Automated assessment of C++ exercises with unit tests
|
|
|
- Jessica Mills
- 10 years ago
- Views:
Transcription
1 Automated assessment of C++ exercises with unit tests Workshop Automatische Bewertung von Programmieraufgaben Tom-Michael Hesse, Axel Wagner, Barbara Paech Institute of Computer Science Chair of Software Engineering Im Neuenheimer Feld Heidelberg, Germany RUPRECHT-KARLS-UNIVERSITÄT HEIDELBERG
2 Motivation: Direct feedback and lower effort C++ is subject to many programming lectures How to assess C++ programming exercises? Currently, code is evaluated and corrected manually We have CppUnit test cases for all exercises What about automatic testing? Available for Java Students test more and benefit from instant feedback Tutors can focus on programming style Tutor But: Currently, there exists no system dynamically testing C++ exercises with unit tests (CI systems are not robust) 2
3 Challenge: How to test C++ automatically? Other universities only use scripts for particular aspects (building programs, log compiler messages) Testing C++ automatically is difficult, need for: Secure build process (i.e., no JVM) Suitable test cases and feedback Automatic evaluation mechanism Interoperability (exercise code, test system) Basic idea: Create a secure test system and integrate it with an e-learning system Use e-learning system JACK [3] for management and presentation Use CppUnit as test framework 3
4 Our approach: Interoperable test system E-learning system as front end (i.e., JACK) Configurable wrapper between e-learning and test system JSON with zipped, base64-encoded source and test files Relative weights and individual feedback for test cases, refinement of generic error messages Stand-alone test server with security mechanisms (i.e., isolation, sandboxing) 4
5 How does it look like? 5
6 Example: Request to test system { } "suites": [ { "name": "TestArray", "link": [ "Account", "Bank", "AccountsArray", "AccountsList", "TestArray" ] }, { "name": "TestList", "link": [ "Account", "Bank", "AccountsArray", "AccountsList", "TestList" ] } ], "files": { "Account.cpp": "<gzipped, base64 kodierte Datei>", "AccountsArray.cpp": "<gzipped, base64 kodierte Datei>",... "Bank.hpp": "<gzipped, base64 kodierte Datei>" } 6
7 Example: Response from test system [{ }] "name": "solution2_tests", "suite": { "ok": false, "tests": [ { "description": "Exercise2Test::FibPos", "diagnostic": "equality assertion failed\nexpected: 2584\nActual: 4181", "ok": false }, { "description": "Exercise2Test::Fib1", "diagnostic": "", "ok": true } ] }, {... 7
8 Issues: Clean execution, malicious code Clean code execution Separated temporary directory for each solution Independent build process for each solution Sequential test suite execution for each solution Build or test process manipulation: Malicious code Usage of EasySandbox [4] (SECCOMP implementation as shared library) Limited system calls (just read/write, exit, sigreturn) Memory protection by heap limit (malloc is overwritten) Loaded via LD_PRELOAD in test runner 8
9 Issues (ctd.): Runtime attacks Build or test process manipulation: Runtime attacks Configurable limit for execution time Unexpected termination will cause empty test results and no points 9
10 Open questions: Build differences, feedback C++ standard is not completely strict Example: Size definitions of some data types are ranges Differences between student systems and test system (i.e., hardware architecture, compiler) might exist Program, which builds and runs on local machine, might not work within the test system Explanation of test cases is tough Students only learn through feedback they understand Test cases itself should be explained Feedback messages should be closely related to the current test case 10
11 Current work Evaluation of our test system during lecture Einführung in die Praktische Informatik ~500 students with weekly programming exercises Focus on functional programming, typical constructs and OO Integration of all components for productive use Further implementation for test case explanation Current version of test system available at GitHub [5] Current version of integrated components will be available soon 11
12 Literature (1) A. Hermanns, V. Jaenen, A. Heide and K. Henning: ClaRA (C++ learning at RWTH Aachen) Change from classical teaching to e-learing, in Proceedings of the 7th International Conference on Information Technology Based Higher Education and Training (ITHET '06), 2006, pp (2) S. Naser: Evaluating the Effectiveness of the CPP-Tutor, an Intelligent Tutoring System for Students Learning to Program in C++, in Journal of Applied Sciences Research, 2009, vol. 5, no. 1, pp (3) JACK, (4) EasySandbox, (5) Test system, 12
13 Tom-Michael Hesse Institute of Computer Science Chair of Software Engineering Im Neuenheimer Feld Heidelberg, Germany RUPRECHT-KARLS-UNIVERSITÄT HEIDELBERG Prof. Dr. Barbara Paech Veranstaltung Institut für Informatik, Ruprecht-Karls-Universität Heidelberg
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS
A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS Abstract T.VENGATTARAMAN * Department of Computer Science, Pondicherry University, Puducherry, India. A.RAMALINGAM Department of MCA, Sri
ITG Software Engineering
IBM WebSphere Administration 8.5 Course ID: Page 1 Last Updated 12/15/2014 WebSphere Administration 8.5 Course Overview: This 5 Day course will cover the administration and configuration of WebSphere 8.5.
Graylog2 Lennart Koopmann, OSDC 2014. @_lennart / www.graylog2.org
Graylog2 Lennart Koopmann, OSDC 2014 @_lennart / www.graylog2.org About me 25 years old Living in Hamburg, Germany @_lennart on Twitter Co-Founder of TORCH - The Graylog2 company. Graylog2 history Started
NGASI Shared-Runtime Manager Administration and User Guide. 1999-2010 WebAppShowcase DBA NGASI
NGASI Shared-Runtime Manager Administration and User Guide 2 NGASI Shared-Runtime Manager Table of Contents Part I Introduction 4 0 1 Overview... 4 2 Requirements... 4 Part II Administrator 6 1 Login...
BIRT Application and BIRT Report Deployment Functional Specification
Functional Specification Version 1: October 6, 2005 Abstract This document describes how the user will deploy a BIRT Application and BIRT reports to the Application Server. Document Revisions Version Date
Automating Security Testing. Mark Fallon Senior Release Manager Oracle
Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage
Configuring Apache Derby for Performance and Durability Olav Sandstå
Configuring Apache Derby for Performance and Durability Olav Sandstå Database Technology Group Sun Microsystems Trondheim, Norway Overview Background > Transactions, Failure Classes, Derby Architecture
Continuous Integration on System z
Continuous Integration on System z A Proof of Concept at Generali Deutschland Informatik Services GmbH Enterprise Modernization GSE Frankfurt, 14th October 2013 Markus Holzem, GDIS-AS mailto: [email protected]
WebSphere Performance Monitoring & Tuning For Webtop Version 5.3 on WebSphere 5.1.x
Frequently Asked Questions WebSphere Performance Monitoring & Tuning For Webtop Version 5.3 on WebSphere 5.1.x FAQ Version 1.0 External FAQ1. Q. How do I monitor Webtop performance in WebSphere? 1 Enabling
Monitoring HP OO 10. Overview. Available Tools. HP OO Community Guides
HP OO Community Guides Monitoring HP OO 10 This document describes the specifications of components we want to monitor, and the means to monitor them, in order to achieve effective monitoring of HP Operations
Test Automation Integration with Test Management QAComplete
Test Automation Integration with Test Management QAComplete This User's Guide walks you through configuring and using your automated tests with QAComplete's Test Management module SmartBear Software Release
DottsConnected SHAREPOINT 2010 ADMIN TRAINING. Exercise 1: Create Dedicated Service Accounts in Active Directory
DottsConnected SHAREPOINT 2010 ADMIN TRAINING Module 1 - Getting started with SharePoint 2010 This introductory module introduces students to the fundamental terminology and architecture of SharePoint
Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c
Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c This document describes how to set up Oracle Enterprise Manager 12c to monitor
Citect and Microsoft Windows XP Service Pack 2
Citect and Microsoft Windows XP Service Pack 2 Citect and Windows XP Spk 2 White Paper Page 1 About Citect Citect Pty Ltd is a worldwide leader in industrial automation and information management. Its
Course: 10174B: Configuring and Administering Microsoft SharePoint 2010
Course: 10174B: Configuring and Administering Microsoft SharePoint 2010 Description: This five-day instructor-led course teaches students how to install, configure, and administer Microsoft SharePoint
HP OO 10.X - SiteScope Monitoring Templates
HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,
Jonathan Worthington Scarborough Linux User Group
Jonathan Worthington Scarborough Linux User Group Introduction What does a Virtual Machine do? Hides away the details of the hardware platform and operating system. Defines a common set of instructions.
Java Management Extensions (JMX) and IBM FileNet System Monitor
Java Management Extensions (JMX) and IBM FileNet System Monitor Derive J2EE statistics from FileNet System Monitor alerts Level: Introductory Steven J. Bass 01.Mar.2009 Scope: Does your customer want to
The Hotspot Java Virtual Machine: Memory and Architecture
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) The Hotspot Java Virtual Machine: Memory and Architecture Prof. Tejinder Singh Assistant Professor,
Restraining Execution Environments
Restraining Execution Environments Segurança em Sistemas Informáticos André Gonçalves Contents Overview Java Virtual Machine: Overview The Basic Parts Security Sandbox Mechanisms Sandbox Memory Native
An Oracle White Paper May 2012. Oracle Database Cloud Service
An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing
SAM Server Utility User s Guide
SAM Server Utility User s Guide Updated May 2012 Copyright 2010, 2012 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. PDF0157 (PDF) SCHOLASTIC, READ 180, SYSTEM 44, SCHOLASTIC EXPERT
Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:
Confinement Problem The confinement problem Isolating entities Virtual machines Sandboxes Covert channels Mitigation 1 Example Problem Server balances bank accounts for clients Server security issues:
Application Report Help. 2014 Kepware Technologies
2014 Kepware Technologies 2 Table of Contents Table of Contents 2 3 Overview 3 Accessing the Application Report 4 Collecting Event Logs 5 Creating On-Demand Process Memory Dumps 7 Enabling Process Memory
Witango Application Server 6. Installation Guide for OS X
Witango Application Server 6 Installation Guide for OS X January 2011 Tronics Software LLC 503 Mountain Ave. Gillette, NJ 07933 USA Telephone: (570) 647 4370 Email: [email protected] Web: www.witango.com
Using Requirements Traceability Links At Runtime A Position Paper
Using Requirements Traceability Links At Runtime A Position Paper Alexander Delater, Barbara Paech University of Heidelberg, Institute of omputer Science Im Neuenheimer Feld 326, 69120 Heidelberg, Germany
ORACLE INSTANCE ARCHITECTURE
ORACLE INSTANCE ARCHITECTURE ORACLE ARCHITECTURE Oracle Database Instance Memory Architecture Process Architecture Application and Networking Architecture 2 INTRODUCTION TO THE ORACLE DATABASE INSTANCE
Security Certification of Third- Parties Applications
Security Certification of Third- Parties Applications Stanislav Dashevskyi [email protected] Advisors: Fabio Massacci, Antonino Sabetta Agenda Introduction Third-party code in web applications Third-party
Tool - 1: Health Center
Tool - 1: Health Center Joseph Amrith Raj http://facebook.com/webspherelibrary 2 Tool - 1: Health Center Table of Contents WebSphere Application Server Troubleshooting... Error! Bookmark not defined. About
Learning More About Load Testing
Welcome to this introduction to application performance testing and the LoadRunner load testing solution. This document provides a short overview of LoadRunner s features, and includes the following sections:
Apache Jakarta Tomcat
Apache Jakarta Tomcat 20041058 Suh, Junho Road Map 1 Tomcat Overview What we need to make more dynamic web documents? Server that supports JSP, ASP, database etc We concentrates on Something that support
MyCloudLab: An Interactive Web-based Management System for Cloud Computing Administration
MyCloudLab: An Interactive Web-based Management System for Cloud Computing Administration Hoi-Wan Chan 1, Min Xu 2, Chung-Pan Tang 1, Patrick P. C. Lee 1 & Tsz-Yeung Wong 1, 1 Department of Computer Science
WebSphere v5 Administration, Network Deployment Edition
WebSphere v5 Administration, Network Deployment Edition Loading Java Classes Web Age Solutions, Inc. 2003 6-32 Class Loader A class loader is a Java class that loads compiled Java byte code of other classes.
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,
Administration Authentication for InGenius Connector Enterprise
Administration Authentication for InGenius Connector Enterprise Version 2.23.301 Contact: [email protected] +1-613-591-9002 x3000 TRADEMARKS InGenius, InGenius Connector Enterprise and the InGenius logo
Intellicus Cluster and Load Balancing (Windows) Version: 7.3
Intellicus Cluster and Load Balancing (Windows) Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
DMZ Secure Proxy Environment setup for IP Forwarding
DMZ Secure Proxy Environment setup for IP Forwarding The DMZ Secure Proxy Server for IBM WebSphere Application Server was a new feature introduced in the WebSphere Application Server V7.0 product. An IBM
Efficient Automated Build and Deployment Framework with Parallel Process
Efficient Automated Build and Deployment Framework with Parallel Process Prachee Kamboj 1, Lincy Mathews 2 Information Science and engineering Department, M. S. Ramaiah Institute of Technology, Bangalore,
Guideline for stresstest Page 1 of 6. Stress test
Guideline for stresstest Page 1 of 6 Stress test Objective: Show unacceptable problems with high parallel load. Crash, wrong processing, slow processing. Test Procedure: Run test cases with maximum number
How To Set Up An Intellicus Cluster And Load Balancing On Ubuntu 8.1.2.2 (Windows) With A Cluster And Report Server (Windows And Ubuntu) On A Server (Amd64) On An Ubuntu Server
Intellicus Cluster and Load Balancing (Windows) Intellicus Enterprise Reporting and BI Platform Intellicus Technologies [email protected] www.intellicus.com Copyright 2014 Intellicus Technologies This
Glassfish Architecture.
Glassfish Architecture. First part Introduction. Over time, GlassFish has evolved into a server platform that is much more than the reference implementation of the Java EE specifcations. It is now a highly
BPM Scheduling with Job Scheduler
Document: BPM Scheduling with Job Scheduler Author: Neil Kolban Date: 2009-03-26 Version: 0.1 BPM Scheduling with Job Scheduler On occasion it may be desired to start BPM processes at configured times
Introduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
"Charting the Course...... to Your Success!" MOC 10174 B Configuring and Administering Microsoft SharePoint 2010. Course Summary
Description Course Summary This five-day instructor-led course teaches students how to install, configure, and administer Microsoft SharePoint and also how to manage and monitor sites and users by using
ADAM 5.5. System Requirements
ADAM 5.5 System Requirements 1 1. Overview The schema below shows an overview of the ADAM components that will be installed and set up. ADAM Server: hosts the ADAM core components. You must install the
BPM Software Architecture
BPM Software Architecture System Details for bpmtoolbox and bpmmodules Version: v1.2 Author: BPM www.bpmglobal.com Page 1 of 13 Contents 1 Introduction 3 2 Software Components 4 2.1 Overview 4 2.2 BPM
Siebel Application Deployment Manager Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013
Siebel Application Deployment Manager Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related
System Planning, Deployment, and Best Practices Guide
www.novell.com/documentation System Planning, Deployment, and Best Practices Guide ZENworks Application Virtualization 9.0 February 22, 2012 Legal Notices Novell, Inc., makes no representations or warranties
Pearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Ergon Workflow Tool White Paper
Ergon Informatik AG Kleinstrasse 15 CH-8008 Zürich Phone +41 1 268 89 00 Fax +41 1 261 27 50 www.ergon.ch Ergon Workflow Tool White Paper Version 1.1, August 14, 2002 Andreas Fleischmann Copyright 2004,
2014 Electrical Server Installation Guide
2014 Electrical Server Installation Guide TITLE: 2014 Electrical Server Installation Guide DATE: September 2013 SUBJECT: ABSTRACT: Installation guide for SolidWorks Electrical 2014 on the server Guide
Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI)
Sonatype CLM Enforcement Points - Continuous Integration (CI) i Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI) ii Contents 1
Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College
Why is CICS Still Alive? Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Agenda Middleware the hidden part of IT CICS (Customer Information Control System) track record as a middleware
JAVA WEB START OVERVIEW
JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start
Managing FactoryTalk Security for Multiple FactoryTalk View Studio Applications
Managing FactoryTalk Security for Multiple FactoryTalk View Studio Applications Relevant Products - FactoryTalk View Machine Edition 5.0 - RSView Machine Edition 4.0 - FactoryTalk View Supervisory Edition
10174 - SharePoint 2010
Configuring and Managing Microsoft SharePoint 2010 Introduction The course teaches students how to install, configure and administer SharePoint, and also manage and monitor sites and users by using SharePoint
Characteristics of Java (Optional) Y. Daniel Liang Supplement for Introduction to Java Programming
Characteristics of Java (Optional) Y. Daniel Liang Supplement for Introduction to Java Programming Java has become enormously popular. Java s rapid rise and wide acceptance can be traced to its design
EMC Documentum Content Management Interoperability Services
EMC Documentum Content Management Interoperability Services Version 6.7 Deployment Guide EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com EMC believes the information
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center
Load Manager Administrator s Guide For other guides in this document set, go to the Document Center Load Manager for Citrix Presentation Server Citrix Presentation Server 4.5 for Windows Citrix Access
How To Create A Help Desk For A System Center System Manager
System Center Service Manager Vision and Planned Capabilities Microsoft Corporation Published: April 2008 Executive Summary The Service Desk function is the primary point of contact between end users and
1. Overview of the Java Language
1. Overview of the Java Language What Is the Java Technology? Java technology is: A programming language A development environment An application environment A deployment environment It is similar in syntax
RUnit - A Unit Test Framework for R
RUnit - A Unit Test Framework for R Thomas König, Klaus Jünemann, and Matthias Burger Epigenomics AG November 5, 2015 Contents 1 Introduction 2 2 The RUnit package 4 2.1 Test case execution........................
Conference on. Model-Based Validation of In-Vehicle Networks
Conference on University of Applied Sciences Prof. Dr.-Ing. Wolfhard Lawrenz (organisation) Salzdahlumer Str. 46/48 D-38302 Wolfenbüttel, Germany AUTOSAR Conformance Testing Characteristics and Challenges
Configuring and Administering Microsoft SharePoint 2010
Course 10174 : Configuring and Administering Microsoft SharePoint 2010 Page 1 of 7 Configuring and Administering Microsoft SharePoint 2010 Course 10174: 4 days; Instructor-Led Introduction This four-day
24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
Lab 2 : Basic File Server. Introduction
Lab 2 : Basic File Server Introduction In this lab, you will start your file system implementation by getting the following FUSE operations to work: CREATE/MKNOD, LOOKUP, and READDIR SETATTR, WRITE and
IBM Proof of Technology Discovering business application services, featuring IBM WebSphere Application Server Network Deployment V8
IBM Proof of Technology Discovering business application services, featuring IBM WebSphere Application Server Network Deployment V8 Proof of Technology Introduction Welcome and Introductions Agenda Service
Continuous Integration (CI)
Introduction A long standing problem for software development teams has been to maintain the stability of an application while integrating the changes made by multiple developers. The later that integration
Configuring and Administering Microsoft SharePoint 2013 Curso Personalizado en
Configuring and Administering Microsoft SharePoint 2013 Course: Corrientes 861 Piso 5 S2000CTH Rosario Argentina TEL: +54 (341) 426 4844 [email protected] Configuring and Administering Microsoft SharePoint
Basic TCP/IP networking knowledge of client/server concepts Basic Linux commands and desktop navigation (if don't know we will cover it )
About Oracle WebLogic Server Oracle WebLogic Server is the industry's best application server for building and deploying enterprise Java EE applications with support for new features for lowering cost
Initializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2. Last revised September 26, 2014
Initializing SAS Environment Manager Service Architecture Framework for SAS 9.4M2 Last revised September 26, 2014 i Copyright Notice All rights reserved. Printed in the United States of America. No part
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Basic Installation of the Cisco Collection Manager
CHAPTER 3 Basic Installation of the Cisco Collection Manager Introduction This chapter gives the information required for a basic installation of the Cisco Collection Manager and the bundled Sybase database.
ITMC 2079 MCTS Configuring and Administering Microsoft SharePoint 2010
ITMC 2079 MCTS Configuring and Administering Microsoft SharePoint 2010 Length: 48 Hours Delivery Method: Instructor-led (classroom); MOC 10174 Course Description The course teaches students how to install,
Data Collection Agent for Active Directory
Data Collection Agent for Active Directory Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for the installation of Data Collection Agent Active Directory, from an
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE
WEBAPP PATTERN FOR APACHE TOMCAT - USER GUIDE Contents 1. Pattern Overview... 3 Features 3 Getting started with the Web Application Pattern... 3 Accepting the Web Application Pattern license agreement...
Tuning WebSphere Application Server ND 7.0. Royal Cyber Inc.
Tuning WebSphere Application Server ND 7.0 Royal Cyber Inc. JVM related problems Application server stops responding Server crash Hung process Out of memory condition Performance degradation Check if the
PEtALS Quick Start. PEtALS Team Roland NAUDIN <[email protected]> - February 2008 -
PEtALS Quick Start This document presents the Quick Start release of PEtALS. This release targets PEtALS beginners to ease their first step with PEtALS. PEtALS Team Roland NAUDIN
Project Software Security: Securing SendMail with JAAS and Polymer
Project Software Security: Securing SendMail with JAAS and Polymer Frank van Vliet [email protected] Diego Ortiz Yepes [email protected] Jornt van der Wiel [email protected] Guido Kok
Install guide for Websphere 7.0
DOCUMENTATION Install guide for Websphere 7.0 Jahia EE v6.6.1.0 Jahia s next-generation, open source CMS stems from a widely acknowledged vision of enterprise application convergence web, document, search,
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Technical concept of how Fachhochschule Dortmund use Microsoft Dynamics NAV 2013 in large classes with focus on development.
Technical concept of how Fachhochschule use Microsoft Dynamics NAV 2013 in large classes with focus on development. Prof. Dr. Martin Hesseler (Germany) Copenhagen (Denmark), 28. October 2013 Folie 1 Agenda
Common Backup Issues
Common Backup Issues The purpose of this guide is to help customers with some of the most common issues that we get on a daily basis. Expect log sequence 'xxx' but found 'SERVERNAME\Microsoft Information
CS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 2: Operating System Structures Prof. Alan Mislove ([email protected]) Operating System Services Operating systems provide an environment for
