The document discusses Novell Identity Manager and its web services capabilities. It provides an overview of the Identity Manager architecture, including its event-based system and use of connectors. It then describes the various identity web services available, including provisioning, role management, password management, and others. It also demonstrates how to enable the test pages for these services and discusses implementing custom identity services using workflows.
You have an integrated, business-focused identity and access management environment with Microsoft Active Directory, Novell eDirectory and other business related processes—and they are all integrated and synchronized into one harmonious implementation. And just when you think everything is going fine, that's when chaos erupts. With many business processes now reliant on your harmonious, integrated environment, you also need to factor in dealing with unexpected adversity that might arise. Whether that adversity is caused by applications, undetected bugs or by user mistakes, you need to know how to quickly isolate and resolve it.
This session will discuss techniques and tools for identifying, isolating, troubleshooting and resolving identity asset issues affecting Novell Identity Manager environments.
Novell ZENworks technologies have been in use for over a decade, and the future has never been brighter. This session will focus on Novell ZENworks Configuration Management and the upcoming version 11 release. It will also cover new developments in the product line, such as Linux device management, advanced power management tools and integrated endpoint security capabilities. Finally, we'll provide a roadmap review that details upcoming releases for other products in the Endpoint Management portfolio.
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell
Facing installation problems? Not sure where to get the list of registries required? Need a tool to generate your own configuration files? Need a technical note to ensure that you proceed with installation, deployment and usage of Novell SecureLogin with ease? Not sure what the SecureLogin log means or how to use it?
If you’re running into challenges installing SecureLogin or just need to know what to do when it’s not working correctly, attend this session to get all the tips and tricks from product developers and Novell Technical Services. The session will provide installation and configuration guidance, including:
• How to use the SecureLogin config tool
• How to generate and customize your response file
• How to customize your installation
• How to complete a single-click install
• And much more
You will also learn what to do when issues with SecureLogin arise. Novell technical support presenters will cover common problems seen in support, available tools and how to use them, and specific troubleshooting steps that will help you keep SecureLogin running smoothly in your environment. You'll also learn what to do when these measures fail and what to have ready when you call support.
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...Novell
In this advanced technical session, we'll discuss techniques for optimizing and troubleshooting the Novell Storage Services (NSS) file system in Novell Open Enterprise Server 2 on Linux. You'll also learn how to design, configure and troubleshoot a clustered NSS environment. Finally, find out how integration with Novell Sentinel in Novell Open Enterprise Server 2 SP2 opens the door to NSS file auditing.
Consolidation Planning: Getting the Most from Your Virtualization InitiativeNovell
During this session, you'll get an in-depth look at the principles and best practices of planning a server consolidation project. You will learn how to ensure projects meet goals such as minimizing new hardware purchases or rack space, how and when to use different strategies such as scale up versus scale out, and how to prove those goals were met after the project is finished.
Using Hard Disk Encryption and Novell SecureLoginNovell
Laptop theft is one of the most common crimes in industrial countries. Therefore, the demand for laptop security and the need to protect confidential data on hard disks is increasing. Several products on the market address this issue by offering hard disk encryption combined with login security. This session will show how these solutions can be integrated into a Novell environment.
A typical scenario might look like the following: The digital certificates used for encryption are generated in Novell eDirectory; the certificates are used with smartcards, which are also managed in eDirectory. The configuration of the hard disk encryption solution is deployed to clients with Novell ZENworks (no user interaction is necessary during installation and configuration). The hard disk encryption registration is combined with Novell SecureLogin, which results in a single sign-on.
This session will describe in detail what the configuration of hard disk encryption in such a scenario looks like, and will feature a live demonstration. The presenters are independent consultants with no interest in marketing a particular hard disk encryption solution.
You have an integrated, business-focused identity and access management environment with Microsoft Active Directory, Novell eDirectory and other business related processes—and they are all integrated and synchronized into one harmonious implementation. And just when you think everything is going fine, that's when chaos erupts. With many business processes now reliant on your harmonious, integrated environment, you also need to factor in dealing with unexpected adversity that might arise. Whether that adversity is caused by applications, undetected bugs or by user mistakes, you need to know how to quickly isolate and resolve it.
This session will discuss techniques and tools for identifying, isolating, troubleshooting and resolving identity asset issues affecting Novell Identity Manager environments.
Novell ZENworks technologies have been in use for over a decade, and the future has never been brighter. This session will focus on Novell ZENworks Configuration Management and the upcoming version 11 release. It will also cover new developments in the product line, such as Linux device management, advanced power management tools and integrated endpoint security capabilities. Finally, we'll provide a roadmap review that details upcoming releases for other products in the Endpoint Management portfolio.
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell
Facing installation problems? Not sure where to get the list of registries required? Need a tool to generate your own configuration files? Need a technical note to ensure that you proceed with installation, deployment and usage of Novell SecureLogin with ease? Not sure what the SecureLogin log means or how to use it?
If you’re running into challenges installing SecureLogin or just need to know what to do when it’s not working correctly, attend this session to get all the tips and tricks from product developers and Novell Technical Services. The session will provide installation and configuration guidance, including:
• How to use the SecureLogin config tool
• How to generate and customize your response file
• How to customize your installation
• How to complete a single-click install
• And much more
You will also learn what to do when issues with SecureLogin arise. Novell technical support presenters will cover common problems seen in support, available tools and how to use them, and specific troubleshooting steps that will help you keep SecureLogin running smoothly in your environment. You'll also learn what to do when these measures fail and what to have ready when you call support.
NSS File System Performance, Clustering and Auditing in Novell Open Enterpris...Novell
In this advanced technical session, we'll discuss techniques for optimizing and troubleshooting the Novell Storage Services (NSS) file system in Novell Open Enterprise Server 2 on Linux. You'll also learn how to design, configure and troubleshoot a clustered NSS environment. Finally, find out how integration with Novell Sentinel in Novell Open Enterprise Server 2 SP2 opens the door to NSS file auditing.
Consolidation Planning: Getting the Most from Your Virtualization InitiativeNovell
During this session, you'll get an in-depth look at the principles and best practices of planning a server consolidation project. You will learn how to ensure projects meet goals such as minimizing new hardware purchases or rack space, how and when to use different strategies such as scale up versus scale out, and how to prove those goals were met after the project is finished.
Using Hard Disk Encryption and Novell SecureLoginNovell
Laptop theft is one of the most common crimes in industrial countries. Therefore, the demand for laptop security and the need to protect confidential data on hard disks is increasing. Several products on the market address this issue by offering hard disk encryption combined with login security. This session will show how these solutions can be integrated into a Novell environment.
A typical scenario might look like the following: The digital certificates used for encryption are generated in Novell eDirectory; the certificates are used with smartcards, which are also managed in eDirectory. The configuration of the hard disk encryption solution is deployed to clients with Novell ZENworks (no user interaction is necessary during installation and configuration). The hard disk encryption registration is combined with Novell SecureLogin, which results in a single sign-on.
This session will describe in detail what the configuration of hard disk encryption in such a scenario looks like, and will feature a live demonstration. The presenters are independent consultants with no interest in marketing a particular hard disk encryption solution.
Installing and Configuring Novell ConferencingNovell
An investment in Novell Conferencing delivers immediate payback by helping you reduce the costs and downtime involved in employee travel. Attend this session to learn how you can install and configure the product and begin realizing value right out of the box. This advanced technical session will cover installation steps, configuration tips and tricks, and detailed recommendations for managing this innovative conferencing solution so you can start saving immediately.
Speaker: Prakash Khot CTO
Dimdim
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Novell
Benefit from the hard-won experience gained by Novell Consulting in dozens of Novell Open Enterprise Server 2 upgrades. In this session, we will discuss the methodologies successfully used with both large and small customers. We'll also discuss prerequisites, environmental preparation, migration strategies and post-migration cleanup. Handouts containing a pre-migration discovery survey and a migration checklist will be provided.
Archiving and e-Discovery for Novell GroupWiseNovell
With an increase in regulations and internal policies governing data retention, e-mail has come into the spotlight. In fact, securing and preserving e-mail data is more important than ever before. Attend this session to hear the perspective of a legal expert in e-mail archiving and e-Discovery. We'll also discuss the options available for addressing this need through our partners, many of whom have significant expertise in this area.
Novell SecureLogin 7 and Your Microsoft Active Directory SetupNovell
Novell recently shipped Novell SecureLogin 7, which delivers a host of enhancements, including:
• An improved integration wizard
• Extended support for .NET applications and Oracle Forms
• Integration with Client Login Extension (CLE) for recovering forgotten passwords
• Windows 7 support
In this session, we will go into detail about these new enhancements and will also discuss how to use SecureLogin 7 with Microsoft Active Directory and Active Directory Application Mode. In addition to understanding the new features in SecureLogin, when you leave this session you’ll understand:
• How to use SecureLogin with Active Directory and Active Directory Application Mode
• How to choose between a Novell eDirectory or Active Directory deployment
• How to add advanced authentication to your Active Directory deployment
• How to set up shared workstation support
• How to apply Active Directory group policies to SecureLogin
• And much more
Finally, you’ll hear from a customer who has deployed SecureLogin in their environment.
Implementing and Proving Compliance Tactics with Novell Compliance Management...Novell
This session will outline how to implement the out-of-the-box controls and reports included in the identity tracking solution pack that ships with Novell Compliance Management Platform. Additionally, you will be guided through examples to expand beyond what is included with the basic configuration of Compliance Management Platform. Before attending, you should have a general understanding of the architecture and deployment of Novell Identity Manager, Novell Access Manager and Novell Sentinel.
Run Book Automation with PlateSpin OrchestrateNovell
his session will describe how to use PlateSpin Orchestrate for tasks beyond virtualization management. Run Book Automation can support the IT operation in a variety of processes, including monitoring, ticket enrichment, problem diagnosis, change and repair, optimization and virtualization, system management and disaster recovery. IDC predicts that data center management will be required to implement higher automation in all fields of system operation.
This session will show what the typical use cases for Run Book Automation are, how PlateSpin Orchestrate fits the requirement for an automation implementation platform, and where in the enterprise IT infrastructure it can be implemented organically and in manageable steps.
A number of implementation examples, such as a disaster recovery implementation for SAP components, prove that automation is not necessarily a huge step, and that even limited projects can lead to a quick return on investment. Implementation details in code and project examples, a technical demo and a tour of the existing example code will conclude the session.
Maintaining deployed software systems is one of the most challenging processes in enterprise IT. As software systems are deployed, they compound management and maintenance burdens for IT personnel. Systems that are not maintained correctly can result in increased downtime and expenses. Software appliances are no different. But during this session we'll show you simple and easy it is to use the tools that help you keep your software appliances up to date. You will learn how to handle the authentication, entitlement and access controls required to distribute updates. We will show you a framework for remote appliance configuration. And finally, you will learn how to meet unique remote appliance management needs.
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell
This session will provide everything you need to know to deploy Novell iFolder 3.8—as well as a look at its latest set of rich features. Showcasing iFolder in single-server, multi-server and cluster deployments, we'll demonstrate iFolder as load balancer and iFolder in a Storage Area Network on Fiber Channel. You'll also hear about new iFolder features like Active Directory integration, pass phrase recovery, platform support and more.
Cloud initiatives are beginning to dominate enterprise IT roadmaps. Successful adoption of Cloud and the subsequent governance challenges warrant a Cloud reference architecture that is applied consistently across the enterprise. This presentation will answer questions such as what exactly a Cloud is, why you need it, what changes it will bring to the enterprise, and what the key capabilities of a Cloud infrastructure are - using Oracle's Cloud Reference Architecture, which is part of the IT Strategies from Oracle (ITSO) Cloud Enterprise Technology Strategy (ETS).
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyNovell
You've read the documentation, played in the lab, and now you're ready to jump in and upgrade your NetWare environment to Novell Open Enterprise Server 2 on Linux. Attend this session to glean a final few best practices and to learn how to make the most of the migration tools included in the product. You'll also learn about the various pitfalls encountered during real-world upgrades, as well as the solutions used to resolve them.
Engineered Systems: Oracle's Vision for the FutureBob Rhubart
Oracle's Exadata and Exalogic are impressive products in their own right. But working in combination they deliver unparalleled transaction processing performance with up to a 30x increase over existing legacy systems, with the lowest cost of ownership over a 3 or 5 year basis than any other hardware. In this session you'll learn how to leverage Oracle's Engineered Systems within your enterprise to deliver record-breaking performance at the lowest TCO.
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
Endpoint security is one of the greatest concerns on the minds of senior management today. Protecting your data and controlling how systems access resources is of the utmost importance. You must take actions to protect your infrastructure while ensuring your employees can continue to perform their jobs effectively and efficiently. Come to this session to learn how you can leverage the power of Novell ZENworks Endpoint Security Management across your enterprise to achieve this delicate balance—so you and the rest of your organization can sleep at night.
Migrate from Red Hat to SUSE Linux Enterprise ServerNovell
This session will discuss issues that arise when migrating from Red Hat Enterprise Linux to SUSE Linux Enterprise Server. The session will focus on tools and techniques that can be used in aiding the migration, covering basic migration issues, analysis of the installation base, and moving third-party applications from Red Hat to SUSE Linux Enterprise Server. The session will also briefly touch on the Novell Expanded Support program.
In this talk, come to learn about Broadridge Integrated Services for web applications - a suite of web applications, web services and java libraries that can be mainly categorized as:
Web Integrated Services: These applications provide a common integration framework, enable UI standards across products for a client and provide set of development components/utility tools that can be used across applications.
Federated Services: These applications handle the tasks related to authentication and authorization.
Installing and Configuring Novell ConferencingNovell
An investment in Novell Conferencing delivers immediate payback by helping you reduce the costs and downtime involved in employee travel. Attend this session to learn how you can install and configure the product and begin realizing value right out of the box. This advanced technical session will cover installation steps, configuration tips and tricks, and detailed recommendations for managing this innovative conferencing solution so you can start saving immediately.
Speaker: Prakash Khot CTO
Dimdim
Upgrading from NetWare to Novell Open Enterprise Server on Linux: The Novell ...Novell
Benefit from the hard-won experience gained by Novell Consulting in dozens of Novell Open Enterprise Server 2 upgrades. In this session, we will discuss the methodologies successfully used with both large and small customers. We'll also discuss prerequisites, environmental preparation, migration strategies and post-migration cleanup. Handouts containing a pre-migration discovery survey and a migration checklist will be provided.
Archiving and e-Discovery for Novell GroupWiseNovell
With an increase in regulations and internal policies governing data retention, e-mail has come into the spotlight. In fact, securing and preserving e-mail data is more important than ever before. Attend this session to hear the perspective of a legal expert in e-mail archiving and e-Discovery. We'll also discuss the options available for addressing this need through our partners, many of whom have significant expertise in this area.
Novell SecureLogin 7 and Your Microsoft Active Directory SetupNovell
Novell recently shipped Novell SecureLogin 7, which delivers a host of enhancements, including:
• An improved integration wizard
• Extended support for .NET applications and Oracle Forms
• Integration with Client Login Extension (CLE) for recovering forgotten passwords
• Windows 7 support
In this session, we will go into detail about these new enhancements and will also discuss how to use SecureLogin 7 with Microsoft Active Directory and Active Directory Application Mode. In addition to understanding the new features in SecureLogin, when you leave this session you’ll understand:
• How to use SecureLogin with Active Directory and Active Directory Application Mode
• How to choose between a Novell eDirectory or Active Directory deployment
• How to add advanced authentication to your Active Directory deployment
• How to set up shared workstation support
• How to apply Active Directory group policies to SecureLogin
• And much more
Finally, you’ll hear from a customer who has deployed SecureLogin in their environment.
Implementing and Proving Compliance Tactics with Novell Compliance Management...Novell
This session will outline how to implement the out-of-the-box controls and reports included in the identity tracking solution pack that ships with Novell Compliance Management Platform. Additionally, you will be guided through examples to expand beyond what is included with the basic configuration of Compliance Management Platform. Before attending, you should have a general understanding of the architecture and deployment of Novell Identity Manager, Novell Access Manager and Novell Sentinel.
Run Book Automation with PlateSpin OrchestrateNovell
his session will describe how to use PlateSpin Orchestrate for tasks beyond virtualization management. Run Book Automation can support the IT operation in a variety of processes, including monitoring, ticket enrichment, problem diagnosis, change and repair, optimization and virtualization, system management and disaster recovery. IDC predicts that data center management will be required to implement higher automation in all fields of system operation.
This session will show what the typical use cases for Run Book Automation are, how PlateSpin Orchestrate fits the requirement for an automation implementation platform, and where in the enterprise IT infrastructure it can be implemented organically and in manageable steps.
A number of implementation examples, such as a disaster recovery implementation for SAP components, prove that automation is not necessarily a huge step, and that even limited projects can lead to a quick return on investment. Implementation details in code and project examples, a technical demo and a tour of the existing example code will conclude the session.
Maintaining deployed software systems is one of the most challenging processes in enterprise IT. As software systems are deployed, they compound management and maintenance burdens for IT personnel. Systems that are not maintained correctly can result in increased downtime and expenses. Software appliances are no different. But during this session we'll show you simple and easy it is to use the tools that help you keep your software appliances up to date. You will learn how to handle the authentication, entitlement and access controls required to distribute updates. We will show you a framework for remote appliance configuration. And finally, you will learn how to meet unique remote appliance management needs.
Novell iFolder 3.8: A Simple, Secure File Access SolutionNovell
This session will provide everything you need to know to deploy Novell iFolder 3.8—as well as a look at its latest set of rich features. Showcasing iFolder in single-server, multi-server and cluster deployments, we'll demonstrate iFolder as load balancer and iFolder in a Storage Area Network on Fiber Channel. You'll also hear about new iFolder features like Active Directory integration, pass phrase recovery, platform support and more.
Cloud initiatives are beginning to dominate enterprise IT roadmaps. Successful adoption of Cloud and the subsequent governance challenges warrant a Cloud reference architecture that is applied consistently across the enterprise. This presentation will answer questions such as what exactly a Cloud is, why you need it, what changes it will bring to the enterprise, and what the key capabilities of a Cloud infrastructure are - using Oracle's Cloud Reference Architecture, which is part of the IT Strategies from Oracle (ITSO) Cloud Enterprise Technology Strategy (ETS).
Lessons Learned: Novell Open Enterprise Server Upgrades Made EasyNovell
You've read the documentation, played in the lab, and now you're ready to jump in and upgrade your NetWare environment to Novell Open Enterprise Server 2 on Linux. Attend this session to glean a final few best practices and to learn how to make the most of the migration tools included in the product. You'll also learn about the various pitfalls encountered during real-world upgrades, as well as the solutions used to resolve them.
Engineered Systems: Oracle's Vision for the FutureBob Rhubart
Oracle's Exadata and Exalogic are impressive products in their own right. But working in combination they deliver unparalleled transaction processing performance with up to a 30x increase over existing legacy systems, with the lowest cost of ownership over a 3 or 5 year basis than any other hardware. In this session you'll learn how to leverage Oracle's Engineered Systems within your enterprise to deliver record-breaking performance at the lowest TCO.
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
Endpoint security is one of the greatest concerns on the minds of senior management today. Protecting your data and controlling how systems access resources is of the utmost importance. You must take actions to protect your infrastructure while ensuring your employees can continue to perform their jobs effectively and efficiently. Come to this session to learn how you can leverage the power of Novell ZENworks Endpoint Security Management across your enterprise to achieve this delicate balance—so you and the rest of your organization can sleep at night.
Migrate from Red Hat to SUSE Linux Enterprise ServerNovell
This session will discuss issues that arise when migrating from Red Hat Enterprise Linux to SUSE Linux Enterprise Server. The session will focus on tools and techniques that can be used in aiding the migration, covering basic migration issues, analysis of the installation base, and moving third-party applications from Red Hat to SUSE Linux Enterprise Server. The session will also briefly touch on the Novell Expanded Support program.
In this talk, come to learn about Broadridge Integrated Services for web applications - a suite of web applications, web services and java libraries that can be mainly categorized as:
Web Integrated Services: These applications provide a common integration framework, enable UI standards across products for a client and provide set of development components/utility tools that can be used across applications.
Federated Services: These applications handle the tasks related to authentication and authorization.
New Approaches to Faster Oracle Forms System PerformanceCorrelsense
Are your end-users complaining that Forms is slow? Ever wonder what the source of the problem is? Want to learn what are the fastest, most effective strategies to improve overall performance and end user experience?
Join us for a webinar where we will showcase best practices for application support engineers, application owners, QA engineers, Oracle Forms developers and EBS Integrators. Topics include:
Minimizing start up times and resource requirements
Improving speed of Forms rendering
Gaining visibility into the potential source of bottlenecks in Oracle components
Speakers: Mia Urman, CEO of OraPlayer Ltd. and Frank Days, VP of Marketing, Correlsense
Oracles new Application Management Suite which includes the following products : Management Packs Siebel/eBusiness/JDEdwards/Peoplesoft - Configuration Mgmt for Applications & Real User Experience Insight ( Oracles End User Monitoring Tool )
This presentation will provide a high level overview of the current role that desktop applications play in enterprise environments, and the general risks associated with different deployment models. It will also cover common methodologies, techniques, and tools used to identify vulnerabilities in typical desktop application implementations. Although there will be some technical content. The discussion should be interesting and accessible to both operational and management levels.
More security blogs by the authors can be found @
https://www.netspi.com/blog/
“Microservices” have become a trendy development strategy. Hosting and running such services used to be pretty painful... but here comes Service Fabric! Let’s take a closer look at this platform, its different development models and all the features it offers, and not only for microservices!
Techdays 2013 managing your hybrid cloud datacenter with scom 2012 and what’s...wwwally
Monitoring beperkt zich niet meer tot de status van een server in uw data center SCOM kijkt naar meer veel meer, ook naar componenten buiten de muren van uw data center. Na een introductie over de bestaande functionaliteit in SCOM 2012 laat ik in deze sessie zien dat SCOM in staat Azure applicaties te monitoren met de uitgebreide mogelijkheden van Application performance monitoring (APM) en dat vanuit een wereldwijd perspectief door gebruik te maken van Global Service monitor (GSM). Naast de monitoring van cloud dienst wil ik graag laten zien wat er binnen ACS en welke keuze u moet maken om dit goed in te richten. Daarnaast een overzicht van de verbeteringen die in APM binnen SCOM 2012 SP1 toegevoegd.
Similar to Applying Novell Identity Manager to Your Everyday Problems (20)
Shining the Enterprise Light on Shades of SocialNovell
2010 has brought an explosion of new social tools to the market, creating a drone of news and conversation that artificially singles out “social” as a stand-alone solution—and for enterprises, a solution to what? When you peel back the category “social,” what capabilities are we really talking about and which ones are missing when it comes to forming a solution that can truly help people in the workplace be more effective?
Learn how to cut through the noise and gain a framework for thinking about the relevance of new tools to their workplace objectives and workplace realities. Attendees will leave this session with a better understanding of use cases and best practices as well as guidance for determining whether a given solution is worth exploring for their enterprise.
Virtual Appliances: Simplifying Application Deployment and Accelerating Your ...Novell
Virtual appliances are the wave of the future, declares IDC, because appliances dramatically simplify application deployment and accelerate the shift to cloud computing. Learn how the landmark strategic partnership between Novell and VMware is delivering innovative appliance versions of VMware products running on SUSE Linux Enterprise Server, and how it can help you move your applications to the cloud. See an exciting demonstration of Novell's award-winning SUSE Studio appliance construction tool, used by software vendors to build appliances in minutes for on-premise and cloud environments, and by enterprises to quickly create optimized Linux image builds. The session will also cover Novell's industry-leading lifecycle management capabilities for appliances. If you're a software vendor, you will leave this session with new ideas on how to simplify delivery of your software, perform appliance lifecycle management and extend your applications to the cloud. If you're an end-user organization, you will learn how to reduce the time spent creating and updating core OS images by 90 percent or more.
23. Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.
Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope
of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified,
translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in
making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents
of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any
particular purpose. The development, release, and timing of features or functionality described for Novell products
remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to
make changes to its content, at any time, without obligation to notify any person or entity of such revisions or
changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc.
in the United States and other countries. All third-party trademarks are the property of their respective owners.