Migratory Applications

Total Page:16

File Type:pdf, Size:1020Kb

Migratory Applications Migratory Applications Krishna A. Bharat Luca Cardelli Graphics, Visualization & Usability Center Digital, Systems Research Center College of Computing, Georgia Tech. 130, Lytton Avenue Atlanta, GA 30332-0280 Palo Alto, CA 94301 E-mail: [email protected] E-mail: [email protected] ABSTRACT cope with the needs of mobile and distributed users. New metaphors will be necessary to cope with these demands. We introduce a new genre of user interface applications that can migrate from one machine to another, taking their user We introduce a new genre of user interface applications: interface and application contexts with them, and continue migratory applications can migrate from one host to from where they left off. Such applications are not tied to one another, maintaining intact the state of their user interface. user or one machine, and can roam freely over the network, After migration, a former host may shut down without rendering service to a community of users, gathering human affecting the application. We discuss how application input and interacting with people. We envisage that this will migration can be implemented at the programming lan- support many new agent-based collaboration metaphors. guage/environment level. Our approach places some The ability to migrate executing programs has applicability demands on the programming environment, but almost to mobile computing as well. Users can have their applica- none on the application programmer. No restrictions are tions travel with them, as they move from one computing placed, in principle, on the type of the application being environment to another. We present an elegant programming migrated. The entire migration operation can be realized by model for creating migratory applications and describe an the execution of a single command. The same technique use implementation. The biggest strength of our implementation for transmitting an application can be used to save the run- is that the details of migration are completely hidden from ning application to Þle and transmit it over other channels to the application programmer; arbitrary user interface appli- be resumed at a later time. cations can be migrated by a single ÒmigrationÓ command. We address system issues such as robustness, persistence Application migration is useful in the context of many and memory usage, and also human factors relating to appli- agent-based collaboration metaphors. For example: cation design, the interaction metaphor and safety. 1. Applications that follow a user across physical locations: KEYWORDS: Application Migration, Collaborative the ubiquitous computing metaphor. For ÒeagerÓ behavior, Work, Interactive Agents, Application Checkpointing, some applications could use a location sensing device such Mobile Computing, Ubiquitous Computing, Safety. as an Òactive badgeÓ, to automatically follow the user. 2. Applications that serve a group of people by travelling to 1 INTRODUCTION each personÕs site in turn (e.g. a meeting scheduler): the The goal of the human-computer interaction community is electronic secretary metaphor. to make powerful applications easy to use, while retaining 3. Applications that interact with people on a userÕs behalf their full potential. For this purpose metaphors have been and carry out an agenda: the interactive agent metaphor. devised; metaphors like overlapping windows, direct manip- ulation, and hypermedia. A successful metaphor hides com- 4. Communication over email that is interactive and intelli- plexity, and allows users to accomplish their tasks with little gent: the interactive message metaphor. Unlike previous effort. Often, a metaphor requires advances in technology implementations of Òactive mailÓ [6], the recipient is able to before it can be effectively implemented. Conversely, a new forward the interactive message after interacting with it. technology often needs the introduction of new metaphors to harness it. In addition to self-induced migration as described so far, it is equally easy to allow a program to be migrated under exter- As the infrastructure for ubiquitous computing comes into nal control. We could Òdrag-and-dropÓ programs from one being, new demands will be placed on the way applications machine to another in the same manner that we move Þles between folders, and windows between screens. Section 2 describes our approach to programming migra- tory applications. In Section 3, we show how this paradigm was applied in the Visual Obliq environment [3] to support the migration of (arbitrary) user interface applications. In Section 4 we provide a walk-through of the process of cre- ating a migratory application. In Section 5 we discuss some The closure table contains a single entry, indicated by Òwhere issues raised by migration. Section 6 lists related work. In x = ...Ó: Section 7 we draw some conclusions. x = 0 2 PROGRAMMING MODEL proc() x:=x+1; x end Our programming model is based on the facilities available where x = in the Obliq distributed scripting language [7]. Figure 2: The closure of a procedure 2.1 Network Semantics In Obliq, arbitrary data, including procedures, can be trans- The transmission of a closure (Figure 3) follows the same mitted over the network. A piece of Obliq data can be seen rules as the transmission of any data graph. When a closure is as a graph where some nodes are mutable (meaning that transmitted, all the program text is copied, since it consists of they have local state that can be modiÞed by assignment) immutable data. The associated collection of values for free and where other nodes are immutable (meaning that they variables is copied according to the general rule. In particu- cannot be modiÞed). For example, the program text of a lar, the locations of global updatable variables are not copied: procedure is immutable and cannot be modiÞed, while network references are generated to their location, so that Þelds in an object are mutable because they can be assigned they can be remotely updated. new values. x = 2.1.1 Network Transmission. When a data graph is passed to a remote procedure, or returned from a remote proc ... x ... end proc ... x ... end where x= where x= procedure, we say that it is transmitted over the network. From To The meaning of transmitting a data graph is the following Transmit (see Figure 1). Starting from a given root, the graph is cop- ied from the source site to the target site up to the point Figure 3: Transmission of a closure where mutable nodes or network references are found. Mutable nodes (indicated by shaded boxes) are not copied; 2.1.2 Network Copy. In contrast to the default transmis- in their place, network references to those nodes are gener- sion mechanism, which stops at mutable nodes and network ated. Solid pointers represent either local or remote refer- references, a special primitive is provided to perform a net- ences. Existing network references are transmitted work copy of a data graph. This primitive makes a complete unchanged, without following the reference. Sharing and local copy of a possibly mutable and distributed graph. circularities are preserved. Copy Transmit From To From To Figure 4: Network Copy Figure 1: Transmission of a data graph Network copy is useful, for example, when moving a user For example, an Obliq object (one of the basic data struc- interface along with a migrating application. tures) is never copied over the network on transmission, since objects have state. A network pointer to the object is A user interface is normally closely bound to site-dependent transmitted in its place. The object can then be referenced resources, such as windows and threads. Since these remotely through that network pointer; for example, one of resources cannot migrate, a stand-alone snapshot of the user its methods may be remotely invoked. interface is Þrst assembled. The snapshot consists of some complex data structure, including a representation of the cur- Arrays and updatable variables are similarly not copied on rent state of all the live windows of the application. This data transmission, since they have state. structure, resembling the graph in the picture above, can be copied over to the target site, and then converted back to a live Obliq procedures are Þrst-class data and, like other data, interface. have a value that can be manipulated and transmitted. The value of a procedure is called a closure; it consists of the 2.2 Agents program text of the procedure, plus a table of values for the An agent is a computation that may hop from site to site over global variables of the procedure. Figure 2 shows the clo- the network [19]. We review the concepts of agents, agent sure for a procedure incrementing a global variable x; the servers, suitcases, and brieÞngs. In Section 2.3, we describe variable x denotes a mutable location containing 0. an Obliq implementation of agent hopping. brieÞng. Agent servers are simple compute servers whose main task is to run agents and supply them with appropriate A suitcase is a piece of data that an agent carries with it as brieÞngs (and maybe check the agentÕs credentials). it moves from site to site. It contains the long-term memory of the agent. It may include a list of sites to visit, the tasks The hop instruction can be programmed in Obliq as follows: to perform at each site, and the results of performing those tasks. let hop = proc(agentServer, agent, suitcase) A brieÞng is data that an agent receives at each site, as it agentServer( enters the site. It may include advice for the agent (e.g. Òtoo (1) proc(briefing) busy now, try this other siteÓ), and any site-dependent data fork( such as local Þle systems and databases. (2) proc() An agent server, for a given site, is a program that accepts (3) agent(copy(suitcase), briefing); code over the network, executes the code, and provides it end); with a local brieÞng.
Recommended publications
  • Qt/Embedded Whitepaper Trolltech Abstract This Whitepaper Describes the Qt/Embedded C++ Toolkit for GUI and Application Developm
    Qt/Embedded Whitepaper Trolltech www.trolltech.com Abstract This whitepaper describes the Qt/Embedded C++ toolkit for GUI and application development on embedded devices. It runs on any device supported by Linux and a C++ compiler. Qt/Embedded provides the entire standard Qt API and can compile out unused features to minimize its memory footprint. Qt/Embedded provides its own windowing system which is far more compact than Xlib and the X Window System that it replaces. Qt/Embedded applications can be developed on familiar desktop systems, e.g. Windows and Unix, and with standard tools. It is provided with all the Qt tools including Qt Designer for visual form design, and with tools specifically tailored to the embedded environment. The Sharp Zaurus PDA using Qt/Embedded ii Qt/Embedded Whitepaper Trolltech www.trolltech.com Contents 1. Introduction . 3 2. System Requirements . 4 3. Architecture . 5 3.1. Windowing System . 6 3.2. Fonts . 6 3.3. Input Devices . 7 3.4. Input Methods . 7 3.5. Screen Acceleration . 8 4. Development Environment . 8 4.1. Qt's Supporting Tools . 8 5. Signals and Slots . 9 5.1. A Signals and Slots Example . 10 5.2. Meta Object Compiler . 11 6. Widgets . 12 6.1. A `Hello' Example . 12 6.2. Common Widgets . 13 6.3. Canvas . 14 6.4. Custom Widgets . 15 6.5. Main Windows . 18 6.6. Menus . 18 6.7. Toolbars . 19 6.8. Balloon Help . 19 6.9. Actions . 20 7. Dialogs . 20 7.1. Layouts . 20 7.2. Qt Designer . 23 7.3. Built-in Dialogs .
    [Show full text]
  • Isys Information Architects Inc
    Isys Information Architects Inc. Home Design Announcements Hall of Shame Isys Information Architects Inc. specializes in the design and development of New Entries robust, highly usable information systems. Isys focuses on ease of use, recognizing Controls that software should assist the user in the performance of some task rather than Stupidity becoming a task in itself. Isys was founded by Brian Hayes, a former professor of Visual Color Industrial Engineering, and system design consultant whose clients have included Terminology AT&T, General Electric, General Motors, Lucent Technologies, NASA, Siemens, Errors the U.S. Air Force, and the U.S. Army. Tabs Metaphors We are a full-service Our software development Globalization provider of user interface department specializes in the In-Depth design and usability design and development of engineering services. Our careful robust, highly usable information Books systems for the Windows operating Links attention to the user interface can system. We provide custom Index reduce system development time, Feedback increase user satisfaction, and reduce programming, database, and training costs. application development services. Hall of Fame Contact Us The Interface Hall of Shame The Interface Hall of is an irreverent look at Fame is a collection of ineffective interface design. images that demonstrate The site includes a collection of interface design solutions that are images from commercial, corporate, both creative and effective. and shareware applications that illustrate how software should not be designed. Isys Information Architects Inc. 5401 McNairy Drive, Suite 100 Greensboro, NC 27455 [email protected] © 1996-1999 Isys Information Architects Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited.
    [Show full text]
  • Maestro 10.2 User Manual
    Maestro User Manual Maestro 10.2 User Manual Schrödinger Press Maestro User Manual Copyright © 2015 Schrödinger, LLC. All rights reserved. While care has been taken in the preparation of this publication, Schrödinger assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Canvas, CombiGlide, ConfGen, Epik, Glide, Impact, Jaguar, Liaison, LigPrep, Maestro, Phase, Prime, PrimeX, QikProp, QikFit, QikSim, QSite, SiteMap, Strike, and WaterMap are trademarks of Schrödinger, LLC. Schrödinger, BioLuminate, and MacroModel are registered trademarks of Schrödinger, LLC. MCPRO is a trademark of William L. Jorgensen. DESMOND is a trademark of D. E. Shaw Research, LLC. Desmond is used with the permission of D. E. Shaw Research. All rights reserved. This publication may contain the trademarks of other companies. Schrödinger software includes software and libraries provided by third parties. For details of the copyrights, and terms and conditions associated with such included third party software, use your browser to open third_party_legal.html, which is in the docs folder of your Schrödinger software installation. This publication may refer to other third party software not included in or with Schrödinger software ("such other third party software"), and provide links to third party Web sites ("linked sites"). References to such other third party software or linked sites do not constitute an endorsement by Schrödinger, LLC or its affiliates. Use of such other third party software and linked sites may be subject to third party license agreements and fees. Schrödinger, LLC and its affiliates have no responsibility or liability, directly or indirectly, for such other third party software and linked sites, or for damage resulting from the use thereof.
    [Show full text]
  • Learning to Code
    PART ILEARNING TO CODE How Important is Programming? “To understand computers is to know about programming. The world is divided… into people who have written a program and people who have not.” Ted Nelson, Computer Lib/Dream Machines (1974) How important is it for you to learn to program a computer? Since the introduction of the first digital electronic computers in the 1940s, people have answered this question in surprisingly different ways. During the first wave of commercial computing—in the 1950s and 1960s, when 1large and expensive mainframe computers filled entire rooms—the standard advice was that only a limited number of specialists would be needed to program com- puters using simple input devices like switches, punched cards, and paper tape. Even during the so-called “golden age” of corporate computing in America—the mid- to late 1960s—it was still unclear how many programming technicians would be needed to support the rapid computerization of the nation’s business, military, and commercial operations. For a while, some experts thought that well-designed computer systems might eventually program themselves, requiring only a handful of attentive managers to keep an eye on the machines. By the late 1970s and early 1980s, however, the rapid emergence of personal computers (PCs), and continuing shortages of computer professionals, shifted popular thinking on the issue. When consumers began to adopt low-priced PCs like the Apple II (1977), the IBM PC (1981), and the Commodore 64 (1982) by the millions, it seemed obvious that ground-breaking changes were afoot. The “PC Revolution” opened up new frontiers, employed tens of thousands of people, and (according to some enthusiasts) demanded new approaches to computer literacy.
    [Show full text]
  • Jaguar Quick Start Guide
    Jaguar Quick Start Guide Jaguar 7.6 Quick Start Guide Schrödinger Press Jaguar Quick Start Guide Copyright © 2009 Schrödinger, LLC. All rights reserved. While care has been taken in the preparation of this publication, Schrödinger assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Canvas, CombiGlide, ConfGen, Epik, Glide, Impact, Jaguar, Liaison, LigPrep, Maestro, Phase, Prime, PrimeX, QikProp, QikFit, QikSim, QSite, SiteMap, Strike, and WaterMap are trademarks of Schrödinger, LLC. Schrödinger and MacroModel are registered trademarks of Schrödinger, LLC. MCPRO is a trademark of William L. Jorgensen. Desmond is a trademark of D. E. Shaw Research. Desmond is used with the permission of D. E. Shaw Research. All rights reserved. This publication may contain the trademarks of other companies. Schrödinger software includes software and libraries provided by third parties. For details of the copyrights, and terms and conditions associated with such included third party software, see the Legal Notices for Third-Party Software in your product installation at $SCHRODINGER/docs/html/third_party_legal.html (Linux OS) or %SCHRODINGER%\docs\html\third_party_legal.html (Windows OS). This publication may refer to other third party software not included in or with Schrödinger software ("such other third party software"), and provide links to third party Web sites ("linked sites"). References to such other third party software or linked sites do not constitute an endorsement by Schrödinger, LLC. Use of such other third party software and linked sites may be subject to third party license agreements and fees. Schrödinger, LLC and its affiliates have no responsibility or liability, directly or indirectly, for such other third party software and linked sites, or for damage resulting from the use thereof.
    [Show full text]
  • Oracle Clinical Getting Started Guide
    Oracle® Clinical Getting Started Release 4.6.2 E18819-01 April 2011 Oracle Clinical Getting Started, Release 4.6.2 E18819-01 Copyright © 2003, 2011, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • Appleshare 3-0 Admin
    APPLESHARE SERVER 3.0 ADMINISTRATOR'S QUICKSTART Before You Start This QuickStart is designed to help you get AppleShare Server 3.0 file and print servers ready and running in the shortest possible time. The QuickStart is divided into three sections: - Getting Started - Setting Up File Service - Setting Up Print Service You may not need to read all three sections -- only those that apply to your specific needs. For instance, if you know you will be setting up only a print server, you can skip to the section "Setting Up Print Service" after reading "Getting Started." Getting help This QuickStart assumes you're already familiar with basic Macintosh concepts and tech-niques. However, if you need additional information about AppleShare Server 3.0, you have two other sources of information: Balloon Help, which is built into the AppleShare Server 3.0 software, and the AppleShare Server 3.0 Administrator's Guide. Using Balloon Help If you don't understand the instructions in this guide -- or if you see a window, button, menu, or command you want to know more about -- use Balloon Help: 1. Choose Show Balloons from the Help menu. 2. Position the pointer over the item you want to know more about. A balloon appears with an explanation of that item. You can turn off Balloon Help at any time by choosing Hide Balloons from the Help menu. Using the AppleShare Server 3.0 Administrator's Guide If you still need more information after consulting Balloon Help, see the AppleShare Server 3.0 Administrator's Guide. It's easy to locate the information you need: Each section of this QuickStart corresponds to a section of the AppleShare Server 3.0 Administrator's Guide, where all procedures are explained in detail.
    [Show full text]
  • Newton 2.0 User Interface Guidelines
    Newton 2.0 User Interface Guidelines Addison-Wesley Publishing Company Reading, Massachusetts Menlo Park, California New York Don Mills, Ontario Wokingham, England Amsterdam Bonn Sydney Singapore Tokyo Madrid San Juan Paris Seoul Milan Mexico City Taipei Apple Computer, Inc. Balloon Help, Espy, Geneva, the MERCHANTABILITY, OR FITNESS © 1996, 1994 Apple Computer, Inc. light bulb logo, MessagePad, FOR A PARTICULAR PURPOSE. AS A All rights reserved. NewtonScript, Newton Toolkit, New RESULT, THIS MANUAL IS SOLD “AS IS,” AND YOU, THE PURCHASER, No part of this publication may be York, QuickDraw, and System 7 are ARE ASSUMING THE ENTIRE RISK reproduced, stored in a retrieval trademarks of Apple Computer, Inc. AS TO ITS QUALITY AND system, or transmitted, in any form Adobe Illustrator and PostScript are ACCURACY. or by any means, mechanical, trademarks of Adobe Systems electronic, photocopying, recording, Incorporated, which may be IN NO EVENT WILL APPLE BE or otherwise, without prior written registered in certain jurisdictions. LIABLE FOR DIRECT, INDIRECT, permission of Apple Computer, Inc., FrameMaker is a registered SPECIAL, INCIDENTAL, OR except to make a backup copy of trademark of Frame Technology CONSEQUENTIAL DAMAGES any documentation provided on Corporation. RESULTING FROM ANY DEFECT OR CD-ROM. Printed in the United Helvetica and Palatino are INACCURACY IN THIS MANUAL, States of America. registered trademarks of Linotype even if advised of the possibility of such No licenses, express or implied, are Company. damages. granted with respect to any of the ITC Zapf Dingbats is a registered THE WARRANTY AND REMEDIES technology described in this book. trademark of International Typeface SET FORTH ABOVE ARE EXCLUSIVE Apple retains all intellectual Corporation.
    [Show full text]
  • Qt/Embedded Whitepaper Trolltech Abstract This Whitepaper Describes the Qt/Embedded C++ Toolkit for GUI and Application Developm
    Qt/Embedded Whitepaper Trolltech www.trolltech.com Abstract This whitepaper describes the Qt/Embedded C++ toolkit for GUI and application development on embedded devices. It runs on any device supported by Linux and a C++ compiler. Qt/Embedded provides the entire standard Qt API and can compile out unused features to minimize its memory footprint. Qt/Embedded applications can be developed on familiar desktop systems, e.g. Windows and Unix, and with standard tools. It is provided with all the Qt tools including Qt Designer for visual form design, and with tools specifically tailored to the embedded environment. The Sharp Zaurus PDA using Qt/Embedded Qt/Embedded Whitepaper Trolltech www.trolltech.com Contents 1. Introduction . 3 2. System Requirements . 4 3. Architecture . 5 3.1. Windowing System . 6 3.2. Fonts . 6 3.3. Input Devices . 6 3.4. Input Methods . 7 3.5. Screen Acceleration . 7 4. Development Environment . 7 4.1. Qt's Supporting Tools . 8 5. Signals and Slots . 8 5.1. A Signals and Slots Example . 9 5.2. Meta Object Compiler . 10 6. Widgets . 11 6.1. A `Hello'Example . 11 6.2. Common Widgets . 12 6.3. Canvas . 13 6.4. Custom Widgets . 14 6.5. Main Windows . 16 6.6. Menus . 16 6.7. Toolbars . 17 6.8. Balloon Help . 17 6.9. Actions . 18 7. Dialogs . 18 7.1. Layouts . 18 7.2. Qt Designer . 21 7.3. Built-in Dialogs . 22 8. Look and Feel . 23 8.1. Widget Style . 23 8.2. Window Decorations . 24 9. Internationalization . 24 9.1.
    [Show full text]
  • PDF) This Guide Explains Setup and Startup Procedures for This Application
    Operating Instructions User’s Guide 1 TotalFlow PM 2 Configuring the System 3 Managing System Objects 4 Working with Jobs 5 Security 6 Backing up and Restoring Data 7 Troubleshooting Read this manual carefully before you use this product and keep it handy for future reference. Important TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW: • THE SUPPLIER SHALL NOT BE LIABLE FOR THE RESULT OF OPERATION OF THIS AP- PLICATION OR THE USE OF THIS DOCUMENT. • THE SUPPLIER SHALL NOT BE LIABLE TO YOU FOR DAMAGES OR LOSS OF ANY DOCUMENT OR DATA PRODUCED BY USING THIS APPLICATION. • THE SUPPLIER SHALL NOT BE LIABLE TO YOU FOR ANY CONSEQUENTIAL, INCIDEN- TAL OR INDIRECT DAMAGES (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF BUSINESS INFORMATION, AND THE LIKE) CAUSED BY FAILURE OF THIS APPLICATION OR LOSS OF DOCUMENTS OR DATA, NOR FOR ANY OTHER DAMAGES ARISING OUT OF THE USE OF THIS APPLICA- TION, IF THE SUPPLIER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. • DO NOT REMOVE OR INSERT ANY DISK OR LICENSE KEYS (DONGLES) WHILE OPER- ATING THIS APPLICATION. Cautions Regarding this Guide and General Use of this Application • Some illustrations or explanations in this guide may differ from your application due to improve- ment or change in the application. • The contents of this document are subject to change without notice. • No part of this document may be duplicated, replicated, reproduced in any form, modified or quoted without prior consent of the supplier. • It is possible that documents or data stored in the computer will be damaged or lost due to user error during operation or software error.
    [Show full text]
  • Sirsidynix Symphony 3.2 Essential Skills Training Guide
    SirsiDynix Symphony 3.2 Essential Skills Training Guide DOC-ESSTGEN-S Publication Name: SirsiDynix Symphony 3.2 Essential Skills Training Guide Publication Number: DOC-ESSTGEN-S Version Number: SirsiDynix Symphony 3.2 Last Updated: January 2008 Additional copies of this document can be downloaded from the SirsiDynix Client Care web site, clientcare.sirsidynix.com. © 2008 SirsiDynix. All Rights Reserved. The processes and all the routines contained herein are the proprietary properties and trade secrets of SirsiDynix. Except as provided by license agreement, this manual shall not be duplicated, used, or disclosed for any purpose or reason, in whole or in part, without the express written consent of SirsiDynix. The information in this document is subject to change without notice and should not be construed as a commitment by SirsiDynix. Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in sub- paragraph (b)(3) of the Rights in Technical Data and Computer Software clause in DFARS 252.227-7013. Rights for non-DOD U.S. Government departments and Agencies are as set forth in FAR 52.227-19(c)(1,2). Sirsi®, WebCat®, Vizion®, WorkFlows®, Unicorn®, UnicornECOLE®, UnicornOASIS®, UnicornSTILAS®, Site Source®, DRA®, DRA Net®, Inlex®, MultiLIS®. Taos®, JurisLink™, Corinthian®, Dynix®, URSA®, Horizon™, Remote Patron Authentication™, and TeleCirc™ are trademarks of SirsiDynix. Other product and company names herein may be the trademarks of their respective owners. All titles, versions, trademarks, claims of compatibility, etc., of hardware and software products mentioned herein are the sole property and responsibility of the respective vendors. SirsiDynix makes no endorsement of any particular product for any purpose, nor claims responsibility for its operation and accuracy.
    [Show full text]
  • Operating Instructions Quick Start Guide 1 Quick Start Guide
    RICOH TotalFlow Production Manager Operating Instructions Quick Start Guide 1 Quick Start Guide For information not in this manual, refer to the Help System in your product. Version 4.3.6 Read this manual carefully and keep it handy for future reference. Introduction Important To the maximum extent permitted by applicable laws, in no event will the manufacturer be liable for any damages whatsoever arising out of failures of this product, losses of documents or data, or the use or non-use of this product and operation manuals provided with it. Make sure that you always copy or have backups of important documents or data. Documents or data might be erased due to your operational errors or malfunctions of the machine. Also, you are responsible for taking protective measures against computer viruses, worms, and other harmful software. In no event will the manufacturer be responsible for any documents created by you using this product or any results from the data executed by you. Cautions Regarding This Guide • Some illustrations or explanations in this guide may differ from your application due to improvement or change in the application. • The contents of this document are subject to change without notice. • No part of this document may be duplicated, replicated, reproduced in any form, modified or quoted without prior consent of the manufacturer. Guides for This Application The following guides are available for this application. Instruction Manuals These instruction manuals are included: • Setup Guide (Printed/PDF) This guide explains setup and startup procedures for this application. • Quick Start Guide (Printed) This guide explains how to log in to the application, do a basic configuration, and print the User’s Guide.
    [Show full text]