Tanium™ Client Deployment Guide

Total Page:16

File Type:pdf, Size:1020Kb

Tanium™ Client Deployment Guide Tanium™ Client Deployment Guide Version 6.0.314.XXXX February 05, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided “as is” and is believed to be accurate, but is presented without any warranty of any kind, express or implied, except as provided in Tanium’s customer sales terms and conditions. Unless so otherwise provided, Tanium assumes no liability whatsoever, and in no event shall Tanium or its suppliers be liable for any indirect, special, consequential, or incidental damages, including without limitation, lost profits or loss or damage to data arising out of the use or inability to use this document, even if Tanium Inc. has been advised of the possibility of such damages. Any IP addresses used in this document are not intended to be actual addresses. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Please visit https://docs.tanium.com for the most current Tanium product documentation. Tanium is a trademark of Tanium, Inc. in the U.S. and other countries. Third-party trademarks mentioned are the property of their respective owners. © 2018 Tanium Inc. All rights reserved. © 2018 Tanium Inc. All Rights Reserved Page 2 Table of contents Overview 8 What is the Tanium Client? 8 Registration 9 Client peering 9 File distribution 11 Prerequisites 14 Host system requirements 14 Admin account 15 Network connectivity and firewall 16 Host system security exceptions 16 Deployment options summary 18 Using the Tanium Client Deployment Tool 21 Methods 21 Before you begin 21 Install the Client Deployment Tool 23 Deploy the Tanium Client 25 Check for Tanium Client updates 32 Troubleshooting 33 Logs 34 Advanced settings 34 Deploying the Tanium Client to Windows endpoints 36 Step 1: Create the installer 36 Step 2: Execute the installer 37 © 2018 Tanium Inc. All Rights Reserved Page 3 EXE 37 MSI 37 Install wizard 38 Command line 39 Example: Silent "Express" installation 40 Example: Specifying Multiple Tanium Server Names 40 Example: Silent "Custom" installation 41 Example: Batch file format 41 Example: Use advanced CDT options 41 Step 1: Create a special installer 43 Step 2: Use the special installer to install the Tanium Client on host computers 45 Uninstall 45 Use a Tanium package 46 Use Add/Remove Programs 46 Uninstall program 46 Deploying the Tanium Client to Mac endpoints 48 Step 1: Create the installer 48 Step 2: Execute the installer 48 Web UI installation 48 Command-line installation 50 Manage the Tanium Client Mac OS service 50 Uninstall 51 Deploying the Tanium Client to Linux endpoints 53 Install the Tanium Client 54 Manage the Tanium Client Linux service 56 © 2018 Tanium Inc. All Rights Reserved Page 4 Example: Add Custom Tags to the client installation directory 56 Uninstall 58 Deploying the Tanium Client to Solaris endpoints 59 Before you begin 59 Install the Tanium Client 60 Unattended Tanium Client installation 61 Configure the Tanium Client 62 Manage the Tanium Client Solaris service 62 Creating a package for IPS 63 Uninstall 67 Deploying the Tanium Client to AIX endpoints 68 Install the Tanium Client 68 Manage the Tanium Client AIX service 69 Uninstall 69 Preparing the Tanium Client on OS images 70 Windows OS 70 Linux OS 72 Mac OS X 74 VDI 76 Configuring the connection with Tanium Server 78 ServerName 78 ServerNameList 78 LastGoodServerName 78 Using the Tanium Console to set ServerName 78 Configuring Tanium Client peering 83 © 2018 Tanium Inc. All Rights Reserved Page 5 Default behavior 83 Example: Setting AddressMask to /22 85 Configure the AddressMask setting 88 Configure DesiredNeighborhoodSize 89 Configure "separated subnets" 90 Configure "isolated subnets" 91 Verify changes 94 Use the Tanium Console 94 Examine the client configuration 96 Using client-related Tanium content 98 Initial Content 98 Client Maintenance 100 Client Upgrade 102 Client Service Hardening 106 Advanced tuning 115 Troubleshooting 116 Tanium Client installation paths 116 Tanium Client Windows Registry 116 TaniumClient.ini settings 119 Tanium Client logs 121 Action logs 122 Action_XXX folders 122 Action_XXX.log files 123 Action log cleanup 124 Contacting Tanium support 124 © 2018 Tanium Inc. All Rights Reserved Page 6 Change log 125 © 2018 Tanium Inc. All Rights Reserved Page 7 Overview This guide describes how to deploy the Tanium™ Client to enterprise endpoints. What is the Tanium Client? The Tanium Client is a service installed on endpoint computers. In response to your questions, it discovers and reports within seconds both static and dynamic real-time data pertaining to the endpoint, including: l Hardware and software inventory l Software configuration l Local or domain user details l Installed application or services, startup programs, and running processes l Existence of registry keys and their values l WMI data elements l File system details, including identification of files by hash or contents l Event log results l Network configuration settings and state With similar speed, the Tanium Client can be used to execute commands, actions, scripts, or other executable programs just as if an authorized administrator were taking actions from the command line on the target device. For example, you can send the Tanium Client an instruction to take the following actions: l Install or uninstall applications or services l Update or patch installed applications, services, hardware drivers, or firmware l Manage installed applications or services l Add, remove, or modify the Windows Registry settings or other configuration stores l Add, remove, or modify files or the contents of files l Start or stop services These powerful features enable large, geographically distributed organizations to identify and respond to a zero-day exploit, security breach, or application outage in a matter of seconds or minutes rather than days and weeks. © 2018 Tanium Inc. All Rights Reserved Page 8 Registration When the Tanium Client software is first deployed to an endpoint, it initiates a direct connection to the Tanium Server assigned to it in the initial configuration. During initial registration, the Tanium Client establishes a unique ID and receives from the Tanium Server the latest client settings, a list of nearby peers, and the latest sensor, question, and scheduled action definitions. By default, the initial registration status is configured to reset approximately every four hours, forcing the Tanium Client to re-initialize registration. This ensures the latest settings are applied and that optimal peers are selected. The Tanium Client also re-registers with the Tanium Server via a normal registration that happens at a defined registration interval. The default registration interval is a randomized time between 30 and 90 seconds. During a normal registration, the Tanium Client informs the Tanium Server of its current state of questions, actions, and settings; and, in response, the Tanium Server sends new questions, actions, or settings to apply. In large environments, normal registrations are the primary way that new questions, actions, and settings get communicated to Tanium Clients. Client peering In an enterprise network, the Tanium Clients establish peering relationships. Peer connections are continual, long-lived connections used to exchange Tanium messages and files. Information and data are forwarded along linear chains of peers. During registration, the Tanium Client receives a "peer list" of other Tanium Clients to which it may attempt to establish a peer connection. The Tanium Client uses the list to determine which neighbors are the most optimal network peers. Figure 1: Types of peers By default, the linear chains form into groups of 100. These groups are known as neighborhoods. By design, each neighborhood has one forward leader and one backward leader at the ends of the chain. Other than at registration, only leaders establish direct © 2018 Tanium Inc. All Rights Reserved Page 9 connections with the Tanium Server. The Tanium Server passes sensors, questions, and scheduled actions to the backward leader, who passes them to its forward peer, who in turn passes them to its forward peer, and so on, until it reaches the forward leader. The forward leader sends the answer to the question or status of the scheduled action to the Tanium Server. Figure 2: Tanium Client neighborhood Tanium peer communication is designed to accommodate new clients that come online, to route around clients that are removed or are unable to communicate effectively, and to "reflect" around network-level blockages, such as firewall blocking. If a Tanium Client cannot establish an outgoing connection to a forward peer in its list, it establishes its forward connection to the Tanium Server and becomes a forward leader. This is called forward reflection. Likewise, if a Tanium Client cannot establish an outgoing connection to a backward peer, it establishes a backward connection to the Tanium Server and becomes a backward leader. This is called backward reflection. Client peering results in a profound reduction in connections and bandwidth over WAN links. The following figure illustrates the proportions of the savings. A large enterprise network includes subnets in headquarters and branch offices, as well as VPN connections from remote workers. Other than during registration, only the remote VPN clients and leaders, depicted in sharp red, connect to the Tanium Server over WAN links. The remaining clients, depicted in faded red, share data over peer connections on the LAN. © 2018 Tanium Inc. All Rights Reserved Page 10 Figure 3: An enterprise network File distribution There are two key optimizations that Tanium utilizes to distribute files efficiently: l Tanium Client peering Reduces the number of files that must be distributed over WAN links. Instead of sending files to all managed endpoints, the Tanium Server sends files only to a small fraction of them (that is, only to endpoints designated as backward leaders).
Recommended publications
  • Xilinx XAPP545 Statistical Profiler for Embedded IBM Powerpc, Application Note
    Product Not Recommended for New Designs Application Note: Virtex-II Pro R Statistical Profiler for Embedded IBM PowerPC XAPP545 (v1.0) September 15, 2004 Author: Njuguna Njoroge Summary This application note describes how to generate statistical profiling information from the IBM PowerPC 405D, which is embedded in some Virtex-II Pro™ FPGAs. Specifically, the application note details how to convert trace output files generated from the Agilent Technologies Trace Port Analyzer into a gprof (GNU profiler) readable format. The gprof tool is capable of generating a histogram of a program's functions and a call-graph table of those functions. Introduction Profiling allows a programmer to assess where a program is spending most of its time and how frequently functions are being called. With this information, a programmer can gain insight as to what optimizations to make. In some cases, a programmer can identify bugs that would be otherwise undetectable. Using the RISCWatch application is a first step in profiling a program. Nonetheless, manually mulling through approximately 350 MB (or 8 million cycles) of trace data to discern the run-time profile of the program is a fruitless endeavor. In fact, the designers of RISCWatch realized this, so they standardized the trace output format to enable post processing of the trace. The regular format of the trace files allows scripts to parse through the trace and convert it to the gprof format. By converting the trace files into the gprof format, the widespread use of gprof in the profiling community
    [Show full text]
  • Oracle Solaris 11 Overview and Design Guide
    Oracle Solaris 11 Overview and Design Guide December 2016 (Edition 1.0) Fujitsu Limited Copyright 2012-2016 FUJITSU LIMITED Preface 1/2 Purpose - This document provides an overview of Oracle Solaris 11 and introduces the new functions. Audience - People who want to study Oracle Solaris 11 - People who already understand an overview of Oracle Solaris Notes - The contents of this document are based on Oracle Solaris 11.3. For the latest information on Oracle Solaris 11, see the manuals from Oracle. - Fujitsu M10 is sold as SPARC M10 Systems by Fujitsu in Japan. Fujitsu M10 and SPARC M10 Systems are identical products. Positioning of documents ⁃ Oracle Solaris 11 http://www.fujitsu.com/global/products/computing/servers/unix/sparc/downloads/documents/ Design Install Operate Oracle Solaris 11 Oracle Solaris 11 Implementation and Operations Guide Overview and Design Guide Oracle Solaris 11 Implementation and Operations Procedure Guide 1 Copyright 2012-2016 FUJITSU LIMITED Preface 2/2 Descriptions in this document - The section numbers of commands are omitted. Example: ⁃ ls(1) => ls command ⁃ shutdown(1M) => shutdown command - The following table lists terms that may be abbreviated. Abbreviation Formal Name Solaris Oracle Solaris Solaris zone Oracle Solaris zone Oracle VM Oracle VM Server for SPARC 2 Copyright 2012-2016 FUJITSU LIMITED Contents 1. Overview of Oracle Solaris 11 2. Installation of Oracle Solaris 11 3. Image Packaging System (IPS) - Oracle Solaris Package Management - 4. ZFS - Oracle Solaris File System - 5. Boot Environment (BE) - Oracle Solaris Boot Environment - 6. Virtualization of Oracle Solaris - Oracle Solaris Zones - 7. Security Appendix 3 Copyright 2012-2016 FUJITSU LIMITED 1.
    [Show full text]
  • Solaris 10 End of Life
    Solaris 10 end of life Continue Oracle Solaris 10 has had an amazing OS update, including ground features such as zones (Solaris containers), FSS, Services, Dynamic Tracking (against live production operating systems without impact), and logical domains. These features have been imitated in the market (imitation is the best form of flattery!) like all good things, they have to come to an end. Sun Microsystems was acquired by Oracle and eventually, the largest OS known to the industry, needs to be updated. Oracle has set a retirement date of January 2021. Oracle indicated that Solaris 10 systems would need to raise support costs. Oracle has never provided migratory tools to facilitate migration from Solaris 10 to Solaris 11, so migration to Solaris has been slow. In September 2019, Oracle decided that extended support for Solaris 10 without an additional financial penalty would be delayed until 2024! Well its March 1 is just a reminder that Oracle Solaris 10 is getting the end of life regarding support if you accept extended support from Oracle. Combined with the fact gdpR should take effect on May 25, 2018 you want to make sure that you are either upgraded to Solaris 11.3 or have taken extended support to obtain any patches for security issues. For more information on tanningix releases and support dates of old and new follow this link ×Sestive to abort the Unix Error Operating System originally developed by Sun Microsystems SolarisDeveloperSun Microsystems (acquired by Oracle Corporation in 2009)Written inC, C'OSUnixWorking StateCurrentSource ModelMixedInitial release1992; 28 years ago (1992-06)Last release11.4 / August 28, 2018; 2 years ago (2018-08-28)Marketing targetServer, PlatformsCurrent: SPARC, x86-64 Former: IA-32, PowerPCKernel typeMonolithic with dynamically downloadable modulesDefault user interface GNOME-2-LicenseVariousOfficial websitewww.oracle.com/solaris Solaris is the own operating system Of Unix, originally developed by Sunsystems.
    [Show full text]
  • Solaris 10 Install Manual.Pdf
    Solaris 10 Install Manual The Oracle Solaris Studio 12.4 Installation Guide provides instructions for It also provides instructions for installing the required Oracle Solaris 10 patches. User Manual. Version 5.0.4 Installing VirtualBox and extension packs. 12.9.2 VM aborts with out of memory errors on Solaris 10 hosts.... 243. The Solaris 10 OS is shipped with the CD and DVD media and documentation that you will need to install the Solaris OS for both SPARC and x86 platforms. Other product names mentioned in this manual may be trademarks or registered 10. Configure the 7820 for the appropriate interface configuration settings.*. Transitioning From Oracle Solaris 10 to Oracle Solaris 11.2 l Describes multiple Using the Oracle Solaris 11 Image Packaging System (IPS) to Install. Amanda client installation must be performed as super user (in other gunzip ZMANae-client-3.3.7-i386-pc-solaris2.10.pkg.gz. Solaris 10 Install Manual Read/Download Remove this template once cleanup is complete. For Solaris, one can do a native installation. Solaris 10 has "premier support" till January 2018 (OLSP p. 30). Solaris 10 and 11 Sparc distributions. pkgadd -d./TaniumClient-6.0.314.1321-SunOS-5.10-sparc.pkg. Solaris 10 and Solaris 11: pkgadd -d get.opencsw.org/now /opt/csw/bin/pkgutil -U /opt/csw/bin/pkgutil -a vim /opt/csw/bin/pkgutil -y -i vim /opt/csw/bin/vim. 3 FreeBSD, 4 MacOS, 5 Solaris, 6 Windows, 7 Alternative to manual installation Solaris 10: PostgreSQL 8.2.1 on Solaris 10 – Deployment Guidelines by Chris.
    [Show full text]
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • An Efficient and Portable SIMD Algorithm for Charge/Current Deposition in Particle-In-Cell Codes✩
    Computer Physics Communications 210 (2017) 145–154 Contents lists available at ScienceDirect Computer Physics Communications journal homepage: www.elsevier.com/locate/cpc An efficient and portable SIMD algorithm for charge/current deposition in Particle-In-Cell codesI H. Vincenti a,b,∗, M. Lobet a, R. Lehe a, R. Sasanka c, J.-L. Vay a a Lawrence Berkeley National Laboratory, 1 Cyclotron Road, Berkeley, CA, USA b Lasers Interactions and Dynamics Laboratory (LIDyL), Commissariat À l'Energie Atomique, Gif-Sur-Yvette, France c Intel Corporation, OR, USA a r t i c l e i n f o a b s t r a c t Article history: In current computer architectures, data movement (from die to network) is by far the most energy Received 9 January 2016 consuming part of an algorithm (≈20 pJ=word on-die to ≈10,000 pJ/word on the network). To increase Received in revised form memory locality at the hardware level and reduce energy consumption related to data movement, 10 August 2016 future exascale computers tend to use many-core processors on each compute nodes that will have Accepted 19 August 2016 a reduced clock speed to allow for efficient cooling. To compensate for frequency decrease, machine Available online 19 September 2016 vendors are making use of long SIMD instruction registers that are able to process multiple data with one arithmetic operator in one clock cycle. SIMD register length is expected to double every four years. As Keywords: Particle-In-Cell method a consequence, Particle-In-Cell (PIC) codes will have to achieve good vectorization to fully take advantage OpenMP of these upcoming architectures.
    [Show full text]
  • Metadefender Core V4.13.1
    MetaDefender Core v4.13.1 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Bapco® Eecomark V2 User Guide
    BAPCo® EEcoMark v2 User Guide BAPCo is a U.S. Registered Trademark of the Business Applications Performance Corporation. EEcoMark is a U.S. Registered Trademark of the Business Applications Performance Corporation. Copyright © 2012 Business Applications Performance Corporation. All other brand and product names are trademarks or registered trademarks of their respective holders Contents 1.0 General .................................................................................................................................................... 4 1.1 Terminology ........................................................................................................................................ 4 2.0 Setup ....................................................................................................................................................... 5 2.1 Minimum System Requirements ........................................................................................................ 5 2.2 Hardware Setup .................................................................................................................................. 5 2.3 Software Setup .................................................................................................................................... 6 3.0 Configuration .......................................................................................................................................... 7 3.1 Guidelines ..........................................................................................................................................
    [Show full text]
  • Perceptive – Installing Imagenow Client on a Workstation
    Perceptive – Installing ImageNow client on a workstation Installing the ImageNow client on a workstation PURPOSE – Any computer that is going to be used to scan or import documents into Avatar will need ImageNow installed. Monterey is hosted by Netsmart and requires that VPN Checkpoint be established prior to initiating ‘Launch POS Scan’ from within Avatar. 1. Installing the ImageNow Client • Open the ImageNow Client Build 6.7.0 (Patch Build 3543) > right click and select “run as Administrator” even if you use your $ account. Avatar – After hitting “launch POS” it should auto connect to the Sunflower screen but if it does not. Error msg = “Failed to load image now client”, it could be that it was installed incorrectly. If installed incorrectly, Uninstall program from control panel and then reinstall the ImageNow Client 6.7.0 (Patch Build 3543).exe • On the Welcome to the Installation Wizard dialog, click Next. • Enable the following icons to be installed: o ImageNow Client Files o Demo Help o Administrator Help o Support for Viewing Non-graphic Data o ImageNow Printer (this is not selected by default) Note: the picture below does not have the ImageNow Printer selected. • On the License Agreement window, scroll down to the bottom of the License Agreement and accept the terms of the License Agreement to activate the Next button. • All sub features will be installed on the local hard drive, click Next. • On the Default connection Profile window, enter the following information and then click Next. o Name: Monterey PROD o Server ID: montereyimagenow.netsmartcloud.com o Server Type: Test o Port Number: 6000 The default information entered above creates the connection profiles below: Monterey Perceptive - Installing ImageNow v3 0(Installing the ImageNow Client onto a workstation) 1 | Page Plexus Foundations Perceptive – Installing ImageNow client on a workstation • Select the Next twice, and then Install.
    [Show full text]
  • PG-FP5 Flash Memory Programmer User's Manual
    User’s Manual User’s PG-FP5 Flash Memory Programmer User’s Manual All information contained in these materials, including products and product specifications, represents information on the product at the time of publication and is subject to change by Renesas Electronics Corp. without notice. Please review the latest information published by Renesas Electronics Corp. through various means, including the Renesas Electronics Corp. website (http://www.renesas.com). www.renesas.com Rev. 5.00 Dec, 2011 Notice 1. All information included in this document is current as of the date this document is issued. Such information, however, is subject to change without any prior notice. Before purchasing or using any Renesas Electronics products listed herein, please confirm the latest product information with a Renesas Electronics sales office. Also, please pay regular and careful attention to additional and different information to be disclosed by Renesas Electronics such as that disclosed through our website. 2. Renesas Electronics does not assume any liability for infringement of patents, copyrights, or other intellectual property rights of third parties by or arising from the use of Renesas Electronics products or technical information described in this document. No license, express, implied or otherwise, is granted hereby under any patents, copyrights or other intellectual property rights of Renesas Electronics or others. 3. You should not alter, modify, copy, or otherwise misappropriate any Renesas Electronics product, whether in whole or in part. 4. Descriptions of circuits, software and other related information in this document are provided only to illustrate the operation of semiconductor products and application examples. You are fully responsible for the incorporation of these circuits, software, and information in the design of your equipment.
    [Show full text]
  • Framework Visualizing of 32-Bit System Updates Response to Use
    al and Com tic pu re ta o t e io h n T a f l o S l c a i Journal of Theoretical & Computational e n n r c u e o J ISSN: 2376-130X Science Short Communication Framework Visualizing of 32-Bit System Updates Response to use 64-Bit Apps Operations Implications Based on System Troubles and Apps Updates and Errors/Framework Visualizing of 32-Bit System Updates Issues with use 64-Bit Apps Updating and Operations Al Hashami Z*, CS Instructor, Oman-Muscat SHORT COMMUNICATION AIMS AND OBJECTIVES The development of the systems versions is dramatic based on The aims of this research is to identify the implications of the buses lanes, memory and registers. As known in the updating operating system especially if it 32-bit under use of 64- computing the general rule that if the RAM is under 4GB, don’t bit applications operations a trouble face the users in case of that need a 64-bit CPU but if the RAM more than 4GB it need. users use many 64-bit applications. It is Identification of 32-bit Some users find that a 32-bit is enough memory and good system updating troubles under operations and updating of 64- performance, in contrast to huge size applications that need bit applications. Also identify of updating implications of 64-bit more memory and fast processing should use faster processor. software that working under 32-bit system implications. Some applications used for processing images, videos and 3D Usual users face many troubles in case of updates of systems rendering utilities need faster CPU like 64-bit system.
    [Show full text]
  • Phoronix Test Suite V4.0.1 (Suldal)
    www.phoronix-test-suite.com Phoronix Test Suite v4.0.1 (Suldal) User Manual Phoronix Test Suite v4.0.1 Test Client Documentation Getting Started Overview The Phoronix Test Suite is the most comprehensive testing and benchmarking platform available for Linux, Solaris, Mac OS X, and BSD operating systems. The Phoronix Test Suite allows for carrying out tests in a fully automated manner from test installation to execution and reporting. All tests are meant to be easily reproducible, easy-to-use, and support fully automated execution. The Phoronix Test Suite is open-source under the GNU GPLv3 license and is developed by Phoronix Media in cooperation with partners. Version 1.0 of the Phoronix Test Suite was publicly released in 2008. The Phoronix Test Suite client itself is a test framework for providing seamless execution of test profiles and test suites. There are more than 200 tests available by default, which are transparently available via OpenBenchmarking.org integration. Of these default test profiles there is a range of sub-systems that can be tested and a range of hardware from mobile devices to desktops and worksrtations/servers. New tests can be easily introduced via the Phoronix Test Suite's extensible test architecture, with test profiles consisting of XML files and shell scripts. Test profiles can produce a quantitative result or other qualitative/abstract results like image quality comparisons and pass/fail. Using Phoronix Test Suite modules, other data can also be automatically collected at run-time such as the system power consumption, disk usage, and other software/hardware sensors. Test suites contain references to test profiles to execute as part of a set or can also reference other test suites.
    [Show full text]