Benjamin Carlson Node.js SQL Server for Data Analytics and Multiplayer Games Excerpt from upcoming MQP-1404 Project Report Advisor: Brian Moriarty
|
|
|
- Gwendolyn Atkins
- 9 years ago
- Views:
Transcription
1 Benjamin Carlson Node.js SQL Server for Data Analytics and Multiplayer Games Excerpt from upcoming MQP-1404 Project Report Advisor: Brian Moriarty Abstract Knecht is a Node.js client/server architecture that allows networked http-based applications to store arbitrary data for later retrieval and pass data between multiple clients. It is designed to support game analytics and multi-player game functionality for game engines written in HTML5/Javascript and other browser technologies. Project History From the outset of the project, we wanted to work on a project that was portable; a project that would work independent of the devices we would test our project on. After going through preliminary ideas and some rudimentary testing, we eventually developed server code and tests designed to calibrate and ensure that our server code and client code would be able to save data and facilitate communication with multiple users, indifferent toward the calling application. Below is the account of the project s inception, planning, development, and testing. At first the project began as the idea of a portable game engine that could have code be transferred from device to device and still be able to play because it would run independently of the machine. Our thoughts turned to Professor Brian Moriarty s game engine: Perlenspiel. Perlenspiel is minimalistic in terms of graphics and the core engine is written completely in JavaScript and is ordinarily interpreted using web browsers. Due to its minimalistic graphics, testing would not be as demanding and could easily show our proof of concept. 1
2 For efficiency, we were originally going to write the engine in C++ using the Simple Direct Media Layer (SDL) Library to handle graphics due to it being supported on Windows, MacOS, Linux, and AndroidOS, and Mozilla Spidermonkey to handle interpreting the JavaScript code. With this we were planning on essentially making Perlenspiel act as a type of interpreter where the game code could be transferred to various machines without having to be recompiled or rewritten based on architecture. We quickly realized that the initial project idea seemed a bit redundant. Because of how many of these devices already have web browsers that are able to play Perlenspiel games accessed from the web, we decided to look at other project ideas. We eventually decided to make server code to help add multiplayer functionality to games made in Perlenspiel. Because of how Perlenspiel is an engine instead of its own standalone game, we decided that this server would be game agnostic, meaning that the server code was not being written around an existing game. Any game could use this server provided they sent the data packaged into a JSON object. Additionally, to add more to the technical aspect of the project, we decided to add the feature of being able to save data to a database on the server to introduce permanence to Perlenspiel games. We decided to use Node.js to write the server code. A Node.js server is a C++ program that uses JavaScript to work. This decision comes from Perlenspiel being written in JavaScript, the ubiquity of JavaScript as the main scripting language of the web and the growing interest in Node.js being used for server code. Additionally Node.js is modular, meaning if there was any extra functionality needed, we could search for the module that would facilitate our need. For an IDE, we considered both Aptana and WebStorm before ultimately choosing WebStorm. This 2
3 decision comes from WebStorm s customizability, the ease of which to set up test servers, and the fact that Aptana at the time was not being as actively developed as WebStorm was at the time. We also decided to use MySQL for the database. This decision comes from MySQL being one of the most common databases (meaning there would be plenty of resources to refer to) as well as the fact that Node.js has a module for accessing MySQL databases. For data transfer, we decided to implement a RESTful API. This decision comes from REST being adopted as a standard for server requests and data transfer. All request types in REST (POST, PUT, GET, DELETE) could be easily applied to both the multiplayer functionality and the data storage and permanence. Additionally, REST is asynchronous, which would let handle many users sending requests at once and being able to handle them when necessary. Because we were using JavaScript, we decided to use JSON objects to send requests and transfer data. The JSON objects could easily be converted into strings and have those strings stored on the server. Because of the scope of the project and the fact that there were three members and two of them had to work on the project for four terms, we decided on using Github to store and distribute all of the necessary files for the project. In the main folder of the project is the code and documentation for both the server and the client. Within the subfolders are all of the files required for testing both data permanence and multiplayer communication, as well as code for the most up to date version of Perlenspiel. We began with simple server testing. A basic server was made and run locally on our computers to determine how to send data and store it in a database. The first successful test was that of storing and retrieving data from the database. For this, we used the felixge/mysql 3
4 module for Node.js. This revealed how to set up the necessary tables for storing data, as well as how to make database queries in Node.js. All queries are made by calling the query() function which takes the query as a string and a callback function used to handle any errors and results from the query. All queries return an array of the results in a JSON format. We also implemented query escaping, which protects the server against SQL injection attacks. Even harder was testing client requests to the server. All requests are standard AJAX requests, however there were two major obstacles to overcome to get the requests to be successfully sent: the format of the request header and the format of the address URI. Our web browsers were preventing us from making these requests because they were cross-domain requests or requests that were being sent to an outside location. While this is prevented to avoid security risks, it interfered with our project. It is possible to get around the cross domain restriction. W3C gives us CORS which, when implemented, allows data to be accepted from machines outside the server. i CORS just requires a couple extra fields in the server s response to the request: one detailing how to view an outside request, one detailing who to accept it from, and one detailing what types of requests and what types of data are acceptable to send. ii As long as the request abides by all of these specifications, the request will be accepted. Another issue was having Ajax requests recognize the address to send the data to. Eventually we recognized that the address has to be formatted in three parts. The first is that the address must begin with the string to indicate that the request is being made with the Hypertext Transfer Protocol. The second part is the address name or the IP address of the server to send requests to. The last part of the address must be a colon followed by the port 4
5 number that the server is listening to. If the address is formatted in this way, then the address will be recognized and the request will be sent. An example of code used for testing. After the initial server testing, both the server code and the client code was developed and tested further and given the name Knecht (named after the character in Herman Hesse s novel Das Glasperlenspiel, which originally inspired the Perlenspiel engine). This time we needed to test both saving the data and using multiplayer. Both of these tests were written in Perlenspiel and provided both proof of concept and found errors that were quickly fixed. The first of these tests was that of server data storage. This was done by modifying the Paint demonstration program for Perlenspiel. An extra row/menu was added to the program that gave four options: register the account (under a valid address), log into an existing account, saving data, and retrieving existing data. For this test the data was to be the paint image, which was saved to the database as an array of RGB values. After successfully testing user registration and application registration, we were able to successfully save data, log back into our account, and retrieve the data. The major obstacle debugging revealed was a discrepancy in the documentation which was later corrected. The second test was a simple multiplayer game that involved two players on their respective sides moving independently of each other. Multiplayer is handled by a series of inputs and updates. A host starts the application on their machine where all of the calculation takes place and invites clients to their game session. The client(s) submit updates to the server 5
6 which the host polls and updates the game session. These updates are sent to the game server and, if the clients have permission to access that specific data, update their game instance with the data presented in the update. In the test itself, the client would send input in the form of its XY coordinates. The host would read this data and draw the client s character on the screen. The host would send its coordinates in an update that the client had permission to view, and it too would draw the host s character on the screen. Apart from a few more discrepancies in documentation, the major bugs encountered in this test was that the data was coming back as a string without being parsed into a JSON object, garbage collection on the database, and there were some errors in assigning permissions to the client. This test was run both locally as two game instances in different browsers (Firefox and Chrome) on the same machine as well as over a distance and both tests passed. 6
7 Instructions for installing Node.js on a developer s machine for testing purposes The following instructions assume that the user already has WebStorm installed on their computer. To install Node.js 1. go to and click on the appropriate installer to download 2. Run the installer. a. IMPORTANT: Pay attention to the location node.exe was installed to. To enable Node.js in WebStorm 1. Open WebStorm 2. Go to File>Settings 3. On the left side of the screen, expand Javascript and click on Node.js 4. On the line indicated by Node.js interpreter Put in the location where node.exe is located To install Modules from WebStorm 1 1. Open WebStorm 2. Go to File>Settings 3. On the left side of the screen, expand Javascript and click on Node.js 4. Under the Packages area, click install 1 These instructions are known to work for WebStorm version 7.x and later. Earlier versions might not contain the required Packages area. 7
8 5. Scroll down to mysql and select it and install it To install Modules from the command prompt 1. Open the command prompt window 2. type npm install mysql in the command prompt to install the mysql module i Cross-Origin Resource Sharing: W3C Candidate Recommendation 29 January W3C. Electronic. < March 27, 2014 ii Blinov, Alexey. Node.js CORS. Github.com. Electronic. < March 27,
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
Cyber Security Challenge Australia 2014
Cyber Security Challenge Australia 2014 www.cyberchallenge.com.au CySCA2014 Web Penetration Testing Writeup Background: Pentest the web server that is hosted in the environment at www.fortcerts.cysca Web
Installation and User Guide Zend Browser Toolbar
Installation and User Guide Zend Browser Toolbar By Zend Technologies, Inc. Disclaimer The information in this help is subject to change without notice and does not represent a commitment on the part of
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence
AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence Corey Benninger The AJAX Storage Dilemna AJAX (Asynchronous JavaScript and XML) applications are constantly looking for ways to increase
Jetico Central Manager. Administrator Guide
Jetico Central Manager Administrator Guide Introduction Deployment, updating and control of client software can be a time consuming and expensive task for companies and organizations because of the number
Software Requirements Specification For Real Estate Web Site
Software Requirements Specification For Real Estate Web Site Brent Cross 7 February 2011 Page 1 Table of Contents 1. Introduction...3 1.1. Purpose...3 1.2. Scope...3 1.3. Definitions, Acronyms, and Abbreviations...3
Uptime Infrastructure Monitor. Installation Guide
Uptime Infrastructure Monitor Installation Guide This guide will walk through each step of installation for Uptime Infrastructure Monitor software on a Windows server. Uptime Infrastructure Monitor is
Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek ([email protected])
Bug Report Date: March 19, 2011 Reporter: Chris Jarabek ([email protected]) Software: Kimai Version: 0.9.1.1205 Website: http://www.kimai.org Description: Kimai is a web based time-tracking application.
An introduction to creating Web 2.0 applications in Rational Application Developer Version 8.0
An introduction to creating Web 2.0 applications in Rational Application Developer Version 8.0 September 2010 Copyright IBM Corporation 2010. 1 Overview Rational Application Developer, Version 8.0, contains
ShoreTel Advanced Applications Web Utilities
INSTALLATION & USER GUIDE ShoreTel Advanced Applications Web Utilities ShoreTel Advanced Applications Introduction The ShoreTel Advanced Application Web Utilities provides ShoreTel User authentication
Visualizing an OrientDB Graph Database with KeyLines
Visualizing an OrientDB Graph Database with KeyLines Visualizing an OrientDB Graph Database with KeyLines 1! Introduction 2! What is a graph database? 2! What is OrientDB? 2! Why visualize OrientDB? 3!
EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke
EVALUATING COMMERCIAL WEB APPLICATION SECURITY By Aaron Parke Outline Project background What and why? Targeted sites Testing process Burp s findings Technical talk My findings and thoughts Questions Project
Cyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
How To Write A Web Server In Javascript
LIBERATED: A fully in-browser client and server web application debug and test environment Derrell Lipman University of Massachusetts Lowell Overview of the Client/Server Environment Server Machine Client
VOL. 2, NO. 1, January 2012 ISSN 2225-7217 ARPN Journal of Science and Technology 2010-2012 ARPN Journals. All rights reserved
Mobile Application for News and Interactive Services L. Ashwin Kumar Department of Information Technology, JNTU, Hyderabad, India [email protected] ABSTRACT In this paper, we describe the design and
FileMaker 14. ODBC and JDBC Guide
FileMaker 14 ODBC and JDBC Guide 2004 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks of FileMaker,
Performance Testing Web 2.0
Performance Testing Web 2.0 David Chadwick Rational Testing Evangelist [email protected] Dawn Peters Systems Engineer, IBM Rational [email protected] 2009 IBM Corporation WEB 2.0 What is it? 2 Web
Lucy Zhang UI Developer [email protected]/[email protected] Contact: 646-896-9088
Lucy Zhang UI Developer [email protected]/[email protected] Contact: 646-896-9088 SUMMARY Over 7 years of extensive experience in the field of front-end Web Development including Client/Server
Art of Code Front-end Web Development Training Program
Art of Code Front-end Web Development Training Program Pre-work (5 weeks) Codecademy HTML5/CSS3 and JavaScript tracks HTML/CSS (7 hours): http://www.codecademy.com/en/tracks/web JavaScript (10 hours):
Visualizing a Neo4j Graph Database with KeyLines
Visualizing a Neo4j Graph Database with KeyLines Introduction 2! What is a graph database? 2! What is Neo4j? 2! Why visualize Neo4j? 3! Visualization Architecture 4! Benefits of the KeyLines/Neo4j architecture
CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ
CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting
Webapps Vulnerability Report
Tuesday, May 1, 2012 Webapps Vulnerability Report Introduction This report provides detailed information of every vulnerability that was found and successfully exploited by CORE Impact Professional during
Advantage of Jquery: T his file is downloaded from
What is JQuery JQuery is lightweight, client side JavaScript library file that supports all browsers. JQuery is a fast and concise JavaScript Library that simplifies HTML document traversing, event handling,
APACHE WEB SERVER. Andri Mirzal, PhD N28-439-03
APACHE WEB SERVER Andri Mirzal, PhD N28-439-03 Introduction The Apache is an open source web server software program notable for playing a key role in the initial growth of the World Wide Web Typically
1 Download & Installation... 4. 1 Usernames and... Passwords
Contents I Table of Contents Part I Document Overview 2 Part II Document Details 3 Part III EventSentry Setup 4 1 Download & Installation... 4 Part IV Configuration 4 1 Usernames and... Passwords 5 2 Network...
Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence
Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &
What about MongoDB? can req.body.input 0; var date = new Date(); do {curdate = new Date();} while(curdate-date<10000)
Security What about MongoDB? Even though MongoDB doesn t use SQL, it can be vulnerable to injection attacks db.collection.find( {active: true, $where: function() { return obj.credits - obj.debits < req.body.input;
EECS 398 Project 2: Classic Web Vulnerabilities
EECS 398 Project 2: Classic Web Vulnerabilities Revision History 3.0 (October 27, 2009) Revise CSRF attacks 1 and 2 to make them possible to complete within the constraints of the project. Clarify that
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
Protection, Usability and Improvements in Reflected XSS Filters
Protection, Usability and Improvements in Reflected XSS Filters Riccardo Pelizzi System Security Lab Department of Computer Science Stony Brook University May 2, 2012 1 / 19 Riccardo Pelizzi Improvements
Index. AdWords, 182 AJAX Cart, 129 Attribution, 174
Index A AdWords, 182 AJAX Cart, 129 Attribution, 174 B BigQuery, Big Data Analysis create reports, 238 GA-BigQuery integration, 238 GA data, 241 hierarchy structure, 238 query language (see also Data selection,
Hosted Connecting Steps Client Installation Instructions
Hosted Connecting Steps Client Installation Instructions Thank you for purchasing B Squared s Hosted Connecting Steps System for Schools. Connecting Steps V4 currently requires you to install a client
Snare System Version 6.3.4 Release Notes
Snare System Version 6.3.4 Release Notes is pleased to announce the release of Snare Server Version 6.3.4. Snare Server Version 6.3.4 New Features The behaviour of the Snare Server reflector has been modified
WINGS WEB SERVICE MODULE
WINGS WEB SERVICE MODULE GENERAL The Wings Web Service Module is a SOAP (Simple Object Access Protocol) interface that sits as an extra layer on top of the Wings Accounting Interface file import (WAIimp)
Upgrade to Webtrends Analytics 8.7: Best Practices
Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
Team: May15-17 Advisor: Dr. Mitra. Lighthouse Project Plan Client: Workiva Version 2.1
Team: May15-17 Advisor: Dr. Mitra Lighthouse Project Plan Client: Workiva Version 2.1 Caleb Brose, Chris Fogerty, Nick Miller, Rob Sheehy, Zach Taylor November 11, 2014 Contents 1 Problem Statement...
Cloud Powered Mobile Apps with Azure
Cloud Powered Mobile Apps with Azure Malte Lantin Technical Evanglist Microsoft Azure Agenda Mobile Services Features and Demos Advanced Features Scaling and Pricing 2 What is Mobile Services? Storage
DreamFactory & Modus Create Case Study
DreamFactory & Modus Create Case Study By Michael Schwartz Modus Create April 1, 2013 Introduction DreamFactory partnered with Modus Create to port and enhance an existing address book application created
EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual
EOP ASSIST: A Software Application for K 12 Schools and School Districts Installation Manual Released January 2015 Updated March 2015 Table of Contents Overview...2 General Installation Considerations...2
MEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
Unity web- player issues in browsers & in client system
Software /Hardware requirements for unity web player i) Software Requirement Operating System: Windows XP or later; Mac OS X 10.5 or later. ii) Graphics Card: Pretty much any 3D graphics card, depending
SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1
SUBJECT TITLE : WEB TECHNOLOGY SUBJECT CODE : 4074 PERIODS/WEEK : 4 PERIODS/ SEMESTER : 72 CREDIT : 4 TIME SCHEDULE UNIT TOPIC PERIODS 1. INTERNET FUNDAMENTALS & HTML Test 1 16 02 2. CSS & JAVASCRIPT Test
Lesson 7 - Website Administration
Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their
What is a CMS? Why Node.js? Joel Barna. Professor Mike Gildersleeve IT 704 10/28/14. Content Management Systems: Comparison of Tools
Joel Barna Professor Mike Gildersleeve IT 704 10/28/14 Content Management Systems: Comparison of Tools What is a CMS? A content management system (CMS) is a system that provides a central interface for
Setting up an MS SQL Server for IGSS
Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3
Startup guide for Zimonitor
Page 1 of 5 Startup guide for Zimonitor This is a short introduction to get you started using Zimonitor. Start by logging in to your version of Zimonitor using the URL and username + password sent to you.
IBM Information Server
IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01 IBM Information Server Version 8 Release 1 IBM Information Server Administration Guide SC18-9929-01
Mercury User Guide v1.1
Mercury User Guide v1.1 Tyrone Erasmus 2012-09-03 Index Index 1. Introduction... 3 2. Getting started... 4 2.1. Recommended requirements... 4 2.2. Download locations... 4 2.3. Setting it up... 4 2.3.1.
CYCLOPE let s talk productivity
Cyclope 6 Installation Guide CYCLOPE let s talk productivity Cyclope Employee Surveillance Solution is provided by Cyclope Series 2003-2014 1 P age Table of Contents 1. Cyclope Employee Surveillance Solution
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
Installation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
SQL Server Instance-Level Benchmarks with DVDStore
SQL Server Instance-Level Benchmarks with DVDStore Dell developed a synthetic benchmark tool back that can run benchmark tests against SQL Server, Oracle, MySQL, and PostgreSQL installations. It is open-sourced
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Introduction to CloudScript
Introduction to CloudScript A NephoScale Whitepaper Authors: Nick Peterson, Alan Meadows Date: 2012-07-06 CloudScript is a build language for the cloud. It is a simple Domain Specific Language (DSL) that
Audit Management Reference
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
SimWebLink.NET Remote Control and Monitoring in the Simulink
SimWebLink.NET Remote Control and Monitoring in the Simulink MARTIN SYSEL, MICHAL VACLAVSKY Department of Computer and Communication Systems Faculty of Applied Informatics Tomas Bata University in Zlín
SQL Injection Attack Lab Using Collabtive
Laboratory for Computer Security Education 1 SQL Injection Attack Lab Using Collabtive (Web Application: Collabtive) Copyright c 2006-2011 Wenliang Du, Syracuse University. The development of this document
Whisler 1 A Graphical User Interface and Database Management System for Documenting Glacial Landmarks
Whisler 1 A Graphical User Interface and Database Management System for Documenting Glacial Landmarks Whisler, Abbey, Paden, John, CReSIS, University of Kansas [email protected] Abstract The Landmarks
Installing The SysAidTM Server Locally
Installing The SysAidTM Server Locally Document Updated: 17 October 2010 Introduction SysAid is available in two editions: a fully on-demand ASP solution and an installed, in-house solution for your server.
Certified Selenium Professional VS-1083
Certified Selenium Professional VS-1083 Certified Selenium Professional Certified Selenium Professional Certification Code VS-1083 Vskills certification for Selenium Professional assesses the candidate
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
Mirtrak 6 Powered by Cyclope
Mirtrak 6 Powered by Cyclope Installation Guide Mirtrak Activity Monitoring Solution v6 is powered by Cyclope Series 2003-2013 Info Technology Supply Ltd. 2 Hobbs House, Harrovian Business Village, Bessborough
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Intel Internet of Things (IoT) Developer Kit
Intel Internet of Things (IoT) Developer Kit IoT Cloud-Based Analytics User Guide September 2014 IoT Cloud-Based Analytics User Guide Introduction Table of Contents 1.0 Introduction... 4 1.1. Revision
How To Fix A Snare Server On A Linux Server On An Ubuntu 4.5.2 (Amd64) (Amd86) (For Ubuntu) (Orchestra) (Uniden) (Powerpoint) (Networking
Snare System Version 6.3.5 Release Notes is pleased to announce the release of Snare Server Version 6.3.5. Snare Server Version 6.3.5 Bug Fixes: The Agent configuration retrieval functionality within the
Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)
Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate
FormAPI, AJAX and Node.js
FormAPI, AJAX and Node.js Overview session for people who are new to coding in Drupal. Ryan Weal Kafei Interactive Inc. http://kafei.ca These slides posted to: http://verbosity.ca Why? New developers bring
Simply type the id# in the search mechanism of ACS Skills Online to access the learning assets outlined below.
Programming Practices Learning assets Simply type the id# in the search mechanism of ACS Skills Online to access the learning assets outlined below. Titles Debugging: Attach the Visual Studio Debugger
Bijlage1. Software Requirements Specification CIS. For. Version 1.0 final. Prepared by Saidou Diallo. HvA/Inaxion. November 2009
Bijlage1 Software Requirements Specification For CIS Version 1.0 final Prepared by Saidou Diallo HvA/Inaxion November 2009 Copyright 2009/2010 Inaxion BV. Table of Contents 1. Introduction...3 1.1 Purpose...
FileMaker 11. ODBC and JDBC Guide
FileMaker 11 ODBC and JDBC Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
NetApp SANtricity Web Service for E-Series Proxy 1.0
NetApp SANtricity Web Service for E-Series Proxy 1.0 Installation Guide NetApp, Inc. Telephone: +1 (408) 822-6000 Part number: 215-08741_A0 495 East Java Drive Fax: +1 (408) 822-4501 Release date: April
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
High Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
Advanced Web Security, Lab
Advanced Web Security, Lab Web Server Security: Attacking and Defending November 13, 2013 Read this earlier than one day before the lab! Note that you will not have any internet access during the lab,
for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later
for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later Copyright 2015, Lucid Innovations Limited. All Rights Reserved Lucid Research
Living Requirements Document: Sniffit
Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps
Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com [email protected] August 2015 Copyright 2015 1&1
Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved
Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a
This document gives an outline of Tim Ward s work on mobile phone systems 2002 2012.
MOBILE PHONE SYSTEMS Tim Ward, Brett Ward Limited, 11/4/2012 This document gives an outline of Tim Ward s work on mobile phone systems 2002 2012. Details of some work for the security industry are omitted.
HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1. Revision Date: July 2011
HELIX MEDIA LIBRARY INSTALL GUIDE FOR WINDOWS SERVER 2003 Helix Media Library Version 1.1 Revision Date: July 2011 Summary of Contents Summary of Contents... 2 Pre Installation Checklist... 4 Prerequisites...
Setting Up Specify to use a Shared Workstation as a Database Server
Specify Software Project www.specifysoftware.org Setting Up Specify to use a Shared Workstation as a Database Server This installation documentation is intended for workstations that include an installation
Witango Application Server 6. Installation Guide for OS X
Witango Application Server 6 Installation Guide for OS X January 2011 Tronics Software LLC 503 Mountain Ave. Gillette, NJ 07933 USA Telephone: (570) 647 4370 Email: [email protected] Web: www.witango.com
phpservermon Documentation
phpservermon Documentation Release 3.1.0-dev Pepijn Over May 11, 2014 Contents 1 Introduction 3 1.1 Summary................................................. 3 1.2 Features..................................................
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
Learning Web App Development
Learning Web App Development Semmy Purewal Beijing Cambridge Farnham Kbln Sebastopol Tokyo O'REILLY Table of Contents Preface xi 1. The Workflow 1 Text Editors 1 Installing Sublime Text 2 Sublime Text
Bubble Code Review for Magento
User Guide Author: Version: Website: Support: Johann Reinke 1.1 https://www.bubbleshop.net [email protected] Table of Contents 1 Introducing Bubble Code Review... 3 1.1 Features... 3 1.2 Compatibility...
Wiley. Automated Data Collection with R. Text Mining. A Practical Guide to Web Scraping and
Automated Data Collection with R A Practical Guide to Web Scraping and Text Mining Simon Munzert Department of Politics and Public Administration, Germany Christian Rubba University ofkonstanz, Department
Paxera Uploader Basic Troubleshooting
Before going further, please check the logs and auto-route queue in the Uploader Control, these logs will say a lot about your problem. You should take care of the following before contacting our Support
User Guide. WS_FTP Server
WS_FTP Server Contents CHAPTER 1 WS_FTP Server Overview What is WS_FTP Server?... 1 System requirements for WS_FTP Server... 2 WS_FTP Server... 2 Ipswitch Notification Server... 4 WS_FTP Server Manager...
Software Requirements Specification
CSL740 Software Engineering Course, IIT Delhi Software Requirements Specification Submitted By Abhishek Srivastava (2011EEY7511) Anil Kumar (2009CS10180) Jagjeet Singh Dhaliwal (2008CS50212) Ierum Shanaya
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
SAV2013: The Great SharePoint 2013 App Venture
SHAREPOINT 2013 FOR DEVELOPERS 5 DAYS SAV2013: The Great SharePoint 2013 App Venture AUDIENCE FORMAT COURSE DESCRIPTION Professional Developers Instructor-led training with hands-on labs This 5-day course
Adding Panoramas to Google Maps Using Ajax
Adding Panoramas to Google Maps Using Ajax Derek Bradley Department of Computer Science University of British Columbia Abstract This project is an implementation of an Ajax web application. AJAX is a new
ACORD. Lync 2013 Web-app Install Guide
ACORD Lync 2013 Web-app Install Guide 1 Index Internet Explorer Pages 3-5 Google Chrome..Pages 6-8 Mozilla Firefox.Pages 9-12 Safari..Pages 13-16 2 If using Internet Explorer as your default browser upon
RMCS Installation Guide
RESTRICTED RIGHTS Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (C)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Windmill. Automated Testing for Web Applications
Windmill Automated Testing for Web Applications Demo! Requirements Quickly build regression tests Easily debug tests Run single test on all target browsers Easily fit in to continuous integration Other
A Model of the Operation of The Model-View- Controller Pattern in a Rails-Based Web Server
A of the Operation of The -- Pattern in a Rails-Based Web Server January 10, 2011 v 0.4 Responding to a page request 2 A -- user clicks a link to a pattern page in on a web a web application. server January
