Pervasive PSQL Product Authorization
|
|
|
- Tobias Lee
- 10 years ago
- Views:
Transcription
1 Pervasive PSQL Product Authorization A Pervasive Software Whitepaper 7/21/2011
2 Table of Contents Pervasive PSQL Product Authorization... 3 Introduction... 3 Product Authorization Basics... 3 Key Generation and Delivery... 3 Validation and Authorization... 4 Product Deauthorization... 4 Ways to Authorize a Pervasive PSQL Key... 5 Online Authorization... 5 Remote Authorization... 6 Offline Authorization... 6 Telephone Authorization... 7 Hardware Changes, Virtual Machines, Disaster Recovery, and Reusing Keys... 8 General Rule: Deauthorize First... 8 Hardware Changes... 8 Pervasive Notification Viewer... 9 How to Resolve a Failed Validation State... 9 Authorization and Deauthorization for Virtual Machines Disaster Recovery Summary Additional Resources
3 Pervasive PSQL Product Authorization Introduction Licensing for Pervasive PSQL is enforced by the use of keys. Keys are associated with individual computers and can be authorized and deauthorized. Product authorization is a key validation process verifying that the copy of software is legitimate, correctly licensed and on the appropriate hardware and software platform. Beginning with Pervasive PSQL v10, Pervasive has employed product authorization technology to ensure the validity of copies of Pervasive PSQL. Our goal is to protect against casual copying of our software products and to extend that protection as simply as possible to our ISV, OEM, and Distributor partners. Pervasive has field tested the product authorization process for electronic downloads of PSQL trials and e commerce purchases for over a year and with the release of PSQL v11, all Pervasive PSQL products use the product authorization process. This paper will help developers and end users better understand the Pervasive product authorization process and the various ways to authorize Pervasive PSQL. Product Authorization Basics Product authorization involves three main components: 1) the software, 2) a key, and 3) a process that validates and authorizes the key for the product. The software is typically delivered with a key and that key is applied during installation and validated on the local machine or, more recently, by a remote process requiring an Internet connection. These are the basics of Pervasive PSQL product authorization. The biggest difference between PSQL v10 and earlier versions is that product authorization now uses an Internet connection (except in the case of Telephone Authorization) as part of the validation process. The Pervasive PSQL Product Authorization process can be broken into two main steps: 1) Key Generation and Delivery and 2) Validation and Authorization. Key Generation and Delivery 1) When a copy of PSQL is ordered from the Pervasive website, downloaded as a trial, or purchased from a Pervasive partner a key is generated and delivered with the product or via . 2) A copy of that key is stored in a Pervasive server to be used as part of the validation and authorization process. 3
4 Key Generation and Delivery Validation and Authorization 1) The authorization process is started after you install PSQL by inputting the key using the PSQL License Administrator. The authorization process can be started during the installation process of PSQL, or after you install PSQL by inputting the key using the PSQL License Administrator. 2) The installation process, or the License Administrator, connects to the Internet to send the key, along with hardware configuration information specific to the machine (a machine signature), to the Pervasive server. 3) The server verifies that the key is registered in its database and confirms that the key is not already associated with another machine. 4) Once the key has been validated, the server creates a unique installation pairing between the key and the machine signature and authorizes the key for PSQL. Validation and Authorization Product Deauthorization A big part of the control delivered by product authorization is the linking of a copy of software to a specific machine. But, because machines fail, get replaced, or get upgraded it is important to have a way to move a copy of software from one machine to another. This is enabled by Product Deauthorization, which is simply deleting the machine signature associated with a key. The key remains 4
5 inactive until it is applied again on the same machine or on another machine. Product deauthorization requires an Internet connection. Ways to Authorize a Pervasive PSQL Key Currently, there are four ways to authorize a Pervasive PSQL Key: Online the machine with PSQL installed is connected to the Internet. Remote the machine with PSQL installed is not connected to the Internet, but is networked to another machine with Internet access. Offline the machine with PSQL installed is isolated from the Internet, but can accept portable storage (for example, a USB drive) from another machine with Internet access. Telephone If Online, Remote, and Offline authorization aren t available, Pervasive PSQL can be authorized with a telephone call. Online Authorization Online authorization was described above when covering the basics of Product Authorization. It is worth mentioning again because it is the most common method by which the Pervasive PSQL key is authorized. It is simple, quick and almost unchanged from previous versions of PSQL: 1) Install PSQL, input the key, click the Apply button to authorize or 2) Install PSQL, open the License Administrator, input the key, click the Apply button to authorize Online Authorization After you input the key and click the Apply button, the process is automatic and takes only a few seconds. Online deauthorization is accomplished through the License Administrator by selecting a key and clicking the Delete button to deauthorize. 5
6 Remote Authorization Remote authorization is used if the machine running the database engine is not connected to the Internet, but it is connected to another machine that is connected to the Internet. The following is a typical scenario for using remote authorization: 1) Install a PSQL engine (Server or Workgroup) on the non Internet machine. 2) Install a PSQL client on an Internet machine. 3) Use the PSQL License Administrator on the Internet machine to access the PSQL engine (Server or Workgroup) on the non Internet machine. 4) Apply the key to authorize PSQL. Remote Authorization Remote deauthorization is accomplished using the License Administrator on the PSQL Client machine. Refer to Pervasive PSQL User s Guide for details about using the licensing utilities for remote authorization or deauthorization of a key. Offline Authorization Offline authorization involves applying a key on a machine that is not connected to the Internet or connected to machine that has an Internet connection. This necessitates moving files required for authorization between the machine on which the PSQL engine is installed and another machine that is connected to the Internet. The example below uses a USB flash drive for transferring files but any portable storage device will do as long as the device is read/write capable. 1) Install a PSQL engine (Server or Workgroup) on the machine with no Internet connection. 2) Using the command line License Administrator, generate an Authorization Request Data file (run the clilcadm utility to collect the machine signature information for the Offline Machine and combine it with the key data in an encrypted file to carry to the Internet Machine). Save the Authorization Request Data file to a USB drive. 6
7 3) If the machine with Internet connectivity does not have PSQL installed, also copy the licgetauth.exe file from the Pervasive PSQL bin folder to the USB drive. 4) Copy the Authorization Request Data and the licgetauth.exe files from the USB drive to the Internet Machine 5) Send the Authorization Request Data to the Pervasive server and retrieve the Authorization Key Data (run licgetauth.exe to send the key and machine signature information to the server and return the authorization data). 6) The output of this process is a.pky file including the Authorization Key Data needed to authorize Pervasive PSQL on the Offline Machine. Save the.pky file to a USB drive. 7) Bring the USB drive to the Offline Machine and apply the Authorization Key Data file (run the clilcadm utility). Offline Authorization Telephone Authorization In the event that online, remote, or offline key authorization is not possible (for example, when you have no Internet connection), Pervasive PSQL can be authorized using a telephone. Telephone 7
8 authorization requires a working Pervasive PSQL v11 Server or Workgroup engine installed and a valid product key. Telephone authorization is available from 9:00 AM to 5:00 PM Central Time (Austin) by calling or To authorize a key using telephone authorization: 1) At a DOS prompt, type clipaadmn.exe. 2) At the prompt, enter the product key. The PSQL Phone Authorization Utility returns an authorization code used to complete telephone authorization. 3) Call Pervasive at or to complete telephone authorization. 4) Provide the authorization code to Pervasive staff and they will provide you an Authorization data string. 5) Enter the Authorization data string at the DOS prompt as the final step of Telephone authorization. Hardware Changes, Virtual Machines, Disaster Recovery, and Reusing Keys General Rule: Deauthorize First When uninstalling Pervasive PSQL, upgrading a server running PSQL, cloning a virtual machine or moving Pervasive PSQL to another system always delete (deauthorize) the PSQL key first. This way you can be sure that the key used to authorize your copy of PSQL will not already be associated with a machine signature and can be used to reauthorize PSQL whenever and wherever needed. Hardware Changes Always deauthorize (delete) the Pervasive PSQL key before making changes to hardware. Here is why. When the PSQL engine starts, it checks to confirm that the machine signature related to that installation of PSQL is unchanged. Changes to three or more of the attributes that make up the machine signature will cause the key state to change from Active to Failed Validation. For virtual machines, any changes in the machine signature attributes (except memory) will cause the key state to change to Failed Validation. If the Failed Validation state is not corrected in a specific time period (usually 14 days but may be different depending on PSQL version and what company created the key), the key will become Disabled. Note: the Failed Validation key state feature is not available on releases of Pervasive PSQL prior to v11 SP1. For those releases, the hardware changes described above will cause the key to go directly to a Disabled state. 8
9 Pervasive Notification Viewer The Pervasive Notification Viewer is a Windows and Linux tray application that creates a notice whenever the PSQL key state changes for example when a hardware change moves the key state from Active to Failed Validation. Notices are repeated daily until the issue is resolved. The Notification Viewer also provides information about the reason for the validation failure and includes steps to use to resolve the issue. Note: The Notification Viewer is not available in versions of Pervasive PSQL prior to PSQL v11 SP1. Notification Viewer Normal Notification Viewer Alert Notification Viewer Details How to Resolve a Failed Validation State There are two ways to return a key to the Active state from Failed Validation. The first is to return the machine to its original state (before the validation check failed), deauthorize (delete) the key, make the hardware changes and reauthorize (re apply) the key. The second option is to contact Pervasive Support 9
10 (or, if you got your copy of Pervasive PSQL from an OEM, contact the OEM) and ask to have the key repaired. Repairing the key puts it into a state where it can be deauthorized and reauthorized on the machine. Note: If a permanent license is deauthorized, all of the user count increases (UCI s) associated with that license are deauthorized also. Authorization and Deauthorization for Virtual Machines The authorization process collects unique machine signature information from each instance of a virtual machine. Therefore, each image (including clones and copies) requires its own key. Authorization and deauthorization for virtual machines work the same way as online authorization. Note that, except for memory allocation changes, changing the configuration of a virtual machine alters the machine signature just as it would for a physical machine. When changing a configuration, copying or moving a virtual machine, deauthorize (delete) the Pervasive PSQL key first. This is the best way to ensure reauthorization on the new virtual machine. Disaster Recovery If the machine running Pervasive PSQL fails, it does not automatically connect to the remote Pervasive server and deauthorize the PSQL key. The key associated with that machine signature, as far as the Pervasive server is aware, is still active. This means the key cannot be used for any other system. The only way to get the key into a state where it can be reauthorized is to contact Pervasive Support and have the key reset. Support hours are Monday through Friday 9:00 AM to 5:00 PM CST: In the U.S. at (select option 1, then option 2) In Europe at If the server failure occurs outside of Pervasive s normal hours and a working system is needed immediately, download a temporary version of PSQL from the Pervasive website at The download process will deliver a 20 user Server or 5 user Workgroup with a 30 day license that can be used to enable a standby system until Pervasive can reset the key or the server is repaired. Summary Product authorization helps Pervasive and its partners protect their software and ensure that customers get valid copies of software. Of the three ways to authorize a PSQL key, the great majority of product 10
11 authorization will be simple online authorization. Most end users will see very little difference in licensing between PSQL v10 and previous versions. Additional Resources Read the License Administration documentation in the Pervasive User Guide: Status Codes pertaining to key authorization: License Administrator Authorization/Deauthorization Read the PSQL License Authorization FAQ: 11
Pervasive PSQL Product Activation
Pervasive PSQL Product Activation Introduction Licensing for Pervasive PSQL is enforced by the use of keys. Keys are associated with individual computers and can be activated and deactivated. Product activation
Pervasive PSQL Vx Server Licensing
Pervasive PSQL Vx Server Licensing Overview The Pervasive PSQL Vx Server edition is designed for highly virtualized environments with support for enterprise hypervisor features including live application
Understanding Backup and Recovery Methods
Lesson 8 Understanding Backup and Recovery Methods Learning Objectives Students will learn to: Understand Local, Online, and Automated Backup Methods Understand Backup Options Understand System Restore
SharePoint Wiki Redirect Installation Instruction
SharePoint Wiki Redirect Installation Instruction System Requirements: Microsoft Windows SharePoint Services v3 or Microsoft Office SharePoint Server 2007. License management: To upgrade from a trial license,
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
Keepit starter guide
Keepit starter guide Contents Getting started page 3 Regarding transfer times page 3 About the encryption key page 3 If you lose your encryption key page 3 Backing up your data page 4 Restoring your files
IPMI Firmware Update (AMI) In WEB-GUI/DOS/WIN/Linux
IPMI Firmware Update (AMI) In WEB-GUI/DOS/WIN/Linux Firmware Updates in WEB-GUI: 1.1 Click < Update Firmware > under Maintenance 1.2 Click to enter the update mode. A warning message
SQL Server Protection
User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers
Digi Connect Wan 3G Application Guide Update the firmware, backup and restore the configuration of a Digi Connect Wan 3G using a USB flash drive.
1. Configure and prepare required files on the USB flash drive to allow firmware update and configuration backup/restore. Objective: Step by step instructions to upgrade the firmware, backup and restore
Altaro Hyper-V Backup V4 - User Guide
Altaro Hyper-V Backup V4 - User Guide 1 / 161 Table of contents Introducing Altaro Hyper-V Backup... 5 Roles... 6 Sample Scenario... 7 Different Editions... 9 Getting Started... 11 System requirements...
Altaro Hyper-V Backup - Getting Started
Altaro Hyper-V Backup - Getting Started System Requirements Supported Host Operating Systems: Altaro Hyper-V Backup: o Windows 2008 R2 (all editions) o Windows 2008 R2 SP1 o Windows Hyper-V Server 2008
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
MS SQL Server Backup - User Guide
MS SQL Server Backup - User Guide TABLE OF CONTENTS Introduction... 1 Features... 1 System Requirements... 1 MS SQL Server Backup... 2 Accessing SQL Server Backup... 2 MS SQL Server Restore... 6 Accessing
Altaro Hyper-V Backup V4 - User Manual
Altaro Hyper-V Backup V4 - User Manual 2009 2013 Altaro, Ltd. All Rights Reserved Table of contents Introducing Altaro Hyper-V Backup... 5 Add-Ons... 6 Sample Scenario... 7 Different Editions... 9 Getting
VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE
VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE Solution Overview Thank you for choosing the ViperVault cloud replication, backup and disaster recovery service. Using this service you can replicate your
Cloning Utility for Rockwell Automation Industrial Computers
Technical Data Cloning Utility for Rockwell Automation Industrial Computers Topic Page About the Cloning Utility 2 Recovery Partition Considerations 2 Prepare to Boot from the Accessories CD 3 Start the
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
TPM Key Backup and Recovery. For Trusted Platforms
TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)
IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a) User s Reference Guide Internal IBM Use Only This document only applies to the software version listed above and information provided may not
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
How to recover IE Client
HIKVISION EUROPE B.V. How to recover IE Client (WebClientActiveX Control) Name: WebClientActiveX Control Publisher: HANGZHOU HIKVISION DIGITAL TECHNOLOGY CO.,LTD. Type: ActiveX Control Version: 2.4.0.56
SafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
MS SharePoint Server Backup - User Guide
MS SharePoint Server Backup - User Guide TABLE OF CONTENTS Introduction...2 SharePoint Server Backup Features...2 SharePoint Server Restore Features...2 System Requirements...3 SharePoint Server Backup...4
Installing and Upgrading to Windows 7
Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make
Yosemite Server Backup Installation Guide
Yosemite Server Backup Installation Guide Part number: First edition: October, 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this
SWCS 4.2 Client Configuration Users Guide Revision 49. 11/26/2012 Solatech, Inc.
SWCS 4.2 Client Configuration Users Guide Revision 49 11/26/2012 Solatech, Inc. Contents Introduction... 4 Installation... 4 Running the Utility... 4 Company Database Tasks... 4 Verifying a Company...
SyncLockStatus Evaluator s Guide
SyncLockStatus Evaluator s Guide 2011 Table of Contents Introduction... 2 System Requirements... 2 Required Microsoft Components... 2 Contact Information... 3 SyncLockStatus Architecture... 3 SyncLockStatus
MICROSOFT 70-687 EXAM QUESTIONS & ANSWERS
MICROSOFT 70-687 EXAM QUESTIONS & ANSWERS Number: 70-687 Passing Score: 700 Time Limit: 120 min File Version: 58.0 http://www.gratisexam.com/ MICROSOFT 70-687 EXAM QUESTIONS & ANSWERS Exam Name: Configuring
FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide
FX-BTCVT Bluetooth Commissioning Converter Commissioning Guide FX-BTCVT-1 (Bluetooth Commissioning Converter) Code No. LIT-12011665 Issued December 5, 2014 Refer to the QuickLIT website for the most up-to-date
ScreenBeam Configuration Utility (Windows 8.1/10) User Manual. Solutions for the Digital Life. Ver 1.2
ScreenBeam Configuration Utility (Windows 8.1/10) User Manual Ver 1.2 Solutions for the Digital Life 1 Using the Utility with Windows 8.1 or Windows 10 This chapter describes installing and using the ScreenBeam
Backup and Restore FAQ
Backup and Restore FAQ Topic 50210 Backup and Restore Web, Data, and Email Security Solutions 11-Mar-2014 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
Installation Manual v2.0.0
Installation Manual v2.0.0 Contents ResponseLogic Install Guide v2.0.0 (Command Prompt Install)... 3 Requirements... 4 Installation Checklist:... 4 1. Download and Unzip files.... 4 2. Confirm you have
Dell PowerVault MD Storage Array Management Pack Suite Version 6.0 for Microsoft System Center Operations Manager Installation Guide
Dell PowerVault MD Storage Array Management Pack Suite Version 6.0 for Microsoft System Center Operations Manager Installation Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information
How To Backup An Exchange 2007 Mailbox With A Backup From A Backup To A Backup On A Windows 2007 Mail Box (Brick Level) (Barcondown) (For Windows 2007) (Powerpoint) (Windows 2007) And Power
MS Exchange Server Backup - User Guide TABLE OF CONTENTS Introduction...2 Features...2 System Requirements...4 Exchange Server 2010... 4 Exchange Server 2007... 4 Exchange Server 2003... 4 Exchange Server
Understanding Backup and Recovery Methods
Understanding Backup and Recovery Methods LESSON 8 EXAM OBJECTIVE MATRIX SKILLS/CONCEPTS EXAM OBJECTIVE DESCRIPTION EXAM OBJECTIVE NUMBER Understanding Local, Network, Understand backup and recovery 6.1
How to Set Up pgagent for Postgres Plus. A Postgres Evaluation Quick Tutorial From EnterpriseDB
How to Set Up pgagent for Postgres Plus A Postgres Evaluation Quick Tutorial From EnterpriseDB February 19, 2010 EnterpriseDB Corporation, 235 Littleton Road, Westford, MA 01866, USA T +1 978 589 5700
Backup and Recovery FAQs
May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General
ScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
HP Data Protector Express 4.0 Service Pack 1
HP Service Pack 1 Dear Data Protector Express User, We are pleased to announce the new release of HP Data Protector Express software. This release is HP Service Pack 1 (SP1). All users of Data Protector
MyUSBOnly User Guide Menu
MyUSBOnly User Guide Menu Welcome - Lock the Bad Guys out of your USB ports!... 2 System Requirement... 4 Important Notes... 4 FAQ How to install a trial version MyUSBOnly?... 5 FAQ How to buy and install
SQL Server Protection Whitepaper
SQL Server Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 The benefits of using the SQL Server Add-on... 2 Requirements... 2 2. SQL Protection overview... 3 User databases...
ScoMIS Encryption Service
Introduction This guide explains how to install the ScoMIS Encryption Service Software onto a laptop computer. There are three stages to the installation which should be completed in order. The installation
How To Restore An Org Server With Anor Backup For Windows 7.5.2 (Oracle)
Oracle Server Backup User Guide TABLE OF CONTENTS Introduction... 2 Oracle Server Backup... 3 Features... 3 Requirements for Oracle server backup... 3 How to enable ARCHIVELOG Mode... 3 System Requirements...
Administration Guide. . All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Gpupdate and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Gpupdate is a trademark owned by Specops Software.
USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------
USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support
Windows 8 Backup, Restore & Recovery By John Allen
Windows 8 Backup, Restore & Recovery By John Allen Restore and recovery options for Windows 8 are different to earlier versions of Windows, and, of course, the terminology has changed. These are a lot
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide
Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft Diagnostics
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
LexisNexis Law School ebooks / etextbooks FAQs LexisNexis Store Purchases
LexisNexis Law School ebooks / etextbooks FAQs LexisNexis Store Purchases General Questions about ebooks/etextbooks Digital Rights Management/Adobe/User Accounts LexisNexis Store Purchases/Downloading
1. System Requirements
BounceBack Ultimate 14.2 User Guide This guide presents you with information on how to use BounceBack Ultimate 14.2. Contents 1. System Requirements 2. BounceBack Pre-Installation 3. How To Install The
Empower TM 2 Software
Empower TM 2 Software 21 CFR PART 11 COMPLIANCE ASSESSMENT Revision A, December, 2005 1 of 14 Waters Corporation Note: Information presented in this document assumes that the appropriate Empower 2 System
Hyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
Event Notification Module TM
Event Notification Module TM Installation Guide Version 7.0 63220-083-03A1 08/2012 Event Notification Module 63220-083-03A1 08/2012 Notices StruxureWare, StruxureWare Power Monitoring, PowerLogic, Citect,
Site Monitor. Version 5.3
Site Monitor Version 5.3 1 1 Table of contents 1 Table of contents... 2 2 Installation... 3 2.1 Components... 3 2.1.1 Monitoring Service... 3 2.1.2 Desktop User Interface... 3 2.1.3 Web User Interface...
ICT Professional Optional Programmes
ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications
EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices
1 EasyLock User Manual Intuitive Encryption Application for portable Storage Devices User Manual Version 1.0.0.8 2004-2010 CoSoSys Ltd. 2 Table of Contents Table of Contents... 2 1. Introduction... 3 2.
Backup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
Zmanda Cloud Backup Frequently Asked Questions
Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What
Troubleshooting pcanywhere plug-in Deployment
Contents Verify implementation of pcanywhere Solution... 2 Deployment of the pcanywhere plug-in from the SMC... 3 Plug-in installation on managed computer... 5 Problems during pcanywhere Plug-in installation...
Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature
Table of Content Error Messages List... 2 Troubleshooting the Storage System... 3 I can t access the Manager... 3 I forgot the password for logging in to the Manager... 3 The users can t access the shared
Rapid Assessment Key User Manual
Rapid Assessment Key User Manual Table of Contents Getting Started with the Rapid Assessment Key... 1 Welcome to the Print Audit Rapid Assessment Key...1 System Requirements...1 Network Requirements...1
SOLUTION GUIDE AND BEST PRACTICES
SOLUTION GUIDE AND BEST PRACTICES Last Updated December 2012 Solution Overview Combine the best in bare-metal backup with the best in remote backup to offer your customers a complete disaster recovery
Installation Instructions Release Version 15.0 January 30 th, 2011
Release Version 15.0 January 30 th, 2011 ARGUS Software: ARGUS Valuation - DCF The contents of this document are considered proprietary by ARGUS Software, the information enclosed and any portion thereof
HL2170W Windows Network Connection Repair Instructions
Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine
NovaBACKUP Storage Server User Manual NovaStor / April 2013
NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Installation Guide. IDA Indoor Climate and Energy. EQUA Simulation AB January 2014. Copyright 2014 EQUA Simulation AB.
Installation Guide IDA Indoor Climate and Energy Network Versions EQUA Simulation AB January 2014 Copyright 2014 EQUA Simulation AB Contents 1. Introduction 3 2. System requirements 3 3. Delivered files
Archive Attender Version 3.5
Archive Attender Version 3.5 Getting Started Guide Sherpa Software (800) 255-5155 www.sherpasoftware.com Page 1 Under the copyright laws, neither the documentation nor the software can be copied, photocopied,
Infinity 2020 Perimeter Intrusion Detection System
Infinity 2020 Perimeter Intrusion Detection System User Guide: Network Application Your First Line of Defense 1 Infinity 2020 Perimeter Intrusion Detection System Table of Contents Section 1: Getting Started...
Hills Professional Series NVRs and Cameras
FAQs Hills Professional Series NVRs and Cameras (V1.1) 1. What is the default NVR resolution? By Default NVR video output resolution is 1080P. Resolution may be changed if necessary to suit the attached
This guide provides information to show how to create and manage Riva Dynamic Distribution List policies.
Riva Enterprise Edition Secure Distribution List Guide This Guide Welcome to Riva Managed Applications Dynamic Distribution Lists, a policy-driven method of creating dynamically populated GroupWise distribution
Virtual Server Agent v9 with VMware. March 2011
Virtual Server Agent v9 with VMware March 2011 Contents Summary... 3 Backup Transport Methods... 3 Deployment Scenarios... 3 VSA Installation Requirements... 4 VSA Patch Requirements... 4 VDDK Installation...
SNMP Manager User s Manual
SNMP Manager User s Manual Table of Contents 1. Introduction...2 2. SNMP Manager Install, Quick Start and Uninstall...2 2.1. Software Installation...2 2.2. Software Quick Start...2 2.3. Software Uninstall...2
HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer
Survey Utility HP Industry Standard Servers June 2004 HP Insight Diagnostics Online Edition Technical White Paper Featuring Survey Utility and IML Viewer Table of Contents Abstract Executive Summary 3
HDDtoGO. User Guide. User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual
HDDtoGO User Guide User Manual Version 3.4 2004-2010 CoSoSys SRL 2010 A-DATA Technology Co., Ltd. HDDtoGO User Manual Table of Contents Table of Contents...1 1. Introduction...2 2. System Requirements...3
Drake Hosted User Guide
Drake Hosted User Guide Last Revision Date: 11/23/2015 Support.DrakeSoftware.com (828) 524-8020 Drake Hosted User Guide Copyright The Drake Hosted User Guide, Drake Tax Software, and any other related
Managing Documents in the Citrix XenApp Remote Desktop
Introduction Managing Documents in the Citrix XenApp Remote Desktop What is a Citrix XenApp Remote Desktop? It is a virtualized instance of MS Windows with only enough software to run TAS in a controlled
MOBILE BANKING. Why should I use Mobile Banking?
MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data
BackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
Actualtests.C2010-508.40 questions
Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got
Live Maps. for System Center Operations Manager 2007 R2 v6.2.1. Installation Guide
Live Maps for System Center Operations Manager 2007 R2 v6.2.1 Installation Guide CONTENTS Contents... 2 Introduction... 4 About This Guide... 4 Supported Products... 4 Understanding Live Maps... 4 Live
Moving SQL Servers. Document version 3.2 Published December 2010
Copyright 2010 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by any means electronic, mechanical, photocopying,
TSM Studio Server User Guide 2.9.0.0
TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio
New User Enrollment Processes for Online Banking Services
This package contains instructions for setting up your Online Banking Account, estatements, Mobile Banking, Remote Check Deposit, and Text Banking. New User Enrollment Processes for Online Banking Services
SQL Server Protection. User guide
User guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Requirements... 2 2. SQL Protection overview... 3 Backup destinations... 3 Transaction logs... 3 Hyper-V backups... 4 SQL database
FAQ - Frequently Asked Questions Sections of Questions
FAQ - Frequently Asked Questions Sections of Questions Bell Business Backup Service Installation & Setup Firewall Settings Connections & Backups Account Information Restoring Files Uninstalling the Bell
McAfee SMC Installation Guide 5.7. Security Management Center
McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can
Installation and Configuration Guide. Version 5.2
Installation and Configuration Guide Version 5.2 June 2015 RESTRICTED RIGHTS Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (C)(1)(ii) of the
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Departmental On-Site Computing Support (DOCS) Server Support SLA
1 General Overview This is a Service Level Agreement ( SLA ) between the customer and Departmental On-site Computing Support (DOCS) to document: The technology services DOCS provides to the campus. The
Anonymous Call Rejection
Contents Anonymous Call Rejection 4 Call Block 5 Call Forward 6-7 Call Return 8 Call Waiting 9 Caller ID 10-11 Do Not Disturb 12 Find Me 13 Selective Call Forwarding 14 Speed Dial 15 Three-Way Calling
Aspera Connect Browser Plugin Installation Instructions - Windows Clinical Proteomic Tumor Analysis Consortium - Data Coordinating Center (CPTAC-DCC)
Aspera Connect Browser Plugin Installation Instructions - Windows Clinical Proteomic Tumor Analysis Consortium - Data Coordinating Center (CPTAC-DCC) 9/4/2013 This document describes the steps to install
How to use Certificate in Microsoft Outlook
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
