This document provides troubleshooting information for Project Horus. It details the network topology including management IPs, production VLAN, and workstation IPs. It describes the proper power on and off order for physical and virtual machines. Common issues covered include no internet connectivity on VMs, VMs becoming inaccessible due to SAN errors, and errors connecting to vCenter single sign-on. The document also provides steps to troubleshoot configuration issues with the Spector 360 monitoring server and end-user machines.
VM Explorer® is a simple but powerful software to back up, replicate and restore your VMware ESX, ESXi and Microsoft Hyper-V Virtual Machines (VM).
The following documentation explains the main tasks required for configuration and daily use of VM Explorer®. All services hereinafter are brought to you by HPE.
The HPE services and materials presented for VM Explorer® hereinafter are protected by copyright, trademark, trade dress, unfair competition, and other intellectual property rights. The trademarks, logos and marks of HPE and VM Explorer® displayed on the services and products are the property of HPE or third parties. You are not permitted to use the Marks without the prior consent of HPE or the third party that may own the Marks.
This document is the manual for DSpace version 1.5.2. It provides an overview of the key functional components of DSpace including its data model, metadata, ingest process, authentication, authorization, search and browse capabilities. The document also covers installing and updating a DSpace system, including prerequisite software, installation options and steps for both UNIX/Linux and Windows platforms. Advanced configuration topics such as HTTPS, multilingual support and 'cron' jobs are also addressed.
This document provides a guide for transitioning from Exchange Server 2003 to Exchange Server 2010. It outlines important considerations and steps to take before, during, and after installing Exchange 2010 servers. Key steps include checking prerequisites like hardware, software, and Active Directory; installing Exchange 2010 in coexistence mode; configuring Exchange 2010 roles; moving mailboxes, settings, and data from Exchange 2003; and removing Exchange 2003 components after transition is complete. The guide is intended for administrators of small to medium Exchange 2003 environments upgrading to Exchange 2010.
This plugin allows you to discover your ESX, Datastores and VM of your VMware architecture automatically. This plugin also has a lot of modules to monitor your virtual architecture. For more information visit the following webpage: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=en&action=view_PUI&id_PUI=269
Space ship depots continue to come online, with launches to the Moon occurring daily. The moon bases
have been stabilized, and humans are beginning to settle in.
Not surprisingly, many island nations fared better than expected during the outbreak. Their isolation could
be very valuable if we face a third round of infection before the earth has been evacuated. We need to get
them back on the grid as soon as possible. Japan, Madagascar, and Iceland are first on the list for
building infrastructures. Local teams have managed to get some equipment, but all you’ll have to start
with is one repository and blank hardware. As we’ve learned while building the depots, travel is
dangerous and difficult. You will need to create your infrastructure in a lab first, to ensure it will be able to
be quickly deployed by a local team. Once the process has been deemed successful, we will establish a
satellite link to the islands to get everything we need to the local repositories
This document provides guidance on hardening the security of Siemens Simatic WinCC Flexible 2008 human-machine interface (HMI) software. It outlines configuration steps to strengthen the operating system, database management system, additional protection measures, WinCC Flexible system parameters, runtime security settings, access settings, Sm@rtServer security, MiniWeb security, OPC server security, web service security, and SMTP security. The document contains over 10 sections with over 100 specific configuration recommendations to lock down the WinCC Flexible 2008 system and protect industrial assets.
This document is the user manual for Oracle VM VirtualBox version 4.0.2. It provides instructions on installing VirtualBox on various host operating systems like Windows, Mac OS X, Linux and Solaris. It also describes how to configure, install and use guest operating systems within VirtualBox virtual machines. Key features covered include taking snapshots of VMs, changing VM hardware settings, enabling shared folders and USB support.
VM Explorer® is a simple but powerful software to back up, replicate and restore your VMware ESX, ESXi and Microsoft Hyper-V Virtual Machines (VM).
The following documentation explains the main tasks required for configuration and daily use of VM Explorer®. All services hereinafter are brought to you by HPE.
The HPE services and materials presented for VM Explorer® hereinafter are protected by copyright, trademark, trade dress, unfair competition, and other intellectual property rights. The trademarks, logos and marks of HPE and VM Explorer® displayed on the services and products are the property of HPE or third parties. You are not permitted to use the Marks without the prior consent of HPE or the third party that may own the Marks.
This document is the manual for DSpace version 1.5.2. It provides an overview of the key functional components of DSpace including its data model, metadata, ingest process, authentication, authorization, search and browse capabilities. The document also covers installing and updating a DSpace system, including prerequisite software, installation options and steps for both UNIX/Linux and Windows platforms. Advanced configuration topics such as HTTPS, multilingual support and 'cron' jobs are also addressed.
This document provides a guide for transitioning from Exchange Server 2003 to Exchange Server 2010. It outlines important considerations and steps to take before, during, and after installing Exchange 2010 servers. Key steps include checking prerequisites like hardware, software, and Active Directory; installing Exchange 2010 in coexistence mode; configuring Exchange 2010 roles; moving mailboxes, settings, and data from Exchange 2003; and removing Exchange 2003 components after transition is complete. The guide is intended for administrators of small to medium Exchange 2003 environments upgrading to Exchange 2010.
This plugin allows you to discover your ESX, Datastores and VM of your VMware architecture automatically. This plugin also has a lot of modules to monitor your virtual architecture. For more information visit the following webpage: http://pandorafms.com/index.php?sec=Library&sec2=repository&lng=en&action=view_PUI&id_PUI=269
Space ship depots continue to come online, with launches to the Moon occurring daily. The moon bases
have been stabilized, and humans are beginning to settle in.
Not surprisingly, many island nations fared better than expected during the outbreak. Their isolation could
be very valuable if we face a third round of infection before the earth has been evacuated. We need to get
them back on the grid as soon as possible. Japan, Madagascar, and Iceland are first on the list for
building infrastructures. Local teams have managed to get some equipment, but all you’ll have to start
with is one repository and blank hardware. As we’ve learned while building the depots, travel is
dangerous and difficult. You will need to create your infrastructure in a lab first, to ensure it will be able to
be quickly deployed by a local team. Once the process has been deemed successful, we will establish a
satellite link to the islands to get everything we need to the local repositories
This document provides guidance on hardening the security of Siemens Simatic WinCC Flexible 2008 human-machine interface (HMI) software. It outlines configuration steps to strengthen the operating system, database management system, additional protection measures, WinCC Flexible system parameters, runtime security settings, access settings, Sm@rtServer security, MiniWeb security, OPC server security, web service security, and SMTP security. The document contains over 10 sections with over 100 specific configuration recommendations to lock down the WinCC Flexible 2008 system and protect industrial assets.
This document is the user manual for Oracle VM VirtualBox version 4.0.2. It provides instructions on installing VirtualBox on various host operating systems like Windows, Mac OS X, Linux and Solaris. It also describes how to configure, install and use guest operating systems within VirtualBox virtual machines. Key features covered include taking snapshots of VMs, changing VM hardware settings, enabling shared folders and USB support.
This document provides guidance on configuring SSL security between WebSphere MQ components including queue managers and clients on different platforms. It discusses creating key repositories, obtaining certificates, and configuring channels for SSL authentication. Specific sections cover setting up SSL between Windows queue managers, WebSphere MQ clients on Windows, and cross-platform configurations between z/OS, AIX, and Windows systems. The document also addresses connecting WebSphere Message Broker to WebSphere MQ using SSL.
This document provides instructions for installing CloudStack in a basic configuration with a single management server and hypervisor host. It outlines the steps to install the CloudStack management server software, the hypervisor on one host system, and configure associated storage and networking to allow provisioning and management of virtual machine instances.
This document provides an overview of high availability solutions in SQL Server 2012, including AlwaysOn Failover Cluster Instances and AlwaysOn Availability Groups. It introduces Windows Server Failover Clustering (WSFC) and how SQL Server leverages it to provide high availability through redundancy at the server-instance level with Failover Cluster Instances and the database level with Availability Groups. It recommends AlwaysOn solutions for protecting SQL Server data and discusses SQL Server's relationship with and use of WSFC capabilities like health monitoring and failover coordination.
This document is the user manual for Oracle VM VirtualBox version 4.3.24. It provides information on installing VirtualBox on various host operating systems, creating and configuring virtual machines, installing Guest Additions to enhance the guest experience, and managing virtual storage and disk images. The manual covers topics such as supported host/guest systems, emulated hardware, general and system settings for VMs, shared folders, graphics acceleration, memory management techniques, and disk controller and image file types.
This document provides instructions and guidance for using LKCD and Kdump to capture Linux kernel crash dumps. It discusses the installation, configuration, and use of LKCD for local and network kernel crash dumping. It also covers the installation, configuration, and testing of Kdump for kernel crash dumping. Additional sections provide details on analyzing kernel crash dumps using the crash utility.
This document provides an overview and introduction to the key features of OllyDbg 2.0, an assembler-level debugger. It highlights many new features in version 2.0 compared to the previous version, including improved support for SSE instructions, unlimited breakpoints, conditional breakpoints, and an analyzer that recognizes arguments in unknown functions. The document provides a high-level tour of OllyDbg's capabilities for debugging, analyzing, searching, and modifying code. It also briefly covers licensing, installation, and other legal and technical details.
This document provides guidelines for hardening the security of Citrix XenServer virtualization platforms. It outlines configuration settings for general system security like restricting root access, enabling encryption, and updating packages. It also includes recommendations for network, hypervisor, and virtual machine settings such as separating interfaces by task, restricting unencrypted connections, disabling promiscuous mode, and more. Implementing the settings in this guide helps reduce the attack surface and prevent unauthorized access to XenServer systems and VMs.
Getting Started with OpenStack and VMware vSphereEMC
VMware vSphere® is the industry’s leading and most reliable virtualization and cloud computing platform. vSphere simplifies IT by separating applications and operating systems (OSs) from the underlying hardware. OpenStack is an open and scalable cloud management platform (CMP) for building public and private clouds. It is a system designed to provide infrastructure as a service (IaaS) on top of a diverse collection of hardware and software infrastructure technologies.
vSphere has a long history of being a stable and resilient platform that offers many benefits to host cloud infrastructures. As an enterprise-class hypervisor with production-level features and support, vSphere is an excellent solution for enhancing OpenStack.
This document provides configuration steps for distributing BFS in-band data over a Gigabit Ethernet network using a Scientific Atlanta DCM 9900 digital content manager. Key steps include configuring the DCM 9900 to output each BFS source as an individual SPTS with a unique multicast IP address. On the DNCS, a multicast session is defined for each BFS source using the GQAM and configured IP address. Routers are configured for IP multicast routing and IGMP. Testing verified guide, PPV, and application data but image downloads failed due to a known defect when using OSM automux across multiple frequencies.
This document provides an overview of networking concepts including the OSI and TCP/IP models, network devices like switches and routers, IP addressing, subnetting, routing protocols, VLANs, switching protocols like STP, and basic network security techniques. It covers topics relevant to the CCNA certification including static and dynamic routing, ACLs, NAT, and subnetting classes A, B, and C. The document is arranged by Yama in 2010 as a study guide for CCNA, CCNP, and CCIE certification exams.
This document is the user manual for sqlmap, an open source tool for detecting and exploiting SQL injection vulnerabilities. It details sqlmap's requirements, typical usage scenario, and supported features for fingerprinting databases, enumerating data, reading/writing files, executing commands, and establishing connections. The tool can detect SQL injections, fingerprint database systems, retrieve user information, dump database tables, run custom SQL statements, access the file system and operating system, and more.
V mware v sphere install & configure manage v6.5ssuser4f1d93
This lab guide outlines steps to deploy and configure a virtual machine (VM) in VMware vSphere:
1. Create a VM and configure its settings such as memory, CPU, and network.
2. Connect an ISO image containing a guest operating system to the VM's CD/DVD drive.
3. Power on the VM to begin the OS installation process from the attached ISO image.
4. After installation, customize the VM's settings as needed.
This document provides tuning guidelines for optimizing Oracle 9i and 10g database performance on Red Hat Enterprise Linux systems. It covers topics such as kernel tuning, memory configuration, I/O optimization, and use of large pages. The guidelines are applicable to Red Hat Enterprise Linux versions 2.1 through 5 for both 32-bit and 64-bit systems.
This white paper describes EMC VNX Snapshots. The paper reviews and explains operations and best practices for the feature, as well as limits and functions.
This document provides a summary of the Dell EMC Avamar for Oracle User Guide:
- It describes how to perform backups and restores of Oracle databases using Avamar. Backup types include archive log backups, automatic storage management, offline backups, and more.
- Restore and recovery methods are discussed like corrupt block recovery, Flashback Database recovery, and roll forward recovery. Concurrent backups and restores are also covered.
- Installation, configuration, and management of Oracle RAC and single-instance databases on Linux, UNIX, Windows, Solaris, HP-UX and AIX are outlined.
- Backup scheduling, monitoring, and troubleshooting failed backups are detailed. Excluding Oracle directories from
This document provides instructions for installing and maintaining the HP ProLiant DL380p Gen8 Server. It describes the front and rear panel components, LED indicators, drive bays, fans, and expansion slots. The document also provides setup instructions, including space, temperature and power requirements. Finally, it details how to install common hardware options like processors, memory, hard drives and controllers.
Here are the key security levels from the Orange Book standard:
Table 1.2. Orange Book NIST Security Levels
Level Description
A Least protection - no protection from casual or coincidental violation of security.
B Moderate protection - casual violation of security policy is prevented.
C Substantial protection - threats from well-managed casual violation of security are
nullified.
B1 Moderate protection for individual users.
B2 Moderate protection for connected systems.
B3 Moderate protection for networked systems.
A1 Least protection for individual users.
The Orange Book, also known as the Trusted Computer System Evaluation Criteria (TCSEC
This document provides an administrator's guide for Rational ClearCase version 2002.05.00 and later. It contains information about ClearCase network architecture, including ClearCase hosts, data storage in versioned object bases (VOBs) and views, users, the ClearCase registry, and ClearCase server processes. It also covers administering ClearCase hosts, using DHCP and non-ClearCase access on UNIX systems, and using automount with ClearCase on UNIX.
This guide helps developers migrate Java applications from version 1.3 to 5.0. While many 1.3 applications run without changes, some compatibility issues exist as described in this guide. The guide covers runtime issues, deployment issues, and tooling issues to assist with the migration. Developers should consult this guide and release notes for any late-breaking issues when migrating applications to Java 5.0.
This guide helps developers migrate Java applications from version 1.3 to 5.0. While many 1.3 applications run without changes, some compatibility issues exist regarding runtime behavior, deployment changes, and tooling. The guide covers issues for all application developers as well as some primarily for platform implementers and tool developers. Developers should consult the guide and release notes for details on any needed changes.
This project aims to improve water clarity in Lake Tahoe through filtration and revegetation. Goal programming determined the optimal solution was constructing bioretention ponds on 45,000 acres of urban land and 112,000 acres of non-urban land, and revegetating 35,000 urban acres and 130,000 non-urban acres. A $149 million budget was established and financial analyses projected $166 million remaining after 5 years. The project seeks to reduce sediment, nitrogen, and phosphorus runoff into the lake from the surrounding basin to improve water quality and clarity, which benefits the local economy that depends on tourism.
Advanced web intelligence, Carlo Tasso, Paolo Omero, infoFACTORY.Paolo Omero
PROGRAMMA DEL SEMINARIO
Durante il seminario sono stati trattati i seguenti argomenti:
Evoluzione delle tecnologie Web: Web 2.0, Intelligenza Artificiale e Web Semantico
Panoramica di alcune tecnologie: Content Based Filtering, Information Extraction, Named Entity Recognition, Social Network Analysis, Automatic Tagging, Sentiment Analysis
Sviluppo del fenomeno dei Social Media con impatto sui processi di Marketing e Business Intelligence
Principali caratteristiche e valore delle conversazioni online
Sistemi di Knowledge Management 2.0
Sistemi di Monitoraggio e Misurazione dei Social Media
Analisi del passaparola online
Misurazione della reputazione
Technological Monitoring
Crisis Management
This document provides guidance on configuring SSL security between WebSphere MQ components including queue managers and clients on different platforms. It discusses creating key repositories, obtaining certificates, and configuring channels for SSL authentication. Specific sections cover setting up SSL between Windows queue managers, WebSphere MQ clients on Windows, and cross-platform configurations between z/OS, AIX, and Windows systems. The document also addresses connecting WebSphere Message Broker to WebSphere MQ using SSL.
This document provides instructions for installing CloudStack in a basic configuration with a single management server and hypervisor host. It outlines the steps to install the CloudStack management server software, the hypervisor on one host system, and configure associated storage and networking to allow provisioning and management of virtual machine instances.
This document provides an overview of high availability solutions in SQL Server 2012, including AlwaysOn Failover Cluster Instances and AlwaysOn Availability Groups. It introduces Windows Server Failover Clustering (WSFC) and how SQL Server leverages it to provide high availability through redundancy at the server-instance level with Failover Cluster Instances and the database level with Availability Groups. It recommends AlwaysOn solutions for protecting SQL Server data and discusses SQL Server's relationship with and use of WSFC capabilities like health monitoring and failover coordination.
This document is the user manual for Oracle VM VirtualBox version 4.3.24. It provides information on installing VirtualBox on various host operating systems, creating and configuring virtual machines, installing Guest Additions to enhance the guest experience, and managing virtual storage and disk images. The manual covers topics such as supported host/guest systems, emulated hardware, general and system settings for VMs, shared folders, graphics acceleration, memory management techniques, and disk controller and image file types.
This document provides instructions and guidance for using LKCD and Kdump to capture Linux kernel crash dumps. It discusses the installation, configuration, and use of LKCD for local and network kernel crash dumping. It also covers the installation, configuration, and testing of Kdump for kernel crash dumping. Additional sections provide details on analyzing kernel crash dumps using the crash utility.
This document provides an overview and introduction to the key features of OllyDbg 2.0, an assembler-level debugger. It highlights many new features in version 2.0 compared to the previous version, including improved support for SSE instructions, unlimited breakpoints, conditional breakpoints, and an analyzer that recognizes arguments in unknown functions. The document provides a high-level tour of OllyDbg's capabilities for debugging, analyzing, searching, and modifying code. It also briefly covers licensing, installation, and other legal and technical details.
This document provides guidelines for hardening the security of Citrix XenServer virtualization platforms. It outlines configuration settings for general system security like restricting root access, enabling encryption, and updating packages. It also includes recommendations for network, hypervisor, and virtual machine settings such as separating interfaces by task, restricting unencrypted connections, disabling promiscuous mode, and more. Implementing the settings in this guide helps reduce the attack surface and prevent unauthorized access to XenServer systems and VMs.
Getting Started with OpenStack and VMware vSphereEMC
VMware vSphere® is the industry’s leading and most reliable virtualization and cloud computing platform. vSphere simplifies IT by separating applications and operating systems (OSs) from the underlying hardware. OpenStack is an open and scalable cloud management platform (CMP) for building public and private clouds. It is a system designed to provide infrastructure as a service (IaaS) on top of a diverse collection of hardware and software infrastructure technologies.
vSphere has a long history of being a stable and resilient platform that offers many benefits to host cloud infrastructures. As an enterprise-class hypervisor with production-level features and support, vSphere is an excellent solution for enhancing OpenStack.
This document provides configuration steps for distributing BFS in-band data over a Gigabit Ethernet network using a Scientific Atlanta DCM 9900 digital content manager. Key steps include configuring the DCM 9900 to output each BFS source as an individual SPTS with a unique multicast IP address. On the DNCS, a multicast session is defined for each BFS source using the GQAM and configured IP address. Routers are configured for IP multicast routing and IGMP. Testing verified guide, PPV, and application data but image downloads failed due to a known defect when using OSM automux across multiple frequencies.
This document provides an overview of networking concepts including the OSI and TCP/IP models, network devices like switches and routers, IP addressing, subnetting, routing protocols, VLANs, switching protocols like STP, and basic network security techniques. It covers topics relevant to the CCNA certification including static and dynamic routing, ACLs, NAT, and subnetting classes A, B, and C. The document is arranged by Yama in 2010 as a study guide for CCNA, CCNP, and CCIE certification exams.
This document is the user manual for sqlmap, an open source tool for detecting and exploiting SQL injection vulnerabilities. It details sqlmap's requirements, typical usage scenario, and supported features for fingerprinting databases, enumerating data, reading/writing files, executing commands, and establishing connections. The tool can detect SQL injections, fingerprint database systems, retrieve user information, dump database tables, run custom SQL statements, access the file system and operating system, and more.
V mware v sphere install & configure manage v6.5ssuser4f1d93
This lab guide outlines steps to deploy and configure a virtual machine (VM) in VMware vSphere:
1. Create a VM and configure its settings such as memory, CPU, and network.
2. Connect an ISO image containing a guest operating system to the VM's CD/DVD drive.
3. Power on the VM to begin the OS installation process from the attached ISO image.
4. After installation, customize the VM's settings as needed.
This document provides tuning guidelines for optimizing Oracle 9i and 10g database performance on Red Hat Enterprise Linux systems. It covers topics such as kernel tuning, memory configuration, I/O optimization, and use of large pages. The guidelines are applicable to Red Hat Enterprise Linux versions 2.1 through 5 for both 32-bit and 64-bit systems.
This white paper describes EMC VNX Snapshots. The paper reviews and explains operations and best practices for the feature, as well as limits and functions.
This document provides a summary of the Dell EMC Avamar for Oracle User Guide:
- It describes how to perform backups and restores of Oracle databases using Avamar. Backup types include archive log backups, automatic storage management, offline backups, and more.
- Restore and recovery methods are discussed like corrupt block recovery, Flashback Database recovery, and roll forward recovery. Concurrent backups and restores are also covered.
- Installation, configuration, and management of Oracle RAC and single-instance databases on Linux, UNIX, Windows, Solaris, HP-UX and AIX are outlined.
- Backup scheduling, monitoring, and troubleshooting failed backups are detailed. Excluding Oracle directories from
This document provides instructions for installing and maintaining the HP ProLiant DL380p Gen8 Server. It describes the front and rear panel components, LED indicators, drive bays, fans, and expansion slots. The document also provides setup instructions, including space, temperature and power requirements. Finally, it details how to install common hardware options like processors, memory, hard drives and controllers.
Here are the key security levels from the Orange Book standard:
Table 1.2. Orange Book NIST Security Levels
Level Description
A Least protection - no protection from casual or coincidental violation of security.
B Moderate protection - casual violation of security policy is prevented.
C Substantial protection - threats from well-managed casual violation of security are
nullified.
B1 Moderate protection for individual users.
B2 Moderate protection for connected systems.
B3 Moderate protection for networked systems.
A1 Least protection for individual users.
The Orange Book, also known as the Trusted Computer System Evaluation Criteria (TCSEC
This document provides an administrator's guide for Rational ClearCase version 2002.05.00 and later. It contains information about ClearCase network architecture, including ClearCase hosts, data storage in versioned object bases (VOBs) and views, users, the ClearCase registry, and ClearCase server processes. It also covers administering ClearCase hosts, using DHCP and non-ClearCase access on UNIX systems, and using automount with ClearCase on UNIX.
This guide helps developers migrate Java applications from version 1.3 to 5.0. While many 1.3 applications run without changes, some compatibility issues exist as described in this guide. The guide covers runtime issues, deployment issues, and tooling issues to assist with the migration. Developers should consult this guide and release notes for any late-breaking issues when migrating applications to Java 5.0.
This guide helps developers migrate Java applications from version 1.3 to 5.0. While many 1.3 applications run without changes, some compatibility issues exist regarding runtime behavior, deployment changes, and tooling. The guide covers issues for all application developers as well as some primarily for platform implementers and tool developers. Developers should consult the guide and release notes for details on any needed changes.
This project aims to improve water clarity in Lake Tahoe through filtration and revegetation. Goal programming determined the optimal solution was constructing bioretention ponds on 45,000 acres of urban land and 112,000 acres of non-urban land, and revegetating 35,000 urban acres and 130,000 non-urban acres. A $149 million budget was established and financial analyses projected $166 million remaining after 5 years. The project seeks to reduce sediment, nitrogen, and phosphorus runoff into the lake from the surrounding basin to improve water quality and clarity, which benefits the local economy that depends on tourism.
Advanced web intelligence, Carlo Tasso, Paolo Omero, infoFACTORY.Paolo Omero
PROGRAMMA DEL SEMINARIO
Durante il seminario sono stati trattati i seguenti argomenti:
Evoluzione delle tecnologie Web: Web 2.0, Intelligenza Artificiale e Web Semantico
Panoramica di alcune tecnologie: Content Based Filtering, Information Extraction, Named Entity Recognition, Social Network Analysis, Automatic Tagging, Sentiment Analysis
Sviluppo del fenomeno dei Social Media con impatto sui processi di Marketing e Business Intelligence
Principali caratteristiche e valore delle conversazioni online
Sistemi di Knowledge Management 2.0
Sistemi di Monitoraggio e Misurazione dei Social Media
Analisi del passaparola online
Misurazione della reputazione
Technological Monitoring
Crisis Management
This document discusses using business process management (BPM) tools to automate warranty claims processing. It outlines the benefits of an integrated warranty solution for OEMs, suppliers, logistics providers, distributors, dealers/service centers, and end customers. Key aspects of the proposed solution include claims processing, appeals, settlements, spare parts planning, reverse logistics, and analytics. The document also describes considerations for implementing a BPM-based warranty system, including required environments, testing strategies, and how the solution could address future challenges like the "Internet of Things."
Neil Bradshaw completed an exam through Park University on April 25, 2015. He scored 90% overall on the exam covering various business topics. His highest scores were in Business Integration and Strategic Management, Business Leadership, Information Management Systems, Legal Environment of Business, Organizational Behavior, and Quantitative Research Techniques and Statistics where he scored 100% in each topic. His lowest scores were in Economics/Macroeconomics and Operations/Production Management where he scored 60% and 66.67%, respectively. His total score of 90% was in the 99th percentile compared to other students in the US who took the same exam.
El documento presenta una lista de 4 temas relacionados con Tecnologías de la Información y Comunicación (TIC): Software de Aplicación, Programación, Sistemas Operativos y Hardware.
Particulate Matter and Indoor Air Quality
-----------------------------------------------------
While Delhi gets moving on its ambitious plan to restrain the number of passenger vehicles on its roads in a desperate bid to improve its air quality
La flebitis es la inflamación de una vena causada por una lesión en el revestimiento interno de la vena. Existen tres tipos principales de flebitis: mecánica (debido a traumatismos), química (por soluciones o fármacos irritantes) e infecciosa (bacteriana). La flebitis se evalúa en grados de levedad e implica dolor, enrojecimiento e hinchazón alrededor del catéter venoso.
#VirtualDesignMaster 3 Challenge 3 – James Brownvdmchallenge
While things on Mars have been going well, since we now have multiple options for our infrastructure, the fact remains that we are working on the colonization of a foreign planet.
This document provides an overview of implementing affordable disaster recovery with Hyper-V and multi-site clustering. It discusses what constitutes a disaster, the key components needed which are a storage mechanism, replication mechanism, and target servers/cluster. It also covers clustering history, what a cluster is, and the important concept of quorum which determines a cluster's existence through voting of its members.
The document provides instructions for configuring IP addresses on a Nutanix cluster in 3 steps:
1. Use the web-based configuration tool to automatically configure IP addresses on Controller VMs and the cluster by inputting network settings.
2. Log into any Controller VM with SSH and start the Nutanix cluster.
3. Verify the cluster services start properly on each node to confirm the cluster is running.
A Self-Adaptive Deployment Framework for Service-Oriented SystemsSander van der Burg
This document presents a self-adaptive deployment framework for service-oriented systems. The framework extends the Disnix distributed service deployment tool to dynamically redeploy systems in response to events like machine crashes or additions. It uses a quality of service model to generate new deployment distributions and filters to map services to machines. An evaluation with several case studies shows initial deployments take longer than redeployments, and the framework allows quick recovery from events with minimal downtime. Future work includes supporting more complex networks and stateful services.
This document provides a step-by-step guide for deploying IBM Tivoli Monitoring 6.1 in small to large environments. It covers installing and configuring the various Tivoli Monitoring components, including the database, Tivoli Enterprise Monitoring Server (TEMS), Tivoli Enterprise Portal Server, agents, and more. The guide also discusses backup strategies, uninstall procedures, and how to work with the Tivoli Enterprise Portal client.
This document provides a step-by-step guide for deploying IBM Tivoli Monitoring 6.1 in small to large environments. It discusses planning the installation, defining the architecture, creating deployment plans, installing the various Tivoli Monitoring components, and configuring the system. The guide also covers demonstrations of a single machine proof of concept installation and a small installation using DB2 Workgroup Edition.
A virtual local area network (VLAN) is defined in a switch that sets the boundary of a
broadcast domain for hosts to communicate with each other. A VLAN has the same attributes
as a physical local area network (LAN) and it can be extended between different switches
within or across different sites.
Today, VLANs are created in the switch to mimic the Ethernet segmentation services that are
traditionally provided by the routers in LAN configurations. Figure 1-1 gives a conceptual view
of a VLAN.
Set Up Security and Integration with DataPower XI50zSarah Duffy
The document provides guidance on setting up security and integration between the IBM DataPower XI50z appliance and IBM zEnterprise systems. It discusses planning the network topology and initial setup of the virtual network. It also covers key security concepts and implementing authentication, authorization, and identity propagation when integrating the XI50z with z/OS mainframe systems like CICS, IMS, DB2 and WebSphere MQ. The document is intended to help users securely connect and integrate the XI50z with various zEnterprise applications and services.
Virtual Machines Security Internals: Detection and ExploitationMattia Salvi
This paper is an analysis of the current state of virtual machines’ security, showcasing how features have been turned into attack vectors that can pose threats to real enterprise level infrastructures. Despite the few real world scenarios that have actively exploited security holes, they remain one of the most dangerous threats organizations have to look out for.
This release note summarizes new features, corrections, and known issues in TEMS Investigation 13.1. Key additions include an alternative mobile-to-mobile audio quality measurement solution, support for circuit-switched fallback events in LTE, and expanded LTE radio access channel information. Several bugs have been fixed and new user terminals and scanners are now supported. The note also describes limitations regarding installation, application use, and device compatibility.
1) The document provides installation and configuration instructions for setting up a VMware ESXi environment called Project Horus. It includes steps for installing ESXi, connecting servers to a Dell Compellent SAN, installing Windows Server 2012 R2, and configuring networking and Active Directory.
2) Configuration details are provided for ESXi, including creating a bootable USB drive, installation, and initial network configuration. Instructions are also given for adding software iSCSI adapters to servers and mapping them to storage volumes on the SAN.
3) The document outlines installing Windows Server 2012 R2 as the vCenter virtual machine, including mounting ISOs from the SAN, IP configuration, and installing vCenter software. It also covers creating
This document provides instructions for deploying a private Infrastructure as a Service (IaaS) cloud using Red Hat Cloud Foundations components. It describes setting up the necessary infrastructure services including the Red Hat Enterprise Linux, Red Hat Enterprise Virtualization, Red Hat Satellite, and JBoss middleware components. It then outlines the steps to deploy virtualization hosts, provision tenant virtual machines, and configure high availability clustering.
This document describes how to configure a router running OpenWrt. It covers getting started, installing and initial configuration. It also provides details on configuring the network and wireless settings in OpenWrt, including IPv4, IPv6 and switch configuration. Advanced configuration topics like hotplug, init scripts and network scripts are also outlined.
This document provides a guide for deploying the Tivoli Provisioning Manager for OS Deployment V5.1. It discusses planning and architecture considerations for image management systems. It then covers installing the TPM server and creating profiles for deploying Windows XP, Windows 2000, Windows Vista and Linux operating systems in unattended and cloning modes. The document is intended to help IT professionals learn how to use TPM for OS deployment in their environment.
This document provides an overview and instructions for setting up and configuring the Motorola WS2000 Wireless Switch. It describes the hardware and software components of the switch. The document then provides step-by-step instructions for initial configuration, including connecting the switch, enabling interfaces and subnets, configuring security settings, and testing connectivity. It also provides information on advanced configuration options for subnets, filtering, bridging and more.
This document provides an overview and instructions for setting up and configuring the Motorola WS2000 Wireless Switch. It describes the hardware and software components of the switch. The document then provides step-by-step instructions for initial configuration, including connecting the switch, enabling interfaces and subnets, configuring security settings, and testing connectivity. It also provides information on advanced configuration options for subnets, filtering, bridging and more.
This document provides an overview and introduction to installing and migrating to IBM Tivoli Workload Scheduler V8.3. It covers prerequisites, a new installation process using a wizard, upgrading from previous versions, and new features such as an improved infrastructure using WebSphere and DB2/Oracle databases. The document is intended to help users get started with V8.3 and provide best practices for installation and migration.
This document is the OpenStack Beginner's Guide for Ubuntu Precise edition. It provides an introduction to OpenStack components including Nova, Glance, Swift, Keystone and Horizon. It then describes how to install and configure these components on an Ubuntu server, including installing databases, configuring Keystone, Glance, Nova, Swift and Horizon.
The NEC DX1000 MicroServer Chassis is an ultra-dense multi-server platform that offers scale-up and scale-out capabilities, but with a power profile comparable to modern single 2U servers. With enterprise-class features such as redundant switching, high bandwidth, and low-latency connections for up to 46 multi-core server nodes – each with 32 GB of RAM and onboard SSD storage, the NEC DX1000 can be easily leveraged to meet your private cloud provisioning needs.
2. P a g e | 1
Contents
1.0 Introduction..................................................................................................................................2
1.1 Change Log...................................................................................................................................2
2.0 Network Topology.........................................................................................................................3
2.01 Management IPs .....................................................................................................................3
2.02 Production – VLAN X, 10.0.X.0/24.............................................................................................3
2.03 Workstation IPs.......................................................................................................................3
2.1 Power on Order............................................................................................................................3
2.11 Physical Machines ...................................................................................................................3
2.12 Virtual Machines (The next step)..............................................................................................4
2.2 Power off Order............................................................................................................................4
2.21 Virtual Machines .....................................................................................................................4
2.22 Physical Machines ...................................................................................................................4
2.3 Network Connectivity Issues..........................................................................................................4
2.31 No Internet Connectivity on VMs..............................................................................................4
3.0 SAN Connectivity Errors.................................................................................................................5
3.01 ERROR: Virtual Machines Become Inaccessible..........................................................................5
3.02 ERROR: Cannot connect to vCenter Single Sign-On server(vSphere Web Client)..........................6
3.03 ERROR: Empty Inventory..........................................................................................................6
4.0 Spector 360 Server Configuration...................................................................................................7
4.01 ERROR: Test email failedwiththe followingmessage:Failure tosendmail.Unable toreaddata
from the transport connection: net_io_connectionclosed.................................................................7
5.0 Spector 360 Server Troubleshooting...............................................................................................7
5.01 Unable to Start Spector Control Center Server Service: Logon Failure .........................................7
5.02 Unable To Retrieve Server Settings – Unable to communicate....................................................8
6.0 Spector 360 End-User Configuration...............................................................................................9
6.01 Start Windows Remote Registry Service....................................................................................9
6.02 ERROR: Cannot Open Service Control Manager on [Computer Name].........................................9
6.03 Hosts cannot ping one another...............................................................................................10
3. P a g e | 2
1.0 Introduction
The contentsof thisdocumentare onlytobe viewedbythose withsole authorizationfromthe creator
of thisdocument.Anyunauthorizedindividuals viewingthisdocumentcouldpotentiallyface charges
under18 U.S.Code§ 1905. This documentissubjecttochange and will be maintainedthroughachange
logdocumentingwhathadchangedpereach instance.
1.1 Change Log
Version # Name Changes Made SectionsAdded/Modified
1.0 Daniel Taylor Initial implementationof Change Log.All
changesmade at thispointwill be
documentedhere.
Reference Documents
Introduction
Change Log
2.0 Daniel Taylor AddeddocumentationonActive Directory
configurationsaswell assettingupand
connectingtoa SAN usingsoftware iSCSI
adapters.
3.0 (andsubsections)
4.0 (andsubsections)
3.0 Daniel Taylor Splitdocumentintotwodifferent
documents:“Installationand
Configuration”and“Troubleshooting”.
4. P a g e | 3
2.0 Network Topology
2.01 Management IPs
Object IP Configuration (All Subnets are /21)
SAN Management 10.0.0.9
Firewall 10.0.0.10
DHCP for IS Wireless Network 10.0.7.0 to 10.0.7.254
Wireless Management 10.0.0.27
Chassis 1 Blade 8 10.0.1.8
Chassis 2 Blade 8 10.0.2.8
Chassis 3 Blade 8 10.0.3.8
ESXi; Chassis 1 Blade 8 10.0.1.24
ESXi; Chassis 2 Blade 8 10.0.2.24
ESXi; Chassis 3 Blade 8 10.0.3.24
vSphere/vCenter; Chassis 1 Blade 8 10.0.1.40
vSphere/vCenter; Chassis 2 Blade 8 10.0.2.40
vSphere/vCenter; Chassis 3 Blade 8 10.0.3.40
Web Client 10.0.2.40:9443
2.02 Production – VLAN X, 10.0.X.0/24
VLAN 84, 10.0.84.XXX/24
PublicIP:69.27.22.30
PublicGateway:69.27.22.1
2.03 Workstation IPs
User Category Project Horus IPs
Workers (two VMs) 10.0.84.20; 10.0.84.21
Exploders (two VMs) 10.0.84.30; 10.0.84.31
Slackers (two VMs) 10.0.84.40; 40.0.84.41
Active Directory (one VM) 10.0.84.10; 10.0.7.253
Spector 360 Server (one VM) 10.0.84.11; 10.0.7.254
2.1 Power on Order
The order inwhichto turn onthese systemsis hierarchical andistobe followedexplicitlyasitislisted,
withno deviationorvariationforthe systemtooperate:
2.11 Physical Machines
1. Chassis2, Blade 8
2. Chassis1, Blade 8
3. Chassis3, Blade 8
Allowaperiodof 5 minutesbeforecontinuingtothe nextstep.
5. P a g e | 4
2.12 Virtual Machines (The next step)
1. On Chassis2, Blade 8, turn onthe vCenterServerVM.
a. Log in tothe vCenterServerVMandwait5 minutesbefore continuingtothe nextstep
for all of the servicestofullyactivate.
b. AccessthisVM by usingthe vSphere Clientandconnectingto10.0.2.24.
2. On Chassis1, Blade 8, turn onthe ADServerVM.
a. Log in tothe AD ServerVMand wait5 minutesbefore continuingtothe nextstepforall
of the servicestofullyactivate.
b. AccessthisVMby usingthe vSphere WEBClientandconnectingto
https://10.0.2.40:9443
3. On Chassis1, 2, and 3, turn on the twoEnd-UserVMs.
Afterthis,turnon all the End-UserVMs, of whichthere are 2 (TWO) on Blade 8 of Chassis1, 2, and 3.
2.2 Power off Order
The order inwhichto turn off these systemsishierarchical andisto be followedexplicitlyasitislisted,
withno deviationorvariationforthe systemtopoweroff inthe correct order:
2.21 Virtual Machines
1. On Chassis1, 2, and 3, all of Blade 8, turn off the End-UserVMs.
2. On Chassis1, Blade 8, turn off the AD ServerVM.
a. Thiscan be done simplybyright-clickingthe VMandclicking“PowerOff”.
3. On Chassis2, Blade 8, turn off the vCenterVM.
2.22 Physical Machines
Nowthat all of the VMs have beenturnedoff,the physical machinescanbe poweredoff inanyorder
throughtheirassociatediDRACcontrols(10.0.1.8, 10.0.2.8, 10.0.3.8 respectively).
DO NOT TURN THE SERVERS OFF BY HOLDING THE POWER BUTTON DOWN ON THE PHYSICAL
MACHINES.
2.3 Network Connectivity Issues
2.31 No Internet Connectivity on VMs
If there is an issue where aVMisunable toconnectto the internet,firstmake sure theyhave twoNICs
(NetworkInterface Cards) viathe vSphere WebClient.NIC1MUST connectto DPortGroupVLAN10and
NIC2 MUST connectto the Test.
Note:DPortGroupVLAN10isthe Internet,while Productionisthe Intranet.
Your VMSettingsshouldlooksomethinglike this:
6. P a g e | 5
3.0 SAN Connectivity Errors
3.01 ERROR: Virtual Machines Become Inaccessible
Thisissue ismostlikelycausedfromthe DataSource on whichyour VMsrun has come across some
problem,typicallydue tothe Data Source beingshutoff or the serversbeingdetachedfromthe Data
Source.To remediate thisissue,typically youcanrescanthe adapterthat isconnectedtothe Data
Source for any“newlydiscovered”storage devices,asshownbelow.
If that doesnot resolve yourissue, the issueliesinthe SAN configuration.YourSAN interface,upon
selectingyourservercluster,willmostlikelyshow some resultcomparabletoDell Compellent’s
“PartiallyConnected”status,asshownbelow:
For thisproject,the IPof the Compellent ManagementInterface is https://10.0.0.9.The solutiontothis
isverysimple.First,navigate tothe Mappingtabon any of the serverswithinyourclusterinCompellent
storage.Clickonthe Volume andthenclickRemove Mapping.Thiswill removethe Volume fromall of
your serverssimultaneously,providedyoucorrectlyimplementedthemintoaServerCluster. Now,to
add the Volume backtothe ServerCluster,navigate toStorageVolumes Big Brother Mapping
and click on “Map Volume toServer”.You’ll be presentedwithadialogue box onwhichserverorserver
clusterto selectformapping.Clickon1984.
7. P a g e | 6
Once the Volume hasbeenmappedbackto the ServerCluster,goaheadandrescanthe Storage
Adaptersasdemonstratedinthe firststep,andyou’ll see thatthe iSCSISoftware Adaptershave
connectedbackto the SAN and the Virtual Machineshave beendiscovered. The HBAsmaystill show
partiallyconnectedstatus,thoughthatisnota glaringissue tobe concernedabout.
3.02 ERROR: Cannot connect to vCenter Single Sign-On server (vSphere Web Client)
Thisissue iscausedby the vCenterServerService(locatedonthe vCenterServer) havingdifficultieson
starting.Resolvingthisissue mayvaryindifficultydependingonthe state of the vCenterServerandif
the vCenterServerService isinthe midstof startingornot. The easiestsolution,of course,istorestart
the vCenterServerandnotforce start anyprocesses;letVMWare andvSphere organize the startorder
for all of these processes.
3.03 ERROR: Empty Inventory
In the eventof an EmptyInventoryupontryingtoaccess hostson the vSphere WebClient, there isa
service thatdoesn’talwaysautomaticallystart,thoughitshould.Firstly,navigatetoLocal Serviceson
the vCenterServerandlookforVMware vCenterInventoryService andensure thatitisrunning.If itis,
simplywaitfive totenminutesforthe service toinformthe webserverof itsinventory.
8. P a g e | 7
4.0 Spector 360 Server Configuration
4.01 ERROR: Test email failed with the following message: Failure to send mail. Unable to
read data from the transport connection: net_io_connectionclosed
Shouldthiserroroccur, it isa firewall issuewiththe network-wide firewall. Toresolvethis,youmustbe
able to gainadministrativeaccesstoyourinternal Firewall. The followingtwocommandswill workfora
CiscoASA Firewall.
access-list smtp extended permit tcp any host 10.0.7.254 eq smtp
access-group smtp in interface outside
5.0 Spector 360 Server Troubleshooting
5.01 Unable to Start Spector Control Center Server Service: Logon Failure
In the eventthe belowerrorisreceived, the issue liesinwithSingle SignOncapabilities.
To resolve thisissue,openthe Spector360 Control Center(ignoreall warnings/errors)andnavigate to
“Database”.From there,clickon“Manage Database Logins”and finallyclick“Create anew Login
Account”,as shownbelow.
9. P a g e | 8
From thisscreen,clickthe “Use SQL ServerAuthentication”radial button,thenfill inusercredentialsas
seenbelow:
Before savingthis,make sure thatunderthe “SelectEvents”and“SelectTools”tabsthat all optionsare
selectedexceptfor“Auditing”under“SelectTools”.Once thatisconfirmed,click“Save andClose”,close
the Spector360 Control Centerapplicationandlogoutof the current Administratoraccount.Logback in
to the serveras an account that doesnothave single signonprivilegesanduse the newlycreatedlogon
credentialsviaDatabase Login.Alternatively,logginginas“sa” will alsoworkprovidedthe credentials
are known.
5.02 Unable To Retrieve Server Settings – Unable to communicate.
If the stepsinthe previoussubsection(6.01) donot resolve thisissue, thenthe issue liesinincorrect
logincredentialsforthe SpectorControl CenterServerService itself.Toresolve thisissue,navigateto
Local Services,locate the “SpectorControl CenterServer”service,rightclickitandclickProperties.Now
clickon the Log-Ontab. The followingwindow will appear:
There are nowtwopossibilitiesonhowtoremediate thisissue.The firstis(andeasiest)istoclickthe
“Local Systemaccount”radial buttonto allow the service tostart bythe “SYSTEM” userthan an
Administratoruseraccount.The secondchoice forfixingthisissueistochange the account credentials
that activate the service.The mostcommonproblemhere isthatthe passwordhaschangedon the
associatedaccount.Update the passwordand start the service.
10. P a g e | 9
6.0 Spector 360 End-User Configuration
6.01 Start Windows Remote Registry Service
If the WRRS can’t be reached,loginto the endusermachine as an Administratorand openservices.msi.
Navigate tothe Remote Registryservice,rightclickitandclickon Properties.Inthe dropdownbox,click
on Automatic,thenclickonstart.It will looklike thisif done right:
In the eventmanuallystartingthe service isprovingimpossible,clickthe LogOntab of the Remote
Registryservice.Make the Username fieldsay“NTAuthorityLocalService”andclearout bothpassword
fields.Hitapplyandtryrestartingthe service.
6.02 ERROR: Cannot Open Service Control Manager on [Computer Name]
If such an error occurs while runningdiagnosticsonanymachine,logintothe endusermachine as an
Administratorandnavigate tothe AdvancedFirewall Options.Make anew InboundRule forPort-based
access onTCP and UDP ports 135. If done right,there will be twoentriesinthe InboundRulessection
for WindowsFirewall,asseenonthe nextpage.
11. P a g e | 10
6.03 Hosts cannot ping one another
Resolvingthisissueisextremelysimple.First,openupaCommandPrompton the VMyouwant to ping
to and the VMyou wantto pingfrom.Next,type thiscommandall onone line:
netsh advfirewall firewall add rule name="ICMP Allow incoming V4 echo
request"protocol=icmpv4:8,any dir=in action=allow
Thisadjuststhe firewall toallowICMPpacketstobe sentto it.