This document provides a user guide for Data Igloo, which allows redirection of user profiles, folders, and registry keys to retain data when used with Deep Freeze. It describes how to install Data Igloo, view Deep Freeze status, create redirections for user profiles, folders, and registry keys, log events, and uninstall Data Igloo. The guide also includes appendices with examples and best practices for installations.
Disk ownership
Launches the Disk Ownership Assistant
to assign ownership to unowned disks
3
*> disk assign
Manually assign ownership of unowned
disks
4
*> disk show -o
Display disk ownership information
5
*> disk remove
Remove ownership label from a disk
1.1.1.1 Modifying disk ownership
To modify disk ownership, use the disk assign and disk remove commands. For example:
*> disk assign -d 0b.83 -s 0
*> disk remove -d 0b.84
This assigns ownership of disk 0b.83 to the local storage system and removes ownership of
An Insight 360 Guide for IT Administrators.
I am the authorized K-12 representative in South Carolina for eInstruction by Turning Technologies
Bill McIntosh
SchoolVision Inc..
Authorized South Carolina K-12 Consultant for eInstruction / Turning Technologies
Phone :843-442-8888
Email :WKMcIntosh@Comcast.net
Twitter : @OtisTMcIntosh
SchoolVision Website on Facebook: https://www.facebook.com/WKMIII
Website : www.einstruction.com
For technical assistance on all eInstruction® or Turning Technologies products please call 866-746-3015
Turning Technologies | 255 West Federal Street | Youngstown, OH Main: 330-746-3015 | Toll Free: 866-746-3015 | Fax: 330-884-6065
www.TurningTechnologies.com
NetApp system installation workbook SpokaneAccenture
This document provides site requirements for installing NetApp storage systems, including physical dimensions and weight specifications for various hardware components as well as power requirements. Environmental factors like clearance around systems is also addressed. Requirements for networking switches used with the systems are included.
This document provides an overview and instructions for setting up an Oracle Database for use as a data warehouse, including preparing the hardware environment, configuring initialization parameters, and accessing Oracle Warehouse Builder. It also covers identifying data sources by importing metadata from various sources like flat files into Oracle Warehouse Builder. The document contains information to help users build and populate their Oracle Database data warehouse.
This document provides instructions for installing, licensing, and troubleshooting Oracle's Crystal Ball software. It discusses system requirements, guidelines for installation and licensing, steps for performing an administrative installation or automatically licensing Crystal Ball after installation using a script. It also covers starting Crystal Ball, uninstalling, and potential troubleshooting issues. Appendices address Microsoft Excel compatibility and conversion issues when working with Crystal Ball files.
The document describes the Exchangeable Image File Format (Exif) Version 2.2 standard for digital still cameras. It specifies formats for image and audio files recorded by digital cameras as well as tag information about images. The Exif format uses existing TIFF and JPEG standards for image files and WAVE format for audio. Attribute information is stored in TIFF tags for uncompressed files and JPEG APP markers for compressed files. The standard defines pixel formats, sampling methods, file structures and tag formats to enable compatibility between camera systems and software.
This document provides an overview, specifications, quick setup instructions, and troubleshooting information for the Dell Latitude ATG E6400 computer. It describes the computer's features and components, how to set up the computer initially, how to connect to the internet, and how to transfer files and settings from an old computer to the new one. The document also includes specifications, troubleshooting tips, instructions for reinstalling software, and information on how to find additional help or support.
Plesk 8.0 Administrator's Guide provides information to help administrators configure and maintain their Plesk control panel. It covers topics such as logging in, customizing the interface, upgrading licenses, securing the panel, configuring server services like DNS, mail, databases and statistics, managing server resources, and serving customers by simplifying account and domain setup. The guide contains information needed to optimize use of the Plesk control panel.
Disk ownership
Launches the Disk Ownership Assistant
to assign ownership to unowned disks
3
*> disk assign
Manually assign ownership of unowned
disks
4
*> disk show -o
Display disk ownership information
5
*> disk remove
Remove ownership label from a disk
1.1.1.1 Modifying disk ownership
To modify disk ownership, use the disk assign and disk remove commands. For example:
*> disk assign -d 0b.83 -s 0
*> disk remove -d 0b.84
This assigns ownership of disk 0b.83 to the local storage system and removes ownership of
An Insight 360 Guide for IT Administrators.
I am the authorized K-12 representative in South Carolina for eInstruction by Turning Technologies
Bill McIntosh
SchoolVision Inc..
Authorized South Carolina K-12 Consultant for eInstruction / Turning Technologies
Phone :843-442-8888
Email :WKMcIntosh@Comcast.net
Twitter : @OtisTMcIntosh
SchoolVision Website on Facebook: https://www.facebook.com/WKMIII
Website : www.einstruction.com
For technical assistance on all eInstruction® or Turning Technologies products please call 866-746-3015
Turning Technologies | 255 West Federal Street | Youngstown, OH Main: 330-746-3015 | Toll Free: 866-746-3015 | Fax: 330-884-6065
www.TurningTechnologies.com
NetApp system installation workbook SpokaneAccenture
This document provides site requirements for installing NetApp storage systems, including physical dimensions and weight specifications for various hardware components as well as power requirements. Environmental factors like clearance around systems is also addressed. Requirements for networking switches used with the systems are included.
This document provides an overview and instructions for setting up an Oracle Database for use as a data warehouse, including preparing the hardware environment, configuring initialization parameters, and accessing Oracle Warehouse Builder. It also covers identifying data sources by importing metadata from various sources like flat files into Oracle Warehouse Builder. The document contains information to help users build and populate their Oracle Database data warehouse.
This document provides instructions for installing, licensing, and troubleshooting Oracle's Crystal Ball software. It discusses system requirements, guidelines for installation and licensing, steps for performing an administrative installation or automatically licensing Crystal Ball after installation using a script. It also covers starting Crystal Ball, uninstalling, and potential troubleshooting issues. Appendices address Microsoft Excel compatibility and conversion issues when working with Crystal Ball files.
The document describes the Exchangeable Image File Format (Exif) Version 2.2 standard for digital still cameras. It specifies formats for image and audio files recorded by digital cameras as well as tag information about images. The Exif format uses existing TIFF and JPEG standards for image files and WAVE format for audio. Attribute information is stored in TIFF tags for uncompressed files and JPEG APP markers for compressed files. The standard defines pixel formats, sampling methods, file structures and tag formats to enable compatibility between camera systems and software.
This document provides an overview, specifications, quick setup instructions, and troubleshooting information for the Dell Latitude ATG E6400 computer. It describes the computer's features and components, how to set up the computer initially, how to connect to the internet, and how to transfer files and settings from an old computer to the new one. The document also includes specifications, troubleshooting tips, instructions for reinstalling software, and information on how to find additional help or support.
Plesk 8.0 Administrator's Guide provides information to help administrators configure and maintain their Plesk control panel. It covers topics such as logging in, customizing the interface, upgrading licenses, securing the panel, configuring server services like DNS, mail, databases and statistics, managing server resources, and serving customers by simplifying account and domain setup. The guide contains information needed to optimize use of the Plesk control panel.
- Oracle Data Integrator is a tool for integrating data between heterogeneous systems and applications. It has components for modeling data, designing interfaces, executing integration processes, and monitoring results.
- The core components include repositories to store metadata, a design studio to create interfaces and mappings, and run-time agents that execute integration processes.
- This guide will help users get started with Oracle Data Integrator by walking through installing the software, exploring an example ETL project, and learning how to design and run integrations.
Getting Started with DaRT 7.0 provides an overview of the Microsoft Diagnostics and Recovery Toolset (DaRT) 7.0, including what is new in this version and an overview of the tools available. DaRT 7.0 allows administrators to diagnose and repair Windows computers that will not start properly. It includes tools to analyze issues, fix problems, recover files, and scan for malware. DaRT 7.0 improves on previous versions by adding a remote connection feature and more deployment options for the DaRT recovery image.
This document provides reference information for the cmdlets in the App Controller PowerShell module for System Center 2012 SP1. It includes help files and documentation for each cmdlet that describe their parameters and usage examples. The cmdlets are designed to manage and monitor App Controller functionality from PowerShell.
This tutorial introduces a multi-tier ASP.NET MVC application that uses Windows Azure Storage services. It provides an overview of the email list management application, including its front-end interface, use of tables, queues and blobs for the back-end, and deployment to Windows Azure. The remaining tutorials will explain how to set up the development environment, build each component of the application, and deploy it to Windows Azure.
This document provides an administrator's guide for using Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0. DaRT 8.0 allows administrators to diagnose and repair computers that will not start properly or that are experiencing issues. It includes tools to recover unusable computers, diagnose problems, repair unbootable systems, restore lost files, and detect malware. The guide covers planning, deploying, operating and troubleshooting DaRT 8.0, including how to create and deploy the DaRT recovery image to recover local or remote computers.
This document provides release notes for Oracle Developer Suite 10g Release 2 (10.1.2) for Solaris, Windows and Linux x86. It includes sections on certification information, known issues, and component release notes. The known issues section documents problems related to installation, configuration, documentation and other areas. The component release notes sections provide additional details on specific issues and limitations for Oracle Business Intelligence Beans, Oracle Forms, and other Developer Suite components.
This document provides an installation guide for Oracle8i Client Release 3 (8.1.7) for Windows, describing the new features, components, system requirements, installation overview and process, configuration tasks, and how to deinstall Oracle components. It is intended for users installing or configuring Oracle8i Client on Windows NT, 2000, 95 or 98 systems and assumes familiarity with those operating systems and database concepts. The guide is organized to walk the user through introduction, preinstallation, installation, post-installation, and deinstallation steps.
This document provides an overview of installing Oracle Data Integrator (ODI), including its main applications like ODI Studio, repositories, and standalone agent, as well as different installation types; it outlines the installation roadmap and process flow, and summarizes ODI's topology with the components that can be installed and their purposes.
This document provides guidance on developing modern mobile web apps using HTML5, CSS3, and JavaScript. It discusses choosing between native, web, and hybrid platforms and determining which browsers and devices to support. It also covers delivering mobile-friendly markup, forms, images and responsive design. The goal is to support various mobile browsers while keeping code simple to ensure compatibility across many devices.
Dell Inspiron 7537 là sản phẩm cao cấp, nổi bật với thiết kế chuyên nghiệp, mạnh mẽ và thời thượng. Dòng máy được nhiều người dùng đánh giá cao nhờ cấu hình ổn định với bộ xử lý Haswell Core i5 và card đồ họa rời NVIDIA GeForce GT 750M, đảm bảo các tác vụ luôn được diễn ra mượt mà và trơn tru.
Nguồn: https://laptops.vn/san-pham/dell-inspiron-7537/
The document provides instructions for removing and installing various components inside the Dell Precision Tower 7910 computer. It begins with safety guidelines for working inside the computer and provides overview diagrams of the computer components. The bulk of the document then lists step-by-step instructions for removing and installing over 30 individual components, including hard drives, memory, heat sinks, fans, and the system board. It concludes with additional memory and locking guidelines.
This document is a user guide for Dekart Private Disk, a software that protects proprietary information and data by encrypting the contents of a removable disk. It contains instructions on installing, updating, and removing Dekart Private Disk, describes the main features and components, and outlines the system requirements. The guide also explains how to use Dekart Private Disk, including details about the control panel interface and available settings options for configuring its behavior and security features.
Faronics Deep Freeze Enterprise User GuideFaronics
This document is the user guide for Deep Freeze Enterprise, which allows administrators to centrally manage and deploy software configurations on multiple computers. It describes how to install and configure Deep Freeze Configuration Administrator and Enterprise Console to customize settings like frozen drives, ThawSpace locations, scheduled tasks and more. The Enterprise Console then enables monitoring and managing Deep Freeze across a network from a single interface.
This document is the user guide for Deep Freeze Mac. It provides instructions on installing, configuring, and using Deep Freeze Mac to restore Mac computers to a predefined state after each restart or login. It covers installing Deep Freeze locally or remotely via Apple Remote Desktop, configuring freeze/thaw settings, creating maintenance schedules, and uninstalling Deep Freeze. The guide also describes the Deep Freeze Remote and Deep Freeze Tasks features for remotely managing multiple Macs.
[E Book] Linux, G C C X G C C The Gnu C C++ Language System For Emb...Emanuele Bonanni
Gnu C/C++ compiler for M68K and PowerPC embedded systems
The Gnu C/C++ compiler (gcc) is the core of the system. It supports a wide variety of
embedded processor architectures including M68K, PowerPC, ARM, and others.
1.4.2
Gnu assembler (as), linker (ld) and binary utilities
The Gnu assembler and linker are included to handle assembly language files and link
object files into executable programs. Also included are utilities like objdump, size, nm, etc.
1.4.3
newlib C runtime library
The newlib library provides standard C library functions like printf(), scan
Sun GlassFish Web Space Server 100 Installation Guidewebhostingguy
Sun GlassFish Web Space Server 10.0 is a next-generation Web 2.0 application aggregation and presentation platform that enables businesses to pull together applications and content from various sources and present them as a unified portal. The document provides installation instructions for Web Space Server and describes its features which include social networking, enterprise widgets, identity management, and tools for users, administrators, and developers.
This document provides an overview of Sitecore's analytics configuration and API. It describes Sitecore's analytics features like page tracking, sessions, tags, profiles and events. It outlines the analytics architecture and database. It also covers configuring analytics settings, roles and the analytics provider. The document provides details on the analytics API for reporting events, pages and using extensions. It concludes with tips for troubleshooting analytics issues.
- The document provides installation instructions for DEFORMTM-3D Version 6.1 on Unix/Linux systems. It details how to mount the installation CD, run the automated installation script to install platform dependent and independent files, and manually install the files if needed. It also covers setting up a user account and environment variables to run the software and potential issues like an invalid program copy.
This document is the manual for DSpace version 1.5.2. It provides an overview of the key functional components of DSpace including its data model, metadata, ingest process, authentication, authorization, search and browse capabilities. The document also covers installing and updating a DSpace system, including prerequisite software, installation options and steps for both UNIX/Linux and Windows platforms. Advanced configuration topics such as HTTPS, multilingual support and 'cron' jobs are also addressed.
The document provides a quick start guide for teachers using the Insight Console software. It outlines the key features and controls available to teachers for monitoring, restricting, and interacting with student computers. These include demonstrating the teacher's screen, viewing student screens, sending messages, limiting web/app access, and remotely controlling student machines. It also describes how Insight appears and functions on the student side.
This document is a user guide for Deep Freeze Standard that provides instructions on installing, configuring, and using the software. It describes the installation process, including attended, silent, and imaging installation methods. It also outlines how to log in to Deep Freeze and configure settings like the status on next boot and license key. The guide provides information on using Deep Freeze's frozen and thawed modes to protect systems from unwanted changes.
- Oracle Data Integrator is a tool for integrating data between heterogeneous systems and applications. It has components for modeling data, designing interfaces, executing integration processes, and monitoring results.
- The core components include repositories to store metadata, a design studio to create interfaces and mappings, and run-time agents that execute integration processes.
- This guide will help users get started with Oracle Data Integrator by walking through installing the software, exploring an example ETL project, and learning how to design and run integrations.
Getting Started with DaRT 7.0 provides an overview of the Microsoft Diagnostics and Recovery Toolset (DaRT) 7.0, including what is new in this version and an overview of the tools available. DaRT 7.0 allows administrators to diagnose and repair Windows computers that will not start properly. It includes tools to analyze issues, fix problems, recover files, and scan for malware. DaRT 7.0 improves on previous versions by adding a remote connection feature and more deployment options for the DaRT recovery image.
This document provides reference information for the cmdlets in the App Controller PowerShell module for System Center 2012 SP1. It includes help files and documentation for each cmdlet that describe their parameters and usage examples. The cmdlets are designed to manage and monitor App Controller functionality from PowerShell.
This tutorial introduces a multi-tier ASP.NET MVC application that uses Windows Azure Storage services. It provides an overview of the email list management application, including its front-end interface, use of tables, queues and blobs for the back-end, and deployment to Windows Azure. The remaining tutorials will explain how to set up the development environment, build each component of the application, and deploy it to Windows Azure.
This document provides an administrator's guide for using Microsoft Diagnostics and Recovery Toolset (DaRT) 8.0. DaRT 8.0 allows administrators to diagnose and repair computers that will not start properly or that are experiencing issues. It includes tools to recover unusable computers, diagnose problems, repair unbootable systems, restore lost files, and detect malware. The guide covers planning, deploying, operating and troubleshooting DaRT 8.0, including how to create and deploy the DaRT recovery image to recover local or remote computers.
This document provides release notes for Oracle Developer Suite 10g Release 2 (10.1.2) for Solaris, Windows and Linux x86. It includes sections on certification information, known issues, and component release notes. The known issues section documents problems related to installation, configuration, documentation and other areas. The component release notes sections provide additional details on specific issues and limitations for Oracle Business Intelligence Beans, Oracle Forms, and other Developer Suite components.
This document provides an installation guide for Oracle8i Client Release 3 (8.1.7) for Windows, describing the new features, components, system requirements, installation overview and process, configuration tasks, and how to deinstall Oracle components. It is intended for users installing or configuring Oracle8i Client on Windows NT, 2000, 95 or 98 systems and assumes familiarity with those operating systems and database concepts. The guide is organized to walk the user through introduction, preinstallation, installation, post-installation, and deinstallation steps.
This document provides an overview of installing Oracle Data Integrator (ODI), including its main applications like ODI Studio, repositories, and standalone agent, as well as different installation types; it outlines the installation roadmap and process flow, and summarizes ODI's topology with the components that can be installed and their purposes.
This document provides guidance on developing modern mobile web apps using HTML5, CSS3, and JavaScript. It discusses choosing between native, web, and hybrid platforms and determining which browsers and devices to support. It also covers delivering mobile-friendly markup, forms, images and responsive design. The goal is to support various mobile browsers while keeping code simple to ensure compatibility across many devices.
Dell Inspiron 7537 là sản phẩm cao cấp, nổi bật với thiết kế chuyên nghiệp, mạnh mẽ và thời thượng. Dòng máy được nhiều người dùng đánh giá cao nhờ cấu hình ổn định với bộ xử lý Haswell Core i5 và card đồ họa rời NVIDIA GeForce GT 750M, đảm bảo các tác vụ luôn được diễn ra mượt mà và trơn tru.
Nguồn: https://laptops.vn/san-pham/dell-inspiron-7537/
The document provides instructions for removing and installing various components inside the Dell Precision Tower 7910 computer. It begins with safety guidelines for working inside the computer and provides overview diagrams of the computer components. The bulk of the document then lists step-by-step instructions for removing and installing over 30 individual components, including hard drives, memory, heat sinks, fans, and the system board. It concludes with additional memory and locking guidelines.
This document is a user guide for Dekart Private Disk, a software that protects proprietary information and data by encrypting the contents of a removable disk. It contains instructions on installing, updating, and removing Dekart Private Disk, describes the main features and components, and outlines the system requirements. The guide also explains how to use Dekart Private Disk, including details about the control panel interface and available settings options for configuring its behavior and security features.
Faronics Deep Freeze Enterprise User GuideFaronics
This document is the user guide for Deep Freeze Enterprise, which allows administrators to centrally manage and deploy software configurations on multiple computers. It describes how to install and configure Deep Freeze Configuration Administrator and Enterprise Console to customize settings like frozen drives, ThawSpace locations, scheduled tasks and more. The Enterprise Console then enables monitoring and managing Deep Freeze across a network from a single interface.
This document is the user guide for Deep Freeze Mac. It provides instructions on installing, configuring, and using Deep Freeze Mac to restore Mac computers to a predefined state after each restart or login. It covers installing Deep Freeze locally or remotely via Apple Remote Desktop, configuring freeze/thaw settings, creating maintenance schedules, and uninstalling Deep Freeze. The guide also describes the Deep Freeze Remote and Deep Freeze Tasks features for remotely managing multiple Macs.
[E Book] Linux, G C C X G C C The Gnu C C++ Language System For Emb...Emanuele Bonanni
Gnu C/C++ compiler for M68K and PowerPC embedded systems
The Gnu C/C++ compiler (gcc) is the core of the system. It supports a wide variety of
embedded processor architectures including M68K, PowerPC, ARM, and others.
1.4.2
Gnu assembler (as), linker (ld) and binary utilities
The Gnu assembler and linker are included to handle assembly language files and link
object files into executable programs. Also included are utilities like objdump, size, nm, etc.
1.4.3
newlib C runtime library
The newlib library provides standard C library functions like printf(), scan
Sun GlassFish Web Space Server 100 Installation Guidewebhostingguy
Sun GlassFish Web Space Server 10.0 is a next-generation Web 2.0 application aggregation and presentation platform that enables businesses to pull together applications and content from various sources and present them as a unified portal. The document provides installation instructions for Web Space Server and describes its features which include social networking, enterprise widgets, identity management, and tools for users, administrators, and developers.
This document provides an overview of Sitecore's analytics configuration and API. It describes Sitecore's analytics features like page tracking, sessions, tags, profiles and events. It outlines the analytics architecture and database. It also covers configuring analytics settings, roles and the analytics provider. The document provides details on the analytics API for reporting events, pages and using extensions. It concludes with tips for troubleshooting analytics issues.
- The document provides installation instructions for DEFORMTM-3D Version 6.1 on Unix/Linux systems. It details how to mount the installation CD, run the automated installation script to install platform dependent and independent files, and manually install the files if needed. It also covers setting up a user account and environment variables to run the software and potential issues like an invalid program copy.
This document is the manual for DSpace version 1.5.2. It provides an overview of the key functional components of DSpace including its data model, metadata, ingest process, authentication, authorization, search and browse capabilities. The document also covers installing and updating a DSpace system, including prerequisite software, installation options and steps for both UNIX/Linux and Windows platforms. Advanced configuration topics such as HTTPS, multilingual support and 'cron' jobs are also addressed.
The document provides a quick start guide for teachers using the Insight Console software. It outlines the key features and controls available to teachers for monitoring, restricting, and interacting with student computers. These include demonstrating the teacher's screen, viewing student screens, sending messages, limiting web/app access, and remotely controlling student machines. It also describes how Insight appears and functions on the student side.
This document is a user guide for Deep Freeze Standard that provides instructions on installing, configuring, and using the software. It describes the installation process, including attended, silent, and imaging installation methods. It also outlines how to log in to Deep Freeze and configure settings like the status on next boot and license key. The guide provides information on using Deep Freeze's frozen and thawed modes to protect systems from unwanted changes.
Power Save Mac is an energy management software that puts computers to sleep or shuts them down when inactive to conserve energy. It provides options to configure inactivity thresholds for sleep/shutdown, scheduled actions, and reporting. The Power Save Mac Assistant allows customizing the Power Save Mac installation package and pre-configuring global settings. It can also directly install tasks into Apple Remote Desktop to enable controlling Power Save Mac remotely.
This document provides information about installing and configuring Faronics WINSelect software. It discusses installing WINSelect via the Faronics Core Console on a workstation or manually. It also summarizes the WINSelect Enterprise Console and the various nodes for configuring system settings, applications, printers, and other options. The document is intended to help administrators understand how to deploy and manage WINSelect on individual computers or across a network.
This document is a user guide for Faronics Power Save that describes how to install, configure, access and generate reports from the software. It provides information on system requirements, an overview of installation and configuration options using the Faronics Core Console interface or manually on a workstation, how to create and apply power plans and policies, and descriptions of various report types that can be generated.
Faronics Deep Freeze Server Enterprise User GuideFaronics
This document is the user guide for Deep Freeze Enterprise, software that protects computers from unwanted changes by restoring them to a known good state after each reboot or at scheduled times. The guide provides instructions on installing Deep Freeze, configuring settings using the Deep Freeze Configuration Administrator tool, and managing frozen computers and tasks using the Deep Freeze Enterprise Console.
This document is the user guide for Faronics Insight, which provides instructions on installing, configuring, and using the Faronics Insight software on various devices. It covers topics such as planning the installation, supported environments, installing on Windows, Mac, iOS, Android, and Linux devices, configuring preferences, updating the software remotely, and using additional Insight utilities.
This document provides instructions for installing and configuring Insight Tech Console and Report Server. It covers supported operating systems, installation procedures for Windows and Mac computers, updating Tech Console and managed machines, configuring Tech Console preferences, and basic usage instructions. The guide is intended to help IT and technical staff use Tech Console's central management capabilities for tasks like hardware and software inventory, updating systems, monitoring security, and generating utilization reports.
This document is an administrator guide for version 5.1 of SafeConsole, a software for managing portable storage devices. SafeConsole allows organizations to control device usage and support users by enabling password resets and more. The guide explains what SafeConsole is, how devices connect to it, and provides an overview of the basic features and configuration options available to administrators in the SafeConsole interface.
This document provides an overview and instructions for using transformations in Informatica PowerCenter. It describes how to create and configure transformations and ports, use expressions, variables, default values, and make transformations reusable. It also provides specific guidance on using the Aggregator and Custom transformations.
This document provides installation instructions for Oracle Hyperion Financial Management System 9.2.1. It outlines hardware and software requirements, instructions for installing the database, server components, and client components. The document also provides directions for configuring Financial Management and describes additional Hyperion products that can be installed.
This document is a user guide for Deep Freeze Standard that provides instructions on installing, configuring, and using the software. It covers topics such as system requirements, attended and silent installation processes, installing over existing versions, using imaging to deploy, Deep Freeze icons, logging in, status and password tabs, and making permanent changes.
This document provides information about the Hitachi Replication Manager Software User Guide, including its intended audience, product version, document organization, and how to get help. It outlines the document contents and chapters, which cover topics such as getting started with Replication Manager, using the Replication Manager console, setting up information sources, discovering volumes, creating copy groups, and managing replication. The document also provides licensing information and describes the architecture and features of Replication Manager.
Faronics Deep Freeze Server Standard User GuideFaronics
This document is a user guide for Deep Freeze Server Standard that provides instructions on installing, configuring, and using the software. It covers topics such as system requirements, attended and silent installation processes, using Deep Freeze icons and features like the status and password tabs, and making permanent changes after installation. The guide is intended to explain how to properly set up and operate Deep Freeze Server Standard on a system.
Tap the Google Assistant icon on the start screen to ask questions and get help with tasks on your
tablet.
User guide:
The user guide is available online at www.gigaset.com. Enter the model name of your tablet in the
search field to find the user guide.
FAQs:
Frequently asked questions and their answers can be found at www.gigaset.com. Enter your
model name in the search field to find answers to common questions.
Support:
If you have any other questions, our support team will be happy to help you by phone or email.
You can find the contact details on the last page of this user guide or at www.
ZebraNet Bridge Enterprise - Manual do SoftwareUseZ
Manual do Software da Zebra para configuração e gerenciamento de impressoras em rede, ZebraNet Bride Enterprise.
Para conferir outros modelos acesse: www.usez.com.br
Faronics Anti-executable Standard User GuideFaronics
The document is an Anti-Executable Standard user guide that provides information about installing and using the Anti-Executable Standard product from Faronics. It includes sections that describe an overview of Anti-Executable, system requirements, how to install and access Anti-Executable Standard, how to configure Anti-Executable settings and options, and how to generate reports and uninstall Anti-Executable Standard.
This document provides an overview and instructions for installing and using Hitachi Storage Navigator Modular 2 (Navigator 2). It includes information on:
- Key features of Navigator 2 and how it integrates with Hitachi storage systems
- System requirements and pre-installation steps
- Installing Navigator 2 on Windows, Solaris, and Linux operating systems
- Performing initial configuration steps like adding arrays, creating volumes, and mapping volumes to hosts
- Using basic Navigator 2 interface elements and functions
- Managing users, permissions, and passwords
- Providing a quick tour of common Navigator 2 activities
The document provides instructions for using a My Book Live personal cloud storage device. It includes information about connecting the device, backing up and accessing files, managing users and shares, and remotely accessing files using mobile apps or a web browser. The document contains sections on basic setup options, media streaming features, and troubleshooting tips. Customer support contact information is also included to help users with any technical issues.
This document is a getting started guide for Websense TRITON Cloud Web Security. It provides instructions on requesting a Cloud Web Security account, deploying the service by configuring browsers and firewalls, using chained proxies, adding IP addresses to policies, setting up end-user authentication, and assisting remote users. The guide aims to help new and existing customers get up and running with the cloud-based web security solution.
Inter-Tel Web Conferencing and Remote Support User GuideVideoguy
This document is the user guide for Inter-Tel's Web Conferencing and Remote Support software. It provides information on hardware and software requirements, how to use the interface, conduct web conferences, and remote support sessions. The guide covers topics such as joining and hosting meetings, using features in the host console, and FAQs for troubleshooting issues.
The document outlines the basic components of an information security program for mortgage industry professionals. It discusses 13 first priority cybersecurity practices like managing risk, protecting systems from malware, patching systems, and training employees. It also discusses 10 second priority practices such as encrypting sensitive data, third party risk management, and disaster recovery planning. The document is intended to provide a succinct overview of security risks and basic practices to help small and medium businesses manage those risks.
The document discusses the basic components of an information security program for mortgage industry professionals. It provides an overview of information security risks and explains practices to help manage those risks, with a focus on small and medium businesses. The document is aligned with the National Institute of Standards and Technology's Cybersecurity Framework and identifies practices according to the framework's five core functions: identify, protect, detect, respond, and recover. It aims to help businesses understand security risks and develop basic programs to address them.
Erpi admin 11123510[1] by иссам неязын issam hejazinIssam Hejazin
This document is the Administrator's Guide for Oracle Hyperion Financial Data Quality Management, Enterprise Edition (FDMEE) release 11.1.2.3.510 from April 2014. It provides instructions on how to configure and use FDMEE to integrate source systems like ERP with Oracle Hyperion Planning and other EPM target applications. Key sections include installing and upgrading FDMEE, setting up source systems and mappings, loading metadata, and extracting and transforming data.
This document is the user guide for Deep Freeze Standard. It provides information about installing, configuring, and using Deep Freeze Standard to protect computers by making their configurations indestructible and reverting them to a known good state after each reboot. The guide covers topics such as system requirements, attended and silent installation and uninstallation methods, installing over existing versions of Deep Freeze, and using features like the status tab and password tab.
This document is a certification guide for IBM Tivoli Netcool/Impact V4.0. It discusses the IBM professional certification program and the test objectives for the Netcool/Impact V4.0 certification. It also provides an overview of planning, installing, configuring, developing policies, administering, and troubleshooting Netcool/Impact V4.0. The document includes chapters on the Netcool/Impact architecture, important concepts, installation, configuration of data sources, policies, logging and more. It aims to provide resources to help readers achieve Netcool/Impact and related certifications.
Plesk is a hosting automation solution that simplifies setup and management of user accounts, websites, and email accounts. It manages common software components like DNS, web, FTP, and mail servers. The new release of Plesk features a brand new desktop interface with quick access to major functions and statistics, as well as the ability to customize permissions for different types of user accounts.
E-commerce Development Services- Hornet DynamicsHornet Dynamics
For any business hoping to succeed in the digital age, having a strong online presence is crucial. We offer Ecommerce Development Services that are customized according to your business requirements and client preferences, enabling you to create a dynamic, safe, and user-friendly online store.
Zoom is a comprehensive platform designed to connect individuals and teams efficiently. With its user-friendly interface and powerful features, Zoom has become a go-to solution for virtual communication and collaboration. It offers a range of tools, including virtual meetings, team chat, VoIP phone systems, online whiteboards, and AI companions, to streamline workflows and enhance productivity.
Hand Rolled Applicative User ValidationCode KataPhilip Schwarz
Could you use a simple piece of Scala validation code (granted, a very simplistic one too!) that you can rewrite, now and again, to refresh your basic understanding of Applicative operators <*>, <*, *>?
The goal is not to write perfect code showcasing validation, but rather, to provide a small, rough-and ready exercise to reinforce your muscle-memory.
Despite its grandiose-sounding title, this deck consists of just three slides showing the Scala 3 code to be rewritten whenever the details of the operators begin to fade away.
The code is my rough and ready translation of a Haskell user-validation program found in a book called Finding Success (and Failure) in Haskell - Fall in love with applicative functors.
Takashi Kobayashi and Hironori Washizaki, "SWEBOK Guide and Future of SE Education," First International Symposium on the Future of Software Engineering (FUSE), June 3-6, 2024, Okinawa, Japan
Graspan: A Big Data System for Big Code AnalysisAftab Hussain
We built a disk-based parallel graph system, Graspan, that uses a novel edge-pair centric computation model to compute dynamic transitive closures on very large program graphs.
We implement context-sensitive pointer/alias and dataflow analyses on Graspan. An evaluation of these analyses on large codebases such as Linux shows that their Graspan implementations scale to millions of lines of code and are much simpler than their original implementations.
These analyses were used to augment the existing checkers; these augmented checkers found 132 new NULL pointer bugs and 1308 unnecessary NULL tests in Linux 4.4.0-rc5, PostgreSQL 8.3.9, and Apache httpd 2.2.18.
- Accepted in ASPLOS ‘17, Xi’an, China.
- Featured in the tutorial, Systemized Program Analyses: A Big Data Perspective on Static Analysis Scalability, ASPLOS ‘17.
- Invited for presentation at SoCal PLS ‘16.
- Invited for poster presentation at PLDI SRC ‘16.
Odoo ERP software
Odoo ERP software, a leading open-source software for Enterprise Resource Planning (ERP) and business management, has recently launched its latest version, Odoo 17 Community Edition. This update introduces a range of new features and enhancements designed to streamline business operations and support growth.
The Odoo Community serves as a cost-free edition within the Odoo suite of ERP systems. Tailored to accommodate the standard needs of business operations, it provides a robust platform suitable for organisations of different sizes and business sectors. Within the Odoo Community Edition, users can access a variety of essential features and services essential for managing day-to-day tasks efficiently.
This blog presents a detailed overview of the features available within the Odoo 17 Community edition, and the differences between Odoo 17 community and enterprise editions, aiming to equip you with the necessary information to make an informed decision about its suitability for your business.
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j
Dr. Jesús Barrasa, Head of Solutions Architecture for EMEA, Neo4j
Découvrez les dernières innovations de Neo4j, et notamment les dernières intégrations cloud et les améliorations produits qui font de Neo4j un choix essentiel pour les développeurs qui créent des applications avec des données interconnectées et de l’IA générative.
Flutter is a popular open source, cross-platform framework developed by Google. In this webinar we'll explore Flutter and its architecture, delve into the Flutter Embedder and Flutter’s Dart language, discover how to leverage Flutter for embedded device development, learn about Automotive Grade Linux (AGL) and its consortium and understand the rationale behind AGL's choice of Flutter for next-gen IVI systems. Don’t miss this opportunity to discover whether Flutter is right for your project.
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeAftab Hussain
Understanding variable roles in code has been found to be helpful by students
in learning programming -- could variable roles help deep neural models in
performing coding tasks? We do an exploratory study.
- These are slides of the talk given at InteNSE'23: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, co-located with the 45th International Conference on Software Engineering, ICSE 2023, Melbourne Australia
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppGoogle
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-fusion-buddy-review
AI Fusion Buddy Review: Key Features
✅Create Stunning AI App Suite Fully Powered By Google's Latest AI technology, Gemini
✅Use Gemini to Build high-converting Converting Sales Video Scripts, ad copies, Trending Articles, blogs, etc.100% unique!
✅Create Ultra-HD graphics with a single keyword or phrase that commands 10x eyeballs!
✅Fully automated AI articles bulk generation!
✅Auto-post or schedule stunning AI content across all your accounts at once—WordPress, Facebook, LinkedIn, Blogger, and more.
✅With one keyword or URL, generate complete websites, landing pages, and more…
✅Automatically create & sell AI content, graphics, websites, landing pages, & all that gets you paid non-stop 24*7.
✅Pre-built High-Converting 100+ website Templates and 2000+ graphic templates logos, banners, and thumbnail images in Trending Niches.
✅Say goodbye to wasting time logging into multiple Chat GPT & AI Apps once & for all!
✅Save over $5000 per year and kick out dependency on third parties completely!
✅Brand New App: Not available anywhere else!
✅ Beginner-friendly!
✅ZERO upfront cost or any extra expenses
✅Risk-Free: 30-Day Money-Back Guarantee!
✅Commercial License included!
See My Other Reviews Article:
(1) AI Genie Review: https://sumonreview.com/ai-genie-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
#AIFusionBuddyReview,
#AIFusionBuddyFeatures,
#AIFusionBuddyPricing,
#AIFusionBuddyProsandCons,
#AIFusionBuddyTutorial,
#AIFusionBuddyUserExperience
#AIFusionBuddyforBeginners,
#AIFusionBuddyBenefits,
#AIFusionBuddyComparison,
#AIFusionBuddyInstallation,
#AIFusionBuddyRefundPolicy,
#AIFusionBuddyDemo,
#AIFusionBuddyMaintenanceFees,
#AIFusionBuddyNewbieFriendly,
#WhatIsAIFusionBuddy?,
#HowDoesAIFusionBuddyWorks
OpenMetadata Community Meeting - 5th June 2024OpenMetadata
The OpenMetadata Community Meeting was held on June 5th, 2024. In this meeting, we discussed about the data quality capabilities that are integrated with the Incident Manager, providing a complete solution to handle your data observability needs. Watch the end-to-end demo of the data quality features.
* How to run your own data quality framework
* What is the performance impact of running data quality frameworks
* How to run the test cases in your own ETL pipelines
* How the Incident Manager is integrated
* Get notified with alerts when test cases fail
Watch the meeting recording here - https://www.youtube.com/watch?v=UbNOje0kf6E
4. Data Igloo User Guide
4
|Contents
Appendix E Using Data Igloo with Microsoft Security Essentials . . . . . . . . . . . . . . . . . . . . . . 59
Appendix F Redirecting Event Logs using Data Igloo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
5. Data Igloo User Guide
|5
Preface
This user guide explains how to install and use Data Igloo.
Topics
Important Information
Technical Support
6. Data Igloo User Guide
6
| Preface
Important Information
This section contains important information about your Faronics Product.
About Faronics
Faronics delivers market-leading solutions that help manage, simplify, and secure complex IT
environments. Our products ensure 100% machine availability, and have dramatically impacted
the day-to-day lives of thousands of information technology professionals. Fueled by a
market-centric focus, Faronics’ technology innovations benefit educational institutions, health
care facilities, libraries, government organizations, and corporations.
Product Documentation
The following documents form the Data Igloo documentation set:
• Data Igloo User Guide — This document guides you how to use the product.
• Data Igloo Release Notes — This document lists the new features, known issues, and closed
issues.
7. Technical Support
|7
Data Igloo User Guide
Technical Support
Every effort has been made to design this software for ease of use and to be problem free. If
problems are encountered, contact Technical Support.
Technical Support: www.faronics.com/support
Web: www.faronics.com
9. |9
Data Igloo User Guide
Introduction
Data Igloo was created to work with Deep Freeze. Deep Freeze protects a computer and restores it
to the original state on reboot. Data Igloo is a utility that allows you to redirect User Profiles,
Folders, and Registry Keys to a different location on your computer and retain data even after a
reboot when the computer is protected by Deep Freeze.
Data Igloo can also be used independently without installing Deep Freeze. Data Igloo provides an
easy way to create NTFS Junction Points and NTFS Symbolic Links using a GUI.
Topics
System Requirements
10. Data Igloo User Guide
10
| Introduction
System Requirements
The system requirements for Data Igloo are:
• Windows XP, Windows Vista, Windows 7 or Windows 8 (32-bit and 64-bit)
• Microsoft .NET 2.0 (SP1) or higher
• Deep Freeze Enterprise or Deep Freeze Standard (6.3 or higher). This is applicable only if you
are using Deep Freeze with Data Igloo. Data Igloo can be used independently without
installing Deep Freeze.
11. |11
Data Igloo User Guide
Installing Data Igloo
This chapter describes how to install Data Igloo.
Topics
Installing Data Igloo
12. Data Igloo User Guide
12
| Installing Data Igloo
Installing Data Igloo
To install Data Igloo, complete the following steps:
1. Double-click Faronics_IGS.exe. Click Next.
2. Read and accept the License Agreement. Click Next.
If .NET is not installed on your computer, the installer will automatically
download it from the Internet and install it. Ensure that your computer is
connected to the Internet.
13. Installing Data Igloo
|13
Data Igloo User Guide
3. Enter the User Name and Organization. Click Next.
4. The default location for Data Igloo is C:Program FilesFaronicsData Igloo Standard. Click
Change... to change the location where Data Igloo is installed. Click Next.
5. Click Install to install Data Igloo.
6. Click Finish to complete installation.
14. Data Igloo User Guide
14
| Installing Data Igloo
Accessing Data Igloo
Data Igloo can be accessed via Start>Programs>Faronics>Data Igloo.
While it is possible to install Data Igloo when Deep Freeze status is Frozen,
redirections created will not remain after a reboot. This is useful for testing
redirections. It is not possible to uninstall or repair Data Igloo when Deep Freeze
status is Frozen.
15. |15
Data Igloo User Guide
Using Data Igloo
This chapter explains how to use Data Igloo.
Topics
Data Igloo Overview
Deep Freeze Status
User Profile Redirection
Folder Redirection
Registry Key Redirection
Closing Data Igloo
Logging Events in Data Igloo
Command Line
16. Data Igloo User Guide
16
| Using Data Igloo
Data Igloo Overview
The following screen is displayed when Data Igloo is launched:
• Deep Freeze Status Icon — The status of Deep Freeze is displayed.
• Tabs — Data Igloo provides the User Profile Redirection, Folder Redirection and Registry Key
Redirection tabs. All tabs are explained in detail further in the user guide.
• Help — Launches the Online Help.
• Check for Updates — Checks if there is a new version of Data Igloo available.
• About — Displays information about the Data Igloo version and the End User License
Agreement.
• Status Bar — The status bar at the bottom of the Data Igloo screen displays the following
information:
— User Name — The User Name of the user account currently logged in.
— Operating System — The Operating System and service pack (if applicable).
Only users with administrative rights are allowed to use Data Igloo.
17. Deep Freeze Status
|17
Data Igloo User Guide
Deep Freeze Status
Deep Freeze protects a computer and restores it to the original state on reboot. Once Deep Freeze
is installed on a computer, any changes made to the computer—regardless of whether they are
accidental or malicious—are never permanent. For more information on Deep Freeze visit
http://www.faronics.com/deepfreeze
The following Deep Freeze status are displayed on Data Igloo:
Icon Definition
Deep Freeze Status is Frozen — Changes made to the computer will be lost
when the computer is restarted.
Deep Freeze Status is Thawed — Changes made to the computer will be
retained even after the computer is restarted.
Deep Freeze not installed — Deep Freeze is not installed on this computer.
Deep Freeze Seed installed — Deep Freeze seed is installed on this
computer.
Deep Freeze is Thawed and Locked — Deep Freeze is Thawed and the
keyboard and mouse are disabled.
Deep Freeze is in Maintenance — Deep Freeze maintenance is in progress.
18. Data Igloo User Guide
18
| Using Data Igloo
ThawSpace
ThawSpace is a feature of DeepFreeze Enterprise. ThawSpace is a virtual partition that can be
used to store programs, save files, or make permanent changes. All files stored in the ThawSpace
are retained after a restart, even if the computer is Frozen.
A ThawSpace must be created in Deep Freeze Enterprise before saving data. Alternatively, you
can also save data on Thawed Drives if you are using Deep Freeze Standard.
Data Igloo allows you to redirect the User Profile and specific Folders to a ThawSpace. Deep
Freeze allows you to create Hidden ThawSpaces. For more information on the process to Hide or
Display a ThawSpace refer to Appendix A, Redirecting to Hidden ThawSpaces.
19. User Profile Redirection
|19
Data Igloo User Guide
User Profile Redirection
The User Profile Redirection feature redirects the entire user profile to any NTFS volume or
partition on the computer. This is useful if Deep Freeze is installed, in order to retain new or
modified user data like Internet Favorites, My Documents and Desktop information even after
reboot.
The User Profile Redirection tab is displayed as follows:
It is not possible to redirect the profile of the user currently logged in.
Both the source and target drives must be NTFS partitions.
If an error occurs during the redirection process, Data Igloo will revert to the
original state without any changes to the data or settings.
20. Data Igloo User Guide
20
| Using Data Igloo
Creating a User Profile Redirection (for Existing User Profiles)
Complete the following steps to redirect a user profile from the default location to another drive
on your computer:
1. Ensure the Deep Freeze status is Thawed.
2. Select the user from the Users pane.
3. This step is optional. Select the Redirect any newly created user profiles to: check box to
redirect newly created user profiles to a ThawSpace. Browse to select the location of the
ThawSpace. If a new user profile is created, it will automatically be redirected to the selected
location.
Selecting the Redirect any newly created user profiles to: check box
automatically selects the Redirect registry key changes to: check box in the
Registry Key Redirection tab. For more information, refer to Registry Key
Redirection.
21. User Profile Redirection
|21
Data Igloo User Guide
4. In the User Profile Location pane select Custom Location. Click Redirect User Profile... to
select the location.
5. The Redirect User Profile dialog is displayed with the Source auto-filled. This is a read-only
field and cannot be edited.
22. Data Igloo User Guide
22
| Using Data Igloo
6. Click Browse for the Target. Select the Target in the Browse for folder dialog and click OK.
7. Set the permissions:
• Select the Copy NTFS permissions (where applicable) check box to copy the permissions for
NTFS. The security applied to Source folder by the NTFS file system is copied to the Target
folder. The security and share permissions are also applied to the files and folders within the
Target folder.
• Select the Copy Share permissions (where applicable) check box to copy the Share
permissions for the user profile folder.
8. Click Redirect User Profile.
9. Data Igloo scans the files and if errors occur, it is displayed in the Error Dialog. For more
information about the Error Dialog refer to Data Igloo Error Dialog. If no error is displayed,
aprogress bar is displayed and the User Profile is redirected to the target location.
23. User Profile Redirection
|23
Data Igloo User Guide
Automatically Redirecting Newly Created User Profiles
Data Igloo provides an option to automatically redirect newly created user profiles. This feature
saves time and effort for the administrator by ensuring that all newly created user profiles are
redirected to the selected location automatically.
Complete the following steps to automatically redirect newly created user profiles:
1. Go to User Profile Redirection tab.
2. Select the Redirect any newly created user profiles to: check box to redirect newly created
user profiles to a ThawSpace.
If Deep Freeze status is Frozen, you can still redirect a User Profile. The files and
folders related to the User Profile will be successfully moved even when the Deep
Freeze status is Frozen. However, the User Profile Redirection will not be retained
when the computer is restarted.
The User Profile redirected to the target folder inherits permissions from its
parent folder. In addition, the owner of the User Profile will be added to the folder
with Full Control permissions.
24. Data Igloo User Guide
24
| Using Data Igloo
• Redirect registry key changes to: click Browse to select the location of the ThawSpace.
Changes to the registry are automatically redirected to the selected location.
• Redirect newly created user profiles to: click Browse to select the location of the ThawSpace.
If a new user profile is created, it will automatically be redirected to the selected location.
3. Click OK.
Removing a User Profile Redirection
Complete the following steps to remove a previously redirected User Profile on your computer:
1. Ensure the Deep Freeze status is Thawed.
2. Select the user profile from the Users pane for which the user profile redirection is to be
removed.
25. User Profile Redirection
|25
Data Igloo User Guide
3. In the User Profile Location pane select Default Location.
4. A dialog is displayed showing the current and target location for the User Profile. Click Yes.
5. A progress bar is displayed and the User Profile redirection is removed.
26. Data Igloo User Guide
26
| Using Data Igloo
Folder Redirection
The Folder Redirection feature moves a folder to any NTFS volume or partition on the computer.
This is useful when Deep Freeze is installed. This feature ensures that data in a folder on a Frozen
drive is always saved on the Thawed drive, thereby retaining the data during a reboot.
The Folder Redirection tab is displayed as follows:
Example
If you have installed Deep Freeze on your computer running Windows XP and if C: is Frozen, the
files saved in the My Documents folder are erased on reboot. To avoid such a situation, you can
redirect the My Documents folder to a Thawed partition using Data Igloo.
Perform the following steps:
1. Reboot the computer in a Thawed state.
Both the source and target drives must be NTFS partitions.
If an error occurs during the redirection process, Data Igloo will revert to the
original state without any changes to the data or settings.
27. Folder Redirection
|27
Data Igloo User Guide
2. Redirect C:Documents and Settings<User Name>My Documents to the
ThawSpace T:.
3. Reboot the computer in a Frozen state.
Creating a new Folder Redirection
Complete the following steps to redirect a folder to another location on your computer:
1. Ensure the Deep Freeze status is Thawed.
2. Go to Folder Redirection tab. Click Redirect Folder....
3. In the Create Folder Redirection dialog, click Browse to select the source folder.
• Select the Copy NTFS permissions (where applicable) check box to copy the permissions for
NTFS. The security applied to Source folder by the NTFS file system is copied to the Target
28. Data Igloo User Guide
28
| Using Data Igloo
folder. The security and share permissions are also applied to the files and folders within the
Target folder.
• Select the Copy Share permissions (where applicable) check box to copy the share
permissions for the folder.
4. Select the source folder and click OK.
5. In the Create Folder Redirection dialog, click Browse to select the target folder.
6. Select the target folder and click OK.
The compression and encryption attributes of the folders and the files within the
folders are not copied.
30. Data Igloo User Guide
30
| Using Data Igloo
The folder redirected to the target drive will inherit the permissions from its
parent folder.
31. Folder Redirection
|31
Data Igloo User Guide
Removing a Folder Redirection
Complete the following steps to remove a previously redirected folder on your computer:
1. Ensure that Deep Freeze is Thawed.
2. Go to Folder Redirection tab.
3. The list of folders currently redirected is displayed. Select the Folder Redirection to be
removed and click Remove.
4. A configuration dialog is displayed displaying the current and target location of the folder.
Click Yes to continue.
5. The folder redirection is removed.
32. Data Igloo User Guide
32
| Using Data Igloo
Registry Key Redirection
The Registry Key Redirection tab allows you to redirect changes occurring in selected registry
keys to a ThawSpace. This ensures that the changes to the registry key are retained even when the
Deep Freeze status is Frozen. When Deep Freeze status is Thawed, the changes to the registry
keys saved on the ThawSpace are automatically restored to the registry.
The Registry Key Redirection tab is displayed as follows:
Only the HKEY_LOCAL_MACHINE registry keys can be redirected using Data Igloo.
33. Registry Key Redirection
|33
Data Igloo User Guide
Creating a Registry Key Redirection
Complete the following steps to create a Registry Key Redirection:
1. Ensure the Deep Freeze status is Thawed.
2. Go to Registry Key Redirection tab. Select Redirect registry key changes to: check box.
3. Click Browse to select a location on a Thawed drive.
4. Click Select Key from registry....
34. Data Igloo User Guide
34
| Using Data Igloo
5. In the Browse For Registry Key dialog, select the registry key and click Redirect.
6. The registry key is redirected to the Thawed drive.
35. Registry Key Redirection
|35
Data Igloo User Guide
7. Reboot the computer Frozen.
Changes made to the configuration are applied only when the computer restarted.
Registry key redirection takes effect only when the computer is rebooted Frozen.
Select the specific registry key to be redirected. Selecting the parent registry key
removes the child registry key from the list.
Deep Freeze status must be Thawed to change the settings in the Registry Key
Redirection tab. Registry key redirection can also be enabled when the Deep
Freeze status is Frozen. However, registry key redirection will not take effect when
the computer is rebooted.
The registry keys that are grayed out cannot be redirected.
Some Registry Keys might automatically appear in the Registry Key Redirection
tab. These Registry Keys are used by Data Igloo and cannot be removed manually.
36. Data Igloo User Guide
36
| Using Data Igloo
Removing a Registry Key Redirection
Complete the following steps to remove Thawed registry keys:
1. Ensure that Deep Freeze is Thawed.
2. Go to Registry Key Redirection tab.
3. Select the registry key from the list and click Remove from list.
37. Closing Data Igloo
|37
Data Igloo User Guide
Closing Data Igloo
Click Close icon on the title bar to close Data Igloo. Alternatively, click the Close button.
38. Data Igloo User Guide
38
| Using Data Igloo
Logging Events in Data Igloo
Data Igloo provides two ways to log and view the events. The Data Igloo error dialog and the Log
File. The Log File logs events for actions performed by Data Igloo.
Data Igloo Error Dialog
The Data Igloo error dialog is displayed whenever there is an exception. The dialog displays the
following options:
• Click View Log File to view the log file.
• Click Copy to clipboard to copy the contents displayed in the error dialog to the clipboard. The
contents can then be pasted in a word processor or E-mail.
• Click Rescan to scan the action again and refresh the error dialog.
• Click Cancel to cancel the dialog.
Data Igloo Log File
To view the events logged in the log file, complete the following steps:
1. Go to C:Program FilesFaronicsData Igloo Standard.
2. Double-click Data Igloo.txt.
3. The events are displayed in the log file.
39. Command Line
|39
Data Igloo User Guide
Command Line
Data Igloo has the following command line options.
Syntax:
IGC.exe/[Command]
Argument/Switch:
<username> the username on the computer for the specified user.
<hostname> the Domain name/Host name.
</loc:> the name of the drive or volume. For example, it may be D: (drive) or volume name.
<source> the name of the source folder that is to be redirected.
<target> the target name of the folder.
<location> location in the registry.
<RegKeyPath> the path of the registry key in the registry.
[NTFS] copies the folder permissions to target.
[Share] copies the sharing permissions and properties of the folder to the target.
[d] reverse the action when used with the particular command.
List of commands available in Data Igloo:
Command Description
Faronics_IGS.exe /s /v/qn Silent Install.
Faronics_IGS.exe /s /x /v/qn Silent Uninstall.
h
help
Displays the Help about
all the supported
commands.
ver
version
Displays the version of
Data Igloo Command Line
tool.
GetDFStatus Displays the current
status of Deep Freeze
(Frozen or Thawed).
CheckForUpdate Checks if a new version of
Data Igloo is available.
40. Data Igloo User Guide
40
| Using Data Igloo
Examples
To redirect the user profile for John to E: drive, you can use the following syntax:
IGC.exe /RedirectUP FARONICSjohn /loc:E:user
To redirect the folder C:Documents to E: drive, you can use the following syntax:
IGC.exe /RedirectFolder C:Documents /loc:E:
AutoRedirectUP </loc:><path>
AutoRedirectUP [/d]
A newly created user
profile will be
automatically redirected
to the defined location
and path.
RedirectUP <hostnameusername> </loc:><newpath>
RedirectUP <hostnameusername> </loc:><newpath>
[/NTFS]
RedirectUP <hostnameusername> </loc:><newpath>
[/share]
RedirectUP <hostnameusername> </loc:><newpath>
[/share] [/NTFS]
Redirects user profiles to
the specified location.
RedirectUPDefault <username>
RedirectUPDefault <username> [/NTFS]
RedirectUPDefault <username> [/Share]
RedirectUPDefault <username> [/Share] [/NTFS]
Redirects the specified
user profiles to the default
location.
RedirectFolder <source> </loc:><target>
RedirectFolder <source> </loc:><target> [/NTFS]
RedirectFolder <source> </loc:><target> [/Share]
RedirectFolder <source> </loc:><target> [/NTFS]
[/Share]
RedirectFolder <source> </loc:><target> [/d]
Redirects the specified
folder to a new
destination.
RedirectRegKeyLocation </loc:><location>
RedirectRegKeyLocation [/d]
Sets a Location for all the
subsequent Redirect
RegKey operations.
RedirectRegKey <RegKeyPath>
RedirectRegKey <RegKeyPath> [/d]
Redirects contents of a
specified Registry Key to a
location as defined by the
RedirectRegKeyLocation
command.
Command Description
41. |41
Data Igloo User Guide
Uninstalling Data Igloo
This chapter describes how to uninstall Data Igloo.
Topics
Uninstalling Data Igloo with the Installer
Uninstalling Data Igloo via Add or Remove Programs in Windows
42. Data Igloo User Guide
42
| Uninstalling Data Igloo
Uninstalling Data Igloo with the Installer
Complete the following steps to uninstall Data Igloo:
1. Double-click Faronics_IGS.exe. Click Next.
2. Select Remove. Click Next.
43. Uninstalling Data Igloo with the Installer
|43
Data Igloo User Guide
3. Click Remove.
4. Data Igloo is removed from your computer. Click Finish to complete uninstallation.
44. Data Igloo User Guide
44
| Uninstalling Data Igloo
Uninstalling Data Igloo via Add or Remove Programs in Windows
Complete the following steps to uninstall Data Igloo via Add or Remove Programs in Windows:
1. Click Start>Control Panel>Add or Remove Programs.
2. Select Data Igloo.
3. Click Remove.
45. |45
Data Igloo User Guide
Appendix A Redirecting to Hidden ThawSpaces
ThawSpace is a virtual partition that can be used to store programs, save files, or make permanent
changes. All files stored in the ThawSpace are retained after a restart, even if the computer is
Frozen.
Deep Freeze allows you to create Hidden ThawSpaces. Hidden ThawSpaces are not visible in
Windows Explorer. However, Hidden ThawSpaces can be accessed via Start>Run>[Drive Letter].
To redirect folders to Hidden ThawSpaces, complete the following steps before creating a Folder
Redirection via Data Igloo:
1. Open Deep Freeze Enterprise on the workstation.
2. Go to ThawSpace tab.
3. Select the Visible check box for the Drive Letter that is not currently visible in Windows
Explorer.
4. Click OK.
5. Log off from the computer and log on.
Now, you can perform a Folder Redirection in Data Igloo. After Folder Redirection, you can again
set the ThawSpace as Hidden. Complete the following steps to set the ThawSpace as Hidden.
1. Open Deep Freeze Enterprise on the workstation.
2. Go to ThawSpace tab.
3. Clear the Visible check box for the Drive Letter that is not currently visible in Windows
Explorer.
46. Data Igloo User Guide
46
|Appendix A Redirecting to Hidden ThawSpaces
4. Click OK.
5. Log off from the computer and log on.
47. |47
Data Igloo User Guide
Appendix B Best Practices for Installing Using Imaging
Prequisites: You must know about imaging using Sysprep before running this example. For more
informaiton, refer to http://technet.microsoft.com/en-ca/library/cc766049(v=ws.10).aspx.
Imaging workstations is one of the quickest ways to deploy workstation software and operating
system settings to multiple workstations. Creating specialized image for single computer and
reimaging it is a straightforward process, since it does not require any steps to re-configure the
system. However, in enterprise environments, the master image is intended for deployment on
multiple computers and has to be configured or generalized in order to remove system specific
information, such as computer name, user SID etc. The master image is usually customized with
certain system configuration and installed software. Below is the recommended way of creating
customized master image with Deep Freeze and Data Igloo installed.
1. Using Windows System manager in WindowsAIK, customize the .xml answer file for
unattended Windows installation.
2. Install fresh Windows system on reference computer.
3. Press Ctrl-Shift-F3 to reboot the system into Audit mode before creating user name on freshly
installed system. Alternatively, to create users on master image, finalize Windows installation,
create all required users and reboot system into Audit mode using Windows SysPrep utility.
This will reboot the system into Audit mode, where the system can be further customized.
4. In the Audit mode, perform all required customizations and software installations. This
includes Deep Freeze workstation and Data Igloo. At this point, do not configure Data Igloo to
redirect users, folders and registry.
5. This step is only to configure all the required scripts. Create all required scripting solutions
and configure Windows SysPrep which will runthe unattended installation. Configure scripts
to automatically run on first reboot after deploying the image. The scripts can be configured to
perform drive letter re-assignment as well as scripting using the Data Igloo command line tool
IGC.exe. The scripts can be configured to perform user, folder, and registry redirections. This
will ensure the newly imaged system will automatically perform all required customizations,
which were not possible to make within master image.
6. Set the Clone flag in Deep Freeze workstation configuration. This will ensure Deep Freeze will
startup in Thawed mode on newly imaged system. Therefore, all the customizations will be
permanently retained.
48. Data Igloo User Guide
48
|Appendix B Best Practices for Installing Using Imaging
7. Run the Sysprep utility with Out of the Box experience, Generalize and Shutdown option. This
will generalize the system on reference computer and automatically shut itdown.
8. Capture the image of the reference computer using any disk imaging tool. This will create a
generalized master image, which can be further deployed on multiple computers.
Do not configure Data Igloo before generalizing the reference image since the
Thawed Users and Folders may become inaccessible and it might lead to incorrect
monitoring of Thawed Registries. Redirecting Folders or Registry Keys before
imaging may lead to broken junction links during imaging.
49. |49
Data Igloo User Guide
Appendix C Example User Profile Redirection to a Real Partition
This example explains how to redirect the user John Smith to a real partition using Data Igloo.
If the C: drive is in a Frozen state, the user data is lost on reboot. To ensure that the user data is not
lost, we can use Data Igloo to redirect the user profile to a real partition (say E: drive) that always
remains Thawed.
Complete the following steps to redirect the user profile from C: drive to E: drive:
1. Install Deep Freeze on the computer. Deep Freeze Standard and Deep Freeze Enterprise
(workstation) are both applicable for this example. Ensure that only C: drive stays Frozen.
2. Reboot Thawed.
3. Install Data Igloo.
4. Launch Data Igloo.
In the User Profile Redirection tab, select John Smith. Click Custom Location and Redirect User
Profile.
5. The Source is selected automatically (C:UsersJohn Smith). Click Browse for the target. Copy
NTFS permissions and Copy Share permissions are selected by default.
50. Data Igloo User Guide
50
|Appendix C Example User Profile Redirection to a Real Partition
6. Select the E: drive and click OK.
7. The location of the user profile is now selected. Click Redirect User Profile.
51. Example User Profile Redirection to a Real Partition
|51
Data Igloo User Guide
8. The user profile John Smith is now redirected to E: drive.
To check if the redirection was successful, navigate to E:/John Smith. The contents of the folder
are displayed:
52. Data Igloo User Guide
52
|Appendix C Example User Profile Redirection to a Real Partition
53. |53
Data Igloo User Guide
Appendix D Example Program Redirection to a Real Partition
Bloomberg Professional is installed on C: drive by default. Bloomberg also saves data on the C:
drive. For computers using Deep Freeze where C: drive is in a Frozen state by default, the data is
lost on a reboot. Bloomberg can be installed on a drive other than C: drive (for example, Thawed
drives like D: or E:). If there is a software update, the system files may be retained upon a reboot
since they are installed on a Thawed drive. However, some software updates also update the
registry keys. Since the registry keys are on C: drive, the updates are lost on reboot.
The solution to this problem is to migrate a program to a Thawed partition. Migrating a program
consists of two parts:
• Folder Redirection — to redirect the files for the program to a Thawed drive.
• Registry Key Redirection — to redirect the registry key for the particular program to a
non-Frozen drive.
Complete the following steps to redirect a program (Folder and Registry Key) to a Thawed drive.
1. Install Deep Freeze on the computer. Deep Freeze Standard and Deep Freeze Enterprise
(workstation) are both applicable for this example. Ensure that only C: drive stays Frozen.
2. Reboot Thawed.
3. Install Data Igloo.
4. Install the program that will save data on C: drive. For this example, we have chosen
Bloomberg, a desktop application. Install Bloomberg in its default location. By default it is
installed on c:blp.
54. Data Igloo User Guide
54
|Appendix D Example Program Redirection to a Real Partition
5. Launch Data Igloo and click the Folder Redirection tab.
6. Click Redirect Folder.
55. Example Program Redirection to a Real Partition
|55
Data Igloo User Guide
7. Browse to select C:blp and click OK.
8. The source path is select. Click Browse for target.
9. Browse to select E: drive and click OK.
10. The Target drive is now selected. Copy NTFS permissions and Copy Share permissions are
selected by default. Click Redirect Folder.
56. Data Igloo User Guide
56
|Appendix D Example Program Redirection to a Real Partition
11. The folder redirection is completed.
57. Example Program Redirection to a Real Partition
|57
Data Igloo User Guide
12. Click the Registry Key Redirection tab. Select Redirect registry key changes to and browse to
select E: drive. Click Select Key from Registry.
13. Browse to select HKEY_LOCAL_MACHINESOFTWAREBloomberg L.P. Click Redirect.
58. Data Igloo User Guide
58
|Appendix D Example Program Redirection to a Real Partition
14. The registry keys for Bloomberg is now redirected to E: drive.
Now, Bloomberg is not only able to save data on E: (Thawed drive), but also able to retain
program updates across reboots even when C: drive is Frozen.
59. |59
Data Igloo User Guide
Appendix E Using Data Igloo with Microsoft Security Essentials
When using an Antivirus or an Anti-Malware program, it is necessary to save the virus definitions
on the computer. When the computer is protected by Deep Freeze, the definitions may be lost
during a reboot. In addition to the virus definitions, it is necessary to save the configuration, scan
history and other data relevant to the user. Some Antivirus programs may not allow changing the
folders from C: drive due to their own self-protection mechanisms.
The solution is to create the folders first, redirect them using Data Igloo and then install the
Antivirus program.
The following example provides steps for redirecting the folder and registry keys for Microsoft
Security Essentials using Data Igloo:
1. Reboot workstation into Thawed state.
2. On the computer where MSE is not installed create following new folders, which will be used
by Microsoft Security Essentials:
On all Windows Operating Systems:
C:Program FilesMicrosoft Security Client
On XP systems:
C:Documents & SettingsAll usersApplication dataMicrosoftMicrosoft Security Client
C:Documents & SettingsAll usersApplication dataMicrosoftMicrosoft Antimalware
On Vista and Windows 7 systems:
C:ProgramdataMicrosoftMicrosoft Security Client
C:ProgramdataMicrosoftMicrosoft Antimalware
3. Using Data Igloo folder redirection feature, redirect newly created folders to a Thawed
location. For this example, we are redirecting to E:
For this example, we are using Windows 7 and the following folders need to be redirected to E:
C:Program FilesMicrosoft Security Client
C:ProgramdataMicrosoftMicrosoft Security Client
C:ProgramdataMicrosoftMicrosoft Antimalware
60. Data Igloo User Guide
60
|Appendix E Using Data Igloo with Microsoft Security Essentials
4. Download and install Microsoft Security Essentials. Update the Antivirus and Spyware
definitions.
61. Using Data Igloo with Microsoft Security Essentials
|61
Data Igloo User Guide
5. Using Data Igloo registry redirection feature redirect following registry keys onto a Thawed
location. For this example, we have choosen E: drive.
6. Reboot the workstation into Frozen state.
All new virus and spyware definitions, history of detected items, as well as Microsoft Security
Essentials settings will be retained across reboots. This setup will also allow to retain new version
updates of the Microsoft Security Essentials.
This example is only applicable to Windows XP, Vista and Windows 7. On
Windows 8, Microsoft Security Essentials is built-in as part of Microsoft
Defender.
62. Data Igloo User Guide
62
|Appendix E Using Data Igloo with Microsoft Security Essentials
63. |63
Data Igloo User Guide
Appendix F Redirecting Event Logs using Data Igloo
When using Deep Freeze to protect computers, the Windows Event Logs are lost on reboot. The
Event Logs provide valuable information to IT administrators and may need to be retained.
The solution to this problem is to redirect the registry for Event Logs to a Thawed location using
Data Igloo.
The following example provides steps for redirecting the registry keys for Event Logs using Data
Igloo:
1. Reboot workstation into Thawed state.
2. Using Data Igloo registry redirection feature redirect
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventlog onto a Thawed
location. For this example, we have selected E: drive.
3. Reboot the workstation into Frozen state.
All new Event Logs will now be retained across reboots even when Deep Freeze is in a Frozen state.
To forward Event Logs to a central server if you are running Vista or higher, refer
to http://technet.microsoft.com/en-ca/library/cc748890.aspx.
64. Data Igloo User Guide
64
|Appendix F Redirecting Event Logs using Data Igloo