TIBCO Jasperreports® Server Administrator Guide

Total Page:16

File Type:pdf, Size:1020Kb

TIBCO Jasperreports® Server Administrator Guide TIBCO JasperReports® Server Administrator Guide Software Release 7.8 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. ANY SOFTWARE ITEM IDENTIFIED AS THIRD PARTY LIBRARY IS AVAILABLE UNDER SEPARATE SOFTWARE LICENSE TERMS AND IS NOT PART OF A TIBCO PRODUCT. AS SUCH, THESE SOFTWARE ITEMS ARE NOT COVERED BY THE TERMS OF YOUR AGREEMENT WITH TIBCO, INCLUDING ANY TERMS CONCERNING SUPPORT, MAINTENANCE, WARRANTIES, AND INDEMNITIES. DOWNLOAD AND USE OF THESE ITEMS IS SOLELY AT YOUR OWN DISCRETION AND SUBJECT TO THE LICENSE TERMS APPLICABLE TO THEM. BY PROCEEDING TO DOWNLOAD, INSTALL OR USE ANY OF THESE ITEMS, YOU ACKNOWLEDGE THE FOREGOING DISTINCTIONS BETWEEN THESE ITEMS AND TIBCO PRODUCTS. This document is subject to U.S. and international copyright laws and treaties. No part of this document may be reproduced in any form without the written authorization of TIBCO Software Inc. TIBCO, the TIBCO logo, Jaspersoft, JasperReports, and Visualize.js are registered trademarks of TIBCO Software Inc. in the United States and/or other countries. Java and all Java based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates. All other product and company names and marks mentioned in this document are the property of their respective owners and are mentioned for identification purposes only. THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. THIS DOCUMENT COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN; THESE CHANGES WILL BE INCORPORATED IN NEW EDITIONS OF THIS DOCUMENT. TIBCO SOFTWARE INC. MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE PRODUCT(S) AND/OR THE PROGRAM(S) DESCRIBED IN THIS DOCUMENT AT ANY TIME. THE CONTENTS OF THIS DOCUMENT MAY BE MODIFIED AND/OR QUALIFIED, DIRECTLY OR INDIRECTLY, BY OTHER DOCUMENTATION WHICH ACCOMPANIES THIS SOFTWARE, INCLUDING BUT NOT LIMITED TO ANY RELEASE NOTES AND "READ ME" FILES. This and other products of TIBCO Software Inc. may be covered by registered patents. Please refer to TIBCO's Virtual Patent Marking document (https://www.tibco.com/patents) for details. Copyright © 2005-2020. TIBCO Software Inc. All Rights Reserved. Version 0820-JSP78-32 of the TIBCO JasperReports Server Administrator Guide TABLE OF CONTENTS Chapter 1 Overview of JasperReports Server Administration 11 1.1 Overview of Organizations 12 1.1.1 Single Default Organization 12 1.1.2 Multiple Organizations 13 1.1.3 Levels of Administrators 13 1.2 Overview of the Repository 14 1.2.1 Folder Structure 14 1.2.2 Resources 15 1.2.3 Browsing and Searching 16 1.3 Overview of Users and Roles 17 1.3.1 Administering Users and Roles 17 1.3.2 Delegated Administration 18 1.4 Overview of Security 18 1.5 Administrator Login 20 1.5.1 JasperReports Server Heartbeat 20 1.5.2 Administrator Email 21 1.6 Administrator Pages 21 Chapter 2 User and Role Management 25 2.1 Managing Organizations 25 2.1.1 Viewing Organization Properties 27 2.1.2 Creating an Organization 27 2.1.3 Default Folders for Organizations 28 2.1.4 Editing an Organization 29 2.1.5 Deleting an Organization 30 2.2 Managing Users 30 2.2.1 Viewing User Properties 31 2.2.2 Creating a User 32 2.2.3 Editing a User 33 2.2.4 Enabling or Disabling Multiple Users 34 2.2.5 Deleting One or More Users 34 2.3 Managing Roles 34 2.3.1 Viewing Role Properties 36 TIBCO Software Inc. 3 TIBCO JasperReports Server Administrator Guide 2.3.2 Creating a Role 37 2.3.3 Assigning Users to a Role 37 2.3.4 Deleting One or More Roles 38 2.4 Managing Attributes 39 2.4.1 Referencing Attributes 39 2.4.2 Attribute Hierarchy 40 2.4.3 Attribute Encryption 40 2.4.4 Attribute Permissions 41 2.4.5 Managing Server Attributes 42 2.4.6 Managing Organization Attributes 43 2.4.7 Managing User Attributes 46 Chapter 3 Repository Administration 49 3.1 Resource Types 49 3.2 JasperReport Structure 51 3.2.1 Referencing Resources in the Repository 52 3.2.2 Absolute References 52 3.2.3 Local Resources and External References 53 3.2.4 References in Subreports 54 3.2.5 Data Snapshots 54 3.3 Managing Folders and Resources 54 3.3.1 Resource IDs 54 3.3.2 Creating Folders 55 3.3.3 Adding Resources 56 3.3.4 Renaming Folders and Resources 57 3.3.5 Copying and Moving 58 3.3.6 Editing Resources 59 3.3.7 Deleting Folders and Resources 60 3.4 Multiple Organizations in the Repository 61 3.4.1 Organization Folders 61 3.4.2 Design Considerations 61 3.4.3 Referencing Resources in the Repository 62 3.4.4 Best Practices 63 3.5 Repository Permissions 63 3.5.1 Inheriting Permissions 65 3.5.2 Cumulative Permissions 65 3.5.3 Administrator Permissions 65 3.5.4 Execute-Only Permission 66 3.5.5 Default User Permissions 66 3.5.6 Setting Permissions 66 3.5.7 Testing User Permissions 68 Chapter 4 Data Sources 71 4.1 Attributes in Data Source Definitions 72 4.2 JDBC Data Sources 74 4.3 Managing JDBC Drivers 76 4.4 JNDI Data Sources 79 4 TIBCO Software Inc. 4.5 AWS Data Sources 81 4.5.1 Creating an AWS Data Source 81 4.5.2 Filtering the Regions For AWS Data Source 84 4.6 Azure SQL Data Sources 84 4.6.1 Uploading an Azure Certificate File to the Repository 84 4.6.2 Creating an Azure SQL Server Data Source 85 4.7 Hadoop-Hive Data Sources 86 4.8 MongoDB Data Sources 87 4.8.1 Creating a MongoDB Data Source with the Native MongoDB Driver 87 4.8.2 Creating a MongoDB JDBC Data Source 89 4.8.3 Using Kerberos Authentication with MongoDB Data Sources 91 4.8.4 Creating a Schema with the Schema Tool 92 4.8.5 Uploading a Schema to the Repository 92 4.9 Virtual Data Sources 92 4.9.1 Performance Considerations 95 4.9.2 Creating Cassandra Data Connectors 95 4.9.3 Logging for Virtual Data Sources 96 4.10 TIBCO Data Virtualization 96 4.11 XLS and XLSX Data Sources 99 4.12 File Data Sources 101 4.13 Bean Data Sources 104 Chapter 5 Other Resources in the Repository 107 5.1 Queries 107 5.2 Datatypes 109 5.3 Lists of Values 110 5.4 Input Controls 111 5.5 Query-based Input Controls 114 5.5.1 Creating a Query-based Input Control 114 5.5.2 Built-in Parameters for Query-based Input Controls 118 5.5.3 Domain-based Queries 120 5.6 Cascading Input Controls 122 5.6.1 Parameters in Input Control Queries 122 5.6.2 Creating a Cascading Input Control 124 5.7 File Resources 128 5.7.1 Fonts 129 5.7.2 JAR Files 129 5.7.3 Resource Bundles 130 5.7.4 Creating a File Resource 130 5.7.5 Editing a File Resource 131 5.7.6 Uploading an SSH Private Key File to the Repository 131 Chapter 6 Themes 133 6.1 Introduction to Themes 133 6.2 How Themes Work 134 6.2.1 Theme Files 136 6.2.2 Inheritance 137 TIBCO Software Inc. 5 TIBCO JasperReports Server Administrator Guide 6.2.3 CSS Priority Scheme and Custom Overrides 137 6.2.4 Propagation 138 6.3 Administering Themes 139 6.3.1 Setting the System Theme 140 6.3.2 Setting an Organization Theme 141 6.3.3 Restricting Access to Themes 142 6.4 Creating Themes 143 6.4.1 Creating Theme Folders and File Resources 144 6.4.2 Downloading and Uploading Theme ZIP Files 144 6.4.3 Placing Themes in the Folder Template 146 6.5 Working With CSS Files 146 6.5.1 Theme Development Workflow 146 6.5.2 Firefox Web Developer Tools 147 6.5.3 Test Platform 147 6.5.4 Modifying the Appearance of Jaspersoft OLAP 148 Chapter 7 Import and Export 149 7.1 Import and Export Catalogs 149 7.2 Dependencies During Import and Export 150 7.3 The Import-Export Encryption Keys 150 7.4 Import and Export Through the Web UI 152 7.4.1 Exporting from the Repository 152 7.4.2 Exporting from the Settings 154 7.4.3 Exporting from Organizations 156 7.4.4 Importing to Organizations 158 7.4.5 Importing from the Settings 160 7.5 Import and Export Through the Command Line 162 7.5.1 Exporting from the Command Line 163 7.5.2 Importing from the Command Line 166 7.5.3 Configuring Import-Export Utilities 168 7.6 Alternate Import-Export Scripts 169 7.6.1 Running Import from Buildomatic 169 7.6.2 Running Export from Buildomatic 170 Chapter 8 System Configuration 171 8.1 Configuration Settings in the User Interface 172 8.1.1 Understanding Persistent Settings 173 8.1.2 Restoring Default Settings 174 8.2 Configuration for Using Proxies 175 8.3 Configuration for Session Persistence 176 8.4 Enabling Compression in Tomcat 178 8.5 Configuring Ad Hoc 178 8.5.1 Ad Hoc Query Settings 179 8.5.2 Ad Hoc Data Policies 180 8.5.3 Ad Hoc Data Policies for Big Data 181 8.5.4 Ad Hoc Templates and Report Generators 182 8.5.5 Ad Hoc Configuration File 183 6 TIBCO Software Inc.
Recommended publications
  • CIO Guide to Application Modernization
    CIO Guide to Application Modernization May 2020 2 What You Need To Know The global pandemic has put unexpected pressures on businesses of all sorts — in ways no one was projecting at the beginning of the year. As a result, CIOs face a series of urgent challenges: • How can they raise system visibility and system control over operations that are more dispersed and changing than ever? • How can they cut costs, yet create a more agile and responsive IT system? • How can they do more with older data, even as they understand better the data from a market that is changing every week? • How can they help people work faster, with a minimum of change management, or set the stage for growth, while preserving capital? In many cases the answer is a step-by-step deployment of cloud computing technology, tailored to meet the most pressing needs first. Working with a comprehensive cloud provider, it is possible to create cloud systems that respect and preserve core assets, while enabling rapid modernization, in particular for the cost-aware agility and resilience of modern application architecture. Why You Should Keep Reading This guide offers a series of approaches to application modernization, from identifying needs and developing an action-oriented roadmap, to methods of identifying and effecting meaningful change in the most critical parts of your IT operations. We have also included at the end a list of key solutions that Google Cloud and our technology partners have to give your organization fast results. 3 Introduction Even before the current crisis, IT organizations saw pressure to be more agile and innovative.
    [Show full text]
  • Proquest Dissertations
    REPROGRAMMING THE LYRIC: A GENRE APPROACH FOR CONTEMPORARY DIGITAL POETRY HOLLY DUPEJ A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS GRADUATE PROGRAM IN COMMUNICATIONS AND CULTURE YORK UNIVERSITY, TORONTO, ONTARIO APRIL 2008 Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-38769-6 Our file Notre reference ISBN: 978-0-494-38769-6 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Plntemet, prefer, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation.
    [Show full text]
  • Lexical Innovation on the Internet - Neologisms in Blogs
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2009 Lexical innovation on the internet - neologisms in blogs Smyk-Bhattacharjee, Dorota Abstract: Studien im Bereich des Sprachwandels beschreiben traditionellerweise diachronische Verän- derungen in den Kernsubsystemen der Sprache und versuchen, diese zu erklären. Obwohl ein Grossteil der Sprachwissenschaftler sich darüber einig ist, dass die aktuellen Entwicklungen in einer Sprache am klarsten im Wortschatz reflektiert werden, lassen die lexikographischen und morphologischen Zugänge zur Beobachtung des lexikalischen Wandels wichtige Fragen offen. So beschäftigen sich letztere typischer- weise mit Veränderungen, die schon stattgefunden haben, statt sich dem sich zum aktuellen Zeitpunkt vollziehenden Wandel zu widmen. Die vorliegende Dissertation bietet eine innovative Lösung zur Un- tersuchung des sich vollziehenden lexikalischen Wandels sowohl in Bezug auf die Datenquelle als auch bzgl. der verwendeten Methodologie. In den vergangenen 20 Jahren hat das Internet unsere Art zu leben, zu arbeiten und zu kommunizieren drastisch beeinflusst. Das Internet bietet aber auch eine Masse an frei zugänglichen Sprachdaten und damit neue Möglichkeiten für die Sprachforschung. Die in dieser Arbeit verwendeten Daten stammen aus einem Korpus englischsprachiger Blogs, eine Art Computer gestützte Kommunikation (computer-mediated communication, CMC). Blogs bieten eine neue, beispiel- lose Möglichkeit, Wörtern nachzuspüren zum Zeitpunkt, in der sie Eingang in die Sprache finden. Um die Untersuchung des Korpus zu vereinfachen, wurde eine Software mit dem Namen Indiana entwickelt. Dieses Instrument verbindet den Korpus basierten Zugang mit einer lexikographischen Analyse. Indiana verwendet eine Kombination von HTML-to-text converter, eine kumulative Datenbank und verschiede Filter, um potentielle Neologismen im Korpus identifizieren zu können.
    [Show full text]
  • Bigquery SQL Example: Simple Aggregates
    Crunching Big Data with Big Query Ryan Boyd, Developer Advocate Jordan Tigani, Software Engineer How BIG is big? 1 million rows? 1 million 1 million 1 million 1 million 1 million 1 million10 million rows? 1 million 1 million 1 million 1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million100 1million million 1 million rows?1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 500million million11 millionmillion 1million1 million million11 million 1million1 million millionrows?11 million 1million1 million million 11 million 1million1 million
    [Show full text]
  • Vendor Contract
    d/W^sEKZ'ZDEd ĞƚǁĞĞŶ t'ŽǀĞƌŶŵĞŶƚ͕>>ĂŶĚ d,/EdZ>K>WhZ,^/E'^z^dD;d/W^Ϳ &Žƌ Z&Wϭϴ1102 Internet & Network Security 'ĞŶĞƌĂů/ŶĨŽƌŵĂƚŝŽŶ dŚĞsĞŶĚŽƌŐƌĞĞŵĞŶƚ;͞ŐƌĞĞŵĞŶƚ͟ͿŵĂĚĞĂŶĚĞŶƚĞƌĞĚŝŶƚŽďLJĂŶĚďĞƚǁĞĞŶdŚĞ/ŶƚĞƌůŽĐĂů WƵƌĐŚĂƐŝŶŐ^LJƐƚĞŵ;ŚĞƌĞŝŶĂĨƚĞƌƌĞĨĞƌƌĞĚƚŽĂƐ͞d/W^͟ƌĞƐƉĞĐƚĨƵůůLJͿĂŐŽǀĞƌŶŵĞŶƚĐŽŽƉĞƌĂƚŝǀĞ ƉƵƌĐŚĂƐŝŶŐƉƌŽŐƌĂŵĂƵƚŚŽƌŝnjĞĚďLJƚŚĞZĞŐŝŽŶϴĚƵĐĂƚŝŽŶ^ĞƌǀŝĐĞĞŶƚĞƌ͕ŚĂǀŝŶŐŝƚƐƉƌŝŶĐŝƉĂůƉůĂĐĞ ŽĨďƵƐŝŶĞƐƐĂƚϰϴϰϱh^,ǁLJϮϳϭEŽƌƚŚ͕WŝƚƚƐďƵƌŐ͕dĞdžĂƐϳϱϲϴϲ͘dŚŝƐŐƌĞĞŵĞŶƚĐŽŶƐŝƐƚƐŽĨƚŚĞ ƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚďĞůŽǁ͕ŝŶĐůƵĚŝŶŐƉƌŽǀŝƐŝŽŶƐŽĨĂůůƚƚĂĐŚŵĞŶƚƐƌĞĨĞƌĞŶĐĞĚŚĞƌĞŝŶ͘/ŶƚŚĞĞǀĞŶƚŽĨ ĂĐŽŶĨůŝĐƚďĞƚǁĞĞŶƚŚĞƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚďĞůŽǁĂŶĚƚŚŽƐĞĐŽŶƚĂŝŶĞĚŝŶĂŶLJƚƚĂĐŚŵĞŶƚ͕ƚŚĞ ƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚƐŚĂůůĐŽŶƚƌŽů͘ dŚĞǀĞŶĚŽƌŐƌĞĞŵĞŶƚƐŚĂůůŝŶĐůƵĚĞĂŶĚŝŶĐŽƌƉŽƌĂƚĞďLJƌĞĨĞƌĞŶĐĞƚŚŝƐŐƌĞĞŵĞŶƚ͕ƚŚĞƚĞƌŵƐĂŶĚ ĐŽŶĚŝƚŝŽŶƐ͕ƐƉĞĐŝĂůƚĞƌŵƐĂŶĚĐŽŶĚŝƚŝŽŶƐ͕ĂŶLJĂŐƌĞĞĚƵƉŽŶĂŵĞŶĚŵĞŶƚƐ͕ĂƐǁĞůůĂƐĂůůŽĨƚŚĞƐĞĐƚŝŽŶƐ ŽĨƚŚĞƐŽůŝĐŝƚĂƚŝŽŶĂƐƉŽƐƚĞĚ͕ŝŶĐůƵĚŝŶŐĂŶLJĂĚĚĞŶĚĂĂŶĚƚŚĞĂǁĂƌĚĞĚǀĞŶĚŽƌ͛ƐƉƌŽƉŽƐĂů͘͘KƚŚĞƌ ĚŽĐƵŵĞŶƚƐƚŽďĞŝŶĐůƵĚĞĚĂƌĞƚŚĞĂǁĂƌĚĞĚǀĞŶĚŽƌ͛ƐƉƌŽƉŽƐĂůƐ͕ƚĂƐŬŽƌĚĞƌƐ͕ƉƵƌĐŚĂƐĞŽƌĚĞƌƐĂŶĚĂŶLJ ĂĚũƵƐƚŵĞŶƚƐǁŚŝĐŚŚĂǀĞďĞĞŶŝƐƐƵĞĚ͘/ĨĚĞǀŝĂƚŝŽŶƐĂƌĞƐƵďŵŝƚƚĞĚƚŽd/W^ďLJƚŚĞƉƌŽƉŽƐŝŶŐǀĞŶĚŽƌĂƐ ƉƌŽǀŝĚĞĚďLJĂŶĚǁŝƚŚŝŶƚŚĞƐŽůŝĐŝƚĂƚŝŽŶƉƌŽĐĞƐƐ͕ƚŚŝƐŐƌĞĞŵĞŶƚŵĂLJďĞĂŵĞŶĚĞĚƚŽŝŶĐŽƌƉŽƌĂƚĞĂŶLJ ĂŐƌĞĞĚĚĞǀŝĂƚŝŽŶƐ͘ dŚĞĨŽůůŽǁŝŶŐƉĂŐĞƐǁŝůůĐŽŶƐƚŝƚƵƚĞƚŚĞŐƌĞĞŵĞŶƚďĞƚǁĞĞŶƚŚĞƐƵĐĐĞƐƐĨƵůǀĞŶĚŽƌƐ;ƐͿĂŶĚd/W^͘ ŝĚĚĞƌƐƐŚĂůůƐƚĂƚĞ͕ŝŶĂƐĞƉĂƌĂƚĞǁƌŝƚŝŶŐ͕ĂŶĚŝŶĐůƵĚĞǁŝƚŚƚŚĞŝƌƉƌŽƉŽƐĂůƌĞƐƉŽŶƐĞ͕ĂŶLJƌĞƋƵŝƌĞĚ ĞdžĐĞƉƚŝŽŶƐŽƌĚĞǀŝĂƚŝŽŶƐĨƌŽŵƚŚĞƐĞƚĞƌŵƐ͕ĐŽŶĚŝƚŝŽŶƐ͕ĂŶĚƐƉĞĐŝĨŝĐĂƚŝŽŶƐ͘/ĨĂŐƌĞĞĚƚŽďLJd/W^͕ƚŚĞLJ ǁŝůůďĞŝŶĐŽƌƉŽƌĂƚĞĚŝŶƚŽƚŚĞĨŝŶĂůŐƌĞĞŵĞŶƚ͘ WƵƌĐŚĂƐĞKƌĚĞƌ͕ŐƌĞĞŵĞŶƚŽƌŽŶƚƌĂĐƚŝƐƚŚĞd/W^DĞŵďĞƌ͛ƐĂƉƉƌŽǀĂůƉƌŽǀŝĚŝŶŐƚŚĞ ĂƵƚŚŽƌŝƚLJƚŽƉƌŽĐĞĞĚǁŝƚŚƚŚĞŶĞŐŽƚŝĂƚĞĚĚĞůŝǀĞƌLJŽƌĚĞƌƵŶĚĞƌƚŚĞŐƌĞĞŵĞŶƚ͘^ƉĞĐŝĂůƚĞƌŵƐ
    [Show full text]
  • The Evolution of Cloud Computing
    Read the complete book: www.bcs.org/books/cloud Read the complete book: www.bcs.org/books/cloud THE EVOLUTION OF CLOUD COMPUTING Read the complete book: www.bcs.org/books/cloud BCS, THE CHARTERED INSTITUTE FOR IT BCS, The Chartered Institute for IT, is committed to making IT good for society. We use the power of our network to bring about positive, tangible change. We champion the global IT profession and the interests of individuals engaged in that profession, for the benefit of all. Exchanging IT expertise and knowledge The Institute fosters links between experts from industry, academia and business to promote new thinking, education and knowledge sharing. Supporting practitioners Through continuing professional development and a series of respected IT qualifica- tions, the Institute seeks to promote professional practice tuned to the demands of business. It provides practical support and information services to its members and volunteer communities around the world. Setting standards and frameworks The Institute collaborates with government, industry and relevant bodies to establish good working practices, codes of conduct, skills frameworks and common standards. It also offers a range of consultancy services to employers to help them adopt best practice. Become a member Over 70,000 people including students, teachers, professionals and practitioners enjoy the benefits of BCS membership. These include access to an international community, invitations to a roster of local and national events, career development tools and a quar- terly thought-leadership magazine. Visit www.bcs.org/membership to find out more. Further Information BCS, The Chartered Institute for IT, First Floor, Block D, North Star House, North Star Avenue, Swindon, SN2 1FA, United Kingdom.
    [Show full text]
  • Building Secure and Reliable Systems
    Building Secure & Reliable Systems Best Practices for Designing, Implementing and Maintaining Systems Compliments of Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea & Adam Stubblefi eld Praise for Building Secure and Reliable Systems It is very hard to get practical advice on how to build and operate trustworthy infrastructure at the scale of billions of users. This book is the first to really capture the knowledge of some of the best security and reliability teams in the world, and while very few companies will need to operate at Google’s scale many engineers and operators can benefit from some of the hard-earned lessons on securing wide-flung distributed systems. This book is full of useful insights from cover to cover, and each example and anecdote is heavy with authenticity and the wisdom that comes from experimenting, failing and measuring real outcomes at scale. It is a must for anybody looking to build their systems the correct way from day one. —Alex Stamos, Director of the Stanford Internet Observatory and former CISO of Facebook and Yahoo This book is a rare treat for industry veterans and novices alike: instead of teaching information security as a discipline of its own, the authors offer hard-wrought and richly illustrated advice for building software and operations that actually stood the test of time. In doing so, they make a compelling case for reliability, usability, and security going hand-in-hand as the entirely inseparable underpinnings of good system design. —Michał Zalewski, VP of Security Engineering at Snap, Inc. and author of The Tangled Web and Silence on the Wire This is the “real world” that researchers talk about in their papers.
    [Show full text]
  • Extrahop 8.1 Admin UI Guide © 2020 Extrahop Networks, Inc
    ExtraHop 8.1 Admin UI Guide © 2020 ExtraHop Networks, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior written approval from ExtraHop Networks, Inc. For more documentation, see https://docs.extrahop.com/. Published: 2020-08-01 ExtraHop Networks Seattle, WA 98101 877-333-9872 (US) +44 (0)203 7016850 (EMEA) +65-31585513 (APAC) www.extrahop.com Contents Introduction to the ExtraHop Admin UI 8 Supported browsers 8 Status and Diagnostics 9 Health 9 Audit Log 10 Send audit log data to a remote syslog server 11 Audit log events 11 Fingerprint 15 Exception Files 15 Support Scripts 15 Run the default support script 15 Run a custom support script 16 Network Settings 17 Connect to ExtraHop Cloud Services 17 Troubleshoot your connection to ExtraHop Cloud Services 17 Configure your firewall rules 18 Connect to ExtraHop Cloud Services through a proxy 18 Bypass certificate validation 18 Connectivity 19 Configure an interface 19 Interface throughput 20 Set a static route 21 Enable IPv6 for an interface 21 Global proxy server 22 ExtraHop Cloud proxy 22 Bond interfaces 22 Create a bond interface 23 Modify bond interface settings 23 Destroy a bond interface 24 Flow Networks 24 Configure the Discover appliance to collect traffic from NetFlow and sFlow devices 24 Configure the interface on your Discover appliance 24 Configure the flow type and the UDP port over which flow data is collected 24 Add the pending flow networks on the Discover appliance 25 View configured
    [Show full text]
  • Digital Memories: Exploring Critical Issues
    Edited by Anna Maj & Daniel Riha Digital Memories Exploring Critical Issues Critical Issues Series Editors Dr Robert Fisher Dr Nancy Billias Advisory Board Dr Alejandro Cervantes-Carson Dr Peter Mario Kreuter Professor Margaret Chatterjee Martin McGoldrick Dr Wayne Cristaudo Revd Stephen Morris Mira Crouch Professor John Parry Dr Phil Fitzsimmons Paul Reynolds Professor Asa Kasher Professor Peter Twohig O w e n K e l l y Professor S Ram Vemuri Revd Dr Kenneth Wilson, O.B.E A Critical Issues research and publications project. http://www.inter-disciplinary.net/critical-issues/ The C y b e r Hub ‘Digital Memories’ Digital Memories: Exploring Critical Issues Edited by Anna Maj and Daniel Riha Inter-Disciplinary Press Oxford, United Kingdom © Inter-Disciplinary Press 2009 http://www.inter-disciplinary.net/publishing/id-press/ The Inter-Disciplinary Press is part of Inter-Disciplinary.Net – a global network for research and publishing. The Inter-Disciplinary Press aims to promote and encourage the kind of work which is collaborative, innovative, imaginative, and which provides an exemplar for inter-disciplinary and multi- disciplinary publishing. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the prior permission of Inter-Disciplinary Press. Inter-Disciplinary Press, Priory House, 149B Wroslyn Road, Freeland, Oxfordshire. OX29 8HR, United Kingdom. +44 (0)1993 882087 British Library Cataloguing in Publication Data. A catalogue record for this book is available from the British Library. ISBN: 978-1-84888-004-7 First published in the United Kingdom in eBook format in 2009.
    [Show full text]
  • Is Believing DIRECTIONAL, 3D SOUND WILL KICK VIRTUAL REALITY up to a NEW LEVEL of VIVID REALISM P
    THE HEALING WHITE-HAT BOTS THE SMART INDIA’S MASSIVE FIELDS TO THE RESCUE STETHOSCOPE IoT EXPERIMENT Electrical aids Can AI automate Using machine learning A vast network aims to speed skin repair software security? to detect pneumonia improve quality of life P. 07 P. 30 P. 36 P. 42 FOR THE TECHNOLOGY INSIDER | 02.19 Hearing Is Believing DIRECTIONAL, 3D SOUND WILL KICK VIRTUAL REALITY UP TO A NEW LEVEL OF VIVID REALISM P. 24 starting at AWGs $4,980 per channel 2.4 GSa/s, 16 bit, 750 MHz 4, 8 and more channels <50 ns trigger latency Typical Applications Semiconductor testing, quantum computing, phased-array radar design & test, Boost your lidar, spectroscopy, NMR lab's performance Impedance starting at Analyzers $11,270 DC to 5 MHz, 1 mΩ to 1 TΩ 0.05% basic accuracy Compensation Advisor and Confidence Indicators Typical Applications High-Q dielectrics, capacitive sensors, supercapacitors, PV materials, component characterization Lock-in starting at Amplifiers $6,210 Up to 600 MHz Scope, FFT, FRA, Sweeper, Imaging tool Optional: AWG, PID, PLL, Boxcar, Counter, AM & FM Typical Applications AFM, LVP, CARS, SRS, SNOM, graphene, optical PLL, THz, pump-probe, RFID, MEMS, NEMS, gyros, NDT, MRFM LabOne® Software All instruments are equipped with LabOne®, the Zurich Instruments control software, providing a wealth of features, efficient workflows and ease of use. Access your instruments from any web browser or integrate it into your LabVIEW, MAT- LAB, Python, C, and .NET programs. Intl. +41 44 515 0410 USA 855-500-0056 (Toll Free) [email protected] www.zhinst.com Zurich Let's discuss your application Instruments Start the conversation today FEATURES_02.19 24 30 36 42 The White- The The India VR FOR Hat Hacking Stethoscope of Things Machine Gets Smart The world’s largest Internet of Things YOUR EARS Meet Mayhem, winner Engineers are upgrad- network will A complete virtual-reality experience of the DARPA contest ing the classic clinical transform India.
    [Show full text]
  • A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure As Unconstitutional Kristin M
    Northwestern Journal of Technology and Intellectual Property Volume 13 | Issue 2 Article 1 2015 A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure as Unconstitutional Kristin M. Bergman Reporters Committee for Freedom of the Press Recommended Citation Kristin M. Bergman, A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure as Unconstitutional, 13 Nw. J. Tech. & Intell. Prop. 117 (2015). https://scholarlycommons.law.northwestern.edu/njtip/vol13/iss2/1 This Article is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure as Unconstitutional Kristin M. Bergman May 2015 VOL. 13, NO. 2 Copyright 2015 by Northwestern University School of Law Volume 13, Number 2 (May 2015) Northwestern Journal of Technology and Intellectual Property A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure as Unconstitutional By Kristin M. Bergman* Brian Krebs, a former reporter for the Washington Post who is now known for his blog Krebs on Security, remained relatively unknown for most of his career. But in December 2013, Mr. Krebs found that hackers had exploited a data vulnerability in Target’s electronic-payment system, compromising millions of credit-card numbers that had been used to purchase goods from the second-largest discount retailer in the United States.
    [Show full text]
  • Against Expression: an Anthology of Conceptual Writing
    Against Expression Against Expression An Anthology of Conceptual Writing E D I T E D B Y C R A I G D W O R K I N A N D KENNETH GOLDSMITH Northwestern University Press Evanston Illinois Northwestern University Press www .nupress.northwestern .edu Copyright © by Northwestern University Press. Published . All rights reserved. Printed in the United States of America + e editors and the publisher have made every reasonable eff ort to contact the copyright holders to obtain permission to use the material reprinted in this book. Acknowledgments are printed starting on page . Library of Congress Cataloging-in-Publication Data Against expression : an anthology of conceptual writing / edited by Craig Dworkin and Kenneth Goldsmith. p. cm. — (Avant- garde and modernism collection) Includes bibliographical references. ---- (pbk. : alk. paper) . Literature, Experimental. Literature, Modern—th century. Literature, Modern—st century. Experimental poetry. Conceptual art. I. Dworkin, Craig Douglas. II. Goldsmith, Kenneth. .A .—dc o + e paper used in this publication meets the minimum requirements of the American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials, .-. To Marjorie Perlo! Contents Why Conceptual Writing? Why Now? xvii Kenneth Goldsmith + e Fate of Echo, xxiii Craig Dworkin Monica Aasprong, from Soldatmarkedet Walter Abish, from Skin Deep Vito Acconci, from Contacts/ Contexts (Frame of Reference): Ten Pages of Reading Roget’s ! esaurus from Removal, Move (Line of Evidence): + e Grid Locations of Streets, Alphabetized, Hagstrom’s Maps of the Five Boroughs: . Manhattan Kathy Acker, from Great Expectations Sally Alatalo, from Unforeseen Alliances Paal Bjelke Andersen, from + e Grefsen Address Anonymous, Eroticism David Antin, A List of the Delusions of the Insane: What + ey Are Afraid Of from Novel Poem from + e Separation Meditations Louis Aragon, Suicide Nathan Austin, from Survey Says! J.
    [Show full text]