The document discusses different types of thin clients that can be used to access an InduSoft Web Studio application remotely. It describes the installation, configuration and execution of web thin clients, secure viewer thin clients, and mobile access thin clients. Web thin clients allow remote access via a web browser while secure viewer thin clients use a dedicated viewer application. Both require configuration of the application files, data server, and firewall ports on the application server.
The document provides an overview of the history and development of OAuth standards for authorization. It describes some of the issues with early implementations that prompted the creation of OAuth 1.0, including services storing user passwords and lack of ability to revoke access. OAuth 1.0 introduced signatures to address these issues. OAuth 2.0 replaced signatures with HTTPS and defines common flows for different use cases, including authorization code, implicit, password, and client credentials grants.
The document discusses the history of chocolate production and consumption. It details how chocolate originated from cacao beans grown in Central and South America by the Maya and Aztec civilizations. The Spanish introduced chocolate to Europe in the 16th century, where it became a popular drink among the wealthy classes until the 18th century when methods for making chocolate candy were discovered.
This document discusses Avaya's IP Office communications solutions for small to mid-sized businesses. It provides an overview of the Avaya IP Office product, which is designed for businesses with 10-1,000 users. Key points include:
- The IP Office can scale from a single site up to 1,000 users across 32 sites with the latest R8.1 release.
- It offers flexibility through digital, analog, and SIP trunk support across multiple locations.
- Avaya is promoting the IP Office as a solution not just for small businesses but also for mid-sized enterprises through new software editions and mobility applications.
- New options like the Linux-based server edition and unified communications module allow the IP Office
This document discusses quality enablement and continuous testing practices for modern application development. It outlines how conventional QA involves late engagement, increased costs and cycle times. The proposed solution advocates for defining requirements, acceptance criteria, automated testing, and feedback throughout the development process. This enables continuous value delivery with testing at least every 30 days. Role-tailored tools are recommended to support requirements management, testing, feedback and reporting across the application lifecycle.
The document provides instructions for using the CCPulse+ software to monitor call center performance. It begins with session objectives which are to learn how to log in to CCPulse+, understand the toolbar icons, create and apply templates to objects, create historical views, and apply thresholds and actions. It then covers logging in, the toolbar functions, terminology, creating and applying templates to objects to build workspace views, creating historical views, and setting thresholds and actions. The overall purpose is to teach users how to use CCPulse+ to measure call handling operations and identify trends through a variety of statistics and views.
The document provides an overview of the history and development of OAuth standards for authorization. It describes some of the issues with early implementations that prompted the creation of OAuth 1.0, including services storing user passwords and lack of ability to revoke access. OAuth 1.0 introduced signatures to address these issues. OAuth 2.0 replaced signatures with HTTPS and defines common flows for different use cases, including authorization code, implicit, password, and client credentials grants.
The document discusses the history of chocolate production and consumption. It details how chocolate originated from cacao beans grown in Central and South America by the Maya and Aztec civilizations. The Spanish introduced chocolate to Europe in the 16th century, where it became a popular drink among the wealthy classes until the 18th century when methods for making chocolate candy were discovered.
This document discusses Avaya's IP Office communications solutions for small to mid-sized businesses. It provides an overview of the Avaya IP Office product, which is designed for businesses with 10-1,000 users. Key points include:
- The IP Office can scale from a single site up to 1,000 users across 32 sites with the latest R8.1 release.
- It offers flexibility through digital, analog, and SIP trunk support across multiple locations.
- Avaya is promoting the IP Office as a solution not just for small businesses but also for mid-sized enterprises through new software editions and mobility applications.
- New options like the Linux-based server edition and unified communications module allow the IP Office
This document discusses quality enablement and continuous testing practices for modern application development. It outlines how conventional QA involves late engagement, increased costs and cycle times. The proposed solution advocates for defining requirements, acceptance criteria, automated testing, and feedback throughout the development process. This enables continuous value delivery with testing at least every 30 days. Role-tailored tools are recommended to support requirements management, testing, feedback and reporting across the application lifecycle.
The document provides instructions for using the CCPulse+ software to monitor call center performance. It begins with session objectives which are to learn how to log in to CCPulse+, understand the toolbar icons, create and apply templates to objects, create historical views, and apply thresholds and actions. It then covers logging in, the toolbar functions, terminology, creating and applying templates to objects to build workspace views, creating historical views, and setting thresholds and actions. The overall purpose is to teach users how to use CCPulse+ to measure call handling operations and identify trends through a variety of statistics and views.
Penetration testing is set of system through which security system is checked to find out how it works during the time of threats. By this all the lope holes are taken out and are sorted out for better performance of the system in preventing hacking.
The document outlines an agenda for an Aruba Networks workshop on advanced ClearPass network security. The agenda includes sections on using ClearPass for wired and wireless network access control (NAC), TACACS+ device authentication, and bringing your own device (BYOD) integration using Onboard for certificate provisioning. Monitoring and troubleshooting ClearPass deployments is also discussed.
The slides from the talk I gave in Java.IL's Apr 2019 session.
These slides describe Keycloak, OAuth 2.0, OpenID and SparkBeyond's integration with Keycloak
Gloo is a Envoy Proxy based API Gateway that connects, secures and controls the traffic across legacy monoliths, microservices and serverless applications.
Attend this session for:
- An overview of Gloo's control plane architecture
- The latest enhancements
- Use cases for modern API Gateways
Learn More:
* About Gloo - https://solo.io/products/gloo
* Join the Community - https://slack.solo.io
* Docs - https://docs.solo.io/gloo/latest/
* Watch the Replay - https://www.youtube.com/playlist?list=PLBOtlFtGznBgy9f1fc9MTh48jq-uR0dA2
ClearPass Guest is a solution for secure guest access networks that addresses three key challenges: 1) non-secure access, 2) manual intervention required for credential provisioning, and 3) separate point solutions for management and enforcement. It provides automated workflows for credential distribution, a single portal for WiFi and wired access, and centralized policy management. ClearPass Guest automates guest access provisioning and enables secure and customizable guest networking solutions for environments like retail stores, hospitals, and public venues.
Running ModSecurity with the OWASP ModSecurity Core Rules is hard. A huge wave of false positives drowns sysadmins and logfile servers alike. The upcoming 3.0.0 release of the Core Rules comes with a new paranoia mode. This feature organises the various rules in different paranoia levels. The higher the paranoia level, the more paranoid the rules and the more false positives you will get. However, the default installation gives you a decent security level without too many false positives. This allows for a straight forward ModSecurity setup which is not threatening an existing productive service. Instead you start with a limited set of rules and then you raise the paranoia level step by step to the number that suits the desired security level of your site. In this talk, we will look at the configuration of the paranoia mode. We will look at rules and we will look at ModSecurity defending against popular attack kits at various paranoia levels
The Coupa Organic Platform from A to Z: Maximizing the ValueCoupa Software
The document outlines an agenda for a presentation on the Coupa Organic Platform. It includes a welcome, video, introductions, overview of the platform, product demo, and Q&A. The presentation highlights actual customer savings ranging from $1.8 million to over $30 million after implementing the Coupa solution. It also provides examples of large companies like Juniper, Sanofi, and General Atlantic that achieved global rollouts and saw benefits such as accelerated processing times and cost savings.
WSO2 Enterprise Integrator is an open source integration platform that allows developers to quickly integrate applications, data, and systems in an iterative manner. It provides out-of-the-box capabilities for service integration, data integration, business process execution, tooling for development and debugging, and analytics for monitoring integrations. It supports common integration patterns and a variety of connectivity options and standards to connect diverse systems. The platform can be deployed in various architectures for availability, scalability, and continuous integration/delivery.
These slides are supposed to help you understand the basics of application security, and how the latest technologies come together to enable you to reduce the number of times people at your organization need to authenticate.
For more information visit. http://gluu.org
The document discusses various techniques for exploiting out-of-band SQL injections in MySQL, including using the LOAD_FILE, LOAD_DATA, and SELECT...INTO OUTFILE functions to retrieve files from the database server or operating system. It also covers using the FEDERATED and CONNECT storage engines to execute queries against remote databases.
The document discusses various integration solution patterns including enterprise integration patterns (EIPs), implementation of EIPs using WSO2 Enterprise Service Bus (ESB), and high-level integration patterns like API gateway, service broker, and dual channeling. It describes how functional components of WSO2 ESB like mediators and sequences can be used to implement EIPs. Overall it provides an overview of best practices, approaches and strategies for designing integration solutions using patterns.
1. Intro - Auth - Authentication & Authorization & SSO
2. OAuth2 in Depth
3. Where does JWT fit in ?
4. How to do stateless Authorization using OAUTH2 & JWT ?
5. Some Sample Code ? How easy is it to implement ?
This document discusses authentication and authorization frameworks like OAuth and OpenID Connect. It provides an overview of key concepts like authentication, authorization, roles in OAuth like resource owner, client, authorization server and resource server. It explains the authorization code grant flow in OAuth and how OpenID Connect builds upon OAuth to provide identity features. It also compares OpenID Connect to SAML and discusses Microsoft and TechCello implementations of these specifications.
This document discusses API gateways as a solution for challenges that arise in microservices architectures. It describes how a monolithic architecture can become complex as services grow quickly. In a microservices architecture, clients could communicate directly with each service but this introduces problems around endpoint management, multiple requests, and refactoring difficulties. An API gateway provides a single entry point, routes requests to appropriate services, and aggregates results to address these issues. It then demonstrates Netflix Zuul, an open source API gateway, and provides a demo of its use with Eureka service discovery and routing between hello and goodbye microservices.
O documento descreve o Sistema de Cadastro para Comércio Informal (SCCI) que tem como objetivo organizar o comércio informal e possibilitar a cobrança de impostos. O SCCI cadastrará comerciantes informais, locais de venda, usuários do sistema e produtos comercializados. O sistema emitirá relatórios para controle e arrecadação.
The document describes the FIDO2 specification which includes WebAuthn and CTAP. WebAuthn introduces a new JavaScript API for browser-based authentication and CTAP introduces a new API for platform-based authentication. It provides an overview of the registration and authentication flows including the use of public key credentials on servers to authenticate users. It also describes extensions, attestations, credential management and the goals of convenience and strong security in the FIDO standards.
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO Alliance
The PSD2 (the Revised Payment Service Directive) from the European Commission requires financial institutions to deploy Strong Customer Authentication. FIDO offers a solution to the challenges created by this new regulation.
Introduction to InduSoft Web Studio 8.0 + SP1AVEVA
InduSoft Web Studio is a truly unique development and runtime software that incorporates all the tools users need to create SCADA HMI applications, dashboards and OEE interfaces.
InduSoft Web Studio v7.1 + SP3 Best PracticesAVEVA
System integrators are tasked with meeting strict requirements for projects, and may need to develop value-added functionality for their solutions. HMI software platforms like InduSoft Web Studio can provide the framework for customer solutions, and InduSoft has made it a priority to support system integrators who use InduSoft Web Studio. Join us for a webinar in which we discuss best practices for system integrators. We will be offering advice for developing projects and efficiently, and share some of the benefits of the InduSoft Certified System Integrator program.
Penetration testing is set of system through which security system is checked to find out how it works during the time of threats. By this all the lope holes are taken out and are sorted out for better performance of the system in preventing hacking.
The document outlines an agenda for an Aruba Networks workshop on advanced ClearPass network security. The agenda includes sections on using ClearPass for wired and wireless network access control (NAC), TACACS+ device authentication, and bringing your own device (BYOD) integration using Onboard for certificate provisioning. Monitoring and troubleshooting ClearPass deployments is also discussed.
The slides from the talk I gave in Java.IL's Apr 2019 session.
These slides describe Keycloak, OAuth 2.0, OpenID and SparkBeyond's integration with Keycloak
Gloo is a Envoy Proxy based API Gateway that connects, secures and controls the traffic across legacy monoliths, microservices and serverless applications.
Attend this session for:
- An overview of Gloo's control plane architecture
- The latest enhancements
- Use cases for modern API Gateways
Learn More:
* About Gloo - https://solo.io/products/gloo
* Join the Community - https://slack.solo.io
* Docs - https://docs.solo.io/gloo/latest/
* Watch the Replay - https://www.youtube.com/playlist?list=PLBOtlFtGznBgy9f1fc9MTh48jq-uR0dA2
ClearPass Guest is a solution for secure guest access networks that addresses three key challenges: 1) non-secure access, 2) manual intervention required for credential provisioning, and 3) separate point solutions for management and enforcement. It provides automated workflows for credential distribution, a single portal for WiFi and wired access, and centralized policy management. ClearPass Guest automates guest access provisioning and enables secure and customizable guest networking solutions for environments like retail stores, hospitals, and public venues.
Running ModSecurity with the OWASP ModSecurity Core Rules is hard. A huge wave of false positives drowns sysadmins and logfile servers alike. The upcoming 3.0.0 release of the Core Rules comes with a new paranoia mode. This feature organises the various rules in different paranoia levels. The higher the paranoia level, the more paranoid the rules and the more false positives you will get. However, the default installation gives you a decent security level without too many false positives. This allows for a straight forward ModSecurity setup which is not threatening an existing productive service. Instead you start with a limited set of rules and then you raise the paranoia level step by step to the number that suits the desired security level of your site. In this talk, we will look at the configuration of the paranoia mode. We will look at rules and we will look at ModSecurity defending against popular attack kits at various paranoia levels
The Coupa Organic Platform from A to Z: Maximizing the ValueCoupa Software
The document outlines an agenda for a presentation on the Coupa Organic Platform. It includes a welcome, video, introductions, overview of the platform, product demo, and Q&A. The presentation highlights actual customer savings ranging from $1.8 million to over $30 million after implementing the Coupa solution. It also provides examples of large companies like Juniper, Sanofi, and General Atlantic that achieved global rollouts and saw benefits such as accelerated processing times and cost savings.
WSO2 Enterprise Integrator is an open source integration platform that allows developers to quickly integrate applications, data, and systems in an iterative manner. It provides out-of-the-box capabilities for service integration, data integration, business process execution, tooling for development and debugging, and analytics for monitoring integrations. It supports common integration patterns and a variety of connectivity options and standards to connect diverse systems. The platform can be deployed in various architectures for availability, scalability, and continuous integration/delivery.
These slides are supposed to help you understand the basics of application security, and how the latest technologies come together to enable you to reduce the number of times people at your organization need to authenticate.
For more information visit. http://gluu.org
The document discusses various techniques for exploiting out-of-band SQL injections in MySQL, including using the LOAD_FILE, LOAD_DATA, and SELECT...INTO OUTFILE functions to retrieve files from the database server or operating system. It also covers using the FEDERATED and CONNECT storage engines to execute queries against remote databases.
The document discusses various integration solution patterns including enterprise integration patterns (EIPs), implementation of EIPs using WSO2 Enterprise Service Bus (ESB), and high-level integration patterns like API gateway, service broker, and dual channeling. It describes how functional components of WSO2 ESB like mediators and sequences can be used to implement EIPs. Overall it provides an overview of best practices, approaches and strategies for designing integration solutions using patterns.
1. Intro - Auth - Authentication & Authorization & SSO
2. OAuth2 in Depth
3. Where does JWT fit in ?
4. How to do stateless Authorization using OAUTH2 & JWT ?
5. Some Sample Code ? How easy is it to implement ?
This document discusses authentication and authorization frameworks like OAuth and OpenID Connect. It provides an overview of key concepts like authentication, authorization, roles in OAuth like resource owner, client, authorization server and resource server. It explains the authorization code grant flow in OAuth and how OpenID Connect builds upon OAuth to provide identity features. It also compares OpenID Connect to SAML and discusses Microsoft and TechCello implementations of these specifications.
This document discusses API gateways as a solution for challenges that arise in microservices architectures. It describes how a monolithic architecture can become complex as services grow quickly. In a microservices architecture, clients could communicate directly with each service but this introduces problems around endpoint management, multiple requests, and refactoring difficulties. An API gateway provides a single entry point, routes requests to appropriate services, and aggregates results to address these issues. It then demonstrates Netflix Zuul, an open source API gateway, and provides a demo of its use with Eureka service discovery and routing between hello and goodbye microservices.
O documento descreve o Sistema de Cadastro para Comércio Informal (SCCI) que tem como objetivo organizar o comércio informal e possibilitar a cobrança de impostos. O SCCI cadastrará comerciantes informais, locais de venda, usuários do sistema e produtos comercializados. O sistema emitirá relatórios para controle e arrecadação.
The document describes the FIDO2 specification which includes WebAuthn and CTAP. WebAuthn introduces a new JavaScript API for browser-based authentication and CTAP introduces a new API for platform-based authentication. It provides an overview of the registration and authentication flows including the use of public key credentials on servers to authenticate users. It also describes extensions, attestations, credential management and the goals of convenience and strong security in the FIDO standards.
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO Alliance
The PSD2 (the Revised Payment Service Directive) from the European Commission requires financial institutions to deploy Strong Customer Authentication. FIDO offers a solution to the challenges created by this new regulation.
Introduction to InduSoft Web Studio 8.0 + SP1AVEVA
InduSoft Web Studio is a truly unique development and runtime software that incorporates all the tools users need to create SCADA HMI applications, dashboards and OEE interfaces.
InduSoft Web Studio v7.1 + SP3 Best PracticesAVEVA
System integrators are tasked with meeting strict requirements for projects, and may need to develop value-added functionality for their solutions. HMI software platforms like InduSoft Web Studio can provide the framework for customer solutions, and InduSoft has made it a priority to support system integrators who use InduSoft Web Studio. Join us for a webinar in which we discuss best practices for system integrators. We will be offering advice for developing projects and efficiently, and share some of the benefits of the InduSoft Certified System Integrator program.
Thin clients are a server-centric computing model where the application software, data, and processing power are located on a central server rather than individual client devices. Thin clients access these centralized resources over a network, requiring only basic functionality locally. This allows for easier management, higher security since data is not stored locally, and lower costs since the clients have fewer components and upgrades are server-based.
OppiaMobile Learning Platform - TelSpain Nov 2013Alex Little
The document describes OppiaMobile, an open-source mobile learning platform designed to supplement existing health worker training programs in developing countries. It allows training materials like videos and quizzes to be accessed offline on mobile devices. The platform is being used in Ethiopia to provide continuing education to under-trained health workers and allow their progress to be tracked. It is customizable so other organizations can use it for their own mobile learning needs.
El documento describe un thin client llamado Dell OptiPlex FX160. Un thin client es un dispositivo de computación ligero que depende principalmente de un servidor central para procesamiento y almacenamiento. El FX160 se conecta a un servidor central para obtener programas y datos. Viene con un sistema operativo integrado y procesadores Intel Atom de bajo consumo. Ofrece puertos como USB, Ethernet, VGA y DVI.
A Special Introduction to the Upcoming InduSoft Web Studio 8.0AVEVA
InduSoft Web Studio v8.0 introduces several new features including support for multiple document interfaces on mobile devices, an IoTView platform agnostic runtime, OPC redundancy, and collaboration server integration with Microsoft Team Foundation Server. Upcoming enhancements will provide additional functionality to mobile thin clients, platform-agnostic runtime editions, cloud-based historian integration, and continued improvements to security, performance, and reliability. The presentation provided an overview of new and upcoming features for InduSoft Web Studio v8.0 and beyond.
InduSoft Web Studio is a truly unique development and runtime software that incorporates all the tools users need to create SCADA HMI applications, dashboards and OEE interfaces.
This document discusses thin client technology. It defines a thin client as a low-cost computing device that works in an application server environment and does not require powerful local processors or storage. A thin client network allows users to access applications, files, and other resources stored on centralized servers. Setting up a thin client system requires server hardware, terminal services software from Microsoft or Citrix, and low-powered thin client devices. Thin clients offer advantages over traditional PCs such as lower total cost of ownership and easier management and security. However, they may have disadvantages for multimedia or software that requires local processing power.
What is New in Wonderware InduSoft Web Studio 8.0+SP1+Patch 1AVEVA
The document describes new features and enhancements in several versions of InduSoft Web Studio. Some key highlights include:
- Screen gestures and zoom modes for touchscreens.
- Global find/replace for tags and text throughout projects. Support for custom widgets, MATH tasks, and database functions on IoTView.
- Support for trend controls and custom widgets on mobile devices via HTML5. Import tool to migrate FactoryTalk applications.
- Native OPC redundancy, enhanced symbols, and integration with Team Foundation Server for application lifecycle management.
- Support for Windows 10, scripting on mobile clients, and multi-touch interfaces. Dynamic configuration through tags database functions.
Thin clients are computer programs that rely heavily on a server to fulfill computational roles rather than performing these roles independently like traditional fat clients. Thin clients have their roots in terminals used to access mainframe computers and evolved into graphical user interfaces powered by X server software running on the client. Thin client infrastructures allow computations to be shared across multiple clients connected to a single server, amortizing computing power for improved efficiency.
Saratoga CRM: Implementing Thin Client at Johnson Controls Inc.Aptean
Whether you're a small shop or a large enterprise, you'll find it worthwhile to hear about the 2800-user deployment of Saratoga Thin Client across JCI and gain firsthand insights into the lessons learned by two of the project leaders.
Thin client server capacity planning for sm esLimesh Parekh
Contact us if you need any help. www.ens.net.in
Using Thin Clients and still confused about Server Capacity Planning ?
Here we have complete Server Capacity Planning guidelines for SMEs.
The Good, the bad, and the ugly of Thin Client/Server ComputingThe Integral Worm
This presentation discusses the features, benefits, advantages and disadvantages of using Thin Client/Server technology as an IT Security strategy. The full discussion of Thin Client/Server technology as a security solution may be found at http://www.theintegralworm.com/security.html .
Thin client computing moves user data and applications from desktop computers to centralized servers in professionally managed data centers. This reduces the total cost of ownership for IT infrastructure. A thin client is a simple user interface device that accesses computational services over a network from a server. Key enabling technologies are remote display protocols that allow graphical displays to be served across the network to thin clients. Thin clients are more secure and easier to manage than traditional desktop computers since the server consolidates resources and access points.
The document outlines the six phases of building an expert system:
1) Project initialization which includes problem definition, needs assessment, and feasibility analysis.
2) System analysis and design including conceptual design, development strategy, and computing resources.
3) Rapid prototyping to test knowledge representation and system structure.
4) System development including knowledge base construction, testing, and improvements.
5) Implementation involving user acceptance testing, training, and deployment.
6) Post-implementation including maintenance, evaluation, and upgrades.
Thin client computing involves using low-cost thin client terminals instead of traditional PCs. Thin clients have minimal local hardware and rely on a centralized server for processing and data storage. This reduces costs associated with hardware, maintenance, power consumption and IT staff. The main components are thin client terminals, thin client software, network connectivity and a server. Common protocols used include RDP, ICA and X11. Thin clients provide advantages like lower TCO, simplified management and security, but may impact performance for multimedia or graphics-heavy applications.
Artificial Intelligence: The Nine Phases of the Expert System Development Lif...The Integral Worm
This presentation is an introduction to Artificial Intelligence: The Nine Phases of the Expert System Development Lifecycle (ESDLC). Topics covered are the following: problem identification phase, feasibility study phase, project planning phase, knowledge acquisition phase, knowledge representation phase, knowledge implementation phase, verification and validation, installation/transition/ training, operation/evaluation/maintenance.
The document summarizes different thin client solutions for accessing InduSoft Web Studio applications remotely, including web thin clients using Internet Explorer, secure viewer thin clients, and mobile access thin clients for tablets and smartphones. It covers configuring the InduSoft project, web server, firewall, and other settings to support remote thin clients. The agenda also lists common issues troubleshooting remote thin client connections and contact information for InduSoft support.
A web server is software that responds to requests from web browsers to serve web pages. It is part of a multi-tier architecture with an information tier (database), middle tier (application logic), and client tier (user interface). The most common protocol for communication between clients and servers is HTTP, with the server responding to GET and POST requests with web pages or other responses. Popular web server software includes Apache, IIS, and Tomcat.
This document provides an overview of Microsoft Internet Information Services (IIS) and how to install and configure it. IIS allows users to set up a web server and publish HTML documents to make them available on the web. It also provides an FTP service to transfer files over TCP/IP networks. The document discusses installing IIS, configuring basic settings like the home directory and default documents, and demonstrates testing an FTP site and web site by uploading and viewing files.
Web Technology – Web Server Setup : Chris Uriartewebhostingguy
This document provides an overview and introduction to a course on setting up a web server. It discusses the course goals of teaching students how to install, configure, and administer a web server to deliver dynamic content. It also covers topics like the history of the world wide web, roles of webmasters, how the internet works, options for hosting a web server, and different web server software.
Web Servers, Browsers, Server - Browser Interaction, Web Surfingwebhostingguy
The document discusses web servers, browsers, and their interaction. It describes how web servers store web pages and other content and make it accessible on the internet using HTTP. Web browsers allow users to view and interact with this content by sending requests to and receiving responses from web servers. When a user enters a URL in their browser, it generates a request to the server, which returns the requested content which is then displayed in the browser.
Web Services and Devices Profile for Web Services (DPWS)Jorgen Thelin
The document discusses Web Services and how they can be applied to devices using the Device Profile for Web Services. It describes how WS specifications can be scaled down to work on limited resource devices. The Device Profile defines a lightweight subset of WS specs for device communication and includes security, discovery, and other protocols. Microsoft's implementations in Windows Vista and .NET support these standards for printer, scanner, and other device integration.
This document discusses an application layer chapter that covers:
- Principles of network applications like the client-server and peer-to-peer paradigms
- Popular application layer protocols including HTTP, SMTP, DNS, and video streaming
- How applications use transport layer protocols like TCP and UDP based on their reliability, throughput, and timing requirements
- Socket programming and how processes communicate over the network
The document discusses web servers, proxy servers, server logs, and network security. It provides details about Apache and Squid servers, how they work, and sample logs. It also covers topics like firewalls, IDS/IPS, antivirus software, malware threats, and configuring a VPN to update a university website.
The document discusses web servers, proxy servers, server logs, and network security. It provides details about Apache and Squid servers, how they work, and sample logs. It also covers Linux commands, network devices, and threats like viruses, worms, and trojans. Network security methods like firewalls, IDS, antivirus software and their role in securing networks is explained.
This document discusses an application layer chapter that covers several topics:
- It provides an overview of application layer protocols including HTTP, email, DNS, peer-to-peer applications, and socket programming.
- It explains the client-server and peer-to-peer paradigms for network applications. Processes communicate by exchanging messages over sockets.
- It introduces HTTP and the web client-server model, where clients make requests and servers send responses. HTTP uses TCP for reliable data transfer.
Computer network network edge and networkrjnavallasca
This document discusses an application layer chapter that covers key concepts like the client-server and peer-to-peer paradigms, application layer protocols, and transport layer services. It specifically focuses on HTTP as the main application layer protocol for the web, describing its request and response message formats, use of TCP for reliable data transfer, and differences between non-persistent and persistent connections.
InduSoft Web Studio and DCS Conversion and Integration WebinarAVEVA
Established in 1997, InduSoft is a pioneer in HMI/SCADA software, being the first to offer solutions for Windows CE and integrate web functionality. It offers mobile access, web-based interfaces, and connectivity to various databases and industrial protocols. InduSoft has received certifications and awards, and its software provides redundancy, data exchange, alarm handling, and deployment across Windows operating systems.
Web servers – features, installation and configurationwebhostingguy
A web server is a computer program and server that allows for hosting of websites and web applications. It accepts requests from browsers and returns HTML documents and other content. Common technologies used on web servers include CGI scripts, SSL security, and ASP to provide dynamic content and server-side processing. Web servers work by accepting connections from browsers, retrieving content from disk, running local programs, and transmitting data back to clients as quickly as possible while supporting threads and processes.
This document outlines deploying IBM Notes in VMware View and Microsoft RemoteApp environments. It discusses the benefits of each approach and provides an overview of the infrastructure required. It also provides guidance on installing Notes clients and tips for ensuring optimal performance on both platforms. VMware View allows full virtualized workstations on zero clients, while RemoteApp streams individual applications. The document aims to help administrators deliver the Notes client while reducing support overhead and infrastructure complexity.
Presentation on Datasmith's Pigeon Voice middleware server for enabling integrations between Vocollect voice applications and a WMS (Warehouse Management System).
This document provides an overview of Microsoft's Azure cloud services platform. It discusses key Azure capabilities and services including compute, storage, SQL Azure database, service bus, and access control. Azure provides scalable infrastructure and platform services that allow developers to build and host applications in the cloud using familiar .NET tools. The document also demonstrates a sample grid computing application built on Azure and highlights reasons to consider cloud computing such as reducing costs, improving scalability, and reducing IT overhead.
Module 2: Application layer
Principles of network applications, Web and HTTP, File transfer protocol, Electronic mail, Domain name system, DDNS, SSH, SNMP ,Internet Applications.
This document provides an introduction to web application development, including the history of the World Wide Web and how it works. It describes the basics of web clients and servers, URLs, HTML, and how communication is established over the internet. It then distinguishes between static and dynamic web pages, and discusses client-side scripting like JavaScript and Java applets as well as server-side scripting using languages like PHP, ASP, and JSP to generate dynamic web content. Finally, it lists some common web development tools.
This document provides an overview of key considerations for planning a new web application. It discusses infrastructure needs and whether an existing network can support additional load. It also covers choices for web technologies including servers, markup languages, programming approaches, design tools, security measures, and presentation elements like navigation and multimedia. The planning process involves assessing existing resources and choosing appropriate technologies to build the application.
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAAVEVA
This document describes new and advanced features in InduSoft Web Studio v8.1+SP5. It includes enhancements to Mobile Access thin clients like support for images on buttons and navigation improvements. It also details improvements to the OPC UA client like better reliability and scalability. The document outlines security system enhancements for LDAP as well as improvements to debugging tools and cybersecurity features.
The document describes new and advanced features in InduSoft Web Studio version 8.1 and later. Key features include enhanced support for HTML5 thin clients like improved alarm handling and animations. It also details improved security options, expanded platform support, and new custom widgets. Tag integration for OPC servers and enhanced database connectivity for IoT applications are highlighted as well.
Introduction to InduSoft Web Studio 8.1 + SP5AVEVA
InduSoft Web Studio is an HMI/SCADA software established in 1997. It has a customer-focused culture and was a pioneer in developing solutions for various operating systems. It has worldwide offices and supports many industries. The software uses an open-standard architecture and allows users to develop a project once and deploy it on multiple devices and operating systems. It offers flexibility, security, and integration capabilities.
The document describes new and advanced features in InduSoft Web Studio v8.1+SP3. It includes the HTML5 Remote Database Spy, which allows monitoring and setting tags remotely from any HTML5 browser. It also includes tag integration for OPC UA and OPC DA servers to browse and import tags without typing. Enhanced animations are supported on mobile access thin clients for alarms, grids, trends, buttons and other objects.
Introduction to InduSoft Web Studio 8.1 + SP3AVEVA
InduSoft Web Studio is an HMI/SCADA software established in 1997 that has pioneered many technologies. It has a customer-focused culture and is part of AVEVA. It has worldwide offices and supports many protocols and platforms, providing solutions for various industries. It offers choice through its licensing and supports developers and OEMs through its flexible architecture and investment protection.
Introduction to InduSoft Web Studio 8.1 + SP2AVEVA
InduSoft Web Studio is an HMI/SCADA software established in 1997 that is used across various industries. It provides a single development environment to design applications that can be deployed on multiple platforms including Windows, Linux, and embedded systems. InduSoft has worldwide offices and supports over 250 communication protocols and databases to provide interoperability across systems.
The document describes new and advanced features of InduSoft Web Studio software. Key features include enhanced mobile access that allows faster switching between screens, encrypted communication for improved cybersecurity, native mobile apps for iOS and Android, a remote support tool, and integration with Schneider Electric and Wonderware systems. It also lists new custom widgets, tag integration support for additional PLCs, and a simplified licensing model.
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...AVEVA
Do you need to improve how quickly and accurately you can address abnormal situations before they impact operations? Join us for a Webinar this May to learn how to do just that with WIN-911’s software. By pairing WIN-911 with SCADA/HMI software it’s possible to filter on specific alarms and enable instant notification (via Smartphone App, Voice Calls, SMS/Text and Email) to specific users so they can react quickly to those alarms most critical to your process. In this webinar we will learn more about WIN-911, how it is integrated with InduSoft Web Studio, and how you can use both to create smart HMI/SCADA applications that allow you to react quickly to alarms.
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...AVEVA
Do you need to improve how quickly and accurately you can address abnormal situations before they impact operations? Join us for a Webinar this May to learn how to do just that with WIN-911’s software. By pairing WIN-911 with SCADA/HMI software it’s possible to filter on specific alarms and enable instant notification (via Smartphone App, Voice Calls, SMS/Text and Email) to specific users so they can react quickly to those alarms most critical to your process. In this webinar we will learn more about WIN-911, how it is integrated with InduSoft Web Studio, and how you can use both to create smart HMI/SCADA applications that allow you to react quickly to alarms.
Introduction to InduSoft Web Studio 8.1 + Service Pack 1AVEVA
This month’s webinar will explore the new features of the first service pack for InduSoft Web Studio 8.1. SP1 includes new features and tools, and adds many internal enhancements to improve the performance of InduSoft Web Studio. In this webinar we’ll cover some of the enhancements and provide an overview of InduSoft Web Studio 8.1 + SP1.
The document discusses new features in recent versions of InduSoft Web Studio including:
- Support for screen gestures like swiping on touch screens to navigate between screens.
- Multiple zoom modes for Studio Mobile Access thin clients to provide compatibility with previous versions.
- Global text-based find and replace capability for improved productivity when developing, maintaining and troubleshooting applications.
- Support for executing custom logic and built-in functions on IoTView to manipulate and transform data before presentation.
Introduction to InduSoft Web Studio 8.1 + SP1AVEVA
InduSoft is a software company established in 1997 in the US that is now part of AVEVA. It develops the InduSoft Web Studio HMI/SCADA and IoT platform for use across various operating systems and devices. The software offers open connectivity, mobility, portability, and security through its modular architecture and templates for different industries. It provides comprehensive tools to build solutions for data collection, visualization, control, and integration across industrial automation applications and enterprises.
Security and LDAP integration in InduSoft Web StudioAVEVA
With cybersecurity threat vectors increasing and attacks on industrial control systems on the rise, it’s more important than ever to take proper safety precautions when developing HMI or SCADA applications. In this webinar, we’ll go over how your application can be integrated with LDAP, and some best practices for developing more secure SCADA/HMI systems.
Graphical Interface Scaling in InduSoft Web StudioAVEVA
Graphical interface scaling or Screen Scaling in InduSoft Web Studio is a set of capabilities that allow you to alter the aspect ratio and size of your screens dynamically. In this webinar, we will discuss why it can sometimes be very important to scale your screen, go over aspect ratios, and discuss screen and project resolutions. Once we’ve covered the basics of screen scaling, we will go over various ways of implementing these capabilities in InduSoft Web Studio, and even how you can extend your application to multiple screens.
InduSoft Web Studio® is a powerful collection of automation tools that include all the building blocks needed to develop human machine interfaces (HMIs), SCADA systems, OEE/Dashboards, embedded applications, and IIoT solutions.
InduSoft Web Studio is HMI/SCADA software established in 1997 that has pioneered various technologies. It has a customer-focused culture and is part of Schneider Electric. The document discusses InduSoft's global presence, support for multiple operating systems and devices, integration capabilities, templates for industries, and licensing options to provide flexibility.
InduSoft Web Studio version 8.1 is coming in the first week of November. For this webinar, we’ll be exploring some of the exciting new additions to InduSoft Web Studio, as well as cover a few great features from recent updates you may have missed. Join us for a live demonstration of InduSoft Web Studio 8.1 and a look at some of the new tools and functionalities.
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...AVEVA
The document discusses migrating from OPC Classic to OPC UA. It provides an overview of the OPC Foundation's mission to create interoperability standards and describes how OPC UA was developed to unify existing OPC specifications, provide platform independence and security, and enable more use cases compared to OPC Classic. OPC UA supports open connectivity, preserves data context through information models, and has built-in security features to ensure safe communication.
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...AVEVA
This document provides an overview and summary of OPC UA for industrial IoT applications. It begins with an agenda for the presentation and introduces InduSoft Web Studio as a platform for data communication, manipulation, and presentation. It then discusses interoperability, mobility, and portability enabled by InduSoft's open architecture. The document reviews InduSoft's internal architecture and connectivity options. It defines industrial IoT (IIoT) and provides examples of IoT in commercial applications. It introduces InduSoft's IoTView solution for portability across platforms and hosts. Finally, it discusses OPC UA standards for interoperability, security, and platform independence in industrial automation.
Tips and Tricks for InduSoft Web Studio-August 2017AVEVA
For this month’s webinar InduSoft would like to showcase some of the tips and tricks for using the software that you may not know, or might need a refresher on. This month we’ll be exploring things like adding images to linked symbols. Got requests for tips and tricks you’d like to see? Let us know in the registration survey, and we’ll try to include them if possible.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
4. Server Thin Client
Installation
Software License Not required
Product (IWS) Not required
Application Files Not required
Execution
Graphical Interface
Background Tasks No
Communication Tasks No
5.
6. Web Thin Client
The user access the application from an Internet Explorer Web Browser.
Ideal for multi-purpose stations (e.g.: Manager’s computer).
Secure Viewer Thin Client
The user access the application from any computer with another
instance of the Viewer. Ideal for operator stations or dual-monitor.
Mobile Access (MA) Thin Client
The user access the application from any browser that supports HTML5.
Ideal for mobile devices, such as tablets and smartphones.
Mobile Access (MA) Thin Client “Tabular”
The user access the application from any browser. Ideal for legacy
mobile devices with web browsing capabilities.
7. Web Thin Client
Web Thin Clients
Server
(Indusoft Web Studio)
9. MA Thin Client (HTML5)
New
MA Thin Client (HTML5)
MA “Tabular” Thin Client (HTML1)
10. MA Thin Client (HTML5)
MA Thin Clients
Server
(Indusoft Web Studio)
11. MA “Tabular” Thin Client
SMA “Tabular”
Thin Clients
Server
(Indusoft Web Studio)
12. Server Thin Client
File Server Application Files
(e.g.: screen files,
(e.g.: File System, Web Server) tags lists, etc) Thin Client
Component(s)
Data Server Online / History
(e.g.: Plug-In, Web Browser)
Information
(e.g.: tag values,
TCP/IP Server trend history, etc )
13. Server Thin Client
File Server TCP Port HTTP/HTTPS
Microsoft Web 80/443 over TCP/IP
Server (IIS) Thin Client
Web Tunneling Component(s)
Gateway
TCP Port 1234 (e.g.: Plug-In, Web
Browser)
Data Server TCP Port InduSoft protocol
TCP/IP Server 1234 over TCP/IP
14. Server Local
Tag value IS shared among all Tag value is NOT shared among any
stations (Servers and Thin Clients) stations (Servers and Thin Clients)
Example: Tank Level, Valve State, Example: Current User, Alarm Filter
Production Counter, etc. Period, Report Name, etc.
16. Typical architectures
Web Thin Client
Cloud-based MA Thin Client
Server Web Thin Client
MA Thin Client
Local HMI
Secure Viewer
Thin Client
Controller + I/O
(e.g.: PLC)
17.
18. Installation, Configuration, Execution
Web Thin Client
System File Server
Web Thin Client Server (IIS)
Web Tunneling Gateway
Redundancy
Secure Viewer Thin Client
System File Server
Web Thin Client Server (IIS)
Web Tunneling Gateway
Redundancy
RDP solution for non-Microsoft devices
MA Thin Client
MAT Thin Client (Tabular)
SSL for IIS Web Server
19. Web Thin Client
Basic Installation
- Preparing the Project
Save all Screens as HTML (File Server part)
Enable TCP/IP Server Task (Data Server part)
Your project is ready to be served to a Web Thin Client
- Preparing the Web Server
Configure the Web Server Root directory to point to the Project’s Web subfolder
Open Firewall ports 80 (http) and 1234 (InduSoft TCP/IP Server)
- Running the Server Application
Call the Runtime and make sure that the Web Server is running
- Connecting through Internet Explorer
Open an Internet Explorer session and type the URL to the computer where the project
is running followed by the startup page name
e.g. http://192.168.1.102/startup.html
You will be asked to enter a valid user name and a password. Once the credentials have
been validated, you will be able to connect to the server project and navigate through
the screens
20. Web Thin Client
Web Server: using IIS (Internet Information
Services)
- Installing IIS
On the Windows Control Panel, select Programs
and Features
Click on the Turn Windows features on and off
We recommend installing the following features:
IIS Management Console
ASP and ASP.Net
ISAIP Extensions and ISAPI Features
You may need to use these features on MA,
SMA and WTG
- Configuring IIS – 2 options (using Console):
Point the Web Server to the Project’s Web folder
Create a Virtual Directory pointing to the Project’s
Web Folder
- Configure MIME Types
On the Console, select the very Root
Under the IIS group, click on MIME Type
Enter all the file extensions present on the project’s
Web Subfolder
21. SSL
IIS (Internet Information Services) using SSL
- Purpose
Provides more security, protecting from attacks through the use of Certificates (HTTPS)
Browsers opening pages served through SSL check a Certificate and validates it
- Configure Server Computer to use SSL
Get a certificate from a Certificate Authority. Or..
Create a self-signed certificate following the steps below
Using MMC, configure the Certificate Store (Local Computer)
On IIS Console, create a Self-Signed Certificate (User computer name)
Enable SSL on the Bindings settings associating it the Self-Signed Certificate that you created
- Configure Client Computer to accept a self-signed Certificate
Ideally, using Internet Explorer, open a page from the to the Server through SSL (https) using the
Computer Name (this is used on the Certificate)
Once the certification validation fails, open the page anyway
On the URL field, click on the warning regarding the Certification and open the View Certificate
Window.
Import the Certificate to the Trusted Root Certification Authorities
Now the Certificate is valid to be used with ANY browser
22. Web Thin Client
Redundancy
Configure the Redundant Servers (both InduSoft project and IIS)
On the development environment to the Ribbon->Project tab and click on Web
On the Data Server IP Address you can enter the IP Address of the computer that will be the
Primary Server
Click on Advanced: you will be able to enter the Secondary IP Address
Backup URL: URL where the Web files are stored (Project’s Web folder) from the
Secondary Server
It is used to download the files from the secondary Web server when the primary
Web server is not available
-
23. Web Thin Client
Web Tunneling Gateway
- Installation
Used on the case when the port 1234 is blocked by Firewalls
Installs an extension on IIS (IndWebSvc)
Installation: The installer is located at InduSoft Web Studio
v7.1BinWebTunnelingGateway.exe
Note: Follow the additional instructions related to ISAPI and CGI
Restrictions, as well as Handler Mapping on the Help system
- Configuration
On the development environment to the Ribbon->Project tab and
click on Web
On the Data Server IP Address enter the Computer’s IP Address. If
the Web Server is on the same computer as the Project, you can
type the localhost address
Click on Advanced
Enable the Web Tunneling Gateway
Enter the IP Address that needs to be visible by the Web Thin
Client
In case of Redundant Systems, enter the secondary IP addresses
and Backup URL
RUN the VERIFY command to save this information on the
project’s web pages
24. Secure Viewer Thin Client
Server Configuration
- Preparing the Project (Data Server)
Enable TCP/IP Server Task
Your project is ready to be served to a Secure Viewer Thin Client
- Preparing the File Server (2 options)
1. Use a Web Server and configure the Root directory to point to the Project’s root folder
(folder where the .app is). OR
2. Share on the network the Project’s root folder
Open Firewall port 1234 (InduSoft TCP/IP Server), and, if using http, port 80
- Running the Server Application
Call the Runtime (make sure that the Web Server is running in case of http)
- Additional Optional Configuration
If using Redundant Systems, repeat the steps above on the Secondary Server computer
If you want to use Web Tunneling Gateway, follow the same instructions to enable it as
on the previous topic
25. Secure Viewer Thin Client
Client Installation and Configuration
Install the Secure Viewer application (ThinClientSetup.exe)
Run the InduSoft Secure Viewer Thin Client Configuration
On the Data Server IP Address, enter the Server’s IP or Name
On the URL field, configure the path to the Server’s .App file
If you are using a shared folder, you will enter here the path as in the example below:
ComputerName<Path>ProjectName.app
If you are using a Web Server, enter the URL to the .App file, as in the example below:
http://computer name/ProjectName.app
Configure the other parameters, such as Secondary Server information, WTG, etc…
26. Mobile Access (v7.1)
Project Configuration
Requires IIS – No additional configuration required!!!
On the development environment to the Ribbon->Project tab and click on Mobile Access
Alternatively, on the Project Explorer TreeView, you can go to the Graphics tab, expand the
Thin Client folder and open the Mobile Access configuration
You can configure Alarms, Trend Tags and Widgets for any Tag
You can create areas and Sub-areas with different configurations
Enable the TCP/IP Server runtime task
Call the Runtime!
On any browser, including from Tables and mobile, type http://<ComputerIP>/MA
27. Mobile Access Tabular
Project Configuration
Requires IIS (ASP) – Configure it to point the Project’s folder, or Web, or WebSMA subfolders
On the development environment to the Ribbon->Project tab and click on Mobile Access Tabular
Alternatively, on the Project Explorer TreeView, you can go to the Graphics tab, expand the Thin
Client folder and open the Mobile Access Tabular configuration
You can configure the Tags that you want to display or control as well as Alarm Configurations
Enable the TCP/IP Server runtime task
Call the Runtime!
On any browser, including from Tables and mobile, type http://<ComputerIP>/<Path>/logon.asp
28. Non-Windows RDP Access
Server Configuration
Configure a Windows 2008 R2 Server Roles for Remote Desktop Sessions and Remote
Desktop Sessions host
Configure additional settings, such as Network Authentication Level, License Mode,
Groups and Users, Audio and Video playback option, etc…
Install and Configure the SecureViewer on the Server
Configure the User’s property to launch InduSoft Secure Viewer on LogOn
(Server Manager->Configuration->Local Users and Groups->Users->Properties
Enviroment tab->Starting Program->Start the Following Program on LogOn
Configure it to start the InduSoft Secure Viewer Thin ClientViewer.exe
Use a Remote Desktop Application to connect to the Server, such as
- PocketCloud: For devices powered with iOS (iPads, iPhones, etc)
- Remote RDP: For devices powered with Android (Tablets or phones)
- Microsoft Remote Desktop Connection: For computers powered with Mac OSX
InduSoft has a special TechNote for this case
29.
30. Main Topics
Installation
File Server communication
Data Server communication
Updated product
Updated project
Security
31. Troubleshooting
Web Thin Client requires the Plug-in ISSymbol.ocx. If you want it to be installed by automatically
downloading it from the Web Site, you MUST run Internet Explorer as Administrator (right-click, Run as
Administrator)
NOTE: Please notice that the ISSymbol installation file is around 16MB large, so its download process may take a
few minutes. During this download time, you will not see anything happening in the Browser
If you are having problems opening a page that you have already opened before, delete the Temporary
Files from the Browser. This is specially helpful when you do not see the changes that you did on the
Server project
Both Server and Thin Clients should be on the Same IWS version, including Service Pack. Or, at least the
Thin Client (Web or Secure Viewer) version needs to be newer than the Server
If you are going to use IIS do not place your project under your user Documents folder. This folder is
protected by the Operating System. Recommendation: create a specific folder for the project, e.g.
c:Project
When using IIS, you MUST configure the MIME types and open the WWW, http and https services and
ports on the Firewall
Always make sure that the TCP/IP Server Runtime task is Running and the port is configured on the
Firewall
Can’t Start the Web Server? The TCP/IP port 80 is probably being used by another program: Skype,
TeamViewer, CodeSys ENI, GE Cymplicity/Proficy
32. Troubleshooting
Browser Error 404 means that the HTML Page does not exist on that server, but the server does have a Web
Server enabled
If the Web Server cannot be reached (not enabled, or firewall blocked) the error is that the browser could
not connect to the Server and not to the Page
If the page can be reached and you get the Error connecting to Server ‘<IP Address>’, this means that the
Web page was found, that ISSymbol was installed, and that the TCP/IP Server can’t be reached. In which case
Either the TCP/IP Server is not running
Firewall is blocking the port 1234 (most common error)
Wrong IP Address configured on the Data Server IP Address setting
Use the Telnet command to try to connect to the port 1234. E. g.:
33.
34. Email
(US) info@indusoft.com
(Brazil) info@indusoft.com.br
(Germany) info@indusoft-germany.de
USA
Support support@indusoft.com
Web site
(English) www.indusoft.com
(Portuguese) www.indusoft.com.br
(German) www.indusoft-germany.de Brazil
Phone (512) 349-0334 (US)
+55-11-3293-9139 (Brazil)
+49 (0) 6227-732510 (Germany) Germany
Toll-Free 877-INDUSOFT (877-463-8763)
Fax (512) 349-0375