A Tool for Discovering Software Dependencies

Total Page:16

File Type:pdf, Size:1020Kb

A Tool for Discovering Software Dependencies WinResMon: A Tool for Discovering Software Dependencies, Configuration and Requirements in Microsoft Windows Rajiv Ramnath – National University of Singapore Sufatrio – Temasek Laboratories, National University of Singapore Roland H. C. Yap and Wu Yongzheng – National University of Singapore ABSTRACT This paper describes WinResMon, a system tool for determining resource usage and interactions among programs in Microsoft Windows environments. Think of WinResMon as a debugging tool to assist with software maintenance in a Microsoft Windows environment. It shows the current system state in terms of how resources are used and explains how the system arrived at that state. WinResMon can be used to determine how a program uses the registry and which files are needed by that program. WinResMon differs from other systems/tools in that it is integrated, designed to answer queries about resource usage and dependencies over time, and extensible, allowing the addition of new functions and tools. Introduction clear. The confusion is further compounded by many implicit software interdependencies, e.g., registry keys The tasks of software maintenance and configu- which are part of shared software configurations. As a ration require a precise understanding of system result, it is difficult to know whether to remove a file resources, the individual requirements of each piece of when uninstalling an application. File removal might software, and interdependencies between every soft- lead to problems with another piece software or might ware program on the system. We use the term software create security vulnerabilities. maintenance to describe the system administration task of ensuring that software on a system is config- When installing two or more programs that share ured and maintained correctly over time. Examples of files, one program may cease to function correctly software dependencies include: because the installation of the second blindly over- wrote shared libraries (DLL files). There is also the file sharing: including dynamic libraries and • question of when to perform a major software external data storage upgrade. System administrators may delay upgrading sharing of software configurations: usually in • for fear of breaking existing software; yet such a the form of registry keys in Microsoft Windows choice has its own risks. • interprocess communication and synchronization. This paper focuses on the problem of software Although software maintenance tasks might maintenance in Microsoft Windows NT-based operat- seem conceptually trivial, they can be time consuming ing systems (Microsoft Windows XP, Microsoft Win- and difficult, especially in large or complex environ- dows 2000, Microsoft Windows 2003).1 We present ments. System administrators often rely on documen- Wi n R e s M o n, a discovery and system debugging tool for tation and on-line information such as FAQs or determining a program’s resource usage as well as the forums, but such information is often incomplete. resource usage interactions between multiple programs. In various distributions of Linux, software dependency issues are partly addressed by the use of a Motivation and Applications package manager. The Red Hat Package Manager We believe that the key to solving the software (RPM) [1], for example, records the currently installed maintenance problem is to understand the life cycle of packages and the files required and provided by these the system and programs therein. We also wish to packages in a centralized database. RPM checks empower ordinary users, removing the requirement of dependencies before removing a package to ensure knowing every minutiae of Microsoft Windows. that files required by other installed packages are not Although WinResMon is not tailored specially for system removed. Similar checks are done to prevent installing security, it can also be utilized as a security auditing tool. a package which contains files that conflicts with We designed WinResMon to act as both an infra- other existing packages. structure or framework and a system utility. As a In Microsoft Windows, however, software instal- 1While an appropriate version of a tool similar to WinRes- lation can be complex, and the exact dependencies Mon could also be of use in UNIX, its value is much greater between different software programs might not be in a Microsoft Windows environment. 20th Large Installation System Administration Conference (LISA ’06) 175 WinResMon: A Tool for Discovering Software Dependencies ... Ramnath, Sufatrio, Yap, & Wu framework, it is extensible, and one can therefore add elevated privileges and configure the system to new functionality and build customized tools. As a limit the use of privileges. If it finds applications tool, it comes with pre-built modules to answer typical that require certain administrator privileges to questions about resource usage and dependencies. function correctly, the system administrator can When used as a debugger, WinResMon investi- set up a policy that restricts the administrator gates the current system state, i.e., which program privileges to the needed resources (files, registry uses which registry keys, and determines how the sys- keys, etc.). We remark that this approach can be tem has arrived at that state. WinResMon accom- contrasted with confinement systems such as plishes this by recording information about the evolu- systrace [2] in UNIX. WinResMon is an audit- tion of system software dependencies and resource ing tool, it does not confine system calls, but usage over time. To solve general problems in soft- provides useful input for system administrators ware maintenance, WinResMon monitors: files, the to create policies on resource access which can registry, and interprocess communication and synchro- then be used to limit privileges. nization. However, it is not feasible to continuously 3. Monitoring sensitive registry locations to and permanently record all changes to the system detect spyware. since the required space would be prohibitive. Win- Managing the Microsoft Windows registry is ResMon employs a reasonable compromise by main- difficult due to its complexity. Spyware often taining detailed usage records over the current time takes advantage of this complexity to bury period and a subset of information that can be main- itself in the registry, making it difficult for the tained over the lifetime of all software in the system. user to remove it completely. In [3], the authors have listed the most common entry points for We illustrate the software maintenance problem spyware to enter a Windows NT system. The with some simple examples. One attack vector for following are some of the configuration settings spyware is to register itself as a start-up program, WinResMon can monitor: thereby hiding itself from the end user. Also consider Autostarts: monitor which programs load a music player which may require some sound decod- on startup. ing libraries. This application only functions correctly Internet explorer hooks: track hooks which with certain versions of the libraries. Thus, replacing a define the default search page, toolbars and library can lead to software failure. Various pieces of browser helper objects (BHO), etc. software may also conflict, e.g., two mail transfer Winlogon: look for applications that hook agents (MTAs) usually do not co-exist. into system resources. Some common system administration questions Services: monitor services such as auto- and tasks which WinResMon can assist with include: matic startup services (e.g., task scheduler) 1. Can we safely remove a particular DLL file? or drivers which are installed as services. Some applications provide shared libraries DLL injection: monitor DLL injection (DLL files) for use with other applications. attacks (any application that uses user32.dll When the system administrator uninstalls an can be hijacked by having a DLL injected application, she can also choose to remove the into its process space). DLLs. Removing a DLL can cause other pro- File associations: monitor the registration of grams which still use it to malfunction. On the file extensions with applications. For exam- other hand, blindly retaining all DLLs will ple, .DOC is registered to Microsoft Word. cause the system to keep growing and may cre- ate security vulnerabilities. The system admini- System Design strator generally lacks adequate information to The WinResMon system infrastructure shown in determine whether another program uses a Figure 1 consists of the following components: logger, shared library. WinResMon can be used to archiver, query API, and user-log API. The logger record the utilization of each DLL so that the generates resource-access traces which are later used system administrator can determine which pro- by the analyzer. The archiver performs log com- grams use which DLLs. paction/summarization of old traces. Query and user- 2. Why does a program need administrator privi- log API provide the interface to the trace database. lege to run? Running programs with administrator privilege The Logger is discouraged because malware such as The logger consists of a system call (syscall) viruses/spyware or poorly written applications interceptor and a trace generator module. The syscall can damage the system. However, some pro- interceptor is an in-kernel driver which monitors system grams may need to run as the administrator calls made by each process and sends the monitored without an obvious reason. WinResMon can event information to the trace generator. The trace
Recommended publications
  • THINC: a Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
    THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2011 c 2011 Ricardo A. Baratto This work may be used in accordance with Creative Commons, Attribution-NonCommercial-NoDerivs License. For more information about that license, see http://creativecommons.org/licenses/by-nc-nd/3.0/. For other uses, please contact the author. ABSTRACT THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto THINC is a new virtual and remote display architecture for desktop computing. It has been designed to address the limitations and performance shortcomings of existing remote display technology, and to provide a building block around which novel desktop architectures can be built. THINC is architected around the notion of a virtual display device driver, a software-only component that behaves like a traditional device driver, but instead of managing specific hardware, enables desktop input and output to be intercepted, manipulated, and redirected at will. On top of this architecture, THINC introduces a simple, low-level, device-independent representation of display changes, and a number of novel optimizations and techniques to perform efficient interception and redirection of display output. This dissertation presents the design and implementation of THINC. It also intro- duces a number of novel systems which build upon THINC's architecture to provide new and improved desktop computing services. The contributions of this dissertation are as follows: • A high performance remote display system for LAN and WAN environments.
    [Show full text]
  • Middleware in Action 2007
    Technology Assessment from Ken North Computing, LLC Middleware in Action Industrial Strength Data Access May 2007 Middleware in Action: Industrial Strength Data Access Table of Contents 1.0 Introduction ............................................................................................................. 2 Mature Technology .........................................................................................................3 Scalability, Interoperability, High Availability ...................................................................5 Components, XML and Services-Oriented Architecture..................................................6 Best-of-Breed Middleware...............................................................................................7 Pay Now or Pay Later .....................................................................................................7 2.0 Architectures for Distributed Computing.................................................................. 8 2.1 Leveraging Infrastructure ........................................................................................ 8 2.2 Multi-Tier, N-Tier Architecture ................................................................................. 9 2.3 Persistence, Client-Server Databases, Distributed Data ....................................... 10 Client-Server SQL Processing ......................................................................................10 Client Libraries ..............................................................................................................
    [Show full text]
  • Tizen 2.4 Compliance Specification for Mobile Profile
    Tizen® 2.4 Compliance Specification for Mobile Profile Version 1.0 Copyright© 2014, 2015 Samsung Electronics Co., Ltd. Copyright© 2014, 2015 Intel Corporation Linux is a registered trademark of Linus Torvalds. Tizen® is a registered trademark of The Linux Foundation. ARM is a registered trademark of ARM Holdings Plc. Intel® is a registered trademark of Intel Corporation in the U.S. and/or other countries * Other names and brands may be claimed as the property of others. Revision History Revision Date Author Reason for Changes Tizen 2.2.1 Compliance Specification for 11 Nov. 2013 Tizen TSG Official release Mobile Profile, v1.0 Tizen 2.3 Compliance Specification for 14 Nov 2014 Tizen TSG Official release Mobile Profile, 1.0 Tizen 2.3.1 Compliance Specification for 22 Sep 2015 Tizen TSG Official release Mobile Profile, 1.0 Tizen 2.4 Compliance Specification for 22 Oct 2015 Tizen TSG Official release Mobile Profile, 1.0 Glossary Term Definition Application Binary Interface, the runtime interface between a binary software ABI program and the underlying operating system. Application Programming Interface, the interface between software API components, including methods, data structures and processes. Compliance Certified for full conformance, which was verified by testing. Conformance How well the implementation follows a specification. Cascading Style Sheets, a simple mechanism for adding style such as fonts, CSS colors, and spacing to web documents. Document Object Model, a platform and language-neutral interface that will DOM allow programs and scripts to dynamically access and update the content, structure and style of documents. DTV Digital Television, a target of the TV Profile.
    [Show full text]
  • The Following Documentation Is an Electronically‐ Submitted
    The following documentation is an electronically‐ submitted vendor response to an advertised solicitation from the West Virginia Purchasing Bulletin within the Vendor Self‐Service portal at wvOASIS.gov. As part of the State of West Virginia’s procurement process, and to maintain the transparency of the bid‐opening process, this documentation submitted online is publicly posted by the West Virginia Purchasing Division at WVPurchasing.gov with any other vendor responses to this solicitation submitted to the Purchasing Division in hard copy format. Purchasing Division State of West Virginia 2019 Washington Street East Solicitation Response Post Office Box 50130 Charleston, WV 25305-0130 Proc Folder : 702868 Solicitation Description : Addendum No 2 Supplemental Staffing for Microsoft Applicatio Proc Type : Central Contract - Fixed Amt Date issued Solicitation Closes Solicitation Response Version 2020-06-10 SR 1300 ESR06012000000007118 1 13:30:00 VENDOR VS0000022405 TeXCloud Solutions, Inc Solicitation Number: CRFQ 1300 STO2000000002 Total Bid : $325,000.00 Response Date: 2020-06-10 Response Time: 11:31:14 Comments: FOR INFORMATION CONTACT THE BUYER Melissa Pettrey (304) 558-0094 [email protected] Signature on File FEIN # DATE All offers subject to all terms and conditions contained in this solicitation Page : 1 FORM ID : WV-PRC-SR-001 Line Comm Ln Desc Qty Unit Issue Unit Price Ln Total Or Contract Amount 1 Temporary information technology 2000.00000 HOUR $65.000000 $130,000.00 software developers Comm Code Manufacturer Specification Model # 80111608 Extended Description : Year 1 / Individual 1 2 Temporary information technology 2000.00000 HOUR $65.000000 $130,000.00 software developers 80111608 Year 1 / Individual 2 3 Temporary information technology 500.00000 HOUR $65.000000 $32,500.00 software developers 80111608 Three (3) Month Renewal Option Individual 1 4 Temporary information technology 500.00000 HOUR $65.000000 $32,500.00 software developers 80111608 Three (3) Month Renewal Option Individual 2 Page : 2 TeXCloud Solutions, Inc.
    [Show full text]
  • KGC Khronos API Overview Nov11 Korea
    The State of Gaming APIs Neil Trevett Vice President Mobile Content, NVIDIA President, The Khronos Group © Copyright Khronos Group, 2011 - Page 1 State of Gaming APIs–the Role of Khronos High-end graphics Breakthrough games embrace technology is created on mobility‟s strengths – not just treat high-end platforms phones as small consoles - and will need complex, interoperating APIs e.g. Augmented Reality As platforms diversify – mobile, Mobile is the new platform for games TV, embedded – HTML5 will innovation. Mobile APIs are needed become increasingly important to unlock hardware potential while as a universal app platform conserving battery life © Copyright Khronos Group, 2011 - Page 2 Khronos - Connecting Software to Silicon • Creating open, royalty-free API standards - Focus on graphics, dynamic media, compute and sensor hardware • Low-level - just above raw silicon - “Foundation” functionality needed on every platform • Safe forum for industry cooperation - „By the industry for the industry‟ - Open to any company to join - IP framework to protect members and industry APIs enable software developers to turn silicon functionality into rich end user experiences © Copyright Khronos Group, 2011 - Page 3 Apple Over 100 members – any company worldwide is welcome to join Board of Promoters © Copyright Khronos Group, 2011 - Page 4 3D Evolution on PCs „Doom‟ on a PC – 1993 id Software „Samaritan‟ Real-time Demo on a PC – 2011 Epic Unreal Engine http://www.youtube.com/watch?v=RSXyztq_0uM © Copyright Khronos Group, 2011 - Page 5 OpenGL for Each
    [Show full text]
  • Taxonomy of Cross-Platform Mobile Applications Development Approaches
    Ain Shams Engineering Journal (2015) xxx, xxx–xxx Ain Shams University Ain Shams Engineering Journal www.elsevier.com/locate/asej www.sciencedirect.com ELECTRICAL ENGINEERING Taxonomy of Cross-Platform Mobile Applications Development Approaches Wafaa S. El-Kassas *, Bassem A. Abdullah, Ahmed H. Yousef, Ayman M. Wahba Department of Computer and Systems Engineering, Faculty of Engineering, Ain Shams University, Egypt Received 13 September 2014; revised 30 May 2015; accepted 3 August 2015 KEYWORDS Abstract The developers use the cross-platform mobile development solutions to develop the Cross-platform mobile mobile application once and run it on many platforms. Many of these cross-platform solutions development; are still under research and development. Also, these solutions are based on different approaches Interpretation approach; such as Cross-Compilation approach, Virtual Machine approach, and Web-Based approach. There Cloud computing; are many survey papers about the cross-platform mobile development solutions but they do not Compilation approach; include the most recent approaches, including Component-Based approach, Cloud-Based Component-Based approach, and Merged approach. The main aim of this paper is helping the researchers to know approach; the most recent approaches and the open research issues. This paper surveys the existing cross- Model-Driven Engineering platform mobile development approaches and attempts to provide a global view: it thoroughly introduces a comprehensive categorization to the cross-platform approaches, defines the pros and cons of each approach, explains sample solutions per approach, compares the cross-platform mobile development solutions, and ends with the open research areas. Ó 2015 Faculty of Engineering, Ain Shams University. Production and hosting by Elsevier B.V.
    [Show full text]
  • Exposing Native Device Apis to Web Apps
    Exposing Native Device APIs to Web Apps Arno Puder Nikolai Tillmann Michał Moskal San Francisco State University Microsoft Research Microsoft Research Computer Science One Microsoft Way One Microsoft Way Department Redmond, WA 98052 Redmond, WA 98052 1600 Holloway Avenue [email protected] [email protected] San Francisco, CA 94132 [email protected] ABSTRACT language of the respective platform, HTML5 technologies A recent survey among developers revealed that half plan to gain traction for the development of mobile apps [12, 4]. use HTML5 for mobile apps in the future. An earlier survey A recent survey among developers revealed that more than showed that access to native device APIs is the biggest short- half (52%) are using HTML5 technologies for developing mo- coming of HTML5 compared to native apps. Several dif- bile apps [22]. HTML5 technologies enable the reuse of the ferent approaches exist to overcome this limitation, among presentation layer and high-level logic across multiple plat- them cross-compilation and packaging the HTML5 as a na- forms. However, an earlier survey [21] on cross-platform tive app. In this paper we propose a novel approach by using developer tools revealed that access to native device APIs a device-local service that runs on the smartphone and that is the biggest shortcoming of HTML5 compared to native acts as a gateway to the native layer for HTML5-based apps apps. Several different approaches exist to overcome this running inside the standard browser. WebSockets are used limitation. Besides the development of native apps for spe- for bi-directional communication between the web apps and cific platforms, popular approaches include cross-platform the device-local service.
    [Show full text]
  • React-Native.Pdf
    react-native #react- native Table of Contents About 1 Chapter 1: Getting started with react-native 2 Remarks 2 Examples 2 Setup for Mac 2 Setup for Windows 14 Setup for Linux (Ubuntu) 15 Start the terminal and run the following commands to install nodeJS: 15 If node command is unavailable 15 Alternatives NodeJS instalations: 16 check if you have the current version 16 Run the npm to install the react-native 16 Android SDK or Android Studio 16 Android SDK e ENV 16 Example app init 17 Obs: Always check if the version on android/app/build.gradle is the same as the Build Tool 17 Open Android AVD to set up a virtual android. Execute the command line: 18 Chapter 2: Android - Hardware Back Button 19 Examples 19 Detect Hardware back button presses in Android 19 Example of BackAndroid along with Navigator 19 Example of Hardware back button detection using BackHandler 20 Hardware back button handling using BackHandler and Navigation Properties (without using d 20 Chapter 3: Animation API 22 Examples 22 Animate an Image 22 Chapter 4: Command Line Instructions 23 Examples 23 Check version installed 23 Upgrade existing project to latest RN version 23 Logging 23 Initialize and getting started with React Native project 23 Start React Native Packager 24 Add android project for your app 24 Chapter 5: Components 25 Examples 25 Basic Component 25 Stateful Component 25 Stateless Component 25 Chapter 6: Create a shareable APK for android 27 Introduction 27 Remarks 27 Examples 27 Create a key to sign the APK 27 Once the key is generated, use it to generate
    [Show full text]
  • Defeating Kernel Native API Hookers by Direct Kiservicetable Restoration
    Defeating Kernel Native API Hookers by Direct KiServiceTable Restoration Tan Chew Keong Vice-President SIG2 www.security.org.sg IT Security... the Gathering. By enthusiasts for enthusiasts! Outline • User-space API calls and Native APIs • Redirecting the execution path of Native APIs • Locating and restoring the KiServiceTable • Defeating Native API hooking rootkits and security tools. IT Security... the Gathering. By enthusiasts for enthusiasts! User-space API calls • User-space Win32 applications requests for system services by calling APIs exported by various DLLs. • For example, to write to an open file, pipe or device, the WriteFile API, exported by kernel32.dll is used. IT Security... the Gathering. By enthusiasts for enthusiasts! User-space API calls • WriteFile API will in turn call the native API NtWriteFile/ZwWriteFile that is exported by ntdll.dll • In ntdll.dll, both NtWriteFile and ZwWriteFile points to the same code. • Actual work is actually performed in kernel- space, hence NtWriteFile/ZwWritefile in ntdll.dll contains only minimal code to transit into kernel code using software interrupt INT 0x2E IT Security... the Gathering. By enthusiasts for enthusiasts! User-space API calls • In Win2k, NtWriteFile/ZwWriteFile in ntdll.dll disassembles to MOV EAX, 0EDh LEA EDX, DWORD PTR SS:[ESP+4] INT 2E RETN 24 • 0xED is the system service number that will be used to index into the KiServiceTable to locate the kernel function that handles the call. IT Security... the Gathering. By enthusiasts for enthusiasts! User-space API calls Application WriteFile() kernel32.dll Nt/ZwWriteFile() mov eax, system service num ntdll.dll lea edx, pointer to parameters int 0x2E ntoskrnl.exe NtWriteFile() IT Security..
    [Show full text]
  • Detecting Wastedlocker Ransomware Using Security Analytics
    Securonix Threat Research: Detecting WastedLocker Ransomware Using Security Analytics Oleg Kolesnikov Securonix Threat Research Team Created on: July 28, 2020 Last Updated: August 18, 2020 Figure 1: Victim’s Systems Targeted by WastedLocker Unavailable (July 2020) The Securonix Threat Research Team (STR) is actively investigating the details of the critical targeted Wastedlocker ransomware attacks that reportedly already exploited more than 31 companies, with 8 of the victims being Fortune 500 companies [1], to help our customers detect, mitigate, and respond to such attacks. Here are some of the key technical details and our recommendations on possible Securonix predictive indicators/security analytics that can be used to detect the current and potentially future attack variants (these indicators may be updated as we receive more information.) 2 www.securonix.com Figure 2: WastedLocker/EvilCorp Attack in Progress - Targeting a Victim Company in a Recent High-Profile Attack Impact Here are the key details regarding the impact of the high-profile WastedLocker ransomware attacks/ EvilCorp malicious cyber threat actor(s)(MTA) involved: • The WastedLocker ransomware is a relatively new malicious payload used by the high-profile EvilCorp MTA, which previously used the Dridex trojan to deploy BitPaymer ransomware in attacks targeting government organizations and enterprises in the United States and Europe. (See Figure 1) • This MTA currently focuses on targeted “big game hunting” (BGH) ransomware attacks with multiple industry victims in recent months, with Garmin as one of the latest high-profile victims attacked (officially confirmed by Garmin on July 27). (See Figure 2) • The most recent ransom amount demanded was US$10M and appears to be based on the victim’s financial data.
    [Show full text]
  • Windows Internals for .NET Developers
    Windows Internals for .NET Developers Pavel Yosifovich @zodiacon [email protected] Agenda •Windows Architecture and .NET •Jobs •Threads •Kernel Objects •Windows Runtime •Summary 2 About Me • Developer, Trainer, Author and Speaker • Co-author: Windows Internals 7th edition, Part 1 (2017) • Author: WPF Cookbook (2012), Mastering Windows 8 C++ App Development (2013) • Pluralsight author • Author of several open-source tools (http://github.com/zodiacon) • Blogs: http://blogs.microsoft.co.il/pavely, https://scorpiosoftware.net/ 3 Windows Architecture Overview Subsystem System Service Process User Processes Processes Processes (CSRSS.exe) CLR / .NET FCL Subsystem DLLs NTDLL.DLL User Mode Executive Kernel Mode Win32k.Sys Device Drivers Kernel Hardware Abstraction Layer (HAL) Hyper-V Hypervisor Kernel Mode (hypervisor context) 4 .NET Today •Part of Windows • Fully supported •User mode only • Kernel mode CLR/.NET possible (e.g. “Singularity”) •Not a complete wrapper over the Windows API • Opportunities to extend and optimize •What about .NET Core? 5 Windows Numeric Versions • Windows NT 4 (4.0) // get version... • Windows 2000 (5.0) if(version.Major >= 5 && version.Minor >= 1) { // XP or later: good to go!? • Windows XP (5.1) } • Windows Server 2003, 2003 R2 (5.2) • Windows Vista, Server 2008 (6.0) • Windows 7, Server 2008 R2 (6.1) • Windows 8, Server 2012 (6.2) • Windows 8.1, Server 2012 R2 (6.3) By default, reported as 6.2 • Windows 10, Server 2016 (10.0) By default, reported as 6.2 6 Windows Versions 7 Windows Subsystem APIs • Windows API (“Win32”)
    [Show full text]
  • Deploying Web Services with .NET
    Corticon Server: Deploying Web Services with .NET Notices Copyright agreement © 2013 Progress Software Corporation and/or its subsidiaries or affiliates. All rights reserved. These materials and all Progress® software products are copyrighted and all rights are reserved by Progress Software Corporation. The information in these materials is subject to change without notice, and Progress Software Corporation assumes no responsibility for any errors that may appear therein. The references in these materials to specific platforms supported are subject to change. Apama, Business Empowerment, Business Making Progress, Corticon, Corticon (and design), DataDirect (and design), DataDirect Connect, DataDirect Connect64, DataDirect XML Converters, DataDirect XQuery, Empowerment Center, Fathom, Making Software Work Together, OpenEdge, Powered by Progress, PowerTier, Progress, Progress Control Tower, Progress Dynamics, Progress Business Empowerment, Progress Empowerment Center, Progress Empowerment Program, Progress OpenEdge, Progress Profiles, Progress Results, Progress RPM, Progress Software Business Making Progress, Progress Software Developers Network, ProVision, PS Select, RulesCloud, RulesWorld, SequeLink, SpeedScript, Stylus Studio, Technical Empowerment, WebSpeed, Xcalia (and design), and Your Software, Our Technology±Experience the Connection are registered trademarks of Progress Software Corporation or one of its affiliates or subsidiaries in the U.S. and/or other countries. AccelEvent, Apama Dashboard Studio, Apama Event Manager, Apama
    [Show full text]