Distributed Locking. User Guide. 2006, 2016 Zumasys, Inc.
|
|
|
- Stewart Wheeler
- 9 years ago
- Views:
Transcription
1 Distributed Locking User Guide 2006, 2016 Zumasys, Inc.
2 Table of Content Overview... 3 Distributed Lock Service Deployment... 5 Server Deployment Examples...6 Installing jdls as a Windows Service... 7 Client Distributed Lock Deployment...8 jbase Distributed Lock Service process flow Lock Mechanisms Lock Mechanisms OS Lock Mechanism Shared Memory Lock Mechanism Distributed Lock Information Utilities...15 SHOW-ITEM-LOCKS jdls dvl...16 Lock Server processes Resilience...18 Client Lock Resilience Server Lock Resilience Recovery...19 Page 2 of 19
3 Introduction This document provides a user guide for the deployment and configuration of the jbase Distributed lock service for a Multiple Application Server environment. The Distributed lock service is provided as an integral component of the jbase release. It is not available on releases prior to jbase Overview Although jbase applications have been successfully deployed over Multiple Applications Servers certain idiosyncrasies related to operating systems, performance and recovery of file locks over networked file systems have prompted the requirement to provide an alternative lock strategy for Multiple Application Server deployment. As such the jbase Distributed lock service is now offered as an alternative mechanism, to the networked file system, by which locks can be propagate between servers. The Distributed lock service simply extends the existing lock mechanisms already available within jbase by the provision of a distributed lock interface. The Distributed lock service can be deployed as a service executing on a dedicated server or, as is more likely, deployed on one or two of the Application Servers in the Multiple Application Server configuration. The Distributed lock service is provided via a daemon process executing on Linux/Unix systems or as an installable service for the Windows platform. The Distributed lock service can be initiated using either the lower case form of the executable, jdls, or the jbase capitalized convention for process daemons, jdls, (jbase Distributed Lock Service). The Distributed lock service also supersedes the jrla, (jbase Record Lock Arbiter), which provided the shared memory lock mechanism for record locks. Linux/Unix system boot scripts should be modified to initialise the lock mechanism using the jdls rather than the jrla executable. Client processes on the Application Servers are configured to connect to the distributed lock service in order to request a lock be taken, request the status of a lock or request locks be released. Once initialised the client remains connected to the distributed lock service for the remainder of the life of the client process, with all lock requests issued and acknowledged through the same connection. Page 3 of 19
4 The connection comprises of a TCPIP socket, which uses a network byte oriented structure to pass specific lock only information. The information for example being lock type, client port number, client process id, client thread id, etc. No application data is passed over the network and hence there is no requirement for message encryption. The use of the TCP protocol is deliberate such that any break in network service can be detected quickly and if enabled, resilience activated Once initialised the jbase Distributed Lock Service process undertakes two distinct operations: The first operation is to initialise the Shared memory lock table and then continuously monitor the lock table for orphaned locks and tidy up as required. This operation was formerly undertaken by the jrla daemon process and effectively remains exactly the same. The second operation is to initialise a socket listener for connecting clients who wish to take locks on the local system. This operation is started as a second process on Linux and Unix system and as an additional thread on Windows. The distributed lock listener continuously listens for client connections, when a client connection is detected a separate independent process is started that will handle all the lock requirements for the connecting client process. Each lock server/service process once started runs as a single thread within its own process space and is completely independent from any other lock server/service process as well as the daemon listener process. This enables the lock listener service to be stopped without impacting existing lock server processes and also ensures any potential lock server process failure does not impact other already executing client processes. This approach provides for a robust, scalable and easily extendable implementation, which avoids many of the complications and restrictions involved with multi threaded servers such as forked threads, signal handling and error recovery. The one to one process relationship ensures that locks can be handled by either of the currently available locking strategies, i.e. Shared memory locks or OS file locks and that locks can be easily identified to point of origin and the release of locks will be automatic in the event of a problem with the client process or client Application Server failure. Although the Distributed Lock Service can be deployed on dedicated servers the more usual configuration is to deploy the Lock Service on one or two of the Application Servers in the Multiple Application Server environment. Quite often a mix of Application Servers are used whereby the most powerful Application Server is used for core processes and other Application Servers used for online processing such as enquires, etc. In this case it is more efficient to configure the main Application Server with the Distributed lock service for the other Application Servers and use local lock processing rather than Distributed locking for the core processes. The local processes will automatically detect this configuration, such that all local lock requests will automatically use the same lock mechanism as the Distributed Lock service, whereby local and distributed locks become seamlessly integrated. Page 4 of 19
5 Distributed Lock Service Deployment Once the servers that will provide the distributed lock service have been determined the service should be configured and deployed as follows: The jbase software should be installed local to the distributed lock server and JBCRELEASEDIR and JBCGLOBALDIR environment variables configured for the user id by which the lock service will execute. In the case of a standalone lock server no license installation is required as the Distributed lock service is unlicensed. Once the jbase release is installed and configured then the Distributed Lock Service can be initialised and started in background. The full set of options for the Distributed lock service can be displayed using the h option on the jdls command line. However specific option combinations for the Distributed Lock Service daemon are as follows: jdls -i {-bptad} {-sr,g} {-tnn} jdls -k {-AD} jdls -K {-o} Where : -A Arbiter only, do not start/stop distributed listener -b Run in the Background (Normal mode of operation) -D Distributed listener only, do not start/stop lock monitor -i Initialise shared memory. -k Kill the Shared memory Lock Monitor and/or Listener -snn,mm Set Shared memory lock table size to 'nn' record locks over 'mm' groups -tnn Set tidy up period to nn minutes -K Kill the IPC resources, shared memory and semaphores -P Port based locks used (default is process id based locks) -T Time stamp all shared memory locks Page 5 of 19
6 Server Deployment Examples jdls ibs13000,50 This command initializes the jdls to start both the jdls Shared memory lock monitor service and the jdls Distributed lock listener service in background. The shared memory will be configured to provide locks with 50 locks per group. The lock table algorithm will actually use the next prime number for the number of groups to provide a better spread of locks over the groups and so in this case configure the shared lock table with locks in 263 groups with 50 locks per group. jdls ibd This command instructs the jdls to initialize ONLY the jdls Distributed lock listener service. Unless the jdls Shared memory lock monitor/arbiter service had been previously started then OS file locks will be used for the default lock mechanism for both distributed locks and local process locks. jdls -kd This command will stop ONLY the jdls Distributed lock listener service. If active the jdls Shared memory lock monitor/arbiter service will be unaffected. jdls k This command will stop both the jdls Distributed lock listener and the jdls Shared memory lock monitor/arbiter service. jdls K This command will remove the IPCS resource. Note all processes must be disconnected and the effective user id for the command must have adequate permissions to remove the resource. Note some command line options are not applicable to Windows as the jdls executable runs in background as a Windows Service. See the jdls h command display on Windows for list of available options. Page 6 of 19
7 Installing jdls as a Windows Service The jbase Distributed Lock Service should be installed as a Windows Service when used on the Windows operating system. Along with other jbase services, the jbase Distributed Lock Service can be installed using the jbase jservcontrol command from the Windows console command line. e.g. jservcontrol v s manual p%jbcreleasedir%\bin\jdls.exe jdls install Once installed the service can then be stopped or started using Windows Services panel. Alternatively the service can also be stopped or started from the command line, via the jbase jservcontrol command. jservcontrol v jdls start stop To remove the service, use the jservcontrol command. jservcontrol v jdls remove All jbase processes must be disconnected before stopping and removing the jdls service. Page 7 of 19
8 Client Distributed Lock Deployment To configure the client system to use the Distributed Lock Service, each client user must be configured with the JDLS environment variable. This variable should be set in the users profile prior to program execution. To be properly effective ALL users of the same database must be configured with exactly the same Distributed Lock Service parameters, otherwise locks will NOT be correctly respected and data inconsistencies may occur. The following basic options can be specified in the JDLS environment variable: JDLS={SERVER=Hostname{, Port}}{,SERVER2=Hostname{, Port}} Where: SERVER Specifies the primary lock service specification SERVER2 Specifies the secondary lock service specification for resilience. Hostname is either the DNS hostname or the dotted IP address of the system where the jbase Distributed Lock Service is executing. Port is the socket port number (default 50002) on which the jbase Distributed Lock Service is listening. Note: The above specifications are completely optional as denoted by the braces, although SERVER2 specification has no meaning without specification of SERVER. If SERVER is not specified but the JDLS environment is set then the configuration will default to localhost and port Page 8 of 19
9 Additional configuration options and their descriptions are as follows: WAIT The WAIT option can be used to control the action of distributed lock retries. If the WAIT option is configured then the client will wait for acknowledgement that the lock request has been completed without any interim communication, (see distributed lock retries ). With this option set the default acknowledgement timeout period is not used. This option is not recommended as processes may wait a considerable time in the case of lock contention without update to the lock status of the process. TIMEOUT=Seconds The TIMEOUT option can be used to override the timeout period, within which any distributed lock request must be acknowledged. The default timeout period is set for thirty seconds. This period allows for multiple retries for the lock on the server system, as such should only be adjusted upward. BINARY The BINARY option can be used to intercept all binary type locks, i.e. locks other than record locks and redirect them to the Distributed Lock Service. Locks that would normally be taken on the local system will be intercepted and redirected to the Distributed Lock Service, such that they can be propagated and hence respected across multiple systems. This option should not be required except when using jbase Hash files over NFS and/or File and Execution Locks. OSLOCKS The OSLOCKS option can be used to force all record locks to be routed via the OS file lock path such that OS file locks are taken on the Distributed Lock Service Server by default rather than using the configured lock mechanism on the lock server. LOCK=EXTERNAL INTERNAL ALL The LOCK option can be used to differentiate the interception of locks for internal or external lock handlers. The default is for ALL locks both internal and external to be intercepted and redirected to the Distributed Lock Service. However certain external database drivers may require their own lock functions be invoked, in which case LOCK option should be set to INTERNAL. RDBMS drivers use INTERNAL locking and hence the default configuration or INTERNAL value will redirect all record locks required for the application irrespective of the underlying RDBMS locking schemes. Page 9 of 19
10 VERBOSE TRACE=Tracefile The TRACE option will override the VERBOSE option such that Distributed Lock trace information will be redirected from standard error to the specified trace file. These options are intended for debugging and problem analysis only. The JDLS client connection configuration can be tested using the C option to the jdls executable at the command line. e.g. jdls Cteststring If the Distributed Lock Service cannot be reached the process will time out and display the following error message: Client: Using host 'localhost', service '50002' Client: Unable to allocate socket If the Distributed Lock Service cannot be reached for a lock request the process will time out and exit with the following message: Client: unable to connect to distributed lock service, locks not enabled Client: connection failed for host , service '50002', error Connection refused Page 10 of 19
11 jbase Distributed Lock Service process flow Monitor process continuously scans shared memory locks in case of orphaned locks jdls (monitor) jdls Listener spawns a lock server process for each client process (listener) fork() Remote Client Process (Port 1) jdls (server port 1) Remote Client Process (Port 2) jdls (server port 2) Locks are taken either in the shard memory lock table or via local OS file locks Page 11 of 19
12 Lock Mechanisms There are two types of lock mechanism that can be implemented on the lock server used for the jdls, jbase Distributed Lock Service. One being shared memory locking the other being OS file locks. When starting the jdls service the default is to use the shared memory lock mechanism. The jdls service initialisation, by default, will start both the jdls Shared memory lock monitor service and the jdls Distributed lock listener service. The jdls Shared memory lock monitor will create a shared memory structure for the locks, which is then used for inter process communication of lock information by both jdls lock server processes, which acquire locks on behalf of remote jbase client processes and also local jbase processes executing on the same system as the jdls Lock Service. If the shared memory lock area is already allocated then the shared memory lock group structure cannot be changed and any lock configuration options specified on the jdls command line ignored. The default lock mechanism can be force to be OS file locks by inhibiting the initialisation of the jdls Shared memory lock monitor process. If the jdls Shared memory lock monitor service is not initialised then the default lock mechanism will be OS file locks. OS Lock Mechanism To initialise the lock service without the jdls Shared memory lock monitor, start the lock service using the D option. This option causes only the jdls Distributed lock listener service to be initialised and as such the default lock mechanism will be OS file locks. e.g. jdls -ibd When the jdls Distributed lock service is active but using the OS file lock mechanism, all record locks are taken on lock files created in the /tmp/jbase subdirectory for Unix systems or the %SYSTEMROOT%\jbase subdirectory for Windows. The file name of the lock file represents an 8 digit hexadecimal value of the inode and device numbers of the original file or pseudo file. e.g. /tmp/jbase/jlock_xxxxxxxx_yyyyyyyy Where xxxxxxxx is the hexadecimal value of the inode and yyyyyyyy is the hexadecimal value of the device. Note: When the jdls Distributed lock service is active and a physical file is used, rather than pseudo MD/VOC entries, then the device number is defaulted to a value of 1. The reason for defaulting the device number to a value of 1 is because the device number allocated to the mounted NFS partition can vary on each of the Multiple Application Servers. Page 12 of 19
13 To initialise the lock service to use jdls Shared memory locking simply use the ib options (initialise services and run in background) on the jdls command line. This is the default configuration for jdls when run as a Windows Service. e.g. jdls -ib Shared Memory Lock Mechanism The shared memory lock monitor process is essentially the same as the eld jrla program, in that its sole function is to periodically examine the state of the shared memory lock table and look for orphaned locks. Orphaned locks can occur when a process exits prematurely without being able to wrap up correctly and release associated locks. These premature processes exits can be due to resource allocation, program failure or because the process has been deliberately interrupted by a fatal signal (usually signal 9) from another process. The default tidy up period is set at five minutes. The Shared Memory Lock Monitor will scan all the locks in the shared memory lock table on a tidy up and when a suspected orphaned lock is discovered, the lock is thoroughly checked against the process identifier to ensure that the associated process is no longer in existence; if that is the case then the lock is released, as such locks left behind by processes will automatically be cleaned up every five minutes. It should not be necessary to clean up locks taken by remote client, which exit prematurely, as the lock server process handling locks on behalf of the client should automatically handle the lock release on detection of communication failure with the client process. The shared memory lock table is currently only used for record locks as group locks or other binary locks are taken as OS file locks on the physical files or pseudo files in /tmp/jbase_lock or %SYSTEMROOT\jbase_lock directories. The Shared Memory Lock Monitor can be stopped and restarted, (using the k and ib options together with the A option on the jdls command line), without interfering with the Distributed Lock Listener service or the currently active lock sever processes working on behalf of remote clients. However this action is not recommended, and should only be used in extreme circumstances, as the preferred locking mechanism should be chosen prior to any local or remote client connection and the Distributed Lock Service initialized accordingly Page 13 of 19
14 Distributed Lock Information Although the lock mechanisms keeps track of outstanding locks taken by processes, or even threads in the case of the shared memory lock table, this information is relatively limited and usually insufficient to easily determine lock ownership. In the case of OS file locks all that is retrieval is the process id of the process, which has taken the lock and maybe the device and inode of the file or stub file. The shared memory mechanism provides additional independent information in the lock table such as port number, record key and thread id. Unfortunately the record key alone is not usually enough for lock diagnosis and additional information such as the file/table information is also usually required. Finding the filename associated with an inode may not be simple for some platforms and in later Multiple Application Servers implementations, which will not use stub files this information will be unavailable. The only process that knows the application file/table name and other associated information is usually the client process, as this was the process that opened or referenced the file/table and obtained the variable on which to take or release locks. As such when using distributed locking, the internal client lock and file/table information is periodically written out to a native file using the port number for the process. This port information is written to the JBCRELEASEDIR/proc/info directory of the lock server system. In the case of remote clients the information is sent to the associated lock server processes, which in turn write the data, with appended statistics, into the info directory on behalf of the client process. In the case of local processes executing on the same system as the jdls lock service, these processes write their lock and file information directly into the JBCRELEASEDIR/proc/info directory. This information can then be retrieved, interpreted and displayed by the lock and file utilities, such as SHOW-ITEM-LOCKS and LIST-OPEN-FILES. This procedure is also a change to the polling procedure done by the utilities that would otherwise occur when not using jdls, as it is not possible to use shared memory between Multiple Application Servers. The client or local processes only write out lock information when the lock information has changed and the process is either initialised, blocking on a lock, no longer waiting on a blocked lock, about to get input or about to sleep. As such the lock information can only be used to provide a snapshot of the lock or open file status for the Multiple Application Server processes at any one point in time. The lock information is deleted on process exit however should a process exit abnormally this lock information may persist. Page 14 of 19
15 Utilities There is essentially one utility program, although referenced by other program names, which is used to display record lock information, namely SHOW-ITEM-LOCKS. The jdls executable can also be used directly to display the shared memory lock table information, but is unable to display associated file/table name information. SHOW-ITEM-LOCKS The SHOW-ITEM-LOCK utility has been modified to include the IP address of the port when displaying information. The utility has also been modified to obtain the lock information for each port from the JBCRELEASEDIR/proc/info directory when either the jdls Lock Service is deemed active on the system or the client JDLS environment variable is configured, thus enabling the utility to be executed from a remote client system. e.g. note, the filename, etc fields have been modified/truncated to fit this document. show-item-locks information retrieved from process information entries generated in JBCRELEASEDIR/proc/info directory on host IPADDR PORT PID FILENAME RECORD KEY LOCK# PORT/-PID ac/fbnk.account x58ba67d8,W ac/fbnk.account x0df361bc,W ac/fbnk.account USD x6bc61286,W --- Where: Port 2 is a local process on the same system as the jdls server and hence has a dotted address of 0. This process (pid 15071) takes locks directly on the same server. Port 1000 is a remote client (on system ) with the JDLS environment variable configured as JDLS=SERVER= The client process is communicating with the lock service (jdls) on the lock server system ( ) and has an associated lock server process (15031). The dotted host address of the client system, ( ), is displayed by show-item-locks. The jdls lock server process (pid 15031) has taken the lock on record key on behalf of the remote client on port 1000 executing on the remote system, ( ). Port 4 is another local process on the same system as the active jdls server but has also been configured with a JDLS environment variable. This time the variable is set to use the default configuration and as such this process is using the reserved loop back local host address of Page 15 of 19
16 jdls dvl In the above case the shared memory lock mechanism was deployed as the default locking mechanism. As such the shared memory lock table information can also be displayed using the dvl command line options to the jdls executable. e.g. Executon of the jdls command with dvl option on system jdls dvl Lock monitor at pid: Active Lock listener at pid: Active Program started: Thu Apr 27 17:28: Time last ran: Thu Apr 27 18:26: Time last tidied up: Thu Apr 27 18:23: Lock retries: 0 Tidy-up time: 5 minutes Locking mechanism: IPC semaphores based on THREAD id Tidy-up operations: 0 Semaphore IDs: , Memory: 6624 bytes used, bytes free CPU Usage: 0.09 usr, 0.09 sys Record locks outstanding Group value pid type port i-node dev queued ipaddr key 89 0x0df361bc WRITE None x6bc WRITE None USD x58ba67d WRITE None Record locks: locks maximum in 263 groups of 50 locks/group 3 locks currently in use 1 is max. locks found in one group This display shows similar information to the show-item-lock utility however the file name information is not held within the shared memory lock table, only the associated inode, also note the device information is defaulted to minus one as the values for the devices for the mounted file partitions can vary between application servers and hence cannot be used. Additional information regarding the process and status of the Distributed Lock Monitor and the Distributed Lock Listener processes is displayed along with the time the Lock service was started. For the Windows platform the process numbers for the two function would be the same as the Lock Monitor and the Lock Listener run as different threads within the same process. Page 16 of 19
17 Lock Server processes In the previous example of three locks the following lock service processes are in use on the lock server system ( ). ps ef grep jdls locks :28? 00:00:00 jdls -ib locks :28? 00:00:00 jdls -ib locks :29? 00:00:00 jdls -ib locks :41? 00:00:00 jdls -ib Where: The lock service has been started as user locks. Process is executing as the Distributed Shared Memory Lock Monitor. Process is executing as Distributed Lock Listener Service. Process is executing on behalf of Port 1000 on client Process is executing on behalf of Port 4 on local host As can be seen from the utility displays, Port 2 is executing on the same local system as the distributed lock service, ( ), on process and taking locks directly in the shared memory lock table. ps ef grep betatest :30 pts/2 00:00:00 ED FBNK.ACCOUNT This example demonstrates the integration capabilities of the Distributed Lock Service whereby the distributed lock configuration can be adjusted to take best advantage of system topology. For example a 32 CPU system mixed with a couple 4 CPU systems could be allocated to form the Application Server tier. The lock service can be configured such that Distributed Lock Service executes on the 32 CPU system such that lock intensive processing jobs like the COB, which would probably be best scheduled to run on the larger server, can run using the standard direct lock mechanisms avoiding network requirement for lock requests, whereas other online or interface processes could be enabled to process on the smaller application servers and hence configured to communicate with the Distributed Lock Service for their lock requirements. The Distributed Lock Service is fully compatible with the existing lock mechanisms and hence the disparate systems can be fully integrated to coordinate lock activity. Page 17 of 19
18 Resilience Client Lock Resilience The Distributed Lock mechanism provides lock resilience by simply duplicating the original lock request to a second Distributed Lock server. The distributed lock resilience model allows for a single point of failure and two or more system configuration failures are not covered. Single point of failure coverage is normally adequate for resilience technology. Network failure between localized systems is extremely rare especially with duplicated network components. In resilience mode the client process will issue a second lock request, to the secondary Distributed Lock server, only once the original lock request has been acknowledged as successful by the primary distributed lock server. The response of the lock requests will be compared and if the secondary response is different an error logged such that the problem can be investigated. As such the performance cost of resilience is an additional socket send and receive message per lock request. While both primary and secondary Distributed Lock Servers continue to respond the process is executing in resilient mode. If communication to the primary Distributed Lock server should be interrupted or lost, an error is logged and then the client process will automatically promote the secondary Distributed Lock server to take over from the original primary server and become the new primary. At this point the duplication of lock requests will cease and the process will continue to communicate only with the new primary lock server. At this point the process is also no longer resilient and any subsequent communication failure with the Distributed Lock server will result in the client process wrapping up and exiting the client system. If communication to the secondary Distributed Lock server should fail while in resilient mode, an error message is logged and the process continues to communicate only with the primary Distributed Lock server and is hence therefore no longer resilient. Once communication fails to one or other of the Distributed Lock servers further communication with the failed server is never attempted for the remainder of the lifetime of the process as attempting to do could cause lock confusion and undermine the lock mechanism. All communication errors are logged to the jbase_error_trace. The resilient mode should not be used with a configuration that integrates with direct local locking processes, as the local processes do not even communicate with the primary lock server let alone a secondary lock server. If resilience is required then all processes both local and remote must be configured to communicate to the same primary and secondary Distributed Lock servers via the JDLS environment variable. Page 18 of 19
19 Server Lock Resilience Client failure resilience is built into the Distributed Lock server processes, irrespective of resilience mode. If communication with a client process fails then the distributed lock server process handling lock requests on behalf of that client will release and outstanding locks and then exit. This procedure ensures that absent or misbehaving clients cannot continue to hold locks irrespective of the state of the client system. The release of locks in this scenario, by the distributed lock server process, only effects the local system and has no effect on any other distributed lock server executing on either another primary or secondary lock server system. The Distributed Lock Listener service can be stopped or restarted, (using the k and ib options together with the D option on the jdls command line), without interfering with the communications of the currently connected remote clients. Obviously new clients will be unable to connect while the Distributed Lock Listener service is not currently listening, hence these options should be used with great care. Recovery Currently there is no automated procedure to recover the Distributed Lock Service on systems that have failed when using resilient mode, as the lock table or OS file locks cannot be easily resynchronized with the current primary lock server and guarantee that all locks will be valid. Once the failed system is recovered and the Distributed Lock service restarted, all remote client processes will need to exit and then reconnect using the JDLS environment variable configuration in order to use the original Distributed Lock Service configuration and renew communication with the restarted Distributed Lock Service. This procedure ensures that all locks are released and retaken such that the lock table and/or OS file locks on both Distributed Lock Service systems are correctly synchronized. Page 19 of 19
Troubleshooting: 2 Solutions to Common Problems
www.novell.com/documentation Troubleshooting: 2 Solutions to Common Problems GroupWise 8 August 31, 2009 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or
APACHE WEB SERVER. Andri Mirzal, PhD N28-439-03
APACHE WEB SERVER Andri Mirzal, PhD N28-439-03 Introduction The Apache is an open source web server software program notable for playing a key role in the initial growth of the World Wide Web Typically
Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13
Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Error Codes for F-Secure Anti-Virus for Firewalls, Windows 6.20
Error Codes for F-Secure Anti-Virus for Firewalls, Windows 6.20 The two tables described here list the error codes sent by F-Secure Content Scanner Server and F-Secure Anti-Virus for Firewalls. Error codes
TACACS+ Authentication
4 TACACS+ Authentication Contents Overview...................................................... 4-2 Terminology Used in TACACS Applications:........................ 4-3 General System Requirements....................................
Flight Workflow User's Guide. Release 12.0.0
Flight Workflow User's Guide Release 12.0.0 Copyright 2015 Signiant Inc. All rights reserved. Contents CHAPTER 1 Flight Introduction 4 FlightUploadReference 4 FlightDownloadReference 4 Cloud Storage Configuration
Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4
Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4 Updated: May 31, 2011 Contents This document describes the Cisco AnyConnect Secure Mobility Client 2.4 for devices running Symbian.
SIOS Protection Suite for Linux v8.3.0. Postfix Recovery Kit Administration Guide
SIOS Protection Suite for Linux v8.3.0 Postfix Recovery Kit Administration Guide July 2014 This document and the information herein is the property of SIOS Technology Corp. (previously known as SteelEye
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
ICC. NetLink Version Info 10.21.2014 8.7.2014 7.12.2013 INDUSTRIAL CONTROL COMMUNICATIONS, INC.
Version Info 10.21.2014 1.3.2 release Updated graph layout and increased text size Added ability to resize graphs Added ability to zoom and scroll graphs using both image zoom and data zoom methods Graphs
Microsoft Windows 2000 Terminal Services
Operating System Microsoft Windows 2000 Terminal Services Licensing Technology White Paper Abstract This white paper provides an introduction to Terminal Services Licensing, the client license management
E-Series. NetApp E-Series Storage Systems Mirroring Feature Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.
E-Series NetApp E-Series Storage Systems Mirroring Feature Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888)
Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature
Table of Content Error Messages List... 2 Troubleshooting the Storage System... 3 I can t access the Manager... 3 I forgot the password for logging in to the Manager... 3 The users can t access the shared
Load Balancing Clearswift Secure Web Gateway
Load Balancing Clearswift Secure Web Gateway Deployment Guide rev. 1.1.8 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide...3 Loadbalancer.org Appliances Supported...3 Loadbalancer.org
EMC DiskXtender File System Manager for UNIX/Linux Release 3.5
EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 Administrator s Guide P/N 300-009-573 REV. A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com
SIEBEL SERVER ADMINISTRATION GUIDE
SIEBEL SERVER ADMINISTRATION GUIDE VERSION 7.5.3 JULY 2003 12-FRLK3Z Siebel Systems, Inc., 2207 Bridgepointe Parkway, San Mateo, CA 94404 Copyright 2003 Siebel Systems, Inc. All rights reserved. Printed
VMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
Application Notes for configuring NICE IEX Workforce Management R4.6 with Avaya Proactive Contact R5.0.1 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for configuring NICE IEX Workforce Management R4.6 with Avaya Proactive Contact R5.0.1 Issue 1.0 Abstract These Application Notes describe the
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
Configuring and Integrating Oracle
Configuring and Integrating Oracle The Basics of Oracle 3 Configuring SAM to Monitor an Oracle Database Server 4 This document includes basic information about Oracle and its role with SolarWinds SAM Adding
Instrumentation for Linux Event Log Analysis
Instrumentation for Linux Event Log Analysis Rajarshi Das Linux Technology Center IBM India Software Lab [email protected] Hien Q Nguyen Linux Technology Center IBM Beaverton [email protected] Abstract
Networking Guide Redwood Manager 3.0 August 2013
Networking Guide Redwood Manager 3.0 August 2013 Table of Contents 1 Introduction... 3 1.1 IP Addresses... 3 1.1.1 Static vs. DHCP... 3 1.2 Required Ports... 4 2 Adding the Redwood Engine to the Network...
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2003-2005
List of FTP commands for the Microsoft command-line FTP client
You are on the nsftools.com site This is a list of the commands available when using the Microsoft Windows command-line FTP client (requires TCP/IP to be installed). All information is from the Windows
Symantec NetBackup AdvancedDisk Storage Solutions Guide. Release 7.5
Symantec NetBackup AdvancedDisk Storage Solutions Guide Release 7.5 21220064 Symantec NetBackup AdvancedDisk Storage Solutions Guide The software described in this book is furnished under a license agreement
COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10
LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions
TOSHIBA GA-1310. Printing from Windows
TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS
Getting Started with Amazon EC2 Management in Eclipse
Getting Started with Amazon EC2 Management in Eclipse Table of Contents Introduction... 4 Installation... 4 Prerequisites... 4 Installing the AWS Toolkit for Eclipse... 4 Retrieving your AWS Credentials...
Cluster APIs. Cluster APIs
Cluster APIs Cluster APIs Cluster APIs include: Cluster Control APIs Cluster Resource Group APIs Cluster Resource Group Exit Program Topics covered here are: Cluster APIs Cluster Resource Services Characteristics
Product Version 1.0 Document Version 1.0-B
VidyoDashboard Installation Guide Product Version 1.0 Document Version 1.0-B Table of Contents 1. Overview... 3 About This Guide... 3 Prerequisites... 3 2. Installing VidyoDashboard... 5 Installing the
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
Using Process Monitor
Using Process Monitor Process Monitor Tutorial This information was adapted from the help file for the program. Process Monitor is an advanced monitoring tool for Windows that shows real time file system,
VMware vsphere Data Protection Advanced 5.5
Data Protection Advanced 5.5 EMC Data Domain Integration TECHNICAL WHITE PAPER Table of Contents Data Domain Configuration... 4 Architecture Overview.... 4 vsphere Data Protection Advanced Client Support....
Backup Tab. User Guide
Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...
McAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
Frequently Asked Questions: Cisco Jabber 9.x for Android
Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail
Audit Troubleshooting
CHAPTER 2 Revised: July 2010, Introduction This chapter provides the information needed for monitoring and troubleshooting audit events and alarms. This chapter is divided into the following sections:
Preparing a Windows 7 Gold Image for Unidesk
Preparing a Windows 7 Gold Image for Unidesk What is a Unidesk gold image? In Unidesk, a gold image is, essentially, a virtual machine that contains the base operating system and usually, not much more
User's Guide - Beta 1 Draft
IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Cluster Server Agent vnext User's Guide - Beta 1 Draft SC27-2316-05 IBM Tivoli Composite Application Manager for Microsoft
Configuring Load Balancing for EMC ViPR SRM
White paper Abstract This white paper describes how to use load balancing in a scaled-out EMC ViPR SRM deployment to avoid performance bottlenecks that could impact data collection and report generation.
TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012
TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
LifeKeeper for Linux PostgreSQL Recovery Kit. Technical Documentation
LifeKeeper for Linux PostgreSQL Recovery Kit Technical Documentation January 2012 This document and the information herein is the property of SIOS Technology Corp. (previously known as SteelEye Technology,
Deploying Exchange Server 2007 SP1 on Windows Server 2008
Deploying Exchange Server 2007 SP1 on Windows Server 2008 Product Group - Enterprise Dell White Paper By Ananda Sankaran Andrew Bachler April 2008 Contents Introduction... 3 Deployment Considerations...
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Administration Guide Published: 2010-06-16 SWDT487521-1041691-0616023638-001 Contents 1 Overview: BlackBerry Enterprise
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
Router Lab Reference Guide
Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and
Cisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows
Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices
SteelEye Protection Suite for Windows Microsoft SQL Server Recovery Kit. Administration Guide
SteelEye Protection Suite for Windows Microsoft SQL Server Recovery Kit Administration Guide June 2013 This document and the information herein is the property of SIOS Technology Corp. (previously known
Deployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
Adjusting Prevention Policy Options Based on Prevention Events. Version 1.0 July 2006
Adjusting Prevention Policy Options Based on Prevention Events Version 1.0 July 2006 Table of Contents 1. WHO SHOULD READ THIS DOCUMENT... 4 2. WHERE TO GET MORE INFORMATION... 4 3. VERIFYING THE OPERATION
ALTIRIS Deployment Solution 6.8 PXE Overview
ALTIRIS Deployment Solution 6.8 PXE Overview Notice Altiris AAA Document 2006 Altiris, Inc. All rights reserved. Document Date: October 3, 2006 Altiris, Inc. is a pioneer of IT lifecycle management software
How To Install Netbackup Access Control (Netbackup) On A Netbackups (Net Backup) On Unix And Non Ha (Net Backup) (Net Backups) (Unix) (Non Ha) (Windows) (
Tech Note 4 NBAC (NetBackup Access Control) UNIX Quick Install Non HA This section includes the following topics About NBAC (NetBackup Access Control) About NBAC (NetBackup Access Control) Starting Checklist
Intel Setup and Configuration Software (Intel SCS) Scalability Guidelines. Version 10.0
Intel Setup and Configuration Software (Intel SCS) Scalability Guidelines Version 10.0 Document Release Date: December 25, 2014 License Intel Setup and Configuration Software (Intel SCS) is furnished under
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
Open Systems SnapVault Best Practices Guide
NETAPP TECHNICAL REPORT Open Systems SnapVault Best Practices Guide Jeremy Merrill, Darrin Chapman TR-3466 ABSTRACT This document is a deployment guide for architecting and deploying Open Systems SnapVault
Practice Fusion API Client Installation Guide for Windows
Practice Fusion API Client Installation Guide for Windows Quickly and easily connect your Results Information System with Practice Fusion s Electronic Health Record (EHR) System Table of Contents Introduction
NetSpective Logon Agent Guide for NetAuditor
NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)
Remote Access Server - Dial-Out User s Guide
Remote Access Server - Dial-Out User s Guide 95-2345-05 Copyrights IBM is the registered trademark of International Business Machines Corporation. Microsoft, MS-DOS and Windows are registered trademarks
Load Balancing Microsoft Terminal Services. Deployment Guide
Load Balancing Microsoft Terminal Services Deployment Guide rev. 1.5.7 Copyright 2002 2016 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 4 Loadbalancer.org Appliances Supported... 4 Loadbalancer.org
Trend Micro Hosted Email Security. Best Practice Guide
Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described
FioranoMQ 9. High Availability Guide
FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential
Oracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html
Oracle EXAM - 1Z0-102 Oracle Weblogic Server 11g: System Administration I Buy Full Product http://www.examskey.com/1z0-102.html Examskey Oracle 1Z0-102 exam demo product is here for you to test the quality
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
AutoMate BPA Server 10 Installation Guide
AutoMate BPA Server 10 Installation Guide AutoMate BPA Server follows the client/server model of computing where one or more servers are hosts that share their resources with multiple clients. Since data
CS 557- Project 1 A P2P File Sharing Network
Assigned: Feb 26, 205 Due: Monday, March 23, 205 CS 557- Project A P2P File Sharing Network Brief Description This project involves the development of FreeBits, a file sharing network loosely resembling
SPAMfighter Mail Gateway
SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4
Matisse Server Administration Guide
Matisse Server Administration Guide May 2014 MATISSE Server Administration Guide Copyright 2013 Matisse Software Inc. All Rights Reserved. This manual and the software described in it are copyrighted.
Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.
Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using
Chapter 11 I/O Management and Disk Scheduling
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.
Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Mod ule_i D Error _Cod e Error Description 1 1 PROCESSOR_NULLREF_ERROR 1 100 ERROR_PARSE_PAIR Failed
Linux Kernel Architecture
Linux Kernel Architecture Amir Hossein Payberah [email protected] Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
SSL Enforcer Documentation
SSL Enforcer Documentation Introduction Install and Uninstall Getting Started Main Settings Options Log Introduction Today a vast majority of Internet activities like social networking, streaming videos,
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Sophos Anti-Virus for Linux configuration guide. Product version: 9
Sophos Anti-Virus for Linux configuration guide Product version: 9 Document date: September 2015 Contents 1 About this guide...5 2 About Sophos Anti-Virus for Linux...6 2.1 What Sophos Anti-Virus does...6
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Intel Active Management Technology with System Defense Feature Quick Start Guide
Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Load Balancing Microsoft AD FS. Deployment Guide
Load Balancing Microsoft AD FS Deployment Guide rev. 1.1.1 Copyright 2002 2015 Loadbalancer.org, Inc. Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org Software
The Advanced JTAG Bridge. Nathan Yawn [email protected] 05/12/09
The Advanced JTAG Bridge Nathan Yawn [email protected] 05/12/09 Copyright (C) 2008-2009 Nathan Yawn Permission is granted to copy, distribute and/or modify this document under the terms of the
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Canon. Product : imagerunner C3200 / 2200i / 3300i / 5000i / 6000i / 7200 / 8500 / 105 / 2010F, Title : imagerunner Universal Send Error Codes
Product : imagerunner C3200 / 2200i / 3300i / 5000i / 6000i / 7200 / 8500 / 105 / 2010F, Title : imagerunner Universal Send Error Codes Question : What are universal send error codes? Answer : #001 -Check
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection.
Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection. This document will help you understand your Mobile Wi-Fi so you can start using it right
USER GUIDE. Diagnostic Web Server FW ver. 6.0.51. BrightSign, LLC. 16780 Lark Ave., Suite B Los Gatos, CA 95032 408-852-9263 www.brightsign.
USER GUIDE Diagnostic Web Server FW ver. 6.0.51 BrightSign, LLC. 16780 Lark Ave., Suite B Los Gatos, CA 95032 408-852-9263 www.brightsign.biz 1 TABLE OF CONTENTS Introduction 1 Setup 2 Setting up the DWS
Security Service tools user IDs and passwords
System i Security Service tools user IDs and passwords Version 5 Release 4 System i Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information and the product
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
Backup Tab. User Guide
Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...
Getting Started with Paragon Recovery CD. Quick Guide
Getting Started with Paragon Recovery CD Quick Guide Paragon Recovery CD 2 Quick Guide CONTENTS 1 Introduction... 3 2 Distribution...3 2.1 Distributive CD...3 2.2 Online Distribution...3 3 Booting from
Running a Workflow on a PowerCenter Grid
Running a Workflow on a PowerCenter Grid 2010-2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)
Pcounter Mobile Guide
Pcounter Mobile Guide Pcounter Mobile Guide 2012.06.22 Page 1 of 19 1. Overview... 3 2. Pre-requisites and Requirements... 4 2.1 Gateway server requirements... 4 2.2 Mobile device requirements... 4 2.3
Module 11. Configuring and Managing Distributed File System. Contents:
Configuring and Managing Distributed File System 11-1 Module 11 Configuring and Managing Distributed File System Contents: Lesson 1: DFS Overview 11-3 Lesson 2: Configuring DFS Namespaces 11-15 Lesson
FileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
