RASG-MID/7 Seventh Meeting of the Regional Aviation Safety Group-Middle East

Total Page:16

File Type:pdf, Size:1020Kb

RASG-MID/7 Seventh Meeting of the Regional Aviation Safety Group-Middle East MIDANPIRG/17 Seventeenth Meeting of the Middle East Air Navigation Planning and Implementation Regional Group & RASG-MID/7 Seventh Meeting of the Regional Aviation Safety Group-Middle East Cairo, Egypt, 15-18 April 2019 MIDANPIRG/17 & RASG-MID/7-REPORT INTERNATIONAL CIVIL AVIATION ORGANIZATION Report of the Seventeenth Meeting of The Middle East Air Navigation Planning and Implementation Regional Group and Seventh Meeting of The Regional Aviation Safety Group-Middle East MIDANPIRG/17 & RASG-MID/7 (Cairo, Egypt, 15 – 18 April 2019) The views expressed in this Report should be taken as those of the Regional Planning and Implementation Group and not of the Organization. This Report will, however, be submitted to the ICAO Council and any formal action taken will be published in due course as a Supplement to the Report Approved by the Meeting and published by authority of the Secretary General The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of ICAO concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontier or boundaries. TABLE OF CONTENTS Page PART I - HISTORY OF THE MEETING 1. Place and Duration ........................................................................................................ 1 2. Opening ......................................................................................................................... 1 3. Attendance ..................................................................................................................... 2 4. Officers and Secretariat ................................................................................................. 2 5. Language ....................................................................................................................... 3 6. Agenda ....................................................................................................................... 3-4 7. Conclusions and Decisions – Definition ....................................................................... 4 8. List of Conclusions and Decisions ............................................................................. 4-7 PART II - REPORT ON AGENDA ITEMS Report on Agenda Item 1 ........................................................................................... 1-1 Report on Agenda Item 2 ..................................................................................... 2-1/2-2 Report on Agenda Item 3 ..................................................................................... 3-1/3-5 Report on Agenda Item 4 .................................................................................... 4-1/4-6 Report on Agenda Item 5.1 ............................................................................ 5.1-1/5.1-7 Report on Agenda Item 5.2 ............................................................................ 5.2-1/5.2-2 Report on Agenda Item 6.1 ..................................................................................... 6.1-1 Report on Agenda Item 6.2 .......................................................................... 6.2-1/6.2-26 Report on Agenda Item 6.3 ............................................................................ 6.3-1/6.3-2 Report on Agenda Item 6.4 ............................................................................ 6.4-1/6.4-3 Report on Agenda Item 7 ........................................................................................... 7-1 Report on Agenda Item 8 ..................................................................................... 8-1/8-2 APPENDICES Appendices 4A – 4E Appendices 5.1A – 5.1L Appendix 5.2A Appendices 6.1A & 6.1B Appendices 6.2A – 6.2Z Appendices 6.3A & 6.3B Appendix 6.4A ATTACHMENT List of Participants ................................................................................................. Attachment A -------------------- MIDANPIRG/17 & RASG-MID/7-REPORT - 1 - PART I - HISTORY OF THE MEETING 1. PLACE AND DURATION 1.1 The Seventeenth Meeting of the Middle East Air Navigation Planning and Implementation Regional Group and the Seventh Meeting of the Regional Aviation Safety Group-Middle East (MIDANPIRG/17 & RASG-MID/7) was held in the Royal Maxim Palace Kempinski Hotel, Cairo, Egypt, from 15 to 18 April 2019. 2. OPENING 2.1 Mr. Mohamed K. Rahma, Regional Director, ICAO Middle East (MID) Regional Office opened the meeting. He welcomed all the participants to Cairo to attend the Seventeenth Meeting of the Middle East Air Navigation Planning and Implementation Regional Group (MIDANPIRG 17) and the Seventh Meeting of the Regional Aviation Safety Group-Middle East (RASG-MID 7), organized concurrently for the first time. Mr. Rahma highlighted that this is in line with the directives from the ICAO Council regarding PIRGs and RASGs arrangements. Mr. Rahma welcomed, in particular, His Excellency, Mr. Ali Khalil Ibrahim, the Director General of the Iraqi Civil Aviation Authority, and thanked him for his participation as a guest of honor. 2.2 Mr. Rahma recalled that the last MIDANPIRG meeting hosted by the ICAO MID Office was MIDANPIRG/9 held in April 2005; he highlighted also that no RASG-MID meeting had been hosted by the ICAO MID Office. In this respect, he expressed his gratitude and appreciation to the States that provided the resources to support the organisation of the meeting outside of the ICAO MID Office premises, namely the Civil Aviation Authority of Qatar, the General Authority of Civil Aviation -Saudi Arabia and the General Civil Aviation Authority -UAE. Mr. Rahma extended his thanks to the Exhibitors, EMPIC and United ATS, that participated also in the sponsorship of the meeting. 2.3 Mr. Rahma provided an overview of the state of air transport at the global and regional levels; and underlined that the continuing growth of traffic in the MID Region placed increased demand on airspace capacity, which necessitates an optimum utilization of the available airspace and Airports. He highlighted that the changes and developments in the civil aviation world happen very rapidly and frequently and stated that we need to keep pace with these developments. In this respect, he referred to the 13th Air Navigation Conference, which was held in ICAO HQ in Montreal, in October 2018 and to the upcoming ICAO 40th Assembly, which will be held in ICAO HQ, in Montreal from 24 September to 4 October 2019; as well as to the DGCA-MID/5 meeting, which will be held in Kuwait, 4-6 November 2019. 2.4 Mr. Rahma highlighted the main MID Region achievements during the past period and confirmed that these achievements would not have happened without the cooperation and dedication of all stakeholders. He listed also some of the challenges the MID Region is facing and emphasized on the necessary commitment and cooperation of all stakeholders to overcome these challenges and achieve the agreed performance targets, in line with the MID Region NCLB Strategy. Finally, Mr. Rahma thanked all participants for their presence wishing them successful and productive meeting. 2.5 His Excellency, Mr. Ali Khalil Ibrahim, the Director General of the Iraqi Civil Aviation Authority, addressed the meeting. He welcome all the participants and underlined that, the main objective of his presence is to demonstrate Iraq’s high-level commitment to improve the civil aviation system and support the MIDANPIRG and RASG-MID activities. He wihed the meeting all the success. MIDANPIRG/17 & RASG-MID/7-REPORT - 2 - 2.6 Mr. Ismaeil Mohammed Al Blooshi, Chairman of RASG-MID thanked all delegates for their attendance. He highlighted the need for effective participation of all stakeholders within the framework of RASG-MID and MIDANPIRG, in order to achieve the desired objectives and goals. 2.7 Mr. Ahmed Al Jallaf, First Vice-Chairman of MIDANPIRG, welcomed also all participants to Cairo. He recalled that, after the MIDANPIRG/16 and MSG/6, he is honoured again to chair the MIDANPIRG/17 meeting, in the absence of the Chairman, Mr. Adel S. Boresli. Mr. Al Jallaf highlighted that the MSG/6 meeting held in Cairo, Egypt, 3 – 5 December 2018 addressed many important subjects and took decision on them on behalf of MIDANPIRG; yet the MIDANPIRG/17 agenda is very busy. He thanked all States and International Organizations that submitted WPs, IPs and/or PPTs to the meeting. He stated at the end that the MIDANPIRG/17 and RASG-MID/7 meetings are organised for the first time concurrently with a common agenda, some sessions in plenary and other agenda items addressed separately (parallel tracks); this would be a trial and at the end of the meeting, it would be decided if we should continue with the same setting, or some adjustements would be needed. 3. ATTENDANCE 3.1 The meeting was attended by a total of Ninety Eight (98) participants, which included experts from fourteen (14) States (Bahrain, Egypt, Iran, Iraq, Jordan, Lebanon, Oman, Qatar, Saudi Arabia, Sudan, UAE, UK, USA and Yemen) and nine (9) International Organizations/Agencies (ACAO, AIRBUS, CANSO, EUROCONTROL, IATA, IFAIMA, IFALPA, IFATCA and MIDRMA). The list of participants is at Attachment A. OFFICERS AND SECRETARIAT 3.2 In the absence of the MIDANPIRG Chairman, Mr. Adel S. Boresli, the First-Vice Chairman, Mr. Ahmed Al Jallaf, Assistant Director General Air Navigation, General Civil Aviation Authority, UAE, and Mr. Ismaeil Mohammed Al Blooshi, Chairman of the RASG-MID, Assistant Director General,
Recommended publications
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Rule Base with Frequent Bit Pattern and Enhanced K-Medoid Algorithm for the Evaluation of Lossless Data Compression
    Volume 3, No. 1, Jan-Feb 2012 ISSN No. 0976-5697 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info Rule Base with Frequent Bit Pattern and Enhanced k-Medoid Algorithm for the Evaluation of Lossless Data Compression. Nishad P.M.* Dr. N. Nalayini Ph.D Scholar, Department Of Computer Science Associate professor, Department of computer science NGM NGM College, Pollachi, India College Pollachi, Coimbatore, India [email protected] [email protected] Abstract: This paper presents a study of various lossless compression algorithms; to test the performance and the ability of compression of each algorithm based on ten different parameters. For evaluation the compression ratios of each algorithm on different parameters are processed. To classify the algorithms based on the compression ratio, rule base is constructed to mine with frequent bit pattern to analyze the variations in various compression algorithms. Also, enhanced K- Medoid clustering is used to cluster the various data compression algorithms based on various parameters. The cluster falls dissentingly high to low after the enhancement. The framed rule base consists of 1,048,576 rules, which is used to evaluate the compression algorithm. Two hundred and eleven Compression algorithms are used for this study. The experimental result shows only few algorithm satisfies the range “High” for more number of parameters. Keywords: Lossless compression, parameters, compression ratio, rule mining, frequent bit pattern, K–Medoid, clustering. I. INTRODUCTION the maximum shows the peek compression ratio of algorithms on various parameters, for example 19.43 is the Data compression is a method of encoding rules that minimum compression ratio and the 76.84 is the maximum allows substantial reduction in the total number of bits to compression ratio for the parameter EXE shown in table-1 store or transmit a file.
    [Show full text]
  • Manual of Air Traffic Services (MATS-1)
    भारतीय िवमानपन प्रािधकरण AIRPORTS AUTHORITY OF INDIA MANUAL OF AIR TRAFFIC SERVICES PART‐1 Air Navigation Services July 6, 2020 Fifth Edition ED/ATM/2020/E5.00‐MATS‐PRT‐1 MANUAL OF AIR TRAFFIC SERVICES PART 1 (ED/ATM/2020/E5.00-MATS-PRT1) July 6, 2020 Controlled Copy Number If Number is in RED colour ‐‐‐ It is “Controlled Copy” If Number is in BLACK colour ‐‐‐ It is “Uncontrolled Copy Document Approving Authority: Executive Director (ATM) Airports Authority of India, Rajiv Gandhi Bhawan, Safdarjung Airport, New Delhi‐110003 Email: [email protected] Blank Page wffiE RiE, cr{.s.vs , 鰤 赫 ARVIND SINGH,:AS AIRPORTS AUTHORITY OF INDIA 鋼 日 rr$q ril* rnrq Chai日 耐an Rajiv Gandhi Bhawan trq.flEiT wr{ qsr, T{ Gid-rrooos. l甲「押暉ノPhone:011‐ 24632930 Safdarjung Airport, New Delhi-l 1 0003. 熱電aLlよ鵞警leЮ \ FOREWORD AAI Act, 1995 mandates'Airports.{uthority of India.to provide air traffic servibes over entire Indian air space. These services comprise of air ' traffic control service, advisory service, flight information service, and alerting service. In orderto achieve the objectives ofair traffic services, there is a need to standardize procedures necessary for the safety of air navigation which can be uniformly appried throughout India. Maintaining the acceptable levels of safety calls for standardization and quality assurance in every sub system of Air Traffic System qt one end ' and maintaining harmony with the ICAO standards and recommeirded practices at the other end to achieve this objective, this Manual of Air Traffic Services -Part I has been developed by ATM Directorate of Airports Authority of India.
    [Show full text]
  • Seeking a Digital Preservation Storage Container Format for Web Archiving
    Kim, Y., and Ross, S. (2012) Digital forensics formats: seeking a digital preservation storage container format for web archiving. International Journal of Digital Curation, 7 (2). pp. 21-39. ISSN 1746-8256 Copyright © 2012 The Authors http://eprints.gla.ac.uk/79800/ Deposited on: 14 May 2013 Enlighten – Research publications by members of the University of Glasgow http://eprints.gla.ac.uk doi:10.2218/ijdc.v7i2.227 Digital Forensics Formats 21 The International Journal of Digital Curation Volume 7, Issue 2 | 2012 Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving Yunhyong Kim, Humanities Advanced Technology and Information Institute, University of Glasgow Seamus Ross, Faculty of Information, University of Toronto, Canada and Humanities Advanced Technology and Information Institute, University of Glasgow Abstract In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC), disk image formats that capture data for recovery or installation (partimage, dd raw image), these two types combined with a selected compression algorithm (e.g. tar+gzip), formats that combine packing and compression (e.g. 7-zip), and forensic file formats for data analysis in criminal investigations (e.g.
    [Show full text]
  • 2009-Jul No.33 TECHNICAL JOURNAL Front Cover Description AVN Lite "AVN339M"
    FUJITSU TEN TECHNICAL JOURNAL,No.33,KOBE,JUL.2009 ISSN 0289-3789 2009-Jul No.33 TECHNICAL JOURNAL Front cover description AVN Lite "AVN339M" This model incorporates a digital terrestrial TV tuner that provides stable reception of high quality Full seg video and audio with four antennas and four tuners. Its main unit has a slot for a B-CAS card that is required to watch and listen to the digital terrestrial TV. It plays commercial-release DVDs and home-made videos recorded in the DVD- VR format. With its compatibility with MP3/WMA files in CD-R/RW, this model gives you access to more videos and audios than our conventional models. FUJITSU TEN LIMITED PROFILE Sales Growth (¥100 million) Head Office: 2-28, Gosyo-dori, 1-chome, 3,800 Hyogo-ku, Kobe, 652-8510, Japan 3,641 3,600 Phone: +81-78-671-5081 3,400 FAX: +81-78-671-5325 3,125 3,200 Established: October 25, 1972 2,992 3,000 Capital: ¥5300 million 2,746 2,800 No. of Employees: 3,783 (Consolidated: 12,267) 2,600 Product Line: Infotainment Products 2,400 • Audio, Navigation Products (for automobiles) 2,200 • Audio (for home use) 2,000 1,800 • Mobile Communication radios 1,600 Car electronic devices 1,400 Domestic Offices: Utsunomiya, Tokyo, Toyota 1,200 Kobe Logistics Center 1,000 Nakatsugawa Technical Center 800 Kobe Plant, Nakatsugawa Plant 600 Affiliated Companies: TOCHIGI FUJITSU TEN LIMITED 400 FUJITSU TEN EAST JAPAN SALES LIMITED 200 FUJITSU TEN CHUBU SALES LIMITED 0 FUJITSU TEN WEST JAPAN SALES LIMITED '05 '06 '07 '08 FUJITSU TEN ACTY LIMITED Consolidated sales FUJITSU TEN RESERCH LIMITED FUJITSU TEN STAFF LIMITED FUJITSU TEN TECHNOLOGY LIMITED Head Office / Main Plant Nakatsugawa Plant Tochigi Fujitsu TEN Limited FUJITSU TEN TECH.
    [Show full text]
  • Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving
    doi:10.2218/ijdc.v7i2.227 Digital Forensics Formats 21 The International Journal of Digital Curation Volume 7, Issue 2 | 2012 Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving Yunhyong Kim, Humanities Advanced Technology and Information Institute, University of Glasgow Seamus Ross, Faculty of Information, University of Toronto, Canada and Humanities Advanced Technology and Information Institute, University of Glasgow Abstract In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC), disk image formats that capture data for recovery or installation (partimage, dd raw image), these two types combined with a selected compression algorithm (e.g. tar+gzip), formats that combine packing and compression (e.g. 7-zip), and forensic file formats for data analysis in criminal investigations (e.g. aff – Advanced Forensic File format). We present a general discussion of the storage container format landscape in terms of the attributes we discuss, and make a direct comparison between the three most promising archival formats: tar, WARC, and aff. We conclude by suggesting the next steps to take the research forward and to validate the observations we have made.
    [Show full text]
  • Bogog00000000000000
    US 20190236273A1 ( 19) United States (12 ) Patent Application Publication (10 ) Pub. No. : US 2019 /0236273 A1 SAXE et al. (43 ) Pub. Date : Aug. 1 , 2019 ( 54 ) METHODS AND APPARATUS FOR GO6N 3 /04 (2006 .01 ) DETECTION OF MALICIOUS DOCUMENTS G06K 9 /62 (2006 .01 ) USING MACHINE LEARNING (52 ) U .S . CI. CPC .. G06F 21/ 563 ( 2013 .01 ) ; GO6N 20 / 20 (71 ) Applicant: Sophos Limited , Abingdon (GB ) (2019 .01 ) ; G06K 9 /6256 ( 2013 .01 ) ; G06K ( 72 ) Inventors: Joshua Daniel SAXE , Los Angeles, 9 /6267 ( 2013 .01 ) ; G06N 3 / 04 ( 2013 .01 ) CA (US ) ; Ethan M . RUDD , Colorado Springs , CO (US ) ; Richard HARANG , (57 ) ABSTRACT Alexandria , VA (US ) An apparatus for detecting malicious files includes a memory and a processor communicatively coupled to the ( 73 ) Assignee : Sophos Limited , Abingdon (GB ) memory. The processor receives multiple potentially mali cious files. A first potentially malicious file has a first file ( 21) Appl . No. : 16 /257 , 749 format , and a second potentially malicious file has a second file format different than the first file format. The processor ( 22 ) Filed : Jan . 25 , 2019 extracts a first set of strings from the first potentially malicious file , and extracts a second set of strings from the Related U . S . Application Data second potentially malicious file . First and second feature (60 ) Provisional application No . 62/ 622 ,440 , filed on Jan . vectors are defined based on lengths of each string from the 26 , 2018 . associated set of strings . The processor provides the first feature vector as an input to a machine learning model to Publication Classification produce a maliciousness classification of the first potentially (51 ) Int.
    [Show full text]
  • Development of FUJITSU TEN's First SD Memory Card Navigation System, AVN Lite, and Its Linkage Service
    Development of FUJITSU TEN's First SD Memory Card Navigation System, AVN Lite, and its Linkage Service Kenichirou MASE Takeshi FUKADA Kenji UEMATSU Teru SAWADA Abstract Since 1997, when FUJITSU TEN released an all-in-one unit consisting of Audio, Visual, and Navigation ahead of the industry, "AVN" has become synonymous with in-dash and all-in-one navigation system. On the other hand, recently, on-dash navigation system (PND: Portable Navigation Device) that provides only basic func- tion of navigation system at a low price has been penetrating the market and the market needs for low-end models have been growing. With the motto, "secure," "easy," and "fun," FUJITSU TEN therefore planned and developed "AVN Lite" that offers the necessary and sufficient functions at a reasonable price including the path search and audio assist which are the basic functions of the car navigation system, storing the map data in the SD card, and also including CD, One-Seg, etc. as AV functions, and we released the "AVN Lite" in October 2008. The navigation system using the method that stores the map data in the SD card is the first product of this kind for FUJITSU TEN. We introduce the problems and solutions for adoption of the SD card as the storage media, and various services linked to this product in this article. 18 Development of FUJITSU TEN's First SD Memory Card Navigation System, AVN Lite, and its Linkage Service 1 Introduction1. Introduction ・Carefully select and arrange four basic buttons of "pre- sent location," volume, etc. at the bottom of the naviga- "AVN," released in 1997 as ECLIPSE brand, has tion device.
    [Show full text]
  • Aviation Abbreviations
    AVIATION ABBREVIATIONS Mahan Air Documentation Center Edition 1 2014/04/23 Alpha (ICAO) A A/A Air-to-air (ICAO) A/C Aircraft AA Approved Urgency (CFMU) AA Aircraft Address (IFPS SSR MODE-S) AAAS Amadeus Airline Ancillary Services AABC ARINC Automated Border Control AAC Airworthiness Advisory Circular (CASA) AAC Airline Administrative Communication (ACP) AACC Airport Associations Coordinating Council (ACI / AACI) AACE Airfield Approach Control Element AACI Airports Association Council International (ACI) AACO Arab Air Carriers Organisation AAD Assigned Altitude Deviation (ICAO) AAE Above Aerodrome Elevation (CA) AAF ATM Added Functions AAFCE Allied Air Forces Central Europe AAG AIS Automation Group AAGDI Automated Air / Ground Data Interchange AAH Autonomous Aircraft Hybrid AAI Arrival Aircraft Interval (FAA AAR) AAI Angle of Approach Indicator AAIB Air Accident Investigation Branch (UK equivalent of NTSB) AAIM Aircraft Autonomous Integrity Monitoring (ICAO) AAIS Automated AIS AAL Altitude Above Aerodrome level (ICAO) AALS Advanced Approach and Landing System AAM Airbus Asset Management AAM Airline Administration Message AAME Association of Aviation Medical Examiners AAP Advanced Automation Program AAP Accident Analysis & Prevention (IFALPA) AAPA Association of Asia Pacific Airlines AAR Airport Acceptance Rate or Airport Arrival Rate (FAA) AAR Air to Air Refueling or Automated Aerial Refueling (Boeing) AAS Advanced Automated System (FAA) AASA Air Lines Association of Southern Africa AASC Airport Authorities Steering Committee AASI Aeronautical
    [Show full text]
  • Zenworks Server Installation Guide Includes Information to Help You Successfully Install the Zenworks Primary Server Software on Windows and Linux Servers
    ZENworks 2020 Update 1 Server Installation Guide June 2020 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. © Copyright 2008 - 2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. 2 Contents About This Guide 7 Part I System Requirements 9 1 Primary Server Requirements 11 2 Database Requirements 15 3 Administration Browser Requirements 17 Part II Windows Installation 19 4 Windows Installation Workflow 21 Installation Workflow for Your First Primary Server. .21 Installation Workflow for Additional Primary Servers . .23 5 Understanding What the ZENworks Installation Does 25 6 Updating Windows Server Software 27 7 Creating an External Certificate 29 Generating a Certificate Signing Request (CSR) . .29 Generating a Certificate by Using NetIQ ConsoleOne . .30 Generating a Certificate by Using NetIQ iManager . .31 8 Installing and Configuring an External ZENworks Database 33 Prerequisites for External Databases. .33 Prerequisites for PostgreSQL . .33 Prerequisites for Microsoft SQL Server . .34 Prerequisites for Oracle. .34 Configuring the External ZENworks Database . .36 PostgreSQL Database Information . .38 MS SQL Database Information . .39 Oracle Database Information . .42 9 Installing a ZENworks Primary Server on Windows 45 Installation Information .
    [Show full text]
  • Metadefender Core V4.18.0
    MetaDefender Core v4.18.0 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 14 Key Features of MetaDefender Core 15 1. Quick Start with MetaDefender Core 16 1.1. Installation 16 Operating system invariant initial steps 16 Basic setup 17 1.1.1. Configuration wizard 17 1.2. License Activation 22 1.3. Process Files with MetaDefender Core 22 2. Installing or Upgrading MetaDefender Core 23 2.1. Recommended System Configuration 23 Microsoft Windows Deployments 23 Unix Based Deployments 25 Data Retention 27 Custom Engines 28 Browser Requirements for the Metadefender Core Management Console 28 2.2. Installing MetaDefender 28 Installation 28 Installation notes 28 2.2.1. Installing Metadefender Core using command line 29 2.2.2. Installing Metadefender Core using the Install Wizard 32 2.3. Upgrading MetaDefender Core 32 Upgrading from MetaDefender Core 3.x 32 Upgrading from MetaDefender Core 4.x 32 2.4. MetaDefender Core Licensing 33 2.4.1. Activating Metadefender Licenses 33 2.4.2. Checking Your Metadefender Core License 38 2.5. Performance and Load Estimation 39 What to know before reading the results: Some factors that affect performance 39 How test results are calculated 40 Test Reports 40 Performance Report - Multi-Scanning On Linux 40 Performance Report - Multi-Scanning On Windows 44 2.6. Special installation options 47 Use RAMDISK for the tempdirectory 47 3.
    [Show full text]
  • Accessdata Password Recovery Toolkit and Distributed Network Attack
    AccessData Password Recovery Toolkit and Distributed Network Attack User Guide | 1 AccessData Legal and Contact Information Document date: March 13, 2014 Legal Information ©2014 AccessData Group, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. AccessData Group, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, AccessData Group, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, AccessData Group, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, AccessData Group, Inc. reserves the right to make changes to any and all parts of AccessData software, at any time, without any obligation to notify any person or entity of such changes. You may not export or re-export this product in violation of any applicable laws or regulations including, without limitation, U.S. export regulations or the laws of the country in which you reside. AccessData Group, Inc. 588 W. 400 S. Suite 350 Lindon, Utah 84042 U.S.A. www.accessdata.com AccessData Trademarks and Copyright Information AccessData® is a registered trademark of AccessData Group, Inc. AD InSight® is a registered trademark of AccessData Group, Inc.
    [Show full text]