Cloud Testing Production Applications CloudTest Strategy and Approach
|
|
- Evelyn Moore
- 8 years ago
- Views:
Transcription
1 White Paper Cloud Testing Production Applications CloudTest Strategy and Approach Mobile Performance Testing Web Performance Testing
2 Table of Contents Executive Summary Intended Audience The Past and Present of Performance Engineering Product and Methodology - Working Together in Harmony Select Topics From SOASTA s CloudTest Methodology Security Test Data in Production Potential Live Customer Impact Customer Case Studies - Testing in Production Security Case Studies Conclusion About CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 2
3 Executive Summary Web sites are the most accessible consumer-facing outlet for most companies. The brand impact from poor performance or an outage is far reaching and usually garners visibility at the highest levels. Anyone involved in web site performance and operations of consumer-facing applications. Online application performance is critical - no one would challenge this statement. Yet the dirty little secret in the web world is that applications are rarely performance tested. When performance for web applications has delayed the introduction of load testing methodologies for production testing in production. CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 3
4 Applications are increasingly event driven, needing to serve a larger than normal customer base for perhaps only a few weeks out of the year. We are 1. Intended Audience 2. The Past and Present of Performance Engineering CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 4
5 There are certain pieces of critical functionality that are required in a testing tool to be successful at production testing. CloudTest is a purpose-built production performance testing tool. It has the ability to scale up to generate true concurrent user loads up into the millions of users while still delivering the analytics in real time. The most common test tool in use today for web application testing was never designed for this purpose. 3. Product and Methodology - Working Together in Harmony CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 5
6 The methodology SOASTA has developed is a full lifecycle system. It starts with strategy and planning, and then proceeds into implementation details. The third pillar is execution. Finally, a full iteration of the process ends with measurement of success and changes in the processes to improve the system, ultimately looping back to begin again. 4. Select Topics From SOASTA s CloudTest Methodology CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 6
7 Lower left: Tests are created and controlled via web browser from anywhere. Center: Load is generated from one or more cloud environments around the world. directed at the target application wherever it resides (private datacenter, cloud, etc) over standard HTTP and HTTPS ports just like real users. 4.1 Security Sensitive Data Applications Non-Disclosure Agreements CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 7
8 Sensitive Data Sites Pre-Release and Early Access Sites IP Address Restriction Cookies and Headers Transaction tagging CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 8
9 CloudTest dashboards combine data from the test controller perspective with data from the Another data stream that might be present during a running cloud test is the monitoring data (CPU, Memory, etc). Whether the data is coming from SOASTA s monitoring agents themselves or from 3rd party monitoring systems, the data is always relayed through SOASTA s agent called and then it uses push technology to send data to the CloudTest main instance. While this data is not generally considered sensitive, as it is only related to the health of systems under test, it can be encrypted for further security and transferred over HTTPS. the servers being monitored and the outside world. This creates a secure relay point for the monitoring data to travel through. leaves the datacenter. Unfortunately, by choosing this option, customers lose the ability to see results. Test data, in the context of this paper, refers to data that resides in an environment (production, in this case) to enable testing. It can also refer to data that was created in the production environment as a result of testing, such as test orders, test accounts, and things of that nature. Test data is sometimes used loosely to refer to data collected during a test by the CloudTest load generators, such as result reports, dashboards, monitoring data, etc. In some cases, added security to companies whose performance and benchmarking are critical to their business, such as platform performance information about their software. CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 9
10 4.2 Test Data in Production on the coverage Using Test Data in Production User Accounts query plan to optimize for database fragmentation Handling Other Types of Test Data inserted, updated or deleted CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 10
11 A common performance problem that databases encounter over time is fragmentation. If you delete large chunks of data from a database, there will be gaps in the data and the individual pages that store data will become noncontiguous. This causes SQL statements to take much longer to process. Test Data Cleanup database fragmentation Coding for Testability CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 11
12 alternate code paths 4.3 Potential Live Customer Impact Three Requirements for Successful Live Testing kill switch 5. Customer Case Studies Testing in Production 5.1 Banking and Financial Data Security test data and alternate code paths CLOUD TESTING PRODUCTION APPLICATIONS WHITE PAPER 12
13 IP address restriction Conclusion About Headquarters Castro St, Fourth Floor Mountain View, CA FAX: EMEA +44 (0) Thames Court 1 Victoria Street Windsor, Berkshire SL4 1YB To learn more visit: 2012 SOASTA. All rights reserved. SOASTA, the SOASTA logo, and SOASTA CloudTest are trademarks of SOASTA. All other product or company names may be trademarks and/ or registered trademarks of their respective owners. EST Connect with us:
SOASTA CloudTest Performance Data Retention and Security Policy. Whitepaper
SOASTA CloudTest Performance Data Retention and Security Policy Whitepaper Table of Contents Executive Summary: Data Security... 3 1. SOASTA s Data Retention Policy... 3 1.1 Test Development... 3 1. 2
More informationThe New Mandate in Mobile Testing Deliver Continuous Quality with Expertise, Automation and Real Devices
Whitepaper The New Mandate in Mobile Testing Deliver Continuous Quality with Expertise, Automation and Real Devices Mobile Performance Testing Mobile Test Automation Table of Contents Executive Summary...
More informationWhitepaper. Continuous Integration Tools Applying Best Practices to the Toolchain
Whitepaper Continuous Integration Tools Applying Best Practices to the Toolchain Table of Contents Introduction... 3 Continuous Integration Tools... 3 Device Test Automation... 3 API / Web Test Automation...
More information8 Common Myths About Performance Testing in Production Don t Let These Misconceptions Keep You From Production Testing.
8 Common Myths About Performance Testing in Production Don t Let These Misconceptions Keep You From Production Testing White Paper Table of Contents Myth #1: Production testing = live testing... 1 Myth
More informationSOASTA Real User Monitoring Best Practices
mpulse Whitepaper SOASTA Real User Monitoring Best Practices How to Connect Performance Analytics to Business Results SOASTA mpulse Dashboard Contents Digital Performance is User Focused....................
More informationPrinciples of Continuous Integration
Whitepaper Principles of Continuous Integration Best Practices to Simultaneously Improve Speed, Quality and Responsiveness in Mobile Development Table of Contents Mobile Services... 3 Benefits of Continuous
More informationWeb Server XX220-11-00. Configuration Guide
Configuration Guide XX220-11-00 Web Server Vicon Industries Inc. Tel: 631-952-2288 Fax: 631-951-2288 Toll Free: 800-645-9116 24-Hour Technical Support: 800-34-VICON (800-348-4266) UK: 44/(0) 1489-566300
More informationCONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE
White Paper CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Enabling WebDAV on Your Lenovo Network Storage Device 1 Accessing Shares from Your Computer
More informationloss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive
CS326e Quiz 5 The first correct 10 answers will be worth 1 point each. Each subsequent correct answer will be worth 0.2 points. Circle the correct answer. UTEID The transfer of an html file from one host
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationHow To Manage Cloud Computing
Four Keys for Monitoring Cloud Services White Paper from ManageEngine Web: email: appmanager-support@manageengine.com Table of Contents 1. Introduction 2. Overview of Cloud Computing 3. Top management
More informationImplementing 2-Legged OAuth in Javascript (and CloudTest)
Implementing 2-Legged OAuth in Javascript (and CloudTest) Introduction If you re reading this you are probably looking for information on how to implement 2-Legged OAuth in Javascript. I recently had to
More informatione-commerce Best Practices How Web and Mobile Performance Optimizes Conversion and User Experience
e-commerce Best Practices How Web and Mobile Performance Optimizes Conversion and User Experience Table of Contents Milliseconds Mean Mega-Dollars...4 Pre-Launch: Testing for Performance...5 Post-Launch:
More informationHow To Deploy Sangoma Sbc Vm At Amazon Cloud Service (Awes) On A Vpc (Virtual Private Cloud) On An Ec2 Instance (Virtual Cloud)
Sangoma VM SBC AMI at AWS (Amazon Web Services) SBC in a Cloud Based UC/VoIP Service. One of the interesting use cases for Sangoma SBC is to provide VoIP Edge connectivity between Soft switches or IPPBX's
More informationWhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition
WhatsUpGold v14.2 Getting Started with WhatsUp Gold MSP Edition Getting Started with MSP Edition In This Guide About WhatsUp Gold MSP Edition... 1 User interfaces... 2 About the MSP Edition reporting capabilities...
More informationhttp://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
More informationIntroduction to ServerIron ADX Application Switching and Load Balancing. Module 6: Content Switching (CSW) Revision 0310
Introduction to ServerIron ADX Application Switching and Load Balancing Module 6: Content Switching (CSW) Revision 0310 Objectives Upon completion of this module the student will be able to: Define layer
More informationSynology QuickConnect
Synology QuickConnect Based on DSM 5.2 Synology Inc. Table of Contents Chapter 1: Introduction What is QuickConnect?... 3 Chapter 2: How QuickConnect Works Overview... 4 QuickConnect Connectivity Test...
More informationLearn More Cloud Extender Requirements Cheat Sheet
Learn More Cloud Extender Requirements Cheat Sheet Overview This document defines all requirements to ensure a successful installation of the MaaS360 Cloud Extender to enable use of ActiveSync Manager
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationTechnical Brief. VBrick Rev & DME Interoperability with Cisco Wide Area Application Services (WAAS) and Akamai Connect
Technical Brief VBrick Rev & DME Interoperability with Cisco Wide Area Application Services (WAAS) and Akamai Connect Copyright 2016 VBrick Systems, Inc. All rights reserved. VBrick Systems, Inc. 2121
More informationWelcome to Zoho, your online productivity and collaboration suite of
In This Chapter Chapter 1 Getting Started with Zoho The Zoho advantage: Why it s right for so many people Signing up for Zoho Finding out about the Zoho apps covered in this book Welcome to Zoho, your
More informationPolicy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationAdobe Digital Publishing Security FAQ
Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server
More informationB6: GET /started/with/ HTTP Analysis
B6: GET /started/with/ HTTP Analysis Robert Bullen Application Performance Engineer Blue Cross Blue Shield of Minnesota robert_d_bullen@bluecrossmn.com The BCBSMN Experience Who is Blue Cross Blue Shield
More informationAjera 7 Installation Guide
Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services
More informationMcAfee Certified Product Specialist McAfee epolicy Orchestrator
McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives
More informationMcAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationBlazent IT Data Intelligence Technology:
Blazent IT Data Intelligence Technology: From Disparate Data Sources to Tangible Business Value White Paper The phrase garbage in, garbage out (GIGO) has been used by computer scientists since the earliest
More informationSingle Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
More informationQlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
More informationHelp us make this document better smarttech.com/docfeedback/170892. Security information
Help us make this document better smarttech.com/docfeedback/170892 Security information SMART kapp includes data security features designed to keep your content controlled in a predictable way. This document
More informationCloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
More informationResonate Central Dispatch
Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and
More informationHow To Use An Employee Performance Management System
Whitepaper 10 Things a Performance Management System Can Do for You A SumTotal White Paper Wondering why performance management matters? Discover the ten vital capabilities an organization can only achieve
More informationGLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
More informationServer Scalability and High Availability
Server Scalability and High Availability GO!Enterprise GLOBO Plc. March 2015 Copyright Notice and Usage Terms This guide is Copyright 2012 GLOBO. All Rights Reserved. Permission is granted to make and
More informationVERITAS Cluster Server Traffic Director Option. Product Overview
VERITAS Cluster Server Traffic Director Option Product Overview V E R I T A S W H I T E P A P E R Table of Contents Traffic Director Option for VERITAS Cluster Server Overview.............................................1
More informationIt s Not Called Continuous Integration for Nothing!
It s Not Called Continuous Integration for Nothing! Dan Boutin Vice President of Digital Strategy dboutin@soasta.com Mobile (404) 304-9529 @DanBoutinSOASTA In This Discussion Today Agenda: SOASTA Introduction
More informationWonderware SmartGlance
Wonderware SmartGlance Features 01 SUMMARY Mobile Reporting offered by Schneider Electric provides real-time access to critical KPIs and process or operational data via popular smart phones and tablets.
More informationThis course will also teach how to create various kinds of dashboards using Reporting Services.
Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services Length : 3 Days (24 Hours) Language(s) : English Audience(s) : IT Professionals Level : 200 Technology : Microsoft SQL Server 2008
More informationWhitepaper. The Top 10 Tips to Improve Web Application Performance
Whitepaper The Top 10 Tips to Improve Web Application Performance Table of Contents Testing for the Lifecycle... 3 Tip No. 1: Bandwidth: Make Sure Everyone Can Get In... 4 Tip No. 2: Load Balancing: Make
More informationPolycom CMA System Upgrade Guide
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
More informationLogi Ad Hoc Reporting Configuration for Load Balancing (Sticky Sessions)
Logi Ad Hoc Reporting Configuration for Load Balancing (Sticky Sessions) Version 10 Last Updated: December 2010 Page 2 Table of Contents About This Paper... 3 What Are Sticky Sessions?... 3 Configuration...
More informationMcAfee Content Security Reporter 1.0.0 Software
Product Guide Revision A McAfee Content Security Reporter 1.0.0 Software For use with epolicy Orchestrator 4.6.2 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK
More informationMedia Server Installation & Administration Guide
Media Server Installation & Administration Guide Smarter Surveillance for a Safer World On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone: (845)
More informationThe Next Generation Test Platform for Mobile Apps
The Next Generation Test Platform for Mobile Apps Agenda Who is SOASTA? Evolution in Man/Machine interaction Challenges faced by our customers Introducing TouchTest How to get started with TouchTest Fred
More informationLoad Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.
Load Balancing and Sessions C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Scalability multiple servers Availability server fails Manageability Goals do not route to it take servers
More informationFeatures of a comprehensive application security solution
WHITE PAPER Citrix NetScaler Features of a comprehensive application security solution The comprehensive security features of Citrix NetScaler protect against DoS/DDoS, deliver intrusion filtering capabilities
More informationWhat Dropbox Can t Do For Your Business
What Dropbox Can t Do For Your Business 33 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr Study Executive Summary The need for a well-rounded
More informationFoglight 5.5.8. Foglight Experience Monitor Metric Reference Guide
Foglight 5.5.8 Foglight Experience Monitor 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationMicrosoft Power BI. Nov 21, 2015
Nov 21, 2015 Microsoft Power BI Biray Giray Practice Lead - Enterprise Architecture, Collaboration, ECM, Information Architecture and Governance getalbert.ca biray.giray@getalbert.ca Michael McKiernan
More informationFrequently Asked Questions
Privacy Security Compliance Frequently Asked Questions Email Encryption Services Watch our video tutorials at https:///support 199 Ave B NW Suite 20 Winter Haven, FL 881 800.87.122 Table of Contents General
More informationDell OpenManage Mobile Version 1.4 User s Guide (Android)
Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION
More informationCloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
More information4 ecommerce challenges solved using analytics
4 ecommerce challenges solved using analytics 4 ecommerce challenges solved using analytics Contents ONE Customer Journey Attribution TWO Valuable Customer Marketing THREE User Flow Analysis (Registration
More informationWhat s New in Analytics: Fall 2015
Adobe Analytics What s New in Analytics: Fall 2015 Adobe Analytics powers customer intelligence across the enterprise, facilitating self-service data discovery for users of all skill levels. The latest
More informationOcularis Media Server Installation & Administration Guide
Ocularis Media Server Installation & Administration Guide 2013 On-Net Surveillance Systems Inc. On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone:
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationThe Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
More informationHow to access and reply to an Egress Switch Secure Email free of charge. Opening a Switch Secure Email New User
How to access and reply to an Egress Switch Secure Email free of charge As an Egress Switch Secure Email recipient, you can access encrypted files quickly and easily. You can also communicate securely
More informationAn Oracle White Paper June 2014. RESTful Web Services for the Oracle Database Cloud - Multitenant Edition
An Oracle White Paper June 2014 RESTful Web Services for the Oracle Database Cloud - Multitenant Edition 1 Table of Contents Introduction to RESTful Web Services... 3 Architecture of Oracle Database Cloud
More informationSECURE WEB GATEWAY DEPLOYMENT METHODOLOGIES
WHITEPAPER In today s complex network architectures it seems there are limitless ways to deploy networking equipment. This may be the case for some networking gear, but for web gateways there are only
More informationVMware Software Manager - Download Service User's Guide
VMware Software Manager - Download Service User's Guide VMware Software Manager 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is
More informationVMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationJob Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2
Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22
More informationFault & Performance Management
Fault & Performance Management Service Provider Presentation February 2015 info@martellotech.com Mitel Fault & Performance Management Outline Key UC Management Challenges for Service Providers Service
More informationMcAfee Content Security Reporter 2.0.0
Product Guide Revision A McAfee Content Security Reporter 2.0.0 For use with epolicy Orchestrator 4.6.5 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationService Level Agreement for Windows Azure operated by 21Vianet
Service Level Agreement for Windows Azure operated by 21Vianet Last updated: November 2015 1. Introduction This Service Level Agreement for Windows Azure (this SLA ) is made by 21Vianet in connection with,
More informationHTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
More informationThe HTTP Plug-in. Table of contents
Table of contents 1 What's it for?... 2 2 Controlling the HTTPPlugin... 2 2.1 Levels of Control... 2 2.2 Importing the HTTPPluginControl...3 2.3 Setting HTTPClient Authorization Module... 3 2.4 Setting
More informationFrequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet
FREQUENTLY ASKED QUESTIONS: SECURING THE FUTURE OF TRUST ON THE INTERNET Frequently Asked Questions Frequently Asked Questions: Securing the Future of Trust on the Internet Securing the Future of Trust
More informationSQL Anywhere 12.0.1 New Features Summary
New Features Summary WHITE PAPER www.sybase.com/sqlanywhere Contents: Introduction... 2 Out of Box Performance... 3 Spatial Enhancements... 3 Developer Productivity... 4 Enhanced Database Management...
More informationAnonymity on the Internet Over Proxy Servers
Anonymity on the Internet Over Proxy Servers Final Product Fábio Rodrigues ei08116@fe.up.pt Matej Bulić ei12010@fe.up.pt Introduction user always leaves digital sign need for security and anonymity Proxy
More informationEUROPA-PARK is bindingly committed to its online data protection policy
Privacy statement of Europa-Park GmbH & Co Mack KG, EUROPA-PARK GmbH & Co Hotelbetriebe KG, EUROPA-PARK GmbH & Co Shopping KG, and EUROPA-PARK Freizeit- & Familienpark Mack KG. EUROPA-PARK is bindingly
More informationMcAfee VirusScan and epolicy Orchestrator Administration Course
McAfee VirusScan and epolicy Orchestrator Administration Course Intel Security Education Services Administration Course Training The McAfee VirusScan and epolicy Orchestrator Administration course from
More informationHow to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter. A Cymphonix White Paper
How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter A Cymphonix White Paper How to Prevent Secure Web Traffic (HTTPS) from Crippling Your Content Filter Introduction Internet connectivity
More informationVMware vcenter Operations Manager Administration Guide
VMware vcenter Operations Manager Administration Guide Custom User Interface vcenter Operations Manager 5.6 This document supports the version of each product listed and supports all subsequent versions
More informationContent Delivery Service (CDS)
Content Delivery Service (CDS) Xyleme delivers content management for learning and development. We transform the way you author, publish, deliver, and analyze learning content to drive business performance.
More informationIBM Tealeaf CX. A leading data capture for online Customer Behavior Analytics. Advantages. IBM Software Data Sheet
IBM Tealeaf CX A leading data capture for online Customer Behavior Analytics Advantages Passively captures network traffic without impacting site performance Provides breakthrough visibility into customer
More informationSingle Source of Truth
Whitepaper Single Source of Truth A Guide for RUM (Real User Measurement) in the Workplace By Cliff Crocker, VP Product Management, SOASTA, Inc. Table of Contents Executive Summary... 3 Aligning Goals:...
More informationProtected Trust Setup Guide for Brother MFC Devices
Protected Trust Setup Guide for Brother MFC Devices Summary Protected Trust Email Encryption is a versatile secure email service. This guide details three use cases between Protected Trust and your Brother
More informationConfigure Web Conference Parameters Through The Web Conference Administration User Interface.
Configure Web Conference Parameters Through The Web Conference Administration User Interface. Once the ShoreTel Service Appliance 100 has been installed and configured in ShoreTel Director, the Web Conference
More informationTesting Packet Switched Network Performance of Mobile Wireless Networks IxChariot
TEST PLAN Testing Packet Switched Network Performance of Mobile Wireless Networks IxChariot www.ixiacom.com 915-6649-01, 2006 Contents Testing Packet Switched Network Performance of Mobile Wireless Networks...3
More informationHow Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
More informationLab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
More informationCloudy with 100% Visibility: Monitoring Application Performance in Hybrid Clouds
Whitepaper Cloudy with 100% Visibility: Monitoring Application Performance in Hybrid Clouds INTRODUCTION The hybrid cloud model combining public cloud services with private (on-premises) resources is immensely
More informationTechnical Brief ActiveSync Configuration for WatchGuard SSL 100
Introduction Technical Brief ActiveSync Configuration for WatchGuard SSL 100 October 2009 With ActiveSync, users get push functionality to keep email, calendar, tasks, and contacts up to date on a mobile
More informationFIRST-PARTY COOKIES. SiteCatalyst Implementation. June 30, 2008 Version 2.0
FIRST-PARTY COOKIES SiteCatalyst Implementation June 30, 2008 Version 2.0 CHAPTER 1 1 Implementing SiteCatalyst with First-Party Cookies SiteCatalyst typically uses third-party cookies to enhance the
More informationWhite Paper: Whole Disk Encryption
How Whole Disk Encryption Works White Paper: Whole Disk Encryption How Whole Disk Encryption Works Contents Introduction to Whole Disk Encryption.....................................................................
More informationCisco OnPlus Service. Economically Deliver Managed Network Services
Data Sheet Cisco OnPlus Service Economically Deliver Managed Network Services In today s competitive business environment, IT solution providers are increasingly looking to managed and cloud services as
More informationWhite Paper Using Webinars for Online Marketing
White Paper Using Webinars for Online Marketing Using Webinars for Online Marketing Introduction Webinars are an effective part of a marketing and lead generation strategy. Prospects are invited to a scheduled
More informationValidity and amendment of the information
Legal Notice EXERCYCLE S.L. registered address: Calle Zurrupitieta, 22 Pol. Ind. Júndiz 01015 Vitoria- Gasteiz Telephone: +34 945 290 258; Fax: +34 945 290 049 Mercantile Registry of Vitoria. Page VI-
More informationVMware vcenter Operations Manager Enterprise Administration Guide
VMware vcenter Operations Manager Enterprise Administration Guide vcenter Operations Manager Enterprise 5.0 This document supports the version of each product listed and supports all subsequent versions
More informationWhitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
More information