Real Vision Imaging. Use a Proxy Server to Connect Your IBM i to the Web. IBM Has Discontinued Service and Support for ALL 3995/3996 Optical Libraries
|
|
- Charleen Clare Baldwin
- 8 years ago
- Views:
Transcription
1 January 2013 YOUR DOCUMENT MANAGEMENT SOLUTION Real Vision Imaging Use a Proxy Server to Connect Your IBM i to the Web Real Vision Software, Inc. P.O. Box Alexandria, LA Jackson Street Suite 203 Alexandria, LA Would you like to run your IBM i on the web without actually putting it on the web? That s where a Proxy Server comes into play. A Windows server becomes your web presence and is linked to your IBM i using a PHP program as a go between, keeping the IBM i removed from the web but having functionality as if it was directly connected. This functionality will allow you to run RVI s web-based Image Inquiry and will display your IBM i pages to the web. RVI has recently developed the PHP program that will provide this connection. It requires PHP server code for your Windows Server which is open source. For more information, contact: Monty Chicola Phone rvoffice@realvisionsoftware.com Technical Support Hours: Monday Friday 8:00 am to 6:00 pm CST P F Support@ realvisionsoftware.com IBM Has Discontinued Service and Support for ALL 3995/3996 Optical Libraries On December 31, 2012, IBM stopped service and support for their 3995/3996 Optical Libraries. RVI can work with you to provide conversion custom code to move your data from the 3995/3996 Optical Libraries to new storage devices. This can be time intensive depending on the number of optical cartridges a customer needs to convert. We expect there to be many customers that will need our conversion services, please contact us to schedule your conversion as soon as you can. For a custom code proposal, contact Kenny Smith at our office ( ) or him at kenny@realvisionsoftware.com. An RVI Certified Business Partner will work with you to determine your options and make recommendations for replacement of your optical libraries with an Imation or Alliance Archive Appliance that will best suit your company's needs. For more information about RVI data storage options, please visit or contact us. For information about the IBM Virtual Optical Library solution, see page 3..
2 Encryption and Decryption within RVI Encrypt transitive verb \in-kript, en-\ See ENCODE Encode transitive verb \in-kōd, en-\ 1a : to convert (as a body of information) from one system of communication into another; especially : to convert (a message) into code Until recently, the decision to encrypt images and/or data has been a choice made by IT Managers, Human Resource Managers, customer service managers, security professionals, et al. More times than not, that decision had to be made based on the risk of the images and/or data being compromised, the cost of encryption (hardware and/or software), processing overhead, the unwieldiness of the encryption process, and the possibility that the encryption/decryption keys could be lost or stolen. The latter risk of losing the keys to decrypt the information would likely result in the images and/or data being lost or inaccessible. These collective risks would usually result in a decision against encryption. However, criminal acts such as stolen identities, the hacking of credit card databases, etc. have forced lawmakers and corporate entities to rethink the idea of encryption. Legislation requiring encryption of stored information, coupled with the sheer necessity of protecting private information and resources, has led the IT world into an entirely new realm of security measures, whether information is stored on traditional storage media (internal disk drives) or on portable devices (external storage appliances). With the proliferation of low cost external storage appliances, the exposure of data is of concern, particularly when the data on the storage device is accessible to the internet or local networks that are in turn accessible from the internet. In order to meet the requirements of encrypting image and report files that are stored on external media and/or storage appliances, RVI has developed an optional encryption/ decryption system based on IBM s encryption and decryption Application Programming Interfaces (API). The API s use the 256-bit Advanced Encryption Standard (AES). AES is a commonly used encryption and decryption standard used by federal agencies of the United States government, the Department of Defense, and many companies in the private sector. This encryption and decryption standard is approved by the Federal Information Processing Standards Publication 197 (FIPS 197) by the United States Department of Commerce. The RVI Encryption and Decryption System encrypts image and spool data as it is moved to storage (the RVI burn process). When capturing spool reports, there is an optional postcapture program that can be deployed that will automatically encrypt and burn the spool data to storage. Then, when the images or spool data is retrieved for viewing or other processing, the data is decrypted. In addition to the encryption and decryption of image and spool data, there are RVI API s for encrypting and decrypting strings of data. These API s are useful for the encryption of information included in web browsers Universal Resource Locators (URL). For example, you could a link to your IBM i and encrypt information such as account numbers or other identifying information. Your HTTP server software can then take that URL and decrypt the encrypted part of the URL and then act on the information provided. The RVI Encryption and Decryption System does not encode and decode communications across networks, such as the communications that take place between web browsers and web servers. Communications encryption and decryption is better suited to a secure communications layers such as Hypertext Transport Protocol Secure (HTTPS). HTTP Strict Transport Security is recommended to be used in conjunction with HTTPS. IBM has a Software Technical Document ( ) on configuring HTTPS with the IBM HTTP Server for IBM i and IBM WebSphere Application Server 6.0. This RVI feature requires an operating system of V5R4 or higher. It is recommended that your IBM i be at current cumulative PTF levels. Mike Miller Real Vision Imaging January
3 Cleaning Up Your Spool Audit File It s a good idea to keep the Spool Audit file fairly clean. The RVI Spool Audit file exists to keep a file from being processed repeatedly and if not maintained, it can fill up. When this happens, the capture of reports and other spool files is curtailed based upon duplicate spool file numbers. So, about three times a year, at the command line, type, Go Image <enter> Choose Option 14: System Operator Menu Choose Option 15: Purge Spool File Audit Records Input a value (120 for example) in Purge Spool Audit Records Over Days Old. This value is dependent upon the actual age of the records residing in the particular out queue. Enter a Y in Submit Process To Batch? Enter a Y in Compress Spool Audit File? <enter> Based on the Date field (capture date) in the Spool Audit file, all records before that date, up to the number of days specified, will be deleted. Alan Carey IBM Virtual Optical Library Solution IBM has provided a virtual optical library solution for IBM i 7.1 that essentially emulates the 3995/3996 infrastructure using the /QOPT file system to access virtual optical volumes on the IBM i managed disk (stored on IFS). This solution has the following benefits: No changes required to your existing optical-based applications - the same file system and volume names are maintained allowing the application (s) to continue to access objects from the virtual volumes and IBM i disk speed access times. Full support of RAID and/or mirrored disk on IBM i Use of IBM i backup/restore process to either IBM i tape or DVD Ability to maintain HA/DR copies easily on secondary IBM i systems Full worm compatibility Coupled with the high speed optical copy utility from IBM that performs a stream copy from physical optical to virtual optical volumes, this solution provides the fastest and most efficient method of migration off of the 3995/3996/Plasmon direct attached jukeboxes. Note that this copy utility will run on OS V5R4, 6.1 or For additional information, contact Mark Even, IBM Lab Services Phone (507) , even@us.ibm.com 3
4 Failure to Initialize System Profiles When opening your RVI viewer, the emergence of the error Failed to initialize system profiles is caused by the viewer s failure to obtain a copy of the system.txt file from the IMAGE directory on your IBM i and copy it to C:\RVI\profiles on your PC. To eliminate this error, follow the steps below: In the RVI Viewer, click Host, Profile Directory and make sure the path listed there is valid and is pointing to the IMAGE directory on your IBM i. Once you enter a valid path, click OK, and the application will attempt to access and copy the system.txt file using the specified profile directory path. You can also force the viewer to attempt to copy system.txt to C:\RVI\Profiles by opening and closing the viewer or by clicking Host, Download Profiles. If the application is successful at copying system.txt, you will find a copy of the file on the PC in C:\RVI\Profiles. Real Vision Imaging January
5 If the path specified under Profile Directory starts with FTP://, then you will need to provide a User ID and Password in the viewer under Image/Preferences/FTP Support. If a valid User ID and Password is provided, the application will be able to authenticate the user and copy the system.txt file to the PC. To ensure that the system.txt file exists on your System i and is available for the RVI PC viewer to download, follow these steps: At an IBM i command line, type Go Image <enter> At the RVI Main Menu, choose Maintenance Menu (option 8) <enter> At the Maintenance Menu, choose Maintain Image System Descriptions and Key Fields (option 1) <enter> At the Maintain Image System Description Screen press <enter> 4 to bring up a list of all image systems. Select any system code and press <enter> through all the screens. Press F3 to exit the Maintain Image System Description and Key Fields Screen. An update process will take place behind the scenes and the system.txt will be automatically updated. To verify that the system.txt exists on your System i: At a System i command line, type wrklnk image <enter> Enter a 5 next to the IMAGE directory <enter> Verify that the file is there. McKenzy Lewis Check-out the Checkbox! We re starting out the new year with a fresh new RVI look! Many of our customers already take advantage of one of our browser options (traditional internet or internet frame) based on user preferences for a point and click interface. We have enhanced this with a similar look and feel to a folder directory structure familiar to most Windows users. We call this new option the RVI Checkbox Control look. Here s how it works: Step #1 An authorized user accesses one of their RVI systems either interfaced to their application or with a stand-alone inquiry as shown in this example. Step #2 The user can specify appropriate index filters to locate the documents they are searching for. In this example, the user is looking for all documents on file related to Case # Continued on page 6 5 5
6 Check-out the Checkbox! continued Step #3 The RVI subfile is presented in the side panel of the new Checkbox Control viewer. Each folder can be expanded to view contents. The user can select some (or all) of the documents for viewing by checking the appropriate boxes. The documents selected will be delivered as PDFs in the primary display panel. Step #4 In addition to secured viewing, users can be granted additional permissions such as printing, ing, faxing or maintaining index details. RVI would be interfaced to your or fax system for delivery as shown in this fax example. These user actions are tracked and audited by the RVI system as they are with any other RVI look. So what does the Checkbox Control enhancement cost? It s a new feature in our base RVI Version 8.0 code so there are no software costs for customers who have an active software maintenance contract. If you are interested in moving to the RVI Checkbox Control look, contact Support at RVI for additional details and requirements to get started. Len Knudsen The IBM logo is a registered trademark and the IBM Business Partner Emblem is a trademark of International Business Machines Corporation of America and are used together under license. Real Vision Imaging January
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationInstallation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
More informationTenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
More informationBusinessLink Software Support
BusinessLink Software Support V2R5 Upgrade Instructions Existing SSL Installations SSL Certificate Conversion Pre-Upgrade Table of Contents Overview... 1 Requirements For Certificate Conversion... 1 OS/400
More informationContents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10
Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...
More informationLesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
More informationImplementing Secure Sockets Layer on iseries
Implementing Secure Sockets Layer on iseries Presented by Barbara Brown Alliance Systems & Programming, Inc. Agenda SSL Concepts Digital Certificate Manager Local Certificate Authority Server Certificates
More informationADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationUser Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration
User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves
More informationOperating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
More informationOutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationWhatsUp Log Management Installation and Migration Guide, including Getting Started Information. (Applies to v10.1.5 and later)
WhatsUp Log Management Installation and Migration Guide, including Getting Started Information (Applies to v10.1.5 and later) C o n t e n t s Getting Started with WhatsUp Log Management Before You Begin...
More informationFileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationGoAnywhere Director to GoAnywhere MFT Upgrade Guide. Version: 5.0.1 Publication Date: 07/09/2015
GoAnywhere Director to GoAnywhere MFT Upgrade Guide Version: 5.0.1 Publication Date: 07/09/2015 Copyright 2015 Linoma Software. All rights reserved. Information in this document is subject to change without
More informationTwo Factor Authentication in SonicOS
Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage
More informationVersion 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform
Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically
More informationCustomer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using
More informationMetalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015
Metalogix Replicator Quick Start Guide Publication Date: May 14, 2015 Copyright Metalogix International GmbH, 2002-2015. All Rights Reserved. This software is protected by copyright law and international
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationPerceptive Intelligent Capture Solution Configration Manager
Perceptive Intelligent Capture Solution Configration Manager Installation and Setup Guide Version: 1.0.x Written by: Product Knowledge, R&D Date: February 2016 2015 Lexmark International Technology, S.A.
More informationUniversal Backup Device with
Universal Backup Device with Fibre Channel Disk to Disk Backup with Affordable Deduplication and Replication for IBM Power Systems Executive Overview Copyright (c)2015 Electronic Storage Corporation Universal
More informationHow To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
More informationIBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
More informationInstallation Guide ARGUS Symphony 1.6 and Business App Toolkit. 6/13/2014 2014 ARGUS Software, Inc.
ARGUS Symphony 1.6 and Business App Toolkit 6/13/2014 2014 ARGUS Software, Inc. Installation Guide for ARGUS Symphony 1.600.0 6/13/2014 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationAlliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
More informationEMC DATA DOMAIN ENCRYPTION A Detailed Review
White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to
More informationVirtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
More informationDocufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
More informationfåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
More informationCLIENT CERTIFICATE (EAP-TLS USE)
PRIMEXIAQ & TEMP SERIES SENSORS CLIENT CERTIFICATE (EAP-TLS USE) SETUP GUIDE Doc Part No.: SNSDOC-055 01.26.15 Legal Notice Copyright 2015 Primex Wireless, Inc. All rights reserved. SNS is a trademark
More informationi5/os and related software Distributing software
System i and System p i5/os and related software Distributing software Version 6 Release 1 System i and System p i5/os and related software Distributing software Version 6 Release 1 Note Before using
More informationIBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support
Software Announcement June 1, 2004 Services Expedite software adds Secure Sockets Layer TCP/IP support Overview Services Expedite software for Microsoft Windows, AIX, and OS/400 is being enhanced to support
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationClient side. DESlock + Data Encryption
Data Encryption DESlock + is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side
More informationUnderstanding Connected DataProtector
Understanding Connected DataProtector Version 7.1 Includes Data Center Information 2003 Connected Corporation. All Rights Reserved. Connected, Connected DataProtector, Connected EmailOptimizer, iroam,
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationBitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
More informationOverview of Active Directory Rights Management Services with Windows Server 2008 R2
Overview of Active Directory Rights Management Services with Windows Server 2008 R2 Student Manual Module 3: Active Directory Rights Management Clients and Information Rights Management on Desktop Applications
More informationBMC Remedy Integration Guide 7.6.04
BMC Remedy Integration Guide 7.6.04 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their
More informationUSER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------
USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support
More informationFileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationPerformance Navigator Installation
Midrange Performance Group / Performance Navigator Business Partner Installation / SOS / Capacity Planning Guide Aug 1, 2011 Overview Performance Navigator provides three main functions for the IBM i platform:
More informationUniversal Backup Device The Essential Facts of UBD
Information Technology Solution Brief Universal Backup Device The Essential Facts of UBD Fibre Channel Disk to Disk Backup for IBM Power Systems Copyright (c)2014 Electronic Storage Corporation Information
More informationInstallation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.
More informationUpgrading Redwood Engine Software. Version 2.0.x to 3.1.0
Upgrading Redwood Engine Software Version 2.0.x to 3.1.0 December 2013 APP NOTE Table of Contents 1 Introduction... 3 1.1 Backing Up the Redwood Engine Configuration, Statistics, and Log Files... 3 2 Checking
More informationBackup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
More informationFileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationArchive Attender Version 3.5
Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,
More informationUSER MANUAL. v. 11.4.1 ---------------------- December 2015 ----------------------
USER MANUAL v. 11.4.1 ---------------------- December 2015 ---------------------- Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark 15
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationExploiting the Web with Tivoli Storage Manager
Exploiting the Web with Tivoli Storage Manager Oxford University ADSM Symposium 29th Sept. - 1st Oct. 1999 Roland Leins, IBM ITSO Center - San Jose leins@us.ibm.com Agenda The Web Client Concept Tivoli
More informationhttp://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationSterling Integrator. PGP Server Manager 5.1
Sterling Integrator 5.1 Contents Overview of...3 Create a PGP Server Profile...3 Edit a PGP Server Profile...5 Delete a PGP Server Profile...5 2 Overview of The enables you to add, edit, and delete PGP
More informationWebmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationGladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
More informationIntegrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
More informationArchive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
More informationSpecops Command. Installation Guide
Specops Software. All right reserved. For more information about Specops Command and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Command is a trademark owned by Specops
More informationThales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.
ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright
More informationFileMaker Server 12. FileMaker Server Help
FileMaker Server 12 FileMaker Server Help 2010-2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.
More informationUSER MANUAL. v. 11.3 ------------------------ January 2014 ------------------------
USER MANUAL v. 11.3 ------------------------ January 2014 ------------------------ 1 Contents At a Glance Miscellaneous 3 About EncryptDisc 14 Product info 4 About this manual 15 Copyright & trademark
More informationInstall SQL Server 2014 Express Edition
How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationFileMaker Server 13. Custom Web Publishing with PHP
FileMaker Server 13 Custom Web Publishing with PHP 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks
More informationFileMaker Server 13. FileMaker Server Help
FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
More informationSymantec Backup Exec 2010 R2. Quick Installation Guide
Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationuh6 efolder BDR Guide for Veeam Page 1 of 36
efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder
More informationForward proxy server vs reverse proxy server
Using a reverse proxy server for TAD4D/LMT Intended audience The intended recipient of this document is a TAD4D/LMT administrator and the staff responsible for the configuration of TAD4D/LMT agents. Purpose
More informationBCTextEncoder Help File
BCTextEncoder Help File Introduction Introduction Main Features BCTextEncoder Requirements BCTextEncoder Specifications 2 Introduction BCTextEncoder is a line in BestCrypt family of encryption software
More informationFeature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
More informationSolutions for Encrypting Data on Tape: Considerations and Best Practices
Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to
More informationWebSphere Application Server security auditing
Copyright IBM Corporation 2008 All rights reserved IBM WebSphere Application Server V7 LAB EXERCISE WebSphere Application Server security auditing What this exercise is about... 1 Lab requirements... 1
More informationRSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
More information1 of 10 1/31/2014 4:08 PM
1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationInstalling and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
More informationetoken Enterprise For: SSL SSL with etoken
etoken Enterprise For: SSL SSL with etoken System Requirements Windows 2000 Internet Explorer 5.0 and above Netscape 4.6 and above etoken R2 or Pro key Install etoken RTE Certificates from: (click on the
More informationAdministration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
More informationHow to Install a Network-Licensed Version of IBM SPSS Statistics 19
How to Install a Network-Licensed Version of IBM SPSS Statistics 19 Important: IBM SPSS Statistics 19 requires either Windows XP Professional or later. IBM SPSS Statistics 19 installs from a DVD and your
More informationHost Access Management and Security Server
Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.
More informationCONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE
White Paper CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Enabling WebDAV on Your Lenovo Network Storage Device 1 Accessing Shares from Your Computer
More informationInstall and configure SSH server
Copyright IBM Corporation 2009 All rights reserved Install and configure SSH server What this exercise is about... 1 What you should be able to do... 1 Introduction... 1 Part 1: Install and configure freesshd
More informationIBM i Version 7.2. Systems management Advanced job scheduler
IBM i Version 7.2 Systems management Advanced job scheduler IBM i Version 7.2 Systems management Advanced job scheduler Note Before using this information and the product it supports, read the information
More informationFileMaker Server 14. Custom Web Publishing Guide
FileMaker Server 14 Custom Web Publishing Guide 2004 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationAlliance AES Encryption for IBM i Solution Brief
Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it
More informationOnline Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
More informationSummer 2013 Cloud Initiative. Release Bulletin
Summer 2013 Cloud Initiative In this bulletin... July 2013 Summer 2013 Cloud Initiative 1 Getting started with the new Cloud... 2 Cloud Enhancements 3 How To Save Files 7 How to Set Up ipad Access 9 How
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationOptus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
More informationAlliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
More informationOnline Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationXerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
More informationSecurity Guidelines for MapInfo Discovery 1.1
Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................
More informationIBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
More information