABSTRACT This paper provides an overview
BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER
Training course 2007 BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER Nicolas FUNKE PS2 ID : 45722 This document represents my internships technical report. I worked for the Biarritz's Town Hall during
Online Student Attendance Management System using Android
Online Student Attendance Management System using Android ABSTRACT: We have seen over the years that the process of manual attendance has been carried outacross almost all educational institutions. The
Requirements for Rosetta Installation. Version 4.2
Requirements for Rosetta Installation Version 4.2 CONFIDENTIAL INFORMATION DISCLAIMER The information herein is the property of Ex Libris Ltd. or its affiliates and any misuse or abuse will result in economic
Deploying and Managing Microsoft Exchange Server 2013
Deploying and Managing Microsoft Exchange Server 2013 Module Overview 1. Exchange Server 2013 Prerequisites and Requirements 2. Exchange Server 2013 Deployment 3. Managing Exchange Server 2013 1. Exchange
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems
Course Name: Linux Server Administration Course Code: PGDNA121 To understand the basic principles underlying Server Software Planning and Deploying Linux Server Manage the Servers Efficiently Fundamentals
Building an efficient and inexpensive PACS system. OsiriX - dcm4chee - JPEG2000
Building an efficient and inexpensive PACS system OsiriX - dcm4chee - JPEG2000 The latest version of OsiriX greatly improves compressed DICOM support, specifically JPEG2000 1 support. In this paper, we
RC6. Marcel Felipe Weschenfelder
RC6 Marcel Felipe Weschenfelder Introduction Operations Algorithm Performance Crypto analyse Highlight/lowlight Conclusion References Agenda RC6 Introduction Designed by: Ron Rivest, Matt Robshaw, Ray
Using Free Software at a Portuguese Secondary School of Arts
Using Free Software at a Portuguese Secondary School of Arts Alexandre Martins and Fernando Leal Escola Secundária Artística de Soares dos Reis Porto, Portugal [email protected] [email protected] 1. Introduction
VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com
VERSION 9.02 INSTALLATION GUIDE www.pacifictimesheet.com PACIFIC TIMESHEET INSTALLATION GUIDE INTRODUCTION... 4 BUNDLED SOFTWARE... 4 LICENSE KEY... 4 SYSTEM REQUIREMENTS... 5 INSTALLING PACIFIC TIMESHEET
Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
RUGGEDCOM NMS for Linux v1.6
Welcome to RNMS 1 Installation 2 RUGGEDCOM NMS for Linux v1.6 Notes on RNMS 3 Installation Upgrades 4 09/2013 Copyright 2013 Siemens AG All rights reserved. Dissemination or reproduction of this document,
Online Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
Cisco IP Communicator (Softphone) Compatibility
Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator is Windows based and works on both XP and Vista The minimum PC requirements for use with Microsoft Windows XP are: Microsoft Windows
Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved.
Parallels Virtuozzo Containers 4.0 for Linux Readme Copyright 1999-2011 by Parallels Holdings, Ltd. All rights reserved. This document provides the first-priority information on Parallels Virtuozzo Containers
