Manual of Air Traffic Services (MATS-1)

Total Page:16

File Type:pdf, Size:1020Kb

Manual of Air Traffic Services (MATS-1) भारतीय िवमानपन प्रािधकरण AIRPORTS AUTHORITY OF INDIA MANUAL OF AIR TRAFFIC SERVICES PART‐1 Air Navigation Services July 6, 2020 Fifth Edition ED/ATM/2020/E5.00‐MATS‐PRT‐1 MANUAL OF AIR TRAFFIC SERVICES PART 1 (ED/ATM/2020/E5.00-MATS-PRT1) July 6, 2020 Controlled Copy Number If Number is in RED colour ‐‐‐ It is “Controlled Copy” If Number is in BLACK colour ‐‐‐ It is “Uncontrolled Copy Document Approving Authority: Executive Director (ATM) Airports Authority of India, Rajiv Gandhi Bhawan, Safdarjung Airport, New Delhi‐110003 Email: [email protected] Blank Page wffiE RiE, cr{.s.vs , 鰤 赫 ARVIND SINGH,:AS AIRPORTS AUTHORITY OF INDIA 鋼 日 rr$q ril* rnrq Chai日 耐an Rajiv Gandhi Bhawan trq.flEiT wr{ qsr, T{ Gid-rrooos. l甲「押暉ノPhone:011‐ 24632930 Safdarjung Airport, New Delhi-l 1 0003. 熱電aLlよ鵞警leЮ \ FOREWORD AAI Act, 1995 mandates'Airports.{uthority of India.to provide air traffic servibes over entire Indian air space. These services comprise of air ' traffic control service, advisory service, flight information service, and alerting service. In orderto achieve the objectives ofair traffic services, there is a need to standardize procedures necessary for the safety of air navigation which can be uniformly appried throughout India. Maintaining the acceptable levels of safety calls for standardization and quality assurance in every sub system of Air Traffic System qt one end ' and maintaining harmony with the ICAO standards and recommeirded practices at the other end to achieve this objective, this Manual of Air Traffic Services -Part I has been developed by ATM Directorate of Airports Authority of India. The purpose of this document is to establish procedures, .provide information and instructions which are essential for the provision of safe and efficient air traffic services in the lndian administered airspace and.at airports where air.traffic services are provided by Airports Authority of India. It is published for use and guidance of its ATS personnel. The.ATS in-charge of an ATC center shall ensure that the prpvision of air traffic services are in accordance with the processes, procedures and instructions contained in this manrRl. This manual fulfills the need for best practices in provision of Air traffic Services according to international & national standards and recommended practices. I, therefore; ball.upon all the AAI personnel engaged in the provisions of Air Traffic Serfuices to comply with the'standards, recommended practices and procedures given in this manual to continue to provide safe and efficient air traffic services under their jurisdiction Blank Page 呻頭 喩 面 A:RPoRTS AUTHORITY OFINolA V:NEET GULAT! … ¬Nや可11お Чq■ 劇く照 榛 嘔 0昭o) , Member ttNS) PhOne 1 91‐ 24631969 ‖03 Al― 脚 耐OF叫 Ⅶ町 MΨ ■μ 郡 イ 11‐ 鵠→蒔 軸 /Fax :91‐ 11124629567 Sa,attung Ai『 Ron,New Deh卜 110003 キ`/E― mall i memberans@a」 aerO “ PREFACE 1) This Manua1 0fAir Trafflc Ser宙cお (MATS)I Pa■ l iS prepatled for thc usc and guidancc of cxecutives and staff of Airpbrts・ Authority of lndia(AAI).The Manり al providcs proccsseS,proccdurcs and instructions that′ are essential for the provision ofsafehndefflcientairtrafflcserviceswLhintheairspaccsunderthejurisdicdOnOf AAI and at airports where aig traffic services aie provided by AAI. 2)_ This Manual has been.developed as a part of comprehensive documbntation of the ATS procedures, processes and facillties supporting conforma.pce to organ izational :'requirements and compliance with National Regulations' and Standards & Recommended pJactices of IC.AO ANNEX 11, PANS - ATM DOC 4444 and other ICAO documents relevant to the' provisions, of Air Traffic Services that are 3) In addition to MATS - Part l,'airport specific Manuals of Airiraffic Services ' (MATS) -Part2have been developed by ATS-in-charges of various airports, as part of . the above mentioned documentation process. MATS - Part 2 contains information, guidahce, procedures and instructions.applicable to the ATS units of those particular airports and aie maintained by ATS-in-charges of.the concerned airport. j 4) Differences from ICAO Standards und R..o*mpnded Practices oIICAO Annex I I . are published in AIP India. 5) Wherever there is a difference between'a standard p."r&ib.d by ICAO and one in this.manual, the standard prescribed in.this manual shall prevail. , . 6) This manual should be read in conjmction with the following: a) ICAO Annex I I - Air Traffic Services b) ICAO Annex 2 - Rules of the Air c) PANS - ATM Doc 4444 - Procedures for Air Navigation Services - Air Traffic Management ) の Doc 7030 - Regional Supplti:mentary Procedures , c > ,Doc 9426 - Air Traffic Services Planning Manual 3 Doc 9613 - Performance Based Navigation Manuai 9 Doc 9683 - Human Factor Training Manual り .Doq 9694 - Manual of Air Traffic Services Data Link Applications D Doc 9870 - Manual on the Prevention of Runway Incursions j) Aeronautical lnformation Publication (AIP) - India k) Relevant DGCA CARs and Circulars l) Current Air Traffic Management Circulars (ATMCs) and CAP Documents m) Manual of Air Traffic Services -Part2 (Airport Specific) 7) It is to be recognized that in the changing aviation safety environment, the need to amend the manual may be necessitated by a number of causes, such as: a) Changes/amendments to ICAO AnnexeslDocuments b) Changes to/introduction of DGCA CARs and Circulars c) Introduction ofnew technologY d) Requirements from ATS, Airlines or any other concerned agency g) Fifth edition of the Manual is issued after updating it and incorporating amendments to pANS - ATM DOC 4444lother ICAO documents, DGCA CARs/Circulars and relevant contents of some of the Air Traffic Management Circulars (ATMCs) and is based on the basis of experience gained and comments/suggestions received from the users of this manual. 9) Views, comments and suggestions for improvement of this edition, may be sent to the Executive Director (Air Traffic Flow Management), Airports Authority of India, CHQ, New Delhi. Membcr(Air Navigadon SeⅣ iccs) 26.06.2020 Airports Authority of India Manual of Air Traffic Services-Part 1 AMEMDMENTS RECORDS OF AMENDMENTS AND CORRIGENDA AMEMDMENTS No. Date Applicable Date Entered Entered by July 6, 2020 ED/ATM/2020/E5.00-MATS-PRT1 i. Blank Page Airports Authority of India Manual of Air Traffic Services-Part 1 TABLE OF CONTENTS Para No. Title Page No. CHAPTER 1 : DOCUMENT IDENTIFICATION AND CONTROL 1.1 Title of the document 1-1 1.2 Purpose of this chapter 1‐1 1.3 Purpose of the manual 1‐1 1.4 Responsibility for documentation and publication 1‐1 1.5 Authority/responsibility for changes 1-1 1.6 Review 1-2 1.7 Interpretation of words 1-2 1.8 Effective date 1-3 1.9 Change history 1-3 1.10 Format 1-3 1.11 Controlling the manual 1-3 1.12 Distribution of the manual 1-3 1.13 Master copy 1-3 1.14 Checking currency of the manual 1-3 1.15 Enquiries 1-3 CHAPTER 2: DEFINITIONS CHAPTER 3: GENERAL 3.1 Organizational Structure and Functions 3-1 3.1.1 Airports Authority of India 3-1 3.1.2 Functions of Airports Authority of India and ATM Directorate 3-1 3.2 Roles and Responsibilities of Air Traffic Management Directorate 3-1 3.3 Operational Supervision 3-2 3.4 ATM Staffing 3-2 3.5 Stress/Fatigue Mitigation of ATCOs – Rest and Relief 3-2 3.5.1 General 3-2 3.5.2 Rest and Relief 3-2 3.5.3 Position Rotation 3-3 3.5.4 Interval between Period of Duty 3-3 3.5.5 Other Stress/Fatigue relieving measures 3-3 3.6 Provision of Air Traffic Services 3-3 3.7 Search and Rescue (SAR) 3-5 3.7.1 Responsible authority 3-5 3.7.2 Area of responsibility 3-5 3.7.3 Satellite aided search and rescue 3-8 3.7.4 SAR agreements 3-8 3.7.5 Conditions of availability 3-8 3.7.6 Procedures and signals used 3-8 3.7.7 Forced Landing 3-9 3.8 Maintenance of ATS unit log books 3-9 3.9 Retention of Operational Documents-Period Thereof-Method For Destruction 3-10 3.10 Entry into Air Traffic Control Units 3-11 3.11 Procedures to be followed in ATC Operational Areas with respect to Mobile 3-11 Phones 3.12 ATC Watch Taking Over Procedures 3-12 3.13 Duties and Responsibilities of ATC Watch Supervisory Officer (WSO) 3-12 3.13.1 Duties and responsibilities of WSO 3-12 3.14 Documents to be Kept in ATS Units 3-14 3.15 Procedure for Opening, Closing and Extension of ATC Watch 3-14 3.15.1 ATC watch hours 3-14 July 6, 2020 ED/ATM/2020/E5.00-MATS-PRT1 P a g e | 1 Manual of Air Traffic Services-Part 1 Airports Authority of India 3.15.2 Fixation and notification of ATC watch hours 3-15 3.15.3 Opening and closing of ATC watch 3-15 3.15.4 Actions to be completed prior to opening of ATC watch 3-15 3.15.5 Extension of ATC watch beyond notified watch hours 3-15 3.15.6 Station level circular on ATC watch hours 3-16 3.16 Prevention of Safety Occurrences During On-The-Job Training (OJT) 3-16 3.17 Undue Interference/Counselling to Controllers on Intercom 3-17 3.18 Reporting and Investigation of Air Traffic Incidents 3-19 3.18.1 Reporting of air traffic incidents 3-19 3.18.2 Investigation of incidents 3-21 3.19 Violation Reports 3-24 3.20 Procedure to be followed in case of Aircraft Accidents and Serious Incidents 3-24 3.20.1 General 3-24 3.20.2 Notification 3-27 3.20.3 Preservation of records 3-27 3.20.4 Procedure for handling aircraft accidents 3-28 3.20.5 Withdrawal of ATCO involved in aircraft accident 3-28 3.21 Selection, Duties and Responsibilities of Jt.
Recommended publications
  • Metadefender Core V4.12.2
    MetaDefender Core v4.12.2 © 2018 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 13 Key Features of Metadefender Core 14 1. Quick Start with Metadefender Core 15 1.1. Installation 15 Operating system invariant initial steps 15 Basic setup 16 1.1.1. Configuration wizard 16 1.2. License Activation 21 1.3. Scan Files with Metadefender Core 21 2. Installing or Upgrading Metadefender Core 22 2.1. Recommended System Requirements 22 System Requirements For Server 22 Browser Requirements for the Metadefender Core Management Console 24 2.2. Installing Metadefender 25 Installation 25 Installation notes 25 2.2.1. Installing Metadefender Core using command line 26 2.2.2. Installing Metadefender Core using the Install Wizard 27 2.3. Upgrading MetaDefender Core 27 Upgrading from MetaDefender Core 3.x 27 Upgrading from MetaDefender Core 4.x 28 2.4. Metadefender Core Licensing 28 2.4.1. Activating Metadefender Licenses 28 2.4.2. Checking Your Metadefender Core License 35 2.5. Performance and Load Estimation 36 What to know before reading the results: Some factors that affect performance 36 How test results are calculated 37 Test Reports 37 Performance Report - Multi-Scanning On Linux 37 Performance Report - Multi-Scanning On Windows 41 2.6. Special installation options 46 Use RAMDISK for the tempdirectory 46 3. Configuring Metadefender Core 50 3.1. Management Console 50 3.2.
    [Show full text]
  • Rule Base with Frequent Bit Pattern and Enhanced K-Medoid Algorithm for the Evaluation of Lossless Data Compression
    Volume 3, No. 1, Jan-Feb 2012 ISSN No. 0976-5697 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info Rule Base with Frequent Bit Pattern and Enhanced k-Medoid Algorithm for the Evaluation of Lossless Data Compression. Nishad P.M.* Dr. N. Nalayini Ph.D Scholar, Department Of Computer Science Associate professor, Department of computer science NGM NGM College, Pollachi, India College Pollachi, Coimbatore, India [email protected] [email protected] Abstract: This paper presents a study of various lossless compression algorithms; to test the performance and the ability of compression of each algorithm based on ten different parameters. For evaluation the compression ratios of each algorithm on different parameters are processed. To classify the algorithms based on the compression ratio, rule base is constructed to mine with frequent bit pattern to analyze the variations in various compression algorithms. Also, enhanced K- Medoid clustering is used to cluster the various data compression algorithms based on various parameters. The cluster falls dissentingly high to low after the enhancement. The framed rule base consists of 1,048,576 rules, which is used to evaluate the compression algorithm. Two hundred and eleven Compression algorithms are used for this study. The experimental result shows only few algorithm satisfies the range “High” for more number of parameters. Keywords: Lossless compression, parameters, compression ratio, rule mining, frequent bit pattern, K–Medoid, clustering. I. INTRODUCTION the maximum shows the peek compression ratio of algorithms on various parameters, for example 19.43 is the Data compression is a method of encoding rules that minimum compression ratio and the 76.84 is the maximum allows substantial reduction in the total number of bits to compression ratio for the parameter EXE shown in table-1 store or transmit a file.
    [Show full text]
  • Seeking a Digital Preservation Storage Container Format for Web Archiving
    Kim, Y., and Ross, S. (2012) Digital forensics formats: seeking a digital preservation storage container format for web archiving. International Journal of Digital Curation, 7 (2). pp. 21-39. ISSN 1746-8256 Copyright © 2012 The Authors http://eprints.gla.ac.uk/79800/ Deposited on: 14 May 2013 Enlighten – Research publications by members of the University of Glasgow http://eprints.gla.ac.uk doi:10.2218/ijdc.v7i2.227 Digital Forensics Formats 21 The International Journal of Digital Curation Volume 7, Issue 2 | 2012 Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving Yunhyong Kim, Humanities Advanced Technology and Information Institute, University of Glasgow Seamus Ross, Faculty of Information, University of Toronto, Canada and Humanities Advanced Technology and Information Institute, University of Glasgow Abstract In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC), disk image formats that capture data for recovery or installation (partimage, dd raw image), these two types combined with a selected compression algorithm (e.g. tar+gzip), formats that combine packing and compression (e.g. 7-zip), and forensic file formats for data analysis in criminal investigations (e.g.
    [Show full text]
  • 2009-Jul No.33 TECHNICAL JOURNAL Front Cover Description AVN Lite "AVN339M"
    FUJITSU TEN TECHNICAL JOURNAL,No.33,KOBE,JUL.2009 ISSN 0289-3789 2009-Jul No.33 TECHNICAL JOURNAL Front cover description AVN Lite "AVN339M" This model incorporates a digital terrestrial TV tuner that provides stable reception of high quality Full seg video and audio with four antennas and four tuners. Its main unit has a slot for a B-CAS card that is required to watch and listen to the digital terrestrial TV. It plays commercial-release DVDs and home-made videos recorded in the DVD- VR format. With its compatibility with MP3/WMA files in CD-R/RW, this model gives you access to more videos and audios than our conventional models. FUJITSU TEN LIMITED PROFILE Sales Growth (¥100 million) Head Office: 2-28, Gosyo-dori, 1-chome, 3,800 Hyogo-ku, Kobe, 652-8510, Japan 3,641 3,600 Phone: +81-78-671-5081 3,400 FAX: +81-78-671-5325 3,125 3,200 Established: October 25, 1972 2,992 3,000 Capital: ¥5300 million 2,746 2,800 No. of Employees: 3,783 (Consolidated: 12,267) 2,600 Product Line: Infotainment Products 2,400 • Audio, Navigation Products (for automobiles) 2,200 • Audio (for home use) 2,000 1,800 • Mobile Communication radios 1,600 Car electronic devices 1,400 Domestic Offices: Utsunomiya, Tokyo, Toyota 1,200 Kobe Logistics Center 1,000 Nakatsugawa Technical Center 800 Kobe Plant, Nakatsugawa Plant 600 Affiliated Companies: TOCHIGI FUJITSU TEN LIMITED 400 FUJITSU TEN EAST JAPAN SALES LIMITED 200 FUJITSU TEN CHUBU SALES LIMITED 0 FUJITSU TEN WEST JAPAN SALES LIMITED '05 '06 '07 '08 FUJITSU TEN ACTY LIMITED Consolidated sales FUJITSU TEN RESERCH LIMITED FUJITSU TEN STAFF LIMITED FUJITSU TEN TECHNOLOGY LIMITED Head Office / Main Plant Nakatsugawa Plant Tochigi Fujitsu TEN Limited FUJITSU TEN TECH.
    [Show full text]
  • Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving
    doi:10.2218/ijdc.v7i2.227 Digital Forensics Formats 21 The International Journal of Digital Curation Volume 7, Issue 2 | 2012 Digital Forensics Formats: Seeking a Digital Preservation Storage Container Format for Web Archiving Yunhyong Kim, Humanities Advanced Technology and Information Institute, University of Glasgow Seamus Ross, Faculty of Information, University of Toronto, Canada and Humanities Advanced Technology and Information Institute, University of Glasgow Abstract In this paper we discuss archival storage container formats from the point of view of digital curation and preservation, an aspect of preservation overlooked by most other studies. Considering established approaches to data management as our jumping off point, we selected seven container format attributes that are core to the long term accessibility of digital materials. We have labeled these core preservation attributes. These attributes are then used as evaluation criteria to compare storage container formats belonging to five common categories: formats for archiving selected content (e.g. tar, WARC), disk image formats that capture data for recovery or installation (partimage, dd raw image), these two types combined with a selected compression algorithm (e.g. tar+gzip), formats that combine packing and compression (e.g. 7-zip), and forensic file formats for data analysis in criminal investigations (e.g. aff – Advanced Forensic File format). We present a general discussion of the storage container format landscape in terms of the attributes we discuss, and make a direct comparison between the three most promising archival formats: tar, WARC, and aff. We conclude by suggesting the next steps to take the research forward and to validate the observations we have made.
    [Show full text]
  • Bogog00000000000000
    US 20190236273A1 ( 19) United States (12 ) Patent Application Publication (10 ) Pub. No. : US 2019 /0236273 A1 SAXE et al. (43 ) Pub. Date : Aug. 1 , 2019 ( 54 ) METHODS AND APPARATUS FOR GO6N 3 /04 (2006 .01 ) DETECTION OF MALICIOUS DOCUMENTS G06K 9 /62 (2006 .01 ) USING MACHINE LEARNING (52 ) U .S . CI. CPC .. G06F 21/ 563 ( 2013 .01 ) ; GO6N 20 / 20 (71 ) Applicant: Sophos Limited , Abingdon (GB ) (2019 .01 ) ; G06K 9 /6256 ( 2013 .01 ) ; G06K ( 72 ) Inventors: Joshua Daniel SAXE , Los Angeles, 9 /6267 ( 2013 .01 ) ; G06N 3 / 04 ( 2013 .01 ) CA (US ) ; Ethan M . RUDD , Colorado Springs , CO (US ) ; Richard HARANG , (57 ) ABSTRACT Alexandria , VA (US ) An apparatus for detecting malicious files includes a memory and a processor communicatively coupled to the ( 73 ) Assignee : Sophos Limited , Abingdon (GB ) memory. The processor receives multiple potentially mali cious files. A first potentially malicious file has a first file ( 21) Appl . No. : 16 /257 , 749 format , and a second potentially malicious file has a second file format different than the first file format. The processor ( 22 ) Filed : Jan . 25 , 2019 extracts a first set of strings from the first potentially malicious file , and extracts a second set of strings from the Related U . S . Application Data second potentially malicious file . First and second feature (60 ) Provisional application No . 62/ 622 ,440 , filed on Jan . vectors are defined based on lengths of each string from the 26 , 2018 . associated set of strings . The processor provides the first feature vector as an input to a machine learning model to Publication Classification produce a maliciousness classification of the first potentially (51 ) Int.
    [Show full text]
  • Development of FUJITSU TEN's First SD Memory Card Navigation System, AVN Lite, and Its Linkage Service
    Development of FUJITSU TEN's First SD Memory Card Navigation System, AVN Lite, and its Linkage Service Kenichirou MASE Takeshi FUKADA Kenji UEMATSU Teru SAWADA Abstract Since 1997, when FUJITSU TEN released an all-in-one unit consisting of Audio, Visual, and Navigation ahead of the industry, "AVN" has become synonymous with in-dash and all-in-one navigation system. On the other hand, recently, on-dash navigation system (PND: Portable Navigation Device) that provides only basic func- tion of navigation system at a low price has been penetrating the market and the market needs for low-end models have been growing. With the motto, "secure," "easy," and "fun," FUJITSU TEN therefore planned and developed "AVN Lite" that offers the necessary and sufficient functions at a reasonable price including the path search and audio assist which are the basic functions of the car navigation system, storing the map data in the SD card, and also including CD, One-Seg, etc. as AV functions, and we released the "AVN Lite" in October 2008. The navigation system using the method that stores the map data in the SD card is the first product of this kind for FUJITSU TEN. We introduce the problems and solutions for adoption of the SD card as the storage media, and various services linked to this product in this article. 18 Development of FUJITSU TEN's First SD Memory Card Navigation System, AVN Lite, and its Linkage Service 1 Introduction1. Introduction ・Carefully select and arrange four basic buttons of "pre- sent location," volume, etc. at the bottom of the naviga- "AVN," released in 1997 as ECLIPSE brand, has tion device.
    [Show full text]
  • Aviation Abbreviations
    AVIATION ABBREVIATIONS Mahan Air Documentation Center Edition 1 2014/04/23 Alpha (ICAO) A A/A Air-to-air (ICAO) A/C Aircraft AA Approved Urgency (CFMU) AA Aircraft Address (IFPS SSR MODE-S) AAAS Amadeus Airline Ancillary Services AABC ARINC Automated Border Control AAC Airworthiness Advisory Circular (CASA) AAC Airline Administrative Communication (ACP) AACC Airport Associations Coordinating Council (ACI / AACI) AACE Airfield Approach Control Element AACI Airports Association Council International (ACI) AACO Arab Air Carriers Organisation AAD Assigned Altitude Deviation (ICAO) AAE Above Aerodrome Elevation (CA) AAF ATM Added Functions AAFCE Allied Air Forces Central Europe AAG AIS Automation Group AAGDI Automated Air / Ground Data Interchange AAH Autonomous Aircraft Hybrid AAI Arrival Aircraft Interval (FAA AAR) AAI Angle of Approach Indicator AAIB Air Accident Investigation Branch (UK equivalent of NTSB) AAIM Aircraft Autonomous Integrity Monitoring (ICAO) AAIS Automated AIS AAL Altitude Above Aerodrome level (ICAO) AALS Advanced Approach and Landing System AAM Airbus Asset Management AAM Airline Administration Message AAME Association of Aviation Medical Examiners AAP Advanced Automation Program AAP Accident Analysis & Prevention (IFALPA) AAPA Association of Asia Pacific Airlines AAR Airport Acceptance Rate or Airport Arrival Rate (FAA) AAR Air to Air Refueling or Automated Aerial Refueling (Boeing) AAS Advanced Automated System (FAA) AASA Air Lines Association of Southern Africa AASC Airport Authorities Steering Committee AASI Aeronautical
    [Show full text]
  • Zenworks Server Installation Guide Includes Information to Help You Successfully Install the Zenworks Primary Server Software on Windows and Linux Servers
    ZENworks 2020 Update 1 Server Installation Guide June 2020 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.novell.com/company/legal/. © Copyright 2008 - 2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. 2 Contents About This Guide 7 Part I System Requirements 9 1 Primary Server Requirements 11 2 Database Requirements 15 3 Administration Browser Requirements 17 Part II Windows Installation 19 4 Windows Installation Workflow 21 Installation Workflow for Your First Primary Server. .21 Installation Workflow for Additional Primary Servers . .23 5 Understanding What the ZENworks Installation Does 25 6 Updating Windows Server Software 27 7 Creating an External Certificate 29 Generating a Certificate Signing Request (CSR) . .29 Generating a Certificate by Using NetIQ ConsoleOne . .30 Generating a Certificate by Using NetIQ iManager . .31 8 Installing and Configuring an External ZENworks Database 33 Prerequisites for External Databases. .33 Prerequisites for PostgreSQL . .33 Prerequisites for Microsoft SQL Server . .34 Prerequisites for Oracle. .34 Configuring the External ZENworks Database . .36 PostgreSQL Database Information . .38 MS SQL Database Information . .39 Oracle Database Information . .42 9 Installing a ZENworks Primary Server on Windows 45 Installation Information .
    [Show full text]
  • Metadefender Core V4.18.0
    MetaDefender Core v4.18.0 © 2020 OPSWAT, Inc. All rights reserved. OPSWAT®, MetadefenderTM and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names, and images mentioned and/or used herein belong to their respective owners. Table of Contents About This Guide 14 Key Features of MetaDefender Core 15 1. Quick Start with MetaDefender Core 16 1.1. Installation 16 Operating system invariant initial steps 16 Basic setup 17 1.1.1. Configuration wizard 17 1.2. License Activation 22 1.3. Process Files with MetaDefender Core 22 2. Installing or Upgrading MetaDefender Core 23 2.1. Recommended System Configuration 23 Microsoft Windows Deployments 23 Unix Based Deployments 25 Data Retention 27 Custom Engines 28 Browser Requirements for the Metadefender Core Management Console 28 2.2. Installing MetaDefender 28 Installation 28 Installation notes 28 2.2.1. Installing Metadefender Core using command line 29 2.2.2. Installing Metadefender Core using the Install Wizard 32 2.3. Upgrading MetaDefender Core 32 Upgrading from MetaDefender Core 3.x 32 Upgrading from MetaDefender Core 4.x 32 2.4. MetaDefender Core Licensing 33 2.4.1. Activating Metadefender Licenses 33 2.4.2. Checking Your Metadefender Core License 38 2.5. Performance and Load Estimation 39 What to know before reading the results: Some factors that affect performance 39 How test results are calculated 40 Test Reports 40 Performance Report - Multi-Scanning On Linux 40 Performance Report - Multi-Scanning On Windows 44 2.6. Special installation options 47 Use RAMDISK for the tempdirectory 47 3.
    [Show full text]
  • Accessdata Password Recovery Toolkit and Distributed Network Attack
    AccessData Password Recovery Toolkit and Distributed Network Attack User Guide | 1 AccessData Legal and Contact Information Document date: March 13, 2014 Legal Information ©2014 AccessData Group, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. AccessData Group, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, AccessData Group, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, AccessData Group, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, AccessData Group, Inc. reserves the right to make changes to any and all parts of AccessData software, at any time, without any obligation to notify any person or entity of such changes. You may not export or re-export this product in violation of any applicable laws or regulations including, without limitation, U.S. export regulations or the laws of the country in which you reside. AccessData Group, Inc. 588 W. 400 S. Suite 350 Lindon, Utah 84042 U.S.A. www.accessdata.com AccessData Trademarks and Copyright Information AccessData® is a registered trademark of AccessData Group, Inc. AD InSight® is a registered trademark of AccessData Group, Inc.
    [Show full text]
  • Image Compression Through Combination Advantages from Existing Techniques
    Elda Cina, Esmerald Aliaj & Habib Hamam Image Compression Through Combination Advantages From Existing Techniques Elda Cina [email protected] Information Technology Faculty “Aleksander Moisiu”, University Durres, Albania Esmerald Aliaj [email protected] Information Technology Faculty “Aleksander Moisiu”, University Durres, Albania Habib Hamam [email protected] Faculty of Engineering, University of Moncton, Canada School of Engineering, Canadian Institute of Technology, Albania Abstract The tremendous growth of digital data has led to a high necessity for compressing applications either to minimize memory usage or transmission speed. Despite of the fact that many techniques already exist, there is still space and need for new techniques in this area of study. With this paper we aim to introduce a new technique for data compression through pixel combinations, used for both lossless and lossy compression. This new technique is also able to be used as a standalone solution, or with some other data compression method as an add-on providing better results. It is here applied only on images but it can be easily modified to work on any other type of data. We are going to present a side-by-side comparison, in terms of compression rate, of our technique with other widely used image compression methods. We will show that the compression ratio achieved by this technique tanks among the best in the literature whilst the actual algorithm remains simple and easily extensible. Finally the case will be made for the ability of our method to intrinsically support and enhance methods used for cryptography, steganography and watermarking. Keywords: Digital Data, Compression Techniques, Compression Rate, Data Security.
    [Show full text]