Cellular Best Practices Guide

Size: px
Start display at page:

Download "Cellular Best Practices Guide"

Transcription

1 Cellular Best Practices Guide

2 Contents About Creating Efficient Cellular Apps 4 Cellular Processors: Interface to the Cellular Network 5 Cellular Data Is Expensive 5 A Device Has an Application Processor and a Cellular Processor 6 How the Cellular Processor Communicates 7 Best Practices for Developing Cellular Apps 8 Bundle Data Requests to Limit Background Activity 8 Background Pings 9 Ad Frameworks 10 Bundle Connections to Reduce Control Plane Traffic 10 Saving App Data to the Cloud in Real Time 12 Conserve Battery When There Is No User Input 12 Respect User Data Plans 13 Switching Video Playback from Wi-Fi to Cellular 14 Manage Data Download Patterns 15 Manage Data Generation, the Cache, and Data Requests 19 Instruments Analysis Tool 20 Main Features of Instruments 20 Quick Tour of Instruments Views 21 Interfaces View 22 Connections View 23 Processes View 24 Combined View 25 Combining with Other Instruments Views 26 Identifying Outliers 26 Understanding the Instruments Log File 28 Understanding Testing 29 Document Revision History 30 2

3 Figures Cellular Processors: Interface to the Cellular Network 5 Figure 2-1 Power and data states of a cellular device s processors 6 Best Practices for Developing Cellular Apps 8 Figure 3-1 A view of background pings that need to be eliminated 9 Figure 3-2 A view of unbundled ads, resulting in high overhead 10 Figure 3-3 A view of excessive, low-volume, foreground traffic 11 Figure 3-4 A view of an app saving data to the cloud in real time making numerous new connections 12 Figure 3-5 A game overriding the automatic dimming of the screen with disappointing results 13 Figure 3-6 A VoIP app using your data plan to transport other users data 14 Figure 3-7 Video playback downloading on Wi-Fi and unknowingly moving to cellular 15 Figure 3-8 An app's oscillating download pattern showing no new connections 16 Figure 3-9 The communication overhead resulting from state transitions within a single connection 17 Figure 3-10 The data download rate affecting the power state, creating oscillation 18 Instruments Analysis Tool 20 Figure A-1 The Instruments user interface: Displaying a wide range of information in a compact space 21 Figure A-2 The Connections tool's Interfaces view visibly identifying traffic going to each interface 22 Figure A-3 Figure A-4 The Connections tool's Connections view showing all the TCP and UDP connections initiated on each interface 23 The Connections tool's Processes view showing the data traffic initiated by each process of the app 24 Figure A-5 The Instruments combined view showing time-aligned details 25 Figure A-6 Instruments displaying a combined view with several different individual instruments 26 Figure A-7 The Additional Details button, for generating an interface inactivity histogram 27 Figure A-8 An interface inactivity histogram to help identify anomalous behavior 27 Figure A-9 Two ways to save Instruments logs: on your device or on your workstation 28 3

4 About Creating Efficient Cellular Apps Applications (apps) designed for Ethernet and Wi-Fi have natural limitations imposed by the architecture of cellular networks. Two of the most significant limitations are bandwidth usage and battery usage. High bandwidth usage and unnecessary connections can cost the user in data plan charges. High data-transfer rates and other factors can consume battery life. Poor app design can consume extraordinary amounts of both. It is in the interests of developers, carriers, and hardware manufacturers to avoid these kinds of problems. While Apple has its developer support programs, carriers like AT&T and Sprint also have frameworks to analyze apps and have programs to educate and encourage developers in creating efficient and well-behaved apps that are safe for networks which Apple developers may want to explore. This document is intended for developers of apps on Apple devices that use cellular networks for data transfer (iphones and ipads). It presumes that you are already familiar with the basics of Ethernet and Wi-Fi data transfer. It uses the Xcode Instruments tool to display data about apps behavior, so some familiarity with Xcode and Instruments may be helpful. The advice here may also be useful to developers of apps on other platforms, but it is not intended to discuss those environments. Note: If you are not familiar with the Instruments analysis tool, see the appendix, Instruments Analysis Tool (page 20), for an introduction. 4

5 Cellular Processors: Interface to the Cellular Network Wi-Fi and Ethernet technologies are similar, and apps can run on either interchangeably. This is not true for cellular networks, where data transfer has different requirements. Whereas Wi-Fi connectivity is relatively inexpensive, the cost per byte of the same data transmitted over a cellular connection can be quite costly for the carrier as well as the user. Cellular networks are quite complex in how they acquire and use radio (airwave/spectrum) resources. That complexity is expensive for the carrier and they pass those expenses on to the user. Cellular Data Is Expensive On most mobile devices, apps can use multiple forms of connectivity, each carrying different expenses. Yet the transition from one to the other is often outside of the users awareness. In addition, to manage cellular connections, the device itself usually has multiple cellular data modes with different data rates and different power usage, also invisible to the user. When a mobile device user out of Wi-Fi range opens an Internet app, it typically takes the exchange of eight to ten cellular network messages (depending on the protocol) before a single byte of data is transmitted. This is far more overhead than in a typical Ethernet/Wi-Fi LAN exchange and it is the principal reason that apps designed for Ethernet and Wi-Fi are often not as efficient when used over a cellular interface. 5

6 Cellular Processors: Interface to the Cellular Network A Device Has an Application Processor and a Cellular Processor Important: You cannot assume that apps that work efficiently on Ethernet and Wi-Fi will perform similarly when used over a cellular interface. A Device Has an Application Processor and a Cellular Processor Typically, a device has both an application processor and a cellular processor, which each operate in different power states and data states, as shown in Figure 2-1. Figure 2-1 Power and data states of a cellular device s processors The cellular processor typically has three different on states, as shown here; some protocols have four. The states are defined by the power consumed and the data rates. There may be a zero state for an established but idle connection with no data being transmitted. Processors use higher power states to send larger amounts of data. The choice of state and the decision to change state is automatically negotiated with the cellular network. 6

7 Cellular Processors: Interface to the Cellular Network How the Cellular Processor Communicates How the Cellular Processor Communicates The cellular processor communicates with the cellular network in two different planes: the control plane, which manages the communication protocol, and the data plane, which carries the actual data packets. To provide good user performance, cellular network providers attempt to deploy a network that will never have its capacity exceeded while keeping costs reasonable. Yet they can be vulnerable to the behavior of apps over which they have no control. Many apps are designed with features that, intentionally or not, push the boundaries of the networks. As a result, carriers often need to restrict app behavior to keep them within the limitations of the networks. For example, a carrier could limit the number of connections that an app triggers, especially in the control plane. Apps may also be restricted by the device manufacturers. For example, devices can restrict an app s use of memory, processing, or battery resources. 7

8 Best Practices for Developing Cellular Apps Apple engineers analyzed the performance of many third-party apps, included streaming, gaming, messaging, and productivity apps. The analysis used more than 50 metrics, including: Control plane overhead Data consumption on the cellular interface Wi-Fi/cellular interface behavior Power consumption specific to cellular usage Background and active modes The analysis, including experience with Apple s own apps, resulted in several best practices for application development. Note: The real-world data behind the following best practices is displayed using the Instruments analysis tool. If you are not familiar with Instruments, see the appendix, Instruments Analysis Tool (page 20). Bundle Data Requests to Limit Background Activity Limit app background activity either by bundling your requests or by making requests when another app has already initiated a connection (if that can be determined). Background activity is not based on interactions with the user but rather on some other desired pattern of communication. Here are two examples. 8

9 Best Practices for Developing Cellular Apps Bundle Data Requests to Limit Background Activity Background Pings The example in Figure 3-1 shows excessive, low-volume, background traffic because of a recurrent keepalive signal that runs even when the app is in the background, repeatedly initiating a new connection to transmit a very small amount of data. Although this kind of pinging is typically not a problem in Ethernet and Wi-Fi apps, repeated, independent connections, even with small amounts of data, can create large amounts of overhead with cellular connections. Figure 3-1 A view of background pings that need to be eliminated In this case, the background pings should be eliminated or bundled with other connections. 9

10 Best Practices for Developing Cellular Apps Bundle Connections to Reduce Control Plane Traffic Ad Frameworks Figure 3-2 shows a problem with the advertising framework the app is using. In the background, separate from the app s activity, the framework is downloading ads at irregular intervals. Although each download has very little data, each one requires new control plane connections. Figure 3-2 A view of unbundled ads, resulting in high overhead The ad delivery mechanism needs to be redesigned to avoid the overhead that comes from downloading the ads one at a time. Bundle Connections to Reduce Control Plane Traffic Both of the examples in the previous section take place in the background, when the user is not actively using the app. Even when the user is actively interacting with an app, it may attempt to communicate with separate, small chunks of data which can produce large overhead. Figure 3-3 shows an app in active mode, where intermittent connections with very small amounts of data are creating high cellular control plane overhead. In this case, the app has been designed to show text on the user s screen and when the user scrolls down, new text is requested. As the user scrolls down a few lines at a time, new data is downloaded in small chunks, with a new connection for each chunk. 10

11 Best Practices for Developing Cellular Apps Bundle Connections to Reduce Control Plane Traffic Reorganizing the download process can make more efficient use of the connection overhead. Figure 3-3 A view of excessive, low-volume, foreground traffic 11

12 Best Practices for Developing Cellular Apps Conserve Battery When There Is No User Input Saving App Data to the Cloud in Real Time Figure 3-4 shows a six-minute log of an app that is saving data to the cloud in real time. This example shows an app that is in active use. The user is repeatedly touching the screen and typing to select and edit the original input while composing text. Each time the user touches or types, the data is saved to the cloud, as if the user is not using an app on the device but is interacting with the cloud directly. Figure 3-4 A view of an app saving data to the cloud in real time making numerous new connections Without any specific bundling of the data, every user interaction generates more cellular control plane overhead and additional data transfer. The lack of bundling thus impacts both the network overhead and the device's data plan. Conserve Battery When There Is No User Input Use power resources efficiently by monitoring user inputs to determine when an Auto-Lock override should be turned off. 12

13 Best Practices for Developing Cellular Apps Respect User Data Plans The Auto-Lock feature on an iphone sets the time that elapses before the iphone automatically locks or turns off the display, if there is no user input. Typically, games attempt to override a device s Auto-Lock functionality to provide what the game designers consider to be a better user experience. For example, a game may prevent the screen from going dark while the user is not taking any action. Generally, this is what the user wants until the user sets the game down, walks away for half an hour, and returns to find a drained battery. Figure 3-5 shows an example of a game that overrides the screen Auto-Lock functionality and keeps the screen on until the battery drains completely. A balance needs to be found between annoying the user unnecessarily and keeping the screen on without any checks for activity. Figure 3-5 A game overriding the automatic dimming of the screen with disappointing results Fortunately, this situation is easy to identify using the display brightness and sleep/wake instruments. Respect User Data Plans Honor device/user data plans with indications to user, especially when Wi-Fi is not available. Apps should not download or upload data for any purpose other than that needed for normal usage. Figure 3-6 shows a very popular VoIP app that uses an ad hoc transport model, taking advantage of whatever connections are available. When it is open on a cellular device in background mode, the app s flexible data transport model uses the cellular device as a router for other users data. Thus it is sending data that was never 13

14 Best Practices for Developing Cellular Apps Respect User Data Plans originated (intentionally or otherwise) by the user of the device and is eating into this user s data plan. Worse, it initiates many new connections to do so, further increasing the overhead that consumes the user s data allowance. Figure 3-6 A VoIP app using your data plan to transport other users data Estimate of the number of connections that your app needs to function properly. When you see more connections than you expect, investigate to determine what is initiating those connections. Switching Video Playback from Wi-Fi to Cellular A video playback app can be a huge consumer of bandwidth if it makes no distinction between Wi-Fi and cellular connections. 14

15 Best Practices for Developing Cellular Apps Manage Data Download Patterns In this example (Figure 3-7), a user began a video download while on a Wi-Fi connection. At some point, the device lost the Wi-Fi connection and transparently transitioned to a cellular connection, perhaps while the user walked from a building to a parking lot. The app gave the user no input and no choice of whether to continue the download under the new, potentially expensive, data channel. Figure 3-7 Video playback downloading on Wi-Fi and unknowingly moving to cellular Manage Data Download Patterns Download data in as big a burst as possible for every connection, especially when using a cellular network. 15

16 Best Practices for Developing Cellular Apps Manage Data Download Patterns The app in Figure 3-8 has all of its connections at the left side of the histogram. Because the app is creating few new connections, it might appear there is no problem with its download process. However, there is a repeating pattern in the download data: Large data spikes are alternating with periods of no data, approximately every ten seconds. Yet the app is not making new connections for these spikes. Figure 3-8 An app's oscillating download pattern showing no new connections 16

17 Best Practices for Developing Cellular Apps Manage Data Download Patterns This oscillating pattern is a more subtle overhead issue than simply creating new connections. Cellular traffic operates at different power and data levels within a single continuous connection. The choice of data rates is managed by the cellular network in negotiation with the mobile device. Even within a single connection, managing the transitions between low, medium, and high data rates requires communication overhead, as illustrated in Figure 3-9. Figure 3-9 The communication overhead resulting from state transitions within a single connection 17

18 Best Practices for Developing Cellular Apps Manage Data Download Patterns In Figure 3-10, an Apple internal analysis tool shows the actual Wideband Code Division Multiple Access (WCDMA) power and data states used by the device. They are oscillating along with the data bursts with short periods of high power and high data transfer between longer periods of medium power and little data. Although new connections are not being created, there is heavy communication overhead and wasted power with no data being transferred. Figure 3-10 The data download rate affecting the power state, creating oscillation In this app, an estimation of the data download rate determines the playback rate. Because a medium data rate predominates, the app specifies a lower playback quality, even though a higher playback quality could be easily supported. This app determines how much to download based on the lower data rate. But because the block of data is sufficiently large to automatically put the device into high-power mode, the requested data packet completes quickly. This behavior leaves the processor and channel idle until the next packet comes due, scheduled according to the lower data rate. The cellular processor runs at high or medium power over half of the time when no data is being transferred, thereby wasting resources and degrading the user experience. 18

19 Best Practices for Developing Cellular Apps Manage Data Generation, the Cache, and Data Requests Although the WCDMA state is not directly observable in Instruments, knowing about its state transition overhead may help you diagnose oscillating download problems like this and may help you to design apps that avoid this issue. If this app had a built-in understanding of the network s power and data-rate transition criteria, it could transfer larger blocks of data at high power and deliberately go into low power between the blocks, conserving battery life while providing higher playback quality. Manage Data Generation, the Cache, and Data Requests As an app developer, you need to be conscious of how data is being uploaded and downloaded by your app to avoid wasting network resources. Encoding and compression. Be aware of how much data is actually transmitted over the cellular interface per byte generated by the app. A single byte of data can have as much as 1500 bytes of overhead. Cache utilization. Use the cache efficiently to avoid unnecessary downloading of same data over and over again. Data request patterns. Look for patterns in how data is requested. Perhaps all the images of a webpage can be downloaded in one connection instead of making multiple connections. Each of these aspects of data usage impacts the network through changes in the device s state and through the generation of control plane traffic. 19

20 Instruments Analysis Tool This appendix provides a brief introduction to the Instruments analysis tool to help you understand the data displays used in the best practices described in Best Practices for Developing Cellular Apps (page 8). Main Features of Instruments Instruments is one of the Xcode developer tools, available through the Open Developer Tools menu. This appendix describes how you can use the Instruments analysis tool to monitor problem areas by checking an app s efficiency both on the network and on the device. Although Instruments should be familiar to most iphone developers, it s worth reviewing some of the features that are important to testing cellular apps. The Instruments analysis tool: Is easy to use Allows you to identify issues and outliers quickly, without having to learn a lot of details about the underlying data-pipe mechanisms Identifies the device-side impact as well as the impact on the network Measures a few seconds worth of data or logs over multiple days Provides appropriate granularity in whatever timescale is being measured Has little to no impact on the device and app behavior while the tool is in use The Instruments analysis tool includes a suite of individual instruments that you can use to identify unusual patterns of network activity. The Connections tool and the App Profiling tool are particularly useful in recognizing the types of network problems that inefficient apps can cause. An overview of the Instruments user interface is available in Touring Instruments in Instruments User Guide. 20

21 Instruments Analysis Tool Quick Tour of Instruments Views This document specifically refers to the Track Pane in the upper half of the view, the Navigation Bar in the middle, and the Detail Pane in the lower half of the view, as shown in Figure A-1. Figure A-1 The Instruments user interface: Displaying a wide range of information in a compact space This document is not intended to be a tutorial in using the Instruments tool. This description is meant to familiarize you with Instruments enough to understand the example displays in Best Practices for Developing Cellular Apps (page 8). Quick Tour of Instruments Views The Connections instrument shows many activities that should be familiar to developers. It has three views: Interfaces, Connections, and Processes. 21

22 Instruments Analysis Tool Quick Tour of Instruments Views Interfaces View The Connections tool s Interfaces view (Figure A-2) monitors traffic on cellular and Wi-Fi interfaces. Figure A-2 The Connections tool's Interfaces view visibly identifying traffic going to each interface The Interfaces Detail pane shows metrics and other details for each interface. Each interface that you select will be graphed in the Track pane, showing data volume over time. 22

23 Instruments Analysis Tool Quick Tour of Instruments Views Connections View The Connections tool s Connections view (Figure A-3) monitors all TCP and UDP connections as the app triggers them. Figure A-3 The Connections tool's Connections view showing all the TCP and UDP connections initiated on each interface The Connections Detail pane shows metrics and other details for each connection and the selected connections are graphed in the Track pane, showing data volume over time. 23

24 Instruments Analysis Tool Quick Tour of Instruments Views Processes View The Connections tool s Processes view (Figure A-4) monitors data traffic connections for each process that the app is running. Figure A-4 The Connections tool's Processes view showing the data traffic initiated by each process of the app The Processes view shows the traffic for each process created or used by the app. Select which processes are graphed using the checkboxes in the Detail pane. All traffic related to other processes is shown in the bottom line of the Detail pane, identified as *Other*. To protect the user s privacy, you can only individually monitor apps that you have developed. 24

25 Instruments Analysis Tool Quick Tour of Instruments Views Combined View The Connections tool supports creating combined views that allow you to have interfaces, connections, and processes graphed in time-aligned combination (Figure A-5). Figure A-5 The Instruments combined view showing time-aligned details Use the Combined view to identify which process was active, what interface the traffic used, and what connections the activity generated. All checked items from all three Detail lists will be graphed in the Track pane. 25

26 Instruments Analysis Tool Combining with Other Instruments Views Combining with Other Instruments Views The Connections instrument is only one of the individual instruments available in the Instruments tool. You can combine a Connections view with other instruments. For example, Figure A-6 shows a time-aligned view of the Connections, Network Activity, Energy Usage, Display Brightness, and CPU Activity instruments. Figure A-6 Instruments displaying a combined view with several different individual instruments A combined view allows you to compare multiple factors in a time-aligned view to help identify problems. Identifying Outliers The Instruments tool can help identify outliers, those instances that are outside the overall normal range of an app s operation. These outliers can have the greatest impact on the cellular data network. 26

27 Instruments Analysis Tool Identifying Outliers To find outliers, open the Connection tool s Interfaces view and locate the Additional Details button ( ) for the interface (Figure A-7). The button appears when you select a specific interface or when you hover your cursor over an interface entry. Click that button to generate a histogram of the app s connections inactivity. Figure A-7 The Additional Details button, for generating an interface inactivity histogram Many Instruments tools have a button like this that provides additional details, depending on the tool. For Interfaces, it generates a histogram showing the inactive time between every two consecutive packets (Figure A-8). Figure A-8 An interface inactivity histogram to help identify anomalous behavior This interface inactivity histogram is used in many of the following best practices. 27

28 Instruments Analysis Tool Understanding the Instruments Log File In general, best practice is to avoid connection idle time values that fall in the middle area (10 seconds to 15 minutes between connections). Instead, operate your app either in continuous connection (the left end) or where the timing is not critical (the right end). If your app requires frequent new connections to the cellular physical layer infrastructure (the middle area), this behavior can both degrade performance and increase user and carrier costs. Understanding the Instruments Log File Complete instructions on creating an Instruments log file (also called a trace file) are beyond the scope of this guide. Please see Collecting Data on Your App for more details. To understand the examples in Best Practices for Developing Cellular Apps (page 8), it will be useful to know that Instruments has two methods for creating log files for analysis (Figure A-9): With your device tethered to your workstation, view the results in real time in Instruments. With your device untethered, save the log on your device, view the log file in Instruments later. Figure A-9 Two ways to save Instruments logs: on your device or on your workstation Seeing your device s activities in real time can be useful for some situations, such as seeing the results of user actions. Being able to operate untethered allows you to test scenarios such a moving from a Wi-Fi area to an area with only cellular service. 28

29 Instruments Analysis Tool Understanding Testing Understanding Testing Typical tests of any app include two modes: active tests and background tests. To accurately evaluate an app s performance, first run a test without the app to be profiled, to understand the traffic generated by the basic usage of the device. Then do a second run, with the app to be profiled, to understand the additional traffic generated by the app. To run an active test, record the app while it is in foreground mode for anywhere from a few seconds up to 15 or 20 minutes. For background tests, run the app in background mode; the screen can be either on or off. You can see the impact of the app on cellular performance by looking at the number of connections made (cellular control plane as well as TCP/UDP), the amount of data transferred, the data transfer patterns, and other metrics. Instruments can monitor these tests for however long you want to run them, from a few minutes to a couple of days. Use longer-duration tests to understand the keepalive patterns generated by apps. Some apps generate more connections when they are freshly set up (out of the box) than when they have been running for a few days. 29

30 Document Revision History This table describes the changes to Cellular Best Practices Guide. Date Notes New document that provides best-practice guidelines for developers of ios apps that use cellular networks for data transfer. 30

31 Apple Inc. Copyright 2014 Apple Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, mechanical, electronic, photocopying, recording, or otherwise, without prior written permission of Apple Inc., with the following exceptions: Any person is hereby authorized to store documentation on a single computer or device for personal use only and to print copies of documentation for personal use provided that the documentation contains Apple s copyright notice. No licenses, express or implied, are granted with respect to any of the technology described in this document. Apple retains all intellectual property rights associated with the technology described in this document. This document is intended to assist application developers to develop applications only for Apple-branded products. Apple Inc. 1 Infinite Loop Cupertino, CA Apple, the Apple logo, Instruments, ipad, iphone, and Xcode are trademarks of Apple Inc., registered in the U.S. and other countries. IOS is a trademark or registered trademark of Cisco in the U.S. and other countries and is used under license. Ping is a registered trademark of Karsten Manufacturing and is used in the U.S. under license. APPLE MAKES NO WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH RESPECT TO THIS DOCUMENT, ITS QUALITY, ACCURACY, MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE. AS A RESULT, THIS DOCUMENT IS PROVIDED AS IS, AND YOU, THE READER, ARE ASSUMING THE ENTIRE RISK AS TO ITS QUALITY AND ACCURACY. IN NO EVENT WILL APPLE BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY DEFECT, ERROR OR INACCURACY IN THIS DOCUMENT, even if advised of the possibility of such damages. Some jurisdictions do not allow the exclusion of implied warranties or liability, so the above exclusion may not apply to you.

itunes Connect App Analytics Guide v1

itunes Connect App Analytics Guide v1 itunes Connect App Analytics Guide v1 apple 2015-04-22 Apple Inc. 2015 Apple Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any

More information

TestFlight FAQ. 2014-7-17 Apple Inc.

TestFlight FAQ. 2014-7-17 Apple Inc. TestFlight FAQ apple 2014-7-17 Apple Inc. 2014 Apple Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means,

More information

ios Team Administration Guide (Legacy)

ios Team Administration Guide (Legacy) ios Team Administration Guide (Legacy) Contents About ios Development Team Administration 5 At a Glance 6 Team Admins Manage Team Membership and Assign Roles in the Member Center 6 Development Devices

More information

WiFiSurvey Using AirPort Utility for WiFi Scanning Guide

WiFiSurvey Using AirPort Utility for WiFi Scanning Guide WiFiSurvey Using AirPort Utility for WiFi Scanning Guide WiFiSurvey User Guide (January 10, 2016) AccessAgility LLC 2016 AccessAgility LLC. All rights reserved. No part of this publication may be reproduced,

More information

WiFiPerf User Guide 1.5

WiFiPerf User Guide 1.5 WiFiPerf User Guide 1.5 AccessAgility LLC 2012 AccessAgility LLC. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any

More information

Apple Applications > Safari 2008-10-15

Apple Applications > Safari 2008-10-15 Safari User Guide for Web Developers Apple Applications > Safari 2008-10-15 Apple Inc. 2008 Apple Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,

More information

Networking & Internet 2010-07-06

Networking & Internet 2010-07-06 Wireless Enterprise App Distribution Networking & Internet 2010-07-06 Apple Inc. 2010 Apple Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,

More information

Xcode User Default Reference. (Legacy)

Xcode User Default Reference. (Legacy) Xcode User Default Reference (Legacy) Contents Introduction 5 Organization of This Document 5 Software Version 5 See Also 5 Xcode User Defaults 7 Xcode User Default Overview 7 General User Defaults 8 NSDragAndDropTextDelay

More information

Mail Programming Topics

Mail Programming Topics Mail Programming Topics Contents Introduction 4 Organization of This Document 4 Creating Mail Stationery Bundles 5 Stationery Bundles 5 Description Property List 5 HTML File 6 Images 8 Composite Images

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

User Manual. Page 2 of 38

User Manual. Page 2 of 38 DSL1215FUN(L) Page 2 of 38 Contents About the Device...4 Minimum System Requirements...5 Package Contents...5 Device Overview...6 Front Panel...6 Side Panel...6 Back Panel...7 Hardware Setup Diagram...8

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Web Security Firewall Setup. Administrator Guide

Web Security Firewall Setup. Administrator Guide Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Creating Carbon Menus. (Legacy)

Creating Carbon Menus. (Legacy) Creating Carbon Menus (Legacy) Contents Carbon Menus Concepts 4 Components of a Carbon Menu 4 Carbon Menu Tasks 6 Creating a Menu Using Nibs 6 The Nib File 7 The Menus Palette 11 Creating a Simple Menu

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

CINSAY RELEASE NOTES. Cinsay Product Updates and New Features V2.1

CINSAY RELEASE NOTES. Cinsay Product Updates and New Features V2.1 CINSAY RELEASE NOTES Cinsay Product Updates and New Features V2.1 2011, 2012, 2013 Cinsay, Inc. All rights reserved. Use of the Cinsay software to which this document relates is governed by, and subject

More information

SwiftBroadband and IP data connections

SwiftBroadband and IP data connections SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

SOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control

SOLUTION CARD WHITE PAPER. What is Fueling BYOD Adoption? Mobile Device Accountability and Control WHITE PAPER Enabling Enterprise BYOD with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your organization s wireless network About This White Paper This white

More information

Apple URL Scheme Reference

Apple URL Scheme Reference Apple URL Scheme Reference Contents About Apple URL Schemes 4 At a Glance 4 Composing Items Using Mail 4 Starting a Phone or FaceTime Conversation 4 Specifying Text Messages 5 Opening Locations in Maps

More information

Bria iphone Edition User Guide

Bria iphone Edition User Guide Bria iphone Edition User Guide CounterPath Corporation CounterPath Corporation Suite 300, One Bentall Centre 505 Burrard Street, Box 95 Vancouver, BC V7X 1M3 Tel: 604.320.3344 sales@counterpath.com www.counterpath.com

More information

ios Deployment Simplified FileMaker How To Guide

ios Deployment Simplified FileMaker How To Guide ios Deployment Simplified FileMaker How To Guide Table of Contents FileMaker How To Guide Introduction... 3 Deployment Options... 3 Option 1 Transfer to the ios device... 3 Option 2 - Host with FileMaker

More information

8x8 Virtual Office Mobile User Guide for iphone

8x8 Virtual Office Mobile User Guide for iphone 8x8 User Guide for iphone Works with iphone, ipad and ipod Touch Version 2.0, September 2010 Table of Contents Introduction...3 Features...3 Technical Requirements...4 Getting Started...5 Ordering from

More information

WebEx. Network Bandwidth White Paper. WebEx Communications Inc. - 1 -

WebEx. Network Bandwidth White Paper. WebEx Communications Inc. - 1 - WebEx Network Bandwidth White Paper WebEx Communications Inc. - 1 - Copyright WebEx Communications, Inc. reserves the right to make changes in the information contained in this publication without prior

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Mobile App Monitoring. Release Notes. Release 8.0

Mobile App Monitoring. Release Notes. Release 8.0 Mobile App Monitoring Release 8.0 Mobile App Monitoring 8.0 Mobile App Monitoring 8.0 July 2014 Copyright Notice Copyright 1995-2014 Keynote Systems, Inc. All rights reserved. THE INFORMATION CONTAINED

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

WHITE PAPER SOLUTION CARD. What is Fueling BYOD Adoption? Mobile Device Accountability and Control

WHITE PAPER SOLUTION CARD. What is Fueling BYOD Adoption? Mobile Device Accountability and Control WHITE PAPER Enabling BYOD in Government Agencies with Seamless Mobile Device Accountability & Control How to provide mobility and Web security in your agency s wireless network About This White Paper This

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

The Raiser s Edge Mobile Event Management Application Guide

The Raiser s Edge Mobile Event Management Application Guide The Raiser s Edge Mobile Event Management Application Guide 072613 2013 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic,

More information

BES10 Self-Service. Version: 10.2. User Guide

BES10 Self-Service. Version: 10.2. User Guide BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create

More information

Control4 Smart Home Safety and Security Guide

Control4 Smart Home Safety and Security Guide Control4 Smart Home Safety and Security Guide Contents Safety and security overview 2 Using the Security menu 3 Accessing the Security menu 3 Arming your system 3 Disarming your system 4 Sending an emergency

More information

ipecs Communicator Installation and Operation Guide Please read this manual carefully before operating your set. Retain it for future reference.

ipecs Communicator Installation and Operation Guide Please read this manual carefully before operating your set. Retain it for future reference. ipecs Communicator Installation and Operation Guide ipecs is an Ericsson-LG Brand Please read this manual carefully before operating your set. Retain it for future reference. Revision History Issue Date

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

iphone/ipad Connection Manual

iphone/ipad Connection Manual / Connection Manual By connecting your, or ipod touch to a compatible Yamaha digital instrument and using the various applications we ve created, you can manage your music files more easily and take advantage

More information

Synology NAS Server Mail Station User Guide 2009-1-7

Synology NAS Server Mail Station User Guide 2009-1-7 Synology NAS Server Mail Station User Guide 2009-1-7 2009-1-07 2009 Synology Inc. All Rights Reserved. 1 Synology Inc. 2009 Synology Inc. All rights reserved. No part of this publication may be reproduced,

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Ricoh HotSpot. Printing App. User s Guide. HotSpot Printing App supports:

Ricoh HotSpot. Printing App. User s Guide. HotSpot Printing App supports: Ricoh HotSpot Printing App Mobile Printing Solution HotSpot Printing App supports: HSPA_UQR_April192013_V1 - Apple ios devices - Android devices - BlackBerry smartphone - BlackBerry PlayBook Printing App

More information

Organized, Hybridized Network Monitoring

Organized, Hybridized Network Monitoring Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Intel HTML5 Development Environment. Tutorial Building an Apple ios* Application Binary

Intel HTML5 Development Environment. Tutorial Building an Apple ios* Application Binary Intel HTML5 Development Environment Tutorial Building an Apple ios* Application Binary V1.02 : 08.08.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO

More information

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Using the Jive for ios App

Using the Jive for ios App Using the Jive for ios App TOC 2 Contents App Overview...3 System Requirements... 4 Release Notes...5 Which Version Am I Using?... 6 Connecting to Your Community... 11 Getting Started...12 Using Your Inbox...13

More information

Conditions affecting performance of a WebEx session.

Conditions affecting performance of a WebEx session. Conditions affecting performance of a WebEx session. WebEx Network Bandwidth White Paper The performance of a WebEx session depends on many factors. While vendors like Cisco can control some of these factors,

More information

iphone/ipad Connection Manual

iphone/ipad Connection Manual / Connection Manual By connecting your, or ipod touch to a compatible Yamaha digital instrument and using the various applications we ve created, you can manage your music files more easily and take advantage

More information

Synology DiskStation

Synology DiskStation Synology DiskStation MIB Guide 2013-11-4 1 United States and other countries. rights which vary from state to state. Synology Inc. 2013 Synology Inc. Other products and company names mentioned herein are

More information

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,

More information

RedBlack CyBake Online Customer Service Desk

RedBlack CyBake Online Customer Service Desk RedBlack CyBake Online Customer Service Desk Publication Date: June 2014 Copyright Copyright 2014 RedBlack Software Ltd. All rights reserved. Complying with all applicable copyright laws is the responsibility

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Pogo> User Guide. for iphone, ipad and ipod touch

Pogo> User Guide. for iphone, ipad and ipod touch Pogo> User Guide for iphone, ipad and ipod touch Introduction to Pogo> This document provides detailed information on how best to use the Pogo> application to benefit your business. The intention is to

More information

8x8 Virtual Office Mobile User Guide for ios

8x8 Virtual Office Mobile User Guide for ios 8x8 User Guide for ios Works with iphone, ipad and ipod Touch Version 3.0, August 2012 The Champion For Business Communications Table of Contents Introduction...3 Features...3 Technical Requirements...4

More information

RTP Performance Enhancing Proxy

RTP Performance Enhancing Proxy PACE RTP Performance Enhancing Proxy V2 Whilst the above information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure its accuracy, Inmarsat makes no warranty

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

Using Zistos PNSC over BGAN

Using Zistos PNSC over BGAN Using Zistos PNSC over BGAN Self powered Field Surveillance and Monitoring Version 01 12 th November 2009 1 Contents 1 Overview 1 2 Applications 1 3 Features & Benefits 1 4 Network Diagram 2 5 Connecting

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

CRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios

CRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios 1 Introduction The Crestron apps CRESTRON-APP and CRESTRON-APP-PAD provide a Smart Graphics touch screen user interface on Apple devices running the ios operating system. CRESTRON-APP can also provide

More information

Steps to Migrating to a Private Cloud

Steps to Migrating to a Private Cloud Deploying and Managing Private Clouds The Essentials Series Steps to Migrating to a Private Cloud sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor For several years now, Realtime

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com

Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com The Basics of IP Packet Filtering Edition IPFILTER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center, CA 92082 craig@web400.com

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

technical brief Optimizing Performance in HP Web Jetadmin Web Jetadmin Overview Performance HP Web Jetadmin CPU Utilization utilization.

technical brief Optimizing Performance in HP Web Jetadmin Web Jetadmin Overview Performance HP Web Jetadmin CPU Utilization utilization. technical brief in HP Overview HP is a Web-based software application designed to install, configure, manage and troubleshoot network-connected devices. It includes a Web service, which allows multiple

More information

User Guide. for Card Reader and Payment Application

User Guide. for Card Reader and Payment Application User Guide for Card Reader and Payment Application Introduction to Pogo> This document provides detailed information on how best to use the Pogo> application to benefit your business. The intention is

More information

PCTV Systems Requirements for using DistanTV mobile

PCTV Systems Requirements for using DistanTV mobile PCTV Systems Requirements for using DistanTV mobile PCTV Systems Requirements for using DistanTV mobile GB/US February 2010 2010 PCTV Systems S.à r.l. All rights reserved. No part of this manual may be

More information

Vonage Business Solutions for Android User Guide

Vonage Business Solutions for Android User Guide Vonage Business Solutions for Android User Guide 1 Vonage Business Solutions, Inc. 1375 Peachtree Street, NE Suite 200 Atlanta, GA 30309 Sales 1-877-862-2562 Support 1-866-901-0242 www.vonagebusiness.com

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Ensuring High Availability for Critical Systems and Applications

Ensuring High Availability for Critical Systems and Applications Ensuring High Availability for Critical Systems and Applications Using SharePlex to Ensure Your Oracle Databases Are Always Up and Running Bill Brunt, Product Manager, Dell Software Abstract Keeping business

More information

Event Kit Programming Guide

Event Kit Programming Guide Event Kit Programming Guide Contents Introduction 4 Who Should Read This Document? 4 Organization of This Document 4 See Also 4 Fetching Events 6 Initializing an Event Store 6 Fetching Events with a Predicate

More information

Seagate Business Storage 8-bay Rackmount NAS Reviewer s Guide

Seagate Business Storage 8-bay Rackmount NAS Reviewer s Guide Seagate Business Storage 8-bay Rackmount NAS Reviewer s Guide Seagate Business Storage 8-bay Rackmount NAS Reviewer s Guide/page 2 Purpose of this guide Experience the most common use cases for the product,

More information

Mobile App User's Guide

Mobile App User's Guide Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure

More information

Keynote Mobile Device Perspective

Keynote Mobile Device Perspective PRODUCT BROCHURE Keynote Mobile Device Perspective Keynote Mobile Device Perspective is a single platform for monitoring and troubleshooting mobile apps on real smartphones connected to live networks in

More information

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER WHITE PAPER Enabling BYOD in K-12 with Seamless Mobile Device Accountability and Control How to ideally support mobile devices and maintain Web security and policy compliance in your schools About This

More information

umobilecam Setup Guide All-in-One Mobile Surveillance for Android, ios, Mac, Windows Webcam, IP camera (version 1.0)

umobilecam Setup Guide All-in-One Mobile Surveillance for Android, ios, Mac, Windows Webcam, IP camera (version 1.0) umobilecam Setup Guide All-in-One Mobile Surveillance for Android, ios, Mac, Windows Webcam, IP camera (version 1.0) Copyright UBNTEK CO., LTD. www.ubntek.com Contents 1. Introduction... 3 2. System Requirements...

More information

Mobile App User's Guide

Mobile App User's Guide Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure

More information

SolarWinds Technical Reference

SolarWinds Technical Reference SolarWinds Technical Reference Riverbed and SolarWinds WAN Optimization Introduction...3 Using the WAN Optimization Reports...3 Downloading and Saving Your Reports...3 Specifying Traffic Optimized Interfaces...3

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

New Features and Enhancements

New Features and Enhancements Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements

More information

Log Insight Manager. Deployment Guide

Log Insight Manager. Deployment Guide Log Insight Manager Deployment Guide VERSION: 3.0 UPDATED: OCTOBER 2015 Copyright Notices Copyright 2002-2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

Cisco Events Mobile Application

Cisco Events Mobile Application Welcome to the new free Cisco Events mobile application! Using this tool, participants can: Connect with peers and Cisco representatives attending an event virtually or onsite Earn points towards exclusive

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

TECHNICAL WHITE PAPER. Closed Caption Analysis Using the CMA 1820

TECHNICAL WHITE PAPER. Closed Caption Analysis Using the CMA 1820 TECHNICAL WHITE PAPER Closed Caption Analysis Using the CMA 1820 Sencore has recently introduced a revolutionary new product option for its CMA 1820 Compressed Media Analyzer that allows users to peer

More information

How To Understand The Difference Between Network Analysis And Network Monitoring

How To Understand The Difference Between Network Analysis And Network Monitoring The Essentials Series: Network Troubleshooting and Problem Identification Bandwidth Monitoring and Traffic Analysis sponsored by by Greg Shields Bandwidth Monitoring and Traffic Analysis...1 Different

More information

Whitepaper Performance Testing and Monitoring of Mobile Applications

Whitepaper Performance Testing and Monitoring of Mobile Applications M eux Test Whitepaper Performance Testing and Monitoring of Mobile Applications Abstract The testing of a mobile application does not stop when the application passes all functional tests. Testing the

More information

CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series

CA Nimsoft Monitor. Probe Guide for Active Directory Server. ad_server v1.4 series CA Nimsoft Monitor Probe Guide for Active Directory Server ad_server v1.4 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as

More information

Veeam Task Manager for Hyper-V

Veeam Task Manager for Hyper-V Veeam Task Manager for Hyper-V Version 1.0 User Guide July, 2014 2014 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Intel Data Direct I/O Technology (Intel DDIO): A Primer >

Intel Data Direct I/O Technology (Intel DDIO): A Primer > Intel Data Direct I/O Technology (Intel DDIO): A Primer > Technical Brief February 2012 Revision 1.0 Legal Statements INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE,

More information

genie app and genie mobile app

genie app and genie mobile app genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

Reducing Backups with Data Deduplication

Reducing Backups with Data Deduplication The Essentials Series: New Techniques for Creating Better Backups Reducing Backups with Data Deduplication sponsored by by Eric Beehler Reducing Backups with Data Deduplication... 1 Explaining Data Deduplication...

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

CRESTRON-APP/CRESTRON-APP-PAD

CRESTRON-APP/CRESTRON-APP-PAD 1 3 Introduction The free version of the app has limitations on the size and complexity of the project. For complete functionality, upgrade to the Pro version via an in-app purchase. The CRESTRON-APP and

More information

Nokia E65 Internet calls

Nokia E65 Internet calls Nokia E65 Internet calls Nokia E65 Internet calls Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document

More information

Installation and User Guide. Leaf Capture Remote Version 2.1.1

Installation and User Guide. Leaf Capture Remote Version 2.1.1 Leaf Capture Remote Version 2.1.1 Copyright Leaf Imaging Ltd. 2011. All rights reserved. Leaf, the Leaf logo, and Aptus are trademarks of Leaf Imaging Ltd. Trademarks This document is also distributed

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Best Practices for Log File Management (Compliance, Security, Troubleshooting)

Best Practices for Log File Management (Compliance, Security, Troubleshooting) Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers

More information

Installation Guide. Mobile Surveillance Distance makes no difference. eagleeyes_quick_v1.5

Installation Guide. Mobile Surveillance Distance makes no difference. eagleeyes_quick_v1.5 Installation Guide Mobile Surveillance Distance makes no difference eagleeyes_quick_v1.5 IMPORTANT SAFEGUARD All lead-free products offered by the company comply with the requirements of the European law

More information

Riverbed Steelhead. Configure Hardware Client

Riverbed Steelhead. Configure Hardware Client Riverbed Steelhead Configure Hardware Client Whilst the above information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure its accuracy, Inmarsat makes no

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper ANALYZING FULL-DUPLEX NETWORKS There are a number ways to access full-duplex traffic on a network for analysis: SPAN or mirror ports, aggregation TAPs (Test Access Ports),

More information

User Guide. BES12 Self-Service

User Guide. BES12 Self-Service User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5

More information