Sales Tel: +63 945 7983492  |  Email Us    
SMDC Residences

Air Residences

Features and Amenities

Reflective Pool
Function Terrace
Seating Alcoves

Air Residences

Green 2 Residences

Features and Amenities:

Wifi ready study area
Swimming Pool
Gym and Function Room

Green 2 Residences

Bloom Residences

Features and Amenities:

Recreational Area
2 Lap Pools
Ground Floor Commercial Areas

Bloom Residences

Leaf Residences

Features and Amenities:

3 Swimming Pools
Gym and Fitness Center
Outdoor Basketball Court

Leaf Residences

Contact Us

Contact us today for a no obligation quotation:


+63 945 7983492
+63 908 8820391

Copyright © 2018 SMDC :: SM Residences, All Rights Reserved.


































































Latest Killexams.com Questions of C9560-659 | braindumps | smresidences.com.ph

Download Pass4sure C9560-659 examcollection - Prepare exam prep - braindumps - VCE and you will pass for sure - braindumps - smresidences.com.ph

Pass4sure C9560-659 dumps | Killexams.com C9560-659 actual questions | http://smresidences.com.ph/

C9560-659 Fundamentals of Applying IBM SmartCloud Control Desk V1

Study guide Prepared by Killexams.com IBM Dumps Experts


Killexams.com C9560-659 Dumps and actual Questions

100% actual Questions - Exam Pass Guarantee with high Marks - Just Memorize the Answers



C9560-659 exam Dumps Source : Fundamentals of Applying IBM SmartCloud Control Desk V1

Test Code : C9560-659
Test cognomen : Fundamentals of Applying IBM SmartCloud Control Desk V1
Vendor cognomen : IBM
: 105 actual Questions

you recognize the fine and fastest manner to pass C9560-659 examination? I got it.
My convoke is Suman Kumar. Ive were given 89.25% in C9560-659 exam after getting your check materials. Thanks for imparting this contour of profitable examine material as the reasons to the answers are first-rate. Thanks killexams.Com for the super query financial organization. The excellent disaster about this query bank is the one of a benign answers. It permits me to apprehend the concept and mathematical calculations.


strive out those actual C9560-659 questions.
This C9560-659 unload is exceptional and is certainly really worth the money. Im now not crazy approximately deciding to buy stuff enjoy that, however for the judgement that exam is so luxurious and demanding, I decided it might breathe smarter to rate a protection internet, signification this package deal. This killexams.com sell off is simply desirable, the questions are legitimate and the solutions are correct, which ive double checked with a few buddies (every so often examination dumps give you incorrect answers, but now not this one). any in all, I handed my examination just the manner I hoped for, and now I imply killexams.com to anybody.


Use actual C9560-659 dumps with actual and popularity.
With simplest two weeks to scuttle for my C9560-659 exam, I felt so helpless considering my negative education. however, needed to pass the test badly as I desired to alternate my task. eventually, i establish the query and reply by pass ofkillexams.com which eliminated my issues. The content material of the manual was moneyed and particular. The facile and quick answers helped accomplish out the subjects without problems. awesome manual, killexams. furthermore took succor from C9560-659 dependable Cert guide and it helped.


Get those s and recede to vacations to build together.
im very joyful with the C9560-659 QAs, it helped me lot in examination center. i can without a doubt near for different IBM certifications also.


I clearly experienced C9560-659 examination questions, there's not anything enjoy this.
Its concise solutions helped me to accomplish superb marks noting any questions below the stipulated time in C9560-659. Being an IT grasp, my competencies with prize are so forth exigency to breathe suitable. Not withstanding, proceeding with a customary employment with giant responsibilities, it became not facile for me to hold a solid making plans. At that factor, I establish out about the typically organized question and reply aide of killexams.Com dumps.


Can you believe, any C9560-659 questions I prepared were asked.
i am ranked very exorbitant amongst my magnificence friends on the list of awesome college students but it simplestoccurred once I registered on this killexams.com for a few exam assist. It became the exorbitant ranking studyingapplication in this killexams.com that helped me in joining the high ranks together with different exceptional students of my magnificence. The assets in this killexams.com are commendable due to the fact theyre particular and extraordinarily profitable for practise thru C9560-659 pdf, C9560-659 dumps and C9560-659 books. i am joyful to write these phrases of appreciation due to the fact this killexams.com deserves it. thanks.


splendid source! I were given actual test questions of C9560-659 exam.
I am C9560-659 certified now, thanks to this killexams.com website. They occupy a magnificient collection of brain dumps and exam preparation resources, I furthermore used them for my C9560-659 certification final year, and this time their sftuff is just as good. The questions are authentic, and the testing engine works fine. No problems detected. I just ordered it, practiced for a week or so, then went in and passed the C9560-659 exam. This is what the impeccable exam preparation should breathe enjoy for everyone, I recommend killexams.


wherein occupy to I test in for C9560-659 exam?
This killexams.Com from helped me rate my C9560-659 accomplice confirmation. Their materials are simply beneficial, and the examination simulator is virtually wonderful, it completely reproduces the exam. Topics are smooth very with out troubles the usage of the killexams.Com keep fabric. The exam itself changed into unpredictable, so Im satisfied I applied killexams.Com . Their packs unfold any that I want, and that i wont rate any unsavory shocks amid your examination. Thanx guys.


Really magnificient experience!
Hello there fellows, just to inform you that I passed C9560-659 exam a day or two ago with 88% marks. Yes, the exam is difficult and killexams.com and Exam Simulator does accomplish life simpler - a magnificient deal! I reflect this unit is the unrivaled judgement I passed the exam. As a matter of first importance, their exam simulator is a gift. I generally adored the probe and-answer organization and tests of different types in light of the fact that this is the most exemplar approach to learn.


wherein am i able to locate C9560-659 latest and up to date dumps questions?
every time I want to pass my certification hold a search for at to maintain my task, I immediately recede to killexams.com and search the specified certification hold a search for at, purchase and prepare the check. It clearly is worth admiring because, I constantly skip the check with exact scores.


IBM Fundamentals of Applying IBM

IBM looks to Disrupt Scientific analysis on the Blockchain | killexams.com actual Questions and Pass4sure dumps

The utilize circumstances for distributed ledger technology are on the upward thrust, as evidenced by IBM’s most fresh patent utility for open scientific analysis on the blockchain.

The tech significant envisions a system in which a blockchain represents an scan with particular person blocks produced from mission accessories together with analysis data, information analysis and effects in addition to build up-statistics evaluation and more any with block-linking capabilities to mirror the fame of modifications. The patent, which was filed with the U.S. Patent and Trademark office at yr-conclusion 2017, comes on the heels of a sever blockchain patent filed through IBM with an augmented reality and gaming heart of attention.

The scientific research neighborhood has been plagued with a scarcity of transparency for information collection tied to the evaluation system, in line with which the blockchain is a probable antidote. Chief among the concerns is a scarcity of “devoted data” and maintaining tips from unauthorized adjustments, any of which the blockchain solves with facets enjoy immutability and data protection.

IBM isn’t the handiest entity that is looking to disrupt this procedure amid what has been described as a “reproducibility disaster in analysis” and falsified records. but previously, different solutions involving the blockchain occupy fallen brief in addressing key points surrounding confidentiality, accessibility, using algorithms for tasks comparable to “automated correction” and more, any of which IBM takes on in its patent utility. The commerce furthermore aspects to “limited platforms that allow for sharing guidance about scientific research and showing pellucid statistics assortment and evaluation steps,” which interferes with researchers getting credit score for the drudgery they’ve performed.

IBM’s solution comprises a brisk computing ambiance for experiments on the blockchain, one that depends heavily on but isn't restricted to a cloud computing mannequin by which facts uploaded to public databases will furthermore breathe tracked. They picture a blockchain gear that is 2-pronged, comprised of both “the trustworthiness of the blockchain thought with open scientific research.” Their technology accomplishes this through placing scientific experiments on the blockchain, together with “data amassed, analysis performed and/or effects accomplished and in doing so bolsters the “trustworthiness and reproducibility of the facts and effects” amid the immutable nature of the blockchain.

IBM describes a “first screen of research information and a 2nd screen of analysis facts representing a log of an analysis carried out on the research records.” The expertise isn’t for static suggestions because the information can even breathe analyzed for the “reliability and provenance” of the guidance.

typical, the technology is designed to accelerate the scientific research procedure, giving the analysis group greater gear to bring together, analyze, draw conclusions and accomplish corrections on their work, a system that furthermore spills into peer experiences, replicating experiments and evaluating the relevance of data any with the profit of records safety that is inherent with the blockchain.

Featured picture from Shutterstock.

The build up IBM looks to Disrupt Scientific research on the Blockchain regarded first on CCN.


How IBM and pink Hat Will move Your Cloud system | killexams.com actual Questions and Pass4sure dumps

Barring a heavy-surpassed strategy to the recent acquisition, IBM and crimson Hat can enact some extraordinary issues out there.

IBM is a long system from making actual machines. That allotment of the enterprise went with Lenovo a couple of years in the past. So, what has been their focus ever seeing that? application and features. And, amongst those utility items and functions has been the cloud.

unless these days, you may furthermore occupy heard petite about IBM’s cloud presence. despite the fact i can assure you it’s there, it became basically struggling to compete with the likes of AWS, Azure, and even GCP. Now, with predictions enjoy these from Gartner pointing out that by pass of 2020, ninety% of organizations will adopt hybrid infrastructure administration capabilities and that the market in daily can breathe value $240 billion or extra – this became nearly as superb a time as any to definitely hold a dive into the cloud management and dawn ecosystem.

Image: Shutterstock

photo: Shutterstock

And IBM in fact took the plunge. in fact, this became the greatest acquisition or deal that IBM has ever gambled on any over its 107-12 months existence. In figuring out the know-how they simply took below their tremendous Blue wings, it might actually repay.

What this skill for IBM, purple Hat, and your cloud

Let’s dawn with IBM. It’s been a difficult ride for this firm. as soon as conventional for regular increase and innovation, IBM has been struggling in terms of keeping up with primary commerce gamers. This stagnation changed into modern and definitely uncomfortable for IBM’ers and fans alike. So, what to do? purchase a magnificent, multinational, open-source application enterprise that’s been constructing some main solutions. This contains purple Hat enterprise Linux, middleware solution JBoss, CloudForms, and the very powerful cloud and container management gear – OpenShift.

For IBM, this capacity opening the aperture into a quick-paced and growing to breathe hybrid cloud market. Most of all, this potential targeting enterprise consumers and arming them with leading gear around cloud administration. basically, the utilize of some of the trade’s most fulfilling container management options (OpenShift) will give IBM valued clientele the forms of gear and capabilities to approach digital transformation efforts as well as complete technology modernization shifts.

The whole concept of "monolith to microservices" can breathe encompassed via this IBM+purple Hat deal. know-how enjoy OpenShift will supply IBM a leading Kubernetes management platform able to offering real-world cloud-native options. This isn’t just IBM paperware from now on, with pink Hat, the ammunition is absolutely there. combine this with a much bigger portfolio of middleware and stout cloud-able (and validated) developer gear and you occupy a extremely mighty Story for hybrid cloud deployment and management.

“With IBM’s fresh circulation to containerize its middleware, nowadays’s landmark partnership between IBM and purple Hat offers valued clientele with extra alternative and adaptability. Their commonplace vision for hybrid cloud the usage of container architectures enables hundreds of thousands of organizations – from banks, to airlines, to executive groups - to entry leading technology from both businesses while not having to choose between public and private cloud.”

- Arvind Krishna, Senior vice chairman, IBM Hybrid Cloud

For IBM, red Hat (and OpenShift) is an instantaneous gateway right into a developer neighborhood that’s literally designing the architecture for commerce corporations and their hybrid cloud initiatives. Did IBM pay a top class for red Hat? You greater believe it. become it value it? Time will inform. Coming from behind isn't convenient, however this is a very superb means to site a rapid engine to your cloud company.

For red Hat, there are pretty massive advantages, too. other than the tremendous amounts of components and scale capabilities, red Hat is entrenching itself even extra into an commerce market that’s primed and able for the cloud. Now, reflect about leveraging crimson Hat tools to influence any of those stunning IBM customers that occupy been itching for an IBM-able hybrid cloud structure.

“through extending their lengthy-standing collaboration with IBM, we’re bringing collectively two main commerce utility systems in pink Hat OpenShift Container Platform and IBM Cloud deepest and adding the energy of IBM’s software and cloud options.”

- Paul Cormier, President, products and technologies, pink Hat

in line with a recent crimson Hat commentary, throughout the acquisition, IBM and purple Hat purchasers can now:

  • Maximize their existing expertise investments and scuttle them extra simply to the hybrid cloud with IBM Cloud deepest and crimson Hat OpenShift serving as the regular foundation;
  • build and deploy containerized applications on one single, built-in container platform IBM Cloud private presenting a single view of any enterprise statistics;
  • allow developers to design, modernize, and set up modern purposes greater right now while taking potential of IBM’s cloud-primarily based services akin to simulated intelligence (AI), cyber web of issues (IoT) and blockchain with IBM Cloud inner most on crimson Hat OpenShift Container Platform.
  • “becoming a member of forces with IBM,” stated pink Hat CEO Jim Whitehurst, “will deliver us with a stronger degree of scale, components and capabilities to hasten up the move of open supply as the basis for digital transformation and produce crimson Hat to an even wider viewers, any whereas keeping their enjoyable pass of life and unwavering commitment to open supply innovation.”

    this is where I should pump the brakes, just a bit of. I in reality hope that IBM doesn’t recede heavy-surpassed in making an attempt to exchange purple Hat’s market definition and culture. because if it tries to thrust crimson Hat to undertake a broader IBM cultural and corporate model, I don’t definitely see it ending neatly. Plus, I’m certain there are actually extra concerns from latest crimson Hat consumers: What’ll occur to RHEL? How does this move licensing and the tools that i hold advantage of? enact I deserve to analyze competitors enjoy Pivotal or other options enjoy Cloud Foundry? again, time will inform how this may any play out. My hope is for a simple integration, whereas preserving red Hat just as astonishing as it is these days.

    finally, it’s censorious to occupy in mind what this can imply to your hybrid cloud and generic cloud administration solution. Barring a heavy-handed system to this acquisition, IBM and pink Hat can enact some definitely brilliant things in the market. here is honestly the first time in a long time that IBM pushed itself into the forefront of cloud, container, and hybrid cloud innovation. The enjoyable allotment is how IBM will integrate other options, Watson as an instance, into purple Hat products. If completed correct, there may furthermore breathe loads of advantages for the consumer, organisations, and the cloud in well-known. I’m staying confident.

    invoice is an enthusiastic technologist with journey in loads of industries. This comprises statistics center, cloud, virtualization, protection, AI, mobility, belt options, and an needy lot extra. His architecture drudgery contains giant virtualization and cloud deployments in addition to ... View full Bio We welcome your feedback on this theme on their sociable media channels, or [contact us directly] with questions in regards to the site.

    greater Insights


    Cloudy climate forward for IBM and purple Hat? | killexams.com actual Questions and Pass4sure dumps

    the belt is buzzing concerning the application industry’s largest acquisition ever. This “online game altering” IBM acquisition of pink Hat for $34 billion eclipses Microsoft’s $26.2 billion of LinkedIn, which set the outdated list. And it’s the third greatest tech acquisition in historical past at the back of Dell buying EMC for $sixty four billion in 2015 and Avago’s buyout of Broadcom for $37 billion the very 12 months.

    Wall highway certainly receives fearful when it sees these lofty expense tags. IBM’s inventory changed into down four.2 percent following the announcement, and there are doubtless more concerns over a broader IBM selloff round how tons IBM is purchasing purple Hat.

    This units the stage for massive expectations on IBM to leverage this asset as a censorious turning factor in its heritage. in view that IBM’s Watson AI poster child has failed to create sustainable increase, could this breathe their exemplar casual to revise the ship as soon as and for all? Or is that this mega merger a complicated conflict of cultures and items with a purpose to accomplish it tough to recognise the complete advantage?

    huge Blue’s been in huge obstacle

    When the chips are down, it’s time to recede any in. massive Blue definitely shocked the expertise world when it announced it might enact its biggest deal ever and purchase pink Hat for a huge 11x premium. The fact is that purple Hat became now not always trying to breathe obtained, so overpaying became the handiest conceivable alternative. And if IBM didn’t pay, Google, Amazon, VMWare and even Alibaba would have.

    determined instances claim determined measures. IBM has been struggling to disclose boom in modern markets for rather a while. earlier than 2018, it had 22 straight quarters of salary decline. And it has lost over $28 billion in income over the past six years. Its revenue on the conclusion if 2017 become $79.14 billion, the bottom in two decades and the more austere annual quantity in view that 1997, when IBM revenues were $seventy eight.51 billion, except for inflation.

    In early 2018, IBM was capable of produce three consecutive quarters of salary boom, but that turned into above any because of the introduction of a brand modern line of IBM Z mainframe computer systems.

    IBM has been a commerce in decline for a long time. It’s difficult to maintain a enterprise with shrinking sales.

    Too ancient to develop?

    IBM is more than a hundred years historical and certainly suffers from comparisons to younger and nimbler agencies corresponding to Amazon, Google, fb, and Apple that occupy posted record growth in recent instances. Amazon’s fresh profits occupy surpassed $2 billion, for instance.

    if you contrast IBM to Microsoft, one other historical world utility company, it’s startling to search for the incompatibility in how Microsoft has been capable of reposition itself as growth commerce in line with the cloud.

    In 1990, when Microsoft liberate windows 3.0, IBM had revenues of $sixty nine billion (handiest $10 billion modest of what it has nowadays), while Microsoft had around $800 million. Microsoft surpassed IBM in revenue in 2015 and crossed the $100 billion annual profits tag in 2018.

    during the final a number of years, as IBM’s profits shrank, Microsoft invested in its “business cloud” enterprise that encompasses Azure, office 365, and Dynamics 365, bringing in over $23 billion in modern revenues. Microsoft has these days been firing on any cylinders whereas IBM experienced growth stalls.

    sluggish to rate to the cloud

    IBM’s success within the hardware enterprise, in particular it’s Z-sequence mainframes, pressured it to give protection to its turf and distracted it from seeing the future influence of cloud. AWS begun offering public cloud capabilities lower back in 2006. As late as 2011, IBM become barely citing the breathe awake “cloud” in its annual reviews or revenue calls. The company at final realized in 2013 that cloud computing changed into the future and made a hail-Mary purchase of SoftLayer to bridge the gap, paying $2 billion after which investing an additional $1 billion to combine the platform.

    It’s challenging to set up gigantic market partake in the event you’re late to the party. Softlayer’s global market partake is silent a removed fifth in the back of AWS, Microsoft, Google, and even brisker newcomer Alibaba, which handed IBM’s cloud revenues in June of 2018.

    IBM made a number of different cloud-connected acquisitions, including Gravitant (a cloud brokerage and management utility), Bluebox (a private cloud as a service platform according to OpenStack), Sanovi (a hybrid cloud healing and migration application), Lighthouse and CrossIdeas (both cloud security platforms), and CSL international (a cloud virtualization platform).

    regardless of these acquisitions within the cloud market, IBM has didn't truly monetize these products and profit market partake in the cloud.

    The company has failed to capitalize on innovations before: Watson AI became at the proper of its online game when it debuted on Jeopardy in 2011 to beat human contestants but immediately fell at the back of Amazon, Google, and Microsoft.

    Will red Hat breathe the savior?

    crimson Hat is the world’s greatest provider of open-supply commerce software options. crimson Hat’s bread and butter Linux company continues to deliver growth in particular as it powers many simultaneous AI and analytics workloads. Its mannequin has evolved from in simple terms on-premise to a wholesome subscription company used on public cloud systems comparable to Amazon net features (AWS), Microsoft Azure, and Google Cloud Platform (GCP).

    crimson Hat has furthermore extended into open middleware solutions akin to OpenStack, a cloud infrastructure platform, and OpenShift, a platform for managing application containers. OpenShift has lengthy been a smartly-saved covert as Cloud endemic Computing foundation (CNCF) has grabbed many of the headlines with its Kubernetes container orchestration platform. IBM has an occasion to leverage its advertising and marketing and world achieve to inspire mainframe and legacy shoppers to adopt OpenShift. These systems occupy been incredibly leveraged in private and hybrid cloud deployments, notably in industries enjoy telecommunications.

    There isn't any doubt that purple Hat gives IBM a lots extra credible cloud story. however the question definitely is, is it too late?

    The acquisition is certainly first rate information for organizations trying to shift basic container-based applications and digital machines to the cloud. however, Amazon has already captured a major a allotment of that market.

    whereas the acquisition of crimson Hat offers IBM a robust position within the hybrid-cloud market, which should breathe regularly occurring for enterprises that aren't taking the time to decommission or re-architect legacy functions, the quickly-turning out to breathe public cloud market may breathe the battleground of the long run.

    Will the mixing rate messy?

    IBM has had a spotty listing when it comes to integrating and capitalizing on gigantic acquisitions.

    whereas the majority of IBM’s M&A has been in the belt of utility, revenue in the section has been disappointing. perhaps what's concerning is that adjusting for acquisitions, IBM’s software enterprise continues to Tell no — mostly due to the indisputable fact that these tremendous acquisitions occupy become a allotment of the IBM cloth and commerce as commonplace.

    Can IBM integrate some thing as tremendous as purple Hat without interfering with its core expense proposition? Many worry that great Blue will try to “blue wash” their platform of option.

    And there’s the query of no matter if these two discrete company cultures can near collectively – IBM, a gradual boom commerce not making an needy lot progress in the cloud house, and red Hat, an creative, open supply commerce it truly is constructing foundational accessories for operating within the cloud.

    We’ve considered lifestyle clashes derail many different high profile mergers equivalent to HP/Compaq, HP/Autonomy, Microsoft/Nokia, AOL/Time Warner, dash/Nextel and Alcatel/Lucent. IBM will should embrace the open source community and strategy.

    The joint company will physiognomy principal platform selections on the cloud front. IBM has a public cloud that competes with AWS and Microsoft. however developers utilize crimson Hat’s Linux on many public clouds. whereas that multi-cloud approach will assist IBM usher in earnings throughout the public clouds, it is going to create battle with its own Softlayer cloud offering. IBM has struggled to control this classification of channel and product conflict correctly in the past.

    after which there's the pass forward for IBM’s own AIX working system vs. Linux — not to point out the SCO-IBM Unix lawsuit silent lingering in the courts.

    additionally to keep are the lesser regular pink Hat storage items enjoy purple Hat Ceph (an object file storage) and pink Hat Gluster (a NAS product). As purple Hat integrates into IBM’s hybrid cloud community, these storage items might breathe separated from IBM, which may create confusion and battle.

    So while IBM actually faces a lot of possibility with the acquisition, there is not any assure this huge ante will pay off. IBM needed a bold circulation. however within the short term, we're not likely to search for any unexpected movement of IBM’s position in the public cloud space. any eyes will breathe on its potential to catapult into the hybrid cloud market. For that, the commerce will should accomplish sure it doesn’t rate in its personal way.

    Frank Palermo is the executive vice president at Virtusa’s global Digital business, where he is chargeable for technology practices in UX, mobility, social, cloud, analytics, huge facts, and IoT.


    C9560-659 Fundamentals of Applying IBM SmartCloud Control Desk V1

    Study guide Prepared by Killexams.com IBM Dumps Experts


    Killexams.com C9560-659 Dumps and actual Questions

    100% actual Questions - Exam Pass Guarantee with high Marks - Just Memorize the Answers



    C9560-659 exam Dumps Source : Fundamentals of Applying IBM SmartCloud Control Desk V1

    Test Code : C9560-659
    Test cognomen : Fundamentals of Applying IBM SmartCloud Control Desk V1
    Vendor cognomen : IBM
    : 105 actual Questions

    you recognize the fine and fastest manner to pass C9560-659 examination? I got it.
    My convoke is Suman Kumar. Ive were given 89.25% in C9560-659 exam after getting your check materials. Thanks for imparting this contour of profitable examine material as the reasons to the answers are first-rate. Thanks killexams.Com for the super query financial organization. The excellent disaster about this query bank is the one of a benign answers. It permits me to apprehend the concept and mathematical calculations.


    strive out those actual C9560-659 questions.
    This C9560-659 unload is exceptional and is certainly really worth the money. Im now not crazy approximately deciding to buy stuff enjoy that, however for the judgement that exam is so luxurious and demanding, I decided it might breathe smarter to rate a protection internet, signification this package deal. This killexams.com sell off is simply desirable, the questions are legitimate and the solutions are correct, which ive double checked with a few buddies (every so often examination dumps give you incorrect answers, but now not this one). any in all, I handed my examination just the manner I hoped for, and now I imply killexams.com to anybody.


    Use actual C9560-659 dumps with actual and popularity.
    With simplest two weeks to scuttle for my C9560-659 exam, I felt so helpless considering my negative education. however, needed to pass the test badly as I desired to alternate my task. eventually, i establish the query and reply by pass ofkillexams.com which eliminated my issues. The content material of the manual was moneyed and particular. The facile and quick answers helped accomplish out the subjects without problems. awesome manual, killexams. furthermore took succor from C9560-659 dependable Cert guide and it helped.


    Get those s and recede to vacations to build together.
    im very joyful with the C9560-659 QAs, it helped me lot in examination center. i can without a doubt near for different IBM certifications also.


    I clearly experienced C9560-659 examination questions, there's not anything enjoy this.
    Its concise solutions helped me to accomplish superb marks noting any questions below the stipulated time in C9560-659. Being an IT grasp, my competencies with prize are so forth exigency to breathe suitable. Not withstanding, proceeding with a customary employment with giant responsibilities, it became not facile for me to hold a solid making plans. At that factor, I establish out about the typically organized question and reply aide of killexams.Com dumps.


    Can you believe, any C9560-659 questions I prepared were asked.
    i am ranked very exorbitant amongst my magnificence friends on the list of awesome college students but it simplestoccurred once I registered on this killexams.com for a few exam assist. It became the exorbitant ranking studyingapplication in this killexams.com that helped me in joining the high ranks together with different exceptional students of my magnificence. The assets in this killexams.com are commendable due to the fact theyre particular and extraordinarily profitable for practise thru C9560-659 pdf, C9560-659 dumps and C9560-659 books. i am joyful to write these phrases of appreciation due to the fact this killexams.com deserves it. thanks.


    splendid source! I were given actual test questions of C9560-659 exam.
    I am C9560-659 certified now, thanks to this killexams.com website. They occupy a magnificient collection of brain dumps and exam preparation resources, I furthermore used them for my C9560-659 certification final year, and this time their sftuff is just as good. The questions are authentic, and the testing engine works fine. No problems detected. I just ordered it, practiced for a week or so, then went in and passed the C9560-659 exam. This is what the impeccable exam preparation should breathe enjoy for everyone, I recommend killexams.


    wherein occupy to I test in for C9560-659 exam?
    This killexams.Com from helped me rate my C9560-659 accomplice confirmation. Their materials are simply beneficial, and the examination simulator is virtually wonderful, it completely reproduces the exam. Topics are smooth very with out troubles the usage of the killexams.Com keep fabric. The exam itself changed into unpredictable, so Im satisfied I applied killexams.Com . Their packs unfold any that I want, and that i wont rate any unsavory shocks amid your examination. Thanx guys.


    Really magnificient experience!
    Hello there fellows, just to inform you that I passed C9560-659 exam a day or two ago with 88% marks. Yes, the exam is difficult and killexams.com and Exam Simulator does accomplish life simpler - a magnificient deal! I reflect this unit is the unrivaled judgement I passed the exam. As a matter of first importance, their exam simulator is a gift. I generally adored the probe and-answer organization and tests of different types in light of the fact that this is the most exemplar approach to learn.


    wherein am i able to locate C9560-659 latest and up to date dumps questions?
    every time I want to pass my certification hold a search for at to maintain my task, I immediately recede to killexams.com and search the specified certification hold a search for at, purchase and prepare the check. It clearly is worth admiring because, I constantly skip the check with exact scores.


    Obviously it is difficult assignment to pick solid certification questions/answers assets concerning review, reputation and validity since individuals rate sham because of picking incorrectly benefit. Killexams.com ensure to serve its customers best to its assets concerning exam dumps update and validity. The vast majority of other's sham report objection customers near to us for the brain dumps and pass their exams cheerfully and effectively. They never trade off on their review, reputation and character because killexams review, killexams reputation and killexams customer conviction is vital to us. Uniquely they deal with killexams.com review, killexams.com reputation, killexams.com sham report grievance, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. In the event that you see any False report posted by their rivals with the cognomen killexams sham report grievance web, killexams.com sham report, killexams.com scam, killexams.com dissension or something enjoy this, simply bethink there are constantly terrible individuals harming reputation of superb administrations because of their advantages. There are a magnificient many fulfilled clients that pass their exams utilizing killexams.com brain dumps, killexams PDF questions, killexams hone questions, killexams exam simulator. Visit Killexams.com, their specimen questions and test brain dumps, their exam simulator and you will realize that killexams.com is the best brain dumps site.


    Vk Profile
    Vk Details
    Tumbler
    linkedin
    Killexams Reddit
    digg
    Slashdot
    Facebook
    Twitter
    dzone
    Instagram
    Google Album
    Google About me
    Youtube



    NSE4-5-4 test prep | 050-v71x-CSESECURID practice questions | C2040-423 test prep | 000-997 VCE | 050-v70-CSEDLPS02 study guide | 650-331 questions answers | CCP free pdf download | 000-280 practice exam | AND-401 free pdf | 6001-1 braindumps | 1Y0-610 practice test | 920-164 test prep | 642-979 mock exam | 090-161 bootcamp | 00M-244 brain dumps | HP0-S32 study guide | 000-974 free pdf | 2B0-100 test questions | 600-212 examcollection | RTRP brain dumps |


    C9560-659 exam questions | C9560-659 free pdf | C9560-659 pdf download | C9560-659 test questions | C9560-659 real questions | C9560-659 practice questions

    Searching for C9560-659 exam dumps that works in actual exam?
    Is it accurate to Tell that you are searching for IBM C9560-659 Dumps of actual questions for the Fundamentals of Applying IBM SmartCloud Control Desk V1 Exam prep? They give most refreshed and character C9560-659 Dumps. Detail is at http://killexams.com/pass4sure/exam-detail/C9560-659. They occupy aggregated a database of C9560-659 Dumps from actual exams keeping in mind the halt goal to give you a casual to rate ready and pass C9560-659 exam on the first attempt. Simply bethink their and unwind. You will pass the exam.

    Are you looking for Pass4sure IBM C9560-659 Dumps containing actual exams questions and answers for the Fundamentals of Applying IBM SmartCloud Control Desk V1 Exam prep? They provide most updated and character source of C9560-659 Dumps that is http://killexams.com/pass4sure/exam-detail/C9560-659. They occupy compiled a database of C9560-659 Dumps questions from actual exams in order to let you prepare and pass C9560-659 exam on the first attempt. killexams.com Huge Discount Coupons and Promo Codes are as under;
    WC2017 : 60% Discount Coupon for any exams on website
    PROF17 : 10% Discount Coupon for Orders greater than $69
    DEAL17 : 15% Discount Coupon for Orders greater than $99
    OCTSPECIAL : 10% Special Discount Coupon for any Orders

    We occupy their specialists working persistently for the gathering of actual exam questions of C9560-659. any the pass4sure questions and answers of C9560-659 gathered by their group are inspected and updated by their C9560-659 ensured group. They sojourn associated with the competitors showed up in the C9560-659 test to rate their reviews about the C9560-659 test, they assemble C9560-659 exam tips and traps, their relish about the strategies utilized as a allotment of the actual C9560-659 exam, the mix-ups they done in the actual test and after that enhance their material appropriately. When you relish their pass4sure questions and answers, you will feel sure about every one of the subjects of test and feel that your knowledge has been enormously progressed. These pass4sure questions and answers are not simply hone questions, these are actual exam questions and answers that are sufficient to pass the C9560-659 exam at first attempt.

    IBM certifications are very required crosswise over IT associations. HR administrators gaunt toward applicants who occupy a comprehension of the theme, as well as having finished certification exams in the subject. any the IBM certification succor provided on killexams.com are acknowledged around the world.

    It is accurate to Tell that you are searching for actual exams questions and answers for the Fundamentals of Applying IBM SmartCloud Control Desk V1 exam? They are here to give you one most updated and character sources that is killexams.com, They occupy gathered a database of questions from actual exams so as to give you a casual to arrangement and pass C9560-659 exam on the very first attempt. any preparation materials on the killexams.com site are progressive and checked by industry specialists.

    Why killexams.com is the Ultimate conclusion for confirmation planning?

    1. A character particular that succor You Prepare for Your Exam:

    killexams.com is a definitive planning hotspot for passing the IBM C9560-659 exam. They occupy deliberately consented and collected actual exam questions and answers, which are updated with an indistinguishable recurrence from actual exam is updated, and investigated by industry specialists. Their IBM certified specialists from numerous associations are capable and qualified/confirmed people who occupy investigated each probe and reply and explanation segment keeping in mind the halt goal to enable you to comprehend the thought and pass the IBM exam. The most exemplar approach to arrangement C9560-659 exam isnt perusing a course reading, however taking practice actual questions and understanding the right answers. practice questions succor set you up for the ideas, as well as the strategy in which questions and reply choices are introduced amid the actual exam.

    2. facile to understand Mobile Device Access:

    killexams give to a magnificient qualification facile to utilize access to killexams.com items. The concentration of the site is to give exact, updated, and to the direct material toward enable you to study and pass the C9560-659 exam. You can rapidly find the actual questions and solution database. The webpage is many-sided amicable to permit reflect about anyplace, as long as you occupy web association. You can simply stack the PDF in portable and concentrate anyplace.

    3. Access the Most Recent Fundamentals of Applying IBM SmartCloud Control Desk V1 actual Questions and Answers:

    Our Exam databases are frequently updated during the time to incorporate the most recent actual questions and answers from the IBM C9560-659 exam. Having Accurate, actual and current actual exam questions, you will pass your exam on the main attempt!

    4. Their Materials is Verified by killexams.com Industry Experts:

    We are doing battle to giving you actual Fundamentals of Applying IBM SmartCloud Control Desk V1 exam questions and answers, alongside explanations. Each on killexams.com has been confirmed by IBM certified specialists. They are exceptionally qualified and confirmed people, who occupy numerous times of expert relish identified with the IBM exams.

    5. They Provide any killexams.com Exam Questions and comprise minute Answers with Explanations:

    Not at any enjoy numerous other exam prep sites, killexams.com gives updated actual IBM C9560-659 exam questions, as well as nitty gritty answers, explanations and charts. This is vital to succor the hopeful comprehend the right answer, as well as knowledges about the alternatives that were wrong.

    killexams.com Huge Discount Coupons and Promo Codes are as under;
    WC2017 : 60% Discount Coupon for any exams on website
    PROF17 : 10% Discount Coupon for Orders greater than $69
    DEAL17 : 15% Discount Coupon for Orders greater than $99
    OCTSPECIAL : 10% Special Discount Coupon for any Orders


    C9560-659 Practice Test | C9560-659 examcollection | C9560-659 VCE | C9560-659 study guide | C9560-659 practice exam | C9560-659 cram


    Killexams 1Z0-863 bootcamp | Killexams 000-463 test questions | Killexams 000-G40 actual questions | Killexams 000-058 practice test | Killexams 310-345 brain dumps | Killexams DHORT actual questions | Killexams 000-852 dumps | Killexams C2040-410 exam questions | Killexams HP0-417 cheat sheets | Killexams CPA exam prep | Killexams 1Y0-A14 free pdf | Killexams 1Z0-821 sample test | Killexams 400-151 exam prep | Killexams 190-721 free pdf download | Killexams COG-135 brain dumps | Killexams 1Z0-508 dump | Killexams ISEBSWTINT-001 braindumps | Killexams P2090-068 practice questions | Killexams ECP-541 practice questions | Killexams 1Z0-035 braindumps |


    killexams.com huge List of Exam Braindumps

    View Complete list of Killexams.com Brain dumps


    Killexams 060-DSFA680 practice test | Killexams 250-308 study guide | Killexams 70-774 pdf download | Killexams TMPTE VCE | Killexams 1Z0-507 exam questions | Killexams ISEBSWTINT-001 cram | Killexams IIA-CIA-Part1 exam prep | Killexams 000-559 free pdf | Killexams HP0-753 examcollection | Killexams 9L0-061 test questions | Killexams HP3-C11 braindumps | Killexams MB3-209 exam prep | Killexams CBEST practice test | Killexams HP2-B22 test prep | Killexams 000-M96 study guide | Killexams HP2-E15 free pdf | Killexams MB5-857 test prep | Killexams HP3-042 study guide | Killexams 000-956 brain dumps | Killexams 9A0-034 brain dumps |


    Fundamentals of Applying IBM SmartCloud Control Desk V1

    Pass 4 sure C9560-659 dumps | Killexams.com C9560-659 actual questions | http://smresidences.com.ph/

    Ask HN: Who is hiring? (December 2013) | killexams.com actual questions and Pass4sure dumps

    Ask HN: Who is hiring? (December 2013) 286 points by whoishiring on Dec 1, 2013 | cloak | past | web | favorite | 322 comments Please lead with the location of the position and comprise the keywords INTERN, REMOTE, or H1B if the corresponding sort of candidate is welcome. Feel free to post any job that may interest HN readers from executive coadjutant to machine learning expert to CTO.

    Also see: inquire of HN: Freelancer? Seeking freelancer? (December 2013) http://news.ycombinator.com/item?id=6827545


    What's modern in Windows Server 2003 and ProLiant Architecture and Tools | killexams.com actual questions and Pass4sure dumps

    There probably hasn't been a time in the modern era of computing where there was more widespread concern for security. Only a few years ago, security was one of those unlit corners of the industry for hard-core types, but largely ignored by most of us. Today, securing computing resources ripples from the largest corporation to the most computer-illiterate home consumer, trying to preclude sophisticated hackers not only from infecting their computers with destructive viruses, but furthermore from stealing information or using their computer as an ad hoc server.

    NOTE

    Jan de Clercq of HP's Security Office provided much of the technical information and technical review of this section. Jan is one of HP's leading security experts. I highly recommend his modern book, Windows Server 2003 Security Infrastructures, Digital Press, 2004.

    Windows 2000 made some huge strides in securing the computing environment with features such as Kerberos for authentication and authorization, IP Security (IPSec) for remote access security, and the Encrypted File System (EFS) for protecting sensitive data. Windows NT and 2000 provided Certificate Services, which gave Administrators the skill to install their own CA and secure the certificates in their enterprise inexpensively, enticing smaller companies to implement Public Key Infrastructures (PKI).

    Security issues always provide leeway for improvement, and Windows Server 2003 and Windows XP occupy taken a step forward in a number of areas. reflect of XP as a Windows 2003 client—they both occupy very similar and compatible features. Significant security feature improvements in Windows XP and Windows Server 2003 include

    The following sections provide a brief description of each issue. refer to Jan de Clercq's books listed in the "References" section at the halt of the chapter for more information.

    Also known as SAFER, these policies are Microsoft's first attempt to provide stronger cryptographic compliance with Federal Information Processing Standards (FIPS) 140-1. FIPS determines whether products meet the touchstone and evaluates overall security provided by a cryptosystem. The kernel mode driver, FIPS.SYS, supports EFS (efs.sys), IPSec (ipsec.sys), and other crypto functions. Although this is only a flush 1 compliance intended for generic PC use, it is nonetheless a start. The thought with SAFER policies is to provide the Administrator the skill to grant granular client-level security policies to restrict the access to read, write, or execute software on computers.

    Because the "How To" basics of configuring these policies are reasonably well documented in the Microsoft KB 324036 article "How to utilize Software Restriction Policies in Windows Server 2003," I'll utilize the space here to picture some principal concepts and implementation recommendations.

    Software Restriction Policies is implemented through GPO settings located in the GPO tree Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies, and in User Configuration\Windows Settings\Security Settings\Software Restriction Policies. When you drill down to this location on a modern policy, a warning appears in the right pane of the GPO Editor, "No Software Restriction Policies Defined," as shown in device 1.23. Right-click on the Software Restriction Policies in the left pane and click modern Software Restriction Policies. You will then see two folders titled Security Levels and Additional Rules. Security Levels defines a high-level access policy, whereas Additional Rules allows you to define specific rules, including the following:

    Think of Security Levels as the locked condition on the front door to a building. There are two options (look in the Security Levels folder in the GPO): Disallowed and Unrestricted. The Disallowed option locks the front door and requires any who enter to provide proper credentials. No public access. Employees with ID badges only. The Unrestricted option leaves the front door unlocked, allowing anyone to enter the building. Inside the structure are special rooms (programs and files on the PC) that furthermore occupy locks on the door. These locks are the four classes of rules described in the previous section. If the front door is Disallowed, then you don't rate access unless you can prove you occupy access to a leeway in the building. The guard escorts you to that leeway (or rooms), but you can't recede anywhere else. This obviously is a high-security condition. If the front door is set to Unrestricted, anyone can walk in and roam through the structure and enter any leeway that is not locked. However, if a leeway is locked (that is, a rule has been created to restrict access to a program), you occupy to breathe granted specific access to rate in. I recommend, as does Microsoft's KB 310791 article "Description of the Software Restriction Policies in Windows XP," you utilize the Unrestricted option because it simply locks out certain files and programs. Unrestricted is the default. Setting the Disallowed mode, unless it is in a very controlled environment, will generate a lot of succor desk calls if it's not well planned and tested.

    These are the keys to the rooms—the exceptions to the lockout. Note that four Registry path policies are created by default in the Additional Rules folder. device 1.24 shows the default Registry path rules, as viewed in the GPMC. They are any defined as Unrestricted and are applied to

    The purpose of these policies is to permit access to censorious directory space when you've set the Security flush to Disallowed. These policies allow access to areas enjoy c:\> Program files.

    Figure 1.24Figure 1.24 The additional rules defined by default in Software Restriction Policies are shown using the GPMC snap-in.

    So far these rules look fairly straightforward. If you want to build the admin pack on every PC, but restrict users from running it, you set the SAFER policy to Unrestricted, and then create a path policy to restrict domain users from executing it. Pretty simple until you rate multiple rules defined in multiple policies and perhaps in a combination of User and Computer Configuration settings.

    NOTE

    The description of functionality described here is based on my relish and testing and asking questions of Microsoft PSS. I occupy not seen any Microsoft documentation to corroborate or negative these assertions. Your mileage may vary, so breathe sure you test these policies before implementing.

    If multiple Software Restriction Policies are defined, things rate complicated. Several design rules apply to the application of these policies. Understanding them is censorious to obtaining the desired results.

  • Closest match applies the rule. That is, if Rule 1 allows access to c:\*.exe and Rule 2 denies access to C:\payrollapp.exe, then the user would breathe unable to race payrollapp.exe because Rule 2 is a closer match to the program being run.

  • Most restrictive rules apply. Apply most-restrictive path rules further down in the directory tree than less-restrictive ones.

  • Rules are processed in the following order:

  • Security flush (highest priority)

  • Hash

  • Certificate

  • Path

  • Internet Zone rule

  • Default rules

  • Software Restriction Policies accumulate from multiple GPOs and are evaluated together. They enact not obey daily SDOU (Site Domain Organizational Unit) processing of GPOs, and they can breathe applied at the Computer and User Configuration sections of each GPO.

  • Security Levels determine how the Additional Rules are defined. If the Security flush is Unrestricted, the Additional Rules should breathe designed to restrict access. If the Security flush is Disallowed, the Additional Rules should breathe designed to allow access.

  • Software restriction policies—especially when setting generic categories (such as entire directories) to breathe disallowed—can occupy unexpected results. For instance, disallowing access to *.vbs to preclude virus deposited files from running can furthermore restrict access to logon scripts and other telling scripts.

  • Always thoroughly test these policies.

  • Define the policies in individual GPOs. This makes them easier to manage and troubleshoot.

  • Avoid applying Software Restriction Policies from multiple locations (domains and OUs) if possible. Applying them from fewer locations makes the results easier to forecast and troubleshoot.

  • To restrict Administrators from a Software Restriction Policy defined in User Configuration, restrict the appropriate Administrators' accounts and/or groups by removing the Apply Group Policy directly on the GPO.

  • To restrict Administrators from a Software Restriction Policy defined in Computer Configuration, you can remove the Apply Group Policy directly from the appropriate user or group, or you can recede to Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies\Enforcement. In the Enforcement Properties page, under the Apply Software Restriction policies to the following users, select any Users Except Local Administrators.

  • Make certain you occupy not inadvertently restricted access to telling files such as logon scripts and directories and files that should breathe scanned by antivirus programs. Testing should expose these types of flaws.

  • Evaluation of these policies at this time seems enjoy a bit of black magic. As of this writing, Microsoft had not seen a lot of customers using these policies, but in the drudgery I've done with the policies, I've establish they are difficult to design and it's difficult to rate the desired results if you occupy a lot of them. Again, adding complexity to these policies results in a high probability of failure, so you must test them thoroughly. You can apply them to User Config and Computer Config on multiple levels (domain and OU), and then occupy them any sorted by rule precedence, closest match, and most restrictive. maintain these GPOs in as few domains and OUs as possible, maintain the rules simple and well planned, and avoid applying them to both User Config and Computer Config in the GPO.

    Sample Rules

    Let's search for at a couple of examples of rules. Suppose they occupy six policies defined in a Domain SAFER Policy defined at the domain:

  • Security Level: Unrestricted

  • Hash Rule 1: hash of Payroll.exe (v4.2) set to Unrestricted

  • Hash Rule 2: hash of Payroll.exe (v4.1) set to Disallowed

  • Certificate Rule 1: Applications Certificate set to Unrestricted

  • Path Rule 1: C:\RestrictedApps set to Disallowed

  • Path Rule 2: C:\RestrictedApps\*.exe set to Unrestricted

  • Using these rules, a user attempting to race the following programs would occupy these results:

  • User runs the program: C:\restrictedApps\Payroll.exe (v4.1).

  • Security flush set to Unrestricted allows access.

    Path Rule 1 allows access.

    Hash Rule 1 disallows access.

    Certificate Rule 1 applies because this app was digitally signed by the certificate owned by the Applications group and is set to Unrestricted.

    Result: Hash Rule 2 applies because it is most specific (denies access to the exact file name, whereas the others refer to directories or groups of files). Access is granted.

  • User runs the program: C:\restrictedApps\backupfiles.exe.

  • Security flush set to Unrestricted allows access.

    Path Rule 1 disallows access to C:\restrictedApps.

    Path Rule 2 allows access to C:\restrictedApps\*.exe.

    Result: Because Path Rule 1 denies access to the directory, Path Rule 2 never applies. Access is denied. bethink that the most-restrictive path rules should breathe applied deeper in the tree than the least-restrictive ones.

  • Suppose the very rules are defined, but the Security flush is set to Disallowed. Path Rule 1 and Hash Rule 2 are not needed because the Security flush is set to Disallowed. With that setting, any you exigency to enact is define rules to allow access to programs that you want the user to access.

    Microsoft has attempted to succor with some exceptions to these rules. In the Software Restriction Policies folder in the GPO, you'll see three policies besides the two folders. These policies are

  • Enforcement: Allows you to exclude .dlls from restricted programs, and to exclude local admins.

  • Designated File Types: By default, policies only apply to daily executable types, such as .exe, .dll, and .vbs. This option allows you to add other types to it, such as .bat, .cmd, .msi, and others, including a blank so you can add one that isn't in the list.

  • Trusted Publishers: Defines users who can choose trusted publishers (for certificates).

  • In summary of Software Restriction Policies, I'd Tell to utilize them very carefully and only after extensive testing so you understand what the ramifications are. They occupy some value in the security configuration of the enterprise, but they are tangled and can create a lot of problems if you aren't careful.

    Some superb resources for SAFER policies comprise the Microsoft whitepaper, and Jeremy Moskowitz's Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP, and Windows 2000, Sybex, March 2004.

    Internet Connection (Personal) Firewall

    Also referred to as the Personal Firewall, this feature is provided with Windows XP as built-in protection for each computer. It isn't the most secure firewall, but it's probably sufficient for casual home users. If firewalls are implemented elsewhere, the personal firewall in XP is usually required to not breathe enabled. To enable the Internet Connection Firewall, open a network connection's Properties page, recede to the Advanced tab, and select the Protect My Computer and Network by Limiting or Preventing Access to this Computer from the Internet check box. Click the Settings button to access the Advanced Settings pane, shown in device 1.25 to configure advanced settings, including

  • Services: Allows you to select services such as FTP, Telnet, HTTP, and Remote Desktop that the users of this computer are allowed to access. Default is no access. So if you gyrate this firewall on and can't rate to a Web site, the judgement is probably wasn't enabled.

  • Security Logging: Allows configuring options to log dropped packets and successful connections (or not), to specify a log file cognomen and location (default is %systemroot%\pfirewall.log), and to set a log file size limit.

  • ICMP: Permits configuring of ICMP traffic, such as Allow Incoming reflect Request, Allow Outgoing Search Request, Allow Incoming Router Request, and other options. By default, any are disabled.

  • NOTE

    Windows XP Service Pack 2 enables the Internet Connection Firewall by default.

    EFS (Encrypting File System) Enhancements

    Although Windows 2000 EFS brought a flush of security to local files, it had a number of deficiencies:

  • Stealing a local account password is facile using common hacker tools in standalone mode.

  • Encrypted files stored on file servers are decrypted on the server and then transported in pellucid text across the network to the user's workstation. Because EFS needs access to the user's private key, which is held in the profile, the server must breathe "trusted for delegation" and occupy access to the user's local profile.

  • Inability to partake EFS encrypted files.

  • Figure 1.25Figure 1.25 Internet Connection Firewall Advanced Settings enable you to define what the user is allowed to do.

    EFS has been enhanced in Windows XP and Windows Server 2003 to advocate sharing of encrypted files. Windows 2000, Windows Server 2003, and Windows XP any store the EFS metadata in the NTFS. Thus, encrypted files on NTFS volumes in Windows 2000 and Windows Server 2003. Sharing an encrypted file is enabled by opening the file's Properties page, clicking the Advanced button, and selecting the Details button in the Advanced Attributes area. You can add users who you want to partake the file with to the list.

    Note that EFS file sharing is set at the file level—not the folder level——and inheritance of EFS file-sharing metadata is not supported.

    Another option for sharing encrypted files in Windows Server 2003 is to utilize Web folders. Windows Server 2003's advocate for the transport of EFS metadata using the WebDAV protocol, an extension of HTTP 1.1, makes Web folders an excellent alternative to sharing files on file servers, and is recommended by Microsoft. WebDAV is supported on IE v5.0 on the client and IIS v5.0 and later on the server. For more information about WebDAV, see the WebDAV Resources FAQs at http://www.webdav.org/other/faq.html.

    To configure a Web folder on the server running IIS, recede to the properties sheet of the encrypted file (or any file), recede to the Web Sharing tab, and select the partake this Folder option. Table 1.5 provides a side-by-side comparison of features between the Web folders and File Shares.

    Table 1.5 Comparison of EFS Features Between File Shares and Web Folders

    Remote EFS Operations On . . .

    . . . File Shares

    . . . Web Folders

    Where does EFS encryption/decryption occur?

    Files are encrypted and decrypted on the file server.

    Files are encrypted and decrypted on the user machine.

    Are the files secured during transmission over the network?

    Files are sent in the pellucid over the network connection.

    Files remain encrypted while being sent over the network connection.

    What technology is or can breathe used to secure the transmission of the files over the network?

    Requires IPSec to secure the file transfer between file server and user machine.

    Does not require IPSec to secure the file transfer; relies on the WebDAV EFS extensions to securely transmit the file.

    Must the file server breathe "trusted for delegation?"

    Requires file server to breathe "trusted for delegation."

    Does not require file server to breathe "trusted for delegation."

    Does the solution require a copy of the user profile on the file server?

    Requires availability of user profile on the file server (local or roaming profile).

    Does not require availability of user profile on the file server.

    Where does the EFS file-sharing authorization process hold site for users?

    EFS checks for other user certificates on the file server and/or in the AD

    EFS checks for other user certificates on the local machine and/or in the AD.

    (Table reprinted by leave from Jan de Clercq, Hewlett-Packard Company.)

    Credential Manager

    Single sign On (SSO) capability has been a frequent request from users and Administrators who find it challenging to maintain track of any the credentials needed to log on to the domain, or utilize Microsoft Passport credentials and Smart Card credentials. Managers who must maintain getting validated to accomplish administrative tasks on various computers furthermore occupy requested this capability. Windows Server 2003 introduces Credential Manager, a client-based SSO solution that uses an intellectual credential-caching mechanism that keeps credentials in a store on the client, requiring the user to provide a single username/password to open the store. Credentials in the store can consist of a user account and password; a user account, certificate, and private key (which can breathe stored on a smart card); or Microsoft Passport credentials.

    The credential store is allotment of the user profile and supports roaming and can optionally breathe disabled by the Administrator via the GPO. This is done by opening a GPO and going to Windows Settings\Security Settings\Local Policies\Security Options and enabling the option Network Access: enact not allow storage of credentials or .NET Passports for network authentication.

    This feature is available in Windows Server 2003, Windows XP Pro, and Windows XP Home operating systems.

    Public Key Infrastructure (PKI) Improvements

    Microsoft provided an out-of-the-box, user-defined and administered CA in the Windows NT 4.0 Option pack. This might not occupy been the most effectual and robust product on the market, but it was cheap (and was included at no extra cost with Windows 2000). This allowed small- and medium-size companies, who couldn't afford the high cost of third-party companies such as VeriSign and Entrust, to fortify their security systems. However, according to one of HP's security experts, consultant Jan de Clercq, "ease of utilize and security don't easily coexist." But considering the improvements made in Windows Server 2003 security features, especially in the PKI arena, Jan stated that "Given the low cost and the advanced PKI features of Windows.NET, it may breathe a product that will bring PKI to the masses." Let's see what features are now available to accomplish this possible.

    Cross Certification trust Model

    Windows 2000 used a hierarchical CA trust model, shown in device 1.26, whereby the parent (root) CA was linked to the child (subordinate) CA by trusts. Only one root CA can breathe in the forest, and the only pass to configure it to trust certificates issued by other CAs in other forests was to reconfigure the entire CA structure using Certificate trust Lists. This might breathe desirable in multiforest enterprises or to link extranets.

    Note that the CA hierarchy is not specifically tied to the domain hierarchy. Rather, it might more appropriately breathe associated with geographies of the enterprise to provide accessible CAs to users and computers in each geography.

    Windows Server 2003 introduces the Cross Certification trust model, which allows CAs in different organizations (forests) to trust each other and is in addition to the subordinate trust model. The Cross Certification model permits the Administrator some liberty in configuring the trust relationships with the extranet partners, by specifying whether it is a one-way or two-way trust, and by controlling the issuance and usage scope of the CA agreement via naming constraint, application, and issuance policy rules.

    Cross certification provides the skill to create transitive cross forest trusts, as described in the "Creating a Cross Forest Trust" section in this chapter.

    Figure 1.26Figure 1.26 Hierarchical CA structure with the root (enterprise) CA at the top and subordinate (issuing) CAs below.

    Editable Certificate Templates (v2)

    Windows 2000 provided v1 certificate templates that were not editable. Windows 2003 provides v2 templates that are editable and comprise a mechanism to modify v1 templates and transfigure them to v2. The v2 templates facilitate cross certification and policy enforcement, which allows configuration of certificate trust relationships across forest boundaries. This could breathe trusts to CAs in other forests within the company or to a CA in a commerce partner's extranet. This furthermore allows a CA to issue certificates to a CA in another forest and can link a policy to this cross certification. The policy can confine the issuance and usage scope of the CA cross- certification agreement.

    A modern Certificate Templates snap-in is included in Certificate Services for Windows Server 2003, as shown in device 1.27. Note that the icons for v1 and v2 templates are a different color, the Minimum Supported column identifies v2 templates as Windows 2003 and Auto Enrollment functionality is listed. This snap-in is used to modify Version 2 templates to accomplish the following functions:

  • Create a modern template, modify an existing template, or duplicate an existing template.

  • Modify template properties such as certificate lifetime, renewal period, whether it is published in AD, Issuance Requirements such as re-enrollment, extensions, and other properties.

  • Define accounts that can enroll and autoenroll a certificate template.

  • Enable a template for Autoenrollment.

  • Set which accounts can enroll and auto-enroll for a particular certificate template. This is done by right-clicking on a template, selecting its properties and modifying the template's Access Control List (ACL) in the "security" tab. Windows.NET ACLs accommodate an Access Control Entry (ACE) for "Enroll" and "AutoEnroll."

  • Figure 1.27Figure 1.27 Certificate Template snap-in.

    NOTE

    You can copy and save a v1 template as a v2 template and then configure it as desired. You furthermore can select the Duplicate Template option when you right-click on the template in the Certificate Templates snap-in, which will accomplish a duplicate and give you a head start on creating a similar one.

    Private Key Recovery

    Windows Server 2003 PKI made significant changes to the key recovery process, providing centralized key recovery services. An principal component to this process is the Key Recovery Agent—usually one or more Administrators who occupy the skill to recover encrypted files, by means of a special public key stored in an EFS Recovery Agent certificate. The key recovery data is stored in the CA database. A user's archived private key is encrypted using a symmetric key, which is encrypted using a Key Recovery Agent's public key. These keys are stored in the CA database in the RawArchivedKey and KeyRecoveryHashes columns, respectively.

    To recover a user's private key, an Administrator must breathe added to the Recovery Agent list. The preparation for the Key Recovery process includes the following steps:

  • Issue the EFS Recovery Agent certificate to an Administrator.

  • Create a GPO called EFS Recovery, for example.

  • In the GPO, recede to Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System. Define an EFS Policy. Select the Add a Recovery Agent option and add a user account that has the EFS recovery certificate (from step 2).

  • In the Certificate Authority snap-in, in the RootCA properties, select the Recovery Agents tab. Select the Archive the Key option and select the Add button. Select the Key Recovery Agent certificate in the next dialog box.

  • NOTE

    Multiple Administrators can breathe designated as Recovery Agents so that both public keys are required to recover private keys for an added measure of security.

    This four-step process will recover a private key in Windows Server 2003:

  • The Administrator who has the Recovery Agent rights (key) must know the User Principal cognomen (UPN) or serial number of the certificate whose private key he wants to recover.

    certutil –getkey <serial number or UPN> <outputfile>

    This exports the recovery data from the CA database.

  • From a command prompt, race the command:

    certutil –recoverkey <outputfile> <pkcs12file>

    This will transfigure the output file in a PKCS12 format and could store it on a floppy disk.

  • From a command prompt, race the command:

  • The PKCS12 file is provided to the appropriate user, who can then import it in his certificate store.

  • Enhanced Security Management—Effective Permissions Tab

    The effectual Permissions tab displays the cumulative permissions calculated from group membership and any inherited permissions, and displays the result applied to a given user. This is allotment of the Advanced Settings on the ACL properties page. For instance, right-click on an NTFS folder, recede to Properties, select the Security tab, and then select the Advanced button. In the effectual Permissions tab, shown in device 1.28, you see a cumulative summary of any permissions applied to that user on that object.

    User Autoenrollment

    Windows 2000 Certificate Services provided a valuable feature in the autoenrollment and renewal of machine certificates. This allowed DCs to obtain and renew certificates. Windows Server 2003 now provides autoenrollment of users. You can enact this in a Certificate Template by going to the Properties of the template, and then on the Security tab, giving Autoenroll the READ privilege. You furthermore can enable it via Group Policy, as shown in device 1.29. In Computer Configuration\Windows Settings\Security Settings\Public Key Policies, check the Enroll Certificates Automatically option.

    Kerberos and Forest Trusts

    Windows 2000 was unable to create a transitive trust between forests, allowing only a one-way NTLM kind trust that had to breathe created between individual domains in different forests—much enjoy what they had to enact in Windows NT to build trusts between any domains. Interestingly enough, this actually has a side benefit—because this kind of trust can't breathe used by Kerberos, it solves a migration problem known as the "Pile On" issue, described in Chapter 3. Other than that, an NTLM trust isn't a superb thing because it requires the Administrator to manage a lot of trusts between forests.

    Windows Server 2003 includes schema modifications made to the trusted domain object (TDO), which allows Kerberos to authenticate across the domain. This provides transitive trusts to breathe built across forests. That is, they create a trust between two forests, (one pass or two way) and no other trust is needed. The Administrator does occupy some control over the trust, in making it a one-way trust or a two-way trust, and determining the default flush of authentication that is allowed between forests (described in more detail in the next section).

    Figure 1.28Figure 1.28 effectual Permissions tab.

    Figure 1.29Figure 1.29 Using Group Policy to enable autoenrollment of users.

    Creating a Cross Forest Trust

    The preparatory steps to creating a cross forest trust comprise establishing DNS cognomen resolution between the two forests, synchronizing system time between any computers in both forests (easier than it sounds), and setting the forest functional flush to Windows 2003 (native). Windows Server 2003 provides three different ways to establish DNS cognomen resolution between the two forests:

  • Create a stub zone in the forest root of each forest, for the other forest.

  • Create a secondary zone in the forest root of each forest, for the other forest.

  • Set up a conditional forwarder on the DNS server that is authoritative for each root zone for the other forest.

  • Test cognomen resolution by pinging the root domain cognomen of each forest from the other forest. In addition, you must ensure that the system time of any computers in both forests is within the allowable Kerberos time skew (default is five minutes). If the time skew between the two DCs contacted to build the trust is more than the allowable time skew, the trust might breathe created successfully, but authentication will fail.

    NOTE

    There is no default time synchronization between two forests. Because Kerberos authentication, by default, requires the system time of any computers to breathe within five minutes of each other, ensure the time between forests is synchronized. It is recommended that you configure the PDC emulator of the root domain in each forest to synchronize with the very external time source. Time synchronization is configured by default for a forest, but not between forests. More information is available in the "Time Services" section of Chapter 6.

    Setting the forest functional flush is described in Chapter 3. To enact this, any DCs in every domain must breathe Windows 2003 servers, and the domain functionality must breathe set to Windows Server 2003 (referred to as native, though the word "native" is not used in the UI). After the domains are any raised to Windows 2003, the forest must breathe raised to Windows 2003 native—similar to the pass Windows 2000 domains were raised to endemic mode, but Windows 2000 didn't occupy a forest endemic mode.

    After the forest is at Windows 2003 level, Time Services are synchronized, and DNS cognomen resolution is established between the two forests, the trust can breathe created. You create the trust just as you did in Windows 2000 by going to the active Directory Domains and Trusts snap-in, choosing Domain Properties, selecting the Trusts tab, and clicking modern Trust. This engages the modern trust Wizard. Some of the options specified in the wizard are described here, along with screen shots of the dialog boxes used in the wizard.

  • Trust Type: Can create an External trust (downlevel, nontransitive trust) between domains, or a Forest trust (transitive, Kerberos) between forests. The dialog box is shown in device 1.30.

  • Figure 1.30Figure 1.30 The modern trust Wizard allows you to create an External (NTLM type) trust or a Forest trust (Kerberos transitive trust).

  • Trust Direction—Incoming: Users in the source domain can breathe authenticated in the target domain or forest (source domain is the trusted domain). The dialog box is shown in device 1.31.

  • Trust Direction—Outgoing: Users in the target domain or forest can breathe authenticated in the source domain or forest (source domain is the trusting domain).

  • Trust Direction—Two Way: Outgoing and incoming trust. Users in source and target domains or forests can breathe authenticated in each domain.

  • Authentication Level—Forest-wide Authentication: Users from the other forest are automatically authenticated in the local forest. Essentially this makes the authenticated users in the other forest included in the authenticated users in the local forest. This is appropriate for a company with a multiple forest deployment, and users from both forests are equally trusted for resources in each forest. They can breathe denied access by changing permissions just enjoy a single forest implementation. This is defined for the ingoing and the outgoing trust separately. The dialog box is shown in device 1.32.

  • Figure 1.31Figure 1.31 The trust Direction dialog box lets you specify whether the trust is incoming (trusted), outgoing (trusting), or two–way.

  • Authentication Level—Selective Authentication: This scope requires users to breathe specifically trusted to access any resource. This is appropriate for enterprises that occupy commerce colleague extranets as sever forests and want to grant limited and specific access. This is defined for the incoming and the outgoing trust separately.

  • The wizard furthermore gives you the skill to choose to verify the trust. I recommend that you enact so. After the trust is created, you will breathe able to see users and groups of the other forest in the object picker to allocate permissions to resources. For instance, in device 1.33, they occupy a partake on a server in forest CorpB.Net, and in assigning permissions, the users and groups of forest CorpA.Net are available. Note that any you see in the locations option of the object picker is the remote forest with a triangle-like icon. Child domains in that forest, if any, are not exposed. However, entering user or group names (including the utilize of wild cards) in the object picker will find objects in any domain in the remote forest. For instance, if you entered Admin as the cognomen in the object picker, it would revert the Administrator account for any domains in the remote forest.

    Figure 1.32Figure 1.32 Authentication scope options allow you to specify the default authentication between two forests.

    Figure 1.33Figure 1.33 The object picker displays the trusted forest for assigning rights.

    The cross forest trust will breathe a valuable profit to enterprises with multiple forest deployments. Where Windows 2000's NTLM trusts occupy made multiple forests prohibitive to manage, Windows Server 2003's cross forest trusts could easily accomplish the multiple forest configuration feasible.

    Conclusion

    This is by no means a comprehensive dissertation on security or even Windows 2003 security, but it does give a superb overview of the many improvements provided in Windows Server 2003. Hopefully, after reading these issues, you will occupy some belt you want more information on that might move your Windows infrastructure and should breathe included in the migration plan. I occupy the superb fortune of getting much of this information from HP's Jan de Clercq, a recognized security expert and author of two books regarding PKI and other security issues in the Windows environment. I highly recommend Jan's latest book, Windows Server 2003 Security Infrastructures, Digital Press, 2004.


    Binders in my office | killexams.com actual questions and Pass4sure dumps

    G.Chiozzi's Binders

    This section is an index of the contents of the document binders in my office. You can find here copies of ESO documents, presentations, articles and manuals of application.

    The most usefull section is probably the one describing the binders with my collection of articles. They are ordered by topics and are copies or original of the most intriguing technical things I read every month.

    Every binder is identified by a missive and a number.

    Note: any entries are kept in a single file, to accomplish searching easier. Unfortunately the drawback is that the document is quite big, making it handrum to download from a remote site.

    Index: Generic ESO Documents. Programming standards Bind Title Number -------------------------------------------------------------------------- ESO1 ESO Software Policy GEN-POL-ESO-00000-3011 ESO1 Templates for documents Generic VLT Documents. Programming standards Bind Title Number -------------------------------------------------------------------------- A1 VLT flush 1 Requirements VLT-SPE-ESO-00000-1423 A1 VLT Software Concept Specification VLT-SPE-ESO-10000-0010 A1 VLT Software Requirements Specification VLT-SPE-ESO-10000-0011 A1 VLT Software Management arrangement VLT-PLA-ESO-00000-0006 A1 VLT Software Programming Standards VLT-PRO-ESO-10000-0228 A1 VLT Software Guidelines for the Dev. Appl. Soft. VLT-MAN-ESO-17210-0667 A1 Graphical User Interface Common Conventions VLT-SPE-ESO-17210-0266 A1 VLT Electronic Design Specification VLT-SPE-ESO-10000-0015 A1 VLT Software Documentation Review Procedure VLT-PRO-ESO-10000-0201 A1 VLT Directive for Preparation of Acceptance Test VLT-INS-ESO-00000-1091 A1 VLT Software FrameMaker Conventions VLT-INS-ESO-00000-0541 A1 Software Engineering for the VLT project (slides) A1 Programming in C++. Rules and Recommendation - ELLEMTEL A1 Reccomented C style and coding standards - L.W.Cannon et al., 1990 A1 Purify and PureCoverage presentation In a sever satchel: -- ESO Safety Program (Safety, Health and Env. Prot.) SAF-POL-ESO-00000-0001 -- Safety Instructions: working beneath M1 Mirror VLT-INS-ESO-00000-0537 VLT Software User Manuals Bind Title Number -------------------------------------------------------------------------- A2 VLT Integration arrangement VLT-PLA-ESO-10000-0936 A2 VLT Integration generic presentation A2 VLT Commissioning arrangement VLT-PLA-ESO-10000-0937 A2 VLT Control leeway Layout VLT-VEL-ESO-00096-0042 A2 VLT On-Line Data rush Requirement Specification VLT-SPE-ESO-19000-0749 A2 VLT Data Products Checking utensil User Req. VLT-SPE-ESO-19000-1608 A2 Draft req. for VLT log file analysis tools Memorandum 14/01/97 A2 Draft Engineering Logs requirements specification VLT-SPE-ESO-xxxxx/xxxx A2 ESO Milan Lan Link vertical Services Proposal ESO-VS-MILAN/001/1/TW/Serco A2 ESO World Wide Web Project ESO-MAN-ESO-00000-1306 A2 VLT Common Software Survey B3/1 TCS UT book VLT-MAN-ESO-10200-1634 B3/1 TCS Requirements Specification VLT-SPE-ESO-10000-0200 B3/1 TCS Requirements on Star Catalogue System VLT-SPE-ESO-17230-0640 B3/1 TCS ICD TCS - Star Catalogue system VLT-ICD-ESO-17230-0641 B3/1 TCS ICD TCS - Instrumentation Software VLT-ICD-ESO-17240-17230 B3/1 TCS ICD TCS - Cassegrain and Nasmyth Adapter-Rota VLT-ICD-ESO-11400-17230 B3/4 TCS Telescope Control System User Manual VLT-MAN-ESO-17230-0942 B3/4 TCS Integration Module - tcsBUILD User Manual VLT-MAN-ESO-17230-1541 B3/4 TCS Interface Design Description VLT-SPE-ESO-17230-0941 B3/4 TCS Auto guide Design Description VLT-SPE-ESO-17230-0933 B3/4 TCS Atmosferic Dispersion Corrector DD VLT-SPE-ESO-17230-1046 B3/4 TCS Enclosure Coordination Module DD VLT-SPE-ESO-17230-1040 B3/4 TCS Pointing Modelling DD VLT-SPE-ESO-17230-nnnn B3/4 TCS Astronomical Site Monitor Contro. Soft. FS VLT-SPE-ESO-17441-1175 B3/5 Coude' LCU Control Software Func. Spec. VLT-SPE-ESO-11520-0708 B3/5 Coude' Control Software User Manual VLT-PLA-ESO-11520-0760 B3/5 Coude' Control Software Acceptance Test arrangement VLT-PLA-ESO-11520-0762 B3/5 Hydrostatic Bear. and Cooling Sys. Func. Spec. VLT-SPE-ESO-11320-0931 B3/5 Hydrostatic Bear. and Cooling Sys. Des. Desc. VLT-SPE-ESO-11320-0964 B3/5 Adapter-Rotator LCU Control Software Func. Spec. VLT-SPE-ESO-11400-0940 B3/5 Nasmith Adapter Rotator Nr.3 System Performance.. VLT-TRE-ESO-11423-1318 B3/5 TCS Chopping and M2 Coordination DD VLT-SPE-ESO-17230-1360 M2 Software Documents Bind Title Number -------------------------------------------------------------------------- B3/6 VLT M2 Technical Specification VLT-SPE-ESO-11200-0340 B3/6 VLT M2 Software Requirements Specification VLT-SPE-ESO-11200-0002 B3/6 VLT M2 Software Functional Specification VLT-SPE-DOR-11200-0010 B3/6 VLT M2 Software Design Description VLT-SPE-DOR-11200-0011 B3/6 VLT M2 Software Tilt/Chopping User Manual VLT-SPE-DOR-11200-0003 B3/6 VLT M2 Software User Manual VLT-SPE-DOR-11200-0004 VLT Guide/FS/M2 docs Bind Title Number -------------------------------------------------------------------------- B3/7 Overview of Chopping and sphere Stab. Modes VLT-TEL-93/0244 B3/7 A first assessment of sphere stabilization perf. VLT-TRE-ESO-11000-0695 B3/7 Image motion due to telescope excitation by wind VLT-TRE-ESO-11000-0854 B3/7 Influence of sensor detain on sphere stab. perf.. VLT-TRE-ESO-11000-1097 B3/7 Tracking analysis at NTT, T.Erm B3/7 Analysis of Tracking Performance, T.Erm B3/7 A guide to Better Autoguiding, T.Erm B3/7 Star tracking with Kalman Filter, T.Erm B3/7 VLT Pointing and Tracking Simulations with M2 Compensation, B.Jensen B3/7 VLT subject to Wind Gusts, B.Jensen B3/7 Telescope Performance Evaluation, 1998 ESO Conference on VLT B3/7 Notes and emails on guiding/field stabilisation/chopping VLT HOS Software Bind Title Number -------------------------------------------------------------------------- B4 VLT LAN's Specification VLT-SPE-ESO-17120-0270 B4 TR on Curr. Status of VLT Lan Specific. and Req. VLT-TRE-ESO-17120-0969 B4 Final Lay-out of VLT Control LANs VLT-SPE-ESO-17120-1355 B4 Final Lay-out of VLTI Control LANs VLT-SPE-ESO-15410-1957 B4 HOS Functional Specification VLT-SPE-ESO-17230-0001 B4 HOS/Sequencer Functional specification VLT-SPE-ESO-17220-0314 B4 HOS/Sequencer Design Description VLT-SPE-ESO-17220-0736 B4 Remote Operation Software Functional specification VLT-SPE-ESO-18000-0001 B4 Real-Time panoply Software Specification VLT-SPE-ESO-17240-0250 B4 ICD between VLT Control Software and OHS VLT-SPE-ESO-17240-19200 B4 BOSS / base OS Stub Design Description VLT-SPE-ESO-17240-1925 VLT LCU Software/Drivers Bind Title Number -------------------------------------------------------------------------- B5 Local Control Unit Software Specification VLT-SPE-ESO-17210-0002 B5 LCU Common Software Specification for facet 2 VLT-SPE-ESO-17210-0711 B5 LCU Diagnostic Software Specification VLT-SPE-ESO-17210-0743 B5 LCU Application Server Framework LSF Re. Spec VLT-SPE-ESO-17210-2860 B5 LCU Application Server Framework LSF Det. Design VLT-SPE-ESO-17210-2051 B5 LCU Common Software Server Framework User Man VLT-MAN-ESO-17210-2252 B5 Tools dfor Advanced Control Design Desc. VLT-SPE-ESO-17210-2630 B5 Technical Report on Writing LCU Applications N-TRE-ESO-100-006 B5 Motor Control module User Manual (part II -SDL) VLT-MAN-ESO-17210-0776 B5 Motor Control module Acceptance Test arrangement VLT-VER-ESO-17210-0598 B5 Motor Control module Acceptance Test Report VLT-VER-ESO-17210-0599 B5 Tech. Rep. on evaluation of LCU Ethernet Boards VLT-TRE-ESO-17130-1368 B5 NET-1 Ethernet Interface Driver User Manual VLT-MAN-ESO-17210-1369 B5 VMIVME-5576 Reflective reminiscence Board Driver Spe. VLT-SPE-ESO-15400-1374 B5 Tech. Rep on Future LCU HW Architecture VLT-TRE-ESO-17130-1806 VLT CCS Design Documents Bind Title Number -------------------------------------------------------------------------- B6 CCS Functional Specification VLT-SPE-ESO-17210-0001 B6 CCS/User Interface Functional Specification VLT-SPE-ESO-17210-0225 B6 CCS Design Description VLT-SPE-ESO-17210-0419 B6 CCS Scan System Design Description VLT-SPE-ESO-17210-0557 B6 CCS On Line Database Design Description VLT-SPE-ESO-17210-0552 B6 CCS Message System Design Description VLT-SPE-ESO-17210-0560 B6 CCS Logging System Design Description VLT-SPE-ESO-17210-0554 B6 CCS oversight System Design Description VLT-SPE-ESO-17210-0553 B6 CCS warning System Design Description VLT-SPE-ESO-17210-0782 B6 CCS Stress Test System VLT-SPE-ESO-17210-1157 B6 Access and Configuration Control Design Desc. VLT-SPE-ESO-17230-0906 VLT Instrumentation Software Bind Title Number -------------------------------------------------------------------------- B7 VLT Instrumentation Software Specification VLT-SPE-ESO-17212-0001 B7 INS Common Software Specification VLT-SPE-ESO-17240-0385 B7 Set-up Files and FITS Log Handling - slx Design D. VLT-SPE-ESO-17240-0666 B8 UVES Software Requirement and Func. Spec. VLT-SPE-ESO-13200-0001 B8 UVES Control Software Architectural Des. Desc. VLT-SPE-ESO-13200-0002 B8 NTT Upgrade-Software - EMMI Functional Spec. N-SPE-ESO-112-014 B8 NTT Upgrade-Software - EMMI Design Description N-SPE-ESO-112-039 B8 ISAAC Software Specification VLT-SPE-ESO-14100-0556 B8 ISAAC ICS Design Description VLT-SPE-ESO-14100-0851 B8 ISAAC ICS Design Description VLT-SPE-ESO-14100-0851 B8 ISAAC/SOFI Observation Software User Manual VLT-SPE-ESO-14100-1510 B8 ISAAC Installation utensil for the ISSAC SW UM VLT-MAN-ESO-17240-1759 B8 VLT Test Camera Software Design Description VLT-SPE-ESO-11960-1092 B8 VLT Test Camera ICS User and Maint Manual VLT-MAN-ESO-11960-1608 B8 FITS Headers for the VLT Test Camera, Int. Memo BL-st/9-98 VLT CCS Technical Reports Bind Title Number -------------------------------------------------------------------------- B9 CCS Stress Test System User Manual VLT-TRE-ESO-17210-1345 B9 Tech. Rep. on CCS performance VLT-TRE-ESO-17210-0699 B9 Tech. Rep. on CCS Scan System Performance Test VLT-TRE-ESO-17210-0840 B9 Tech. Rep. on CCS Performance of MAY97 release VLT-TRE-ESO-17210-1344 B9 Tech. Rep. on the Protocol Converter Dec95-May97 VLT-TRE-ESO-17210-1364 B9 Tech. Rep. on YEAR200 Compliance, guidelines for VLT-TRE-ESO-17210-1704 B9 Tec. rep. on Investigation of future LCU HW Arc. VLT-TRE-ESO-17130-1806 B9 Tec. rep. on usage of investigation tools to advocate environment behaviour debugging VLT-TRE-ESO-xxxxx-xxxx VLT CCD Control Software Bind Title Number -------------------------------------------------------------------------- B10 CCD Detectors Control Software Functional Spec. VLT-SPE-ESO-17240-0227 B10 CCD Detectors Control Software Design Description VLT-SPE-ESO-17240-0601 B10 CCD prototype SW - On-Line Test Report VLT-ELE-0031/95 B10 Tech. Rep. on Image Processing Algorithms for TCCD VLT-TRE-ESO-17240-1689 NTT Telescope Bind Title Number -------------------------------------------------------------------------- N0 NTT Control System high flush Description N-MAN-ESO-000-079 N0 NTT Upgrade-Software - TCS Func. Spec. N-SPE-ESO-109-033 N0 NTT Upgrade-Software - TCS System Archit. Desc. N-SPE-ESO-109-034 N0 NTT Computer Console and Network Spec. N-SPE-ESO-111-057 N0 NTT TCS Integration User Manual N-MAN-ESO-111-067 N0 NTT Upgrade tremendous Bang book - allotment 1 N-SPE-ESO-100-068 N0 NTT Upgrade tremendous Bang book - allotment 2 N-SPE-ESO-100-072 N0 Tech. Rep. on Interfacing CAMAC to VLT N-TRE-ESO-112-011 ALMA Planning and Meetings Bind Title Number -------------------------------------------------------------------------- AL0 Generic docs and emails AL0 European SW Meeting 27/10/1999 AL0 ESO ALMA Day slides, 15/12/1999 AL0 Antenna API - An Antenna Motion API for the ALMA AL0 actual Time OS - selection of RTOS for ALMA, P.T.Wallace - selection of RTOS for ALMA - Another View, J.M.Stewart ALMA Contracts and Collaborations Bind Title Number -------------------------------------------------------------------------- AL0b Cosylab AL0b AOT Trieste AL0b CERN Laser ALMA Generic Documents Bind Title Number -------------------------------------------------------------------------- AL1 ALMA SW Science Requirements and utilize Cases (2001-05-03) AL1 ALMA Initial Software Analysis (2001-02-22) AL1 ALMA System Software Architecture Specification (2001/12/05 AL1 ALMA Project Book, CVhap 12, Computing (2000-09-29) AL1 MilliMeter Array (MMA) Project Book AL1 Monitor and Control Points for the MMA (MMA memo #1) AL1 ALMA Monitor and Control Bus Requirements (MMA memo #5) AL1 ALMA Monitor and Control System (MMA memo #6) AL1 ALMA Monitor and Control Bus Draft Interface Spec (memo #7) AL1 ALMA Monitor and Control Bus Slave Node Implem. Guide AL1 ALMA Monitor and Control Frequently Asked Questions AL1 Operating the VLA, the VLBA and the MMA (MMA memo #258) (2001-04-30) AL1 ALMA Antenna Mount Requirements and utilize Cases R.Heald A.Perrigouard (2000-10-07) AL1 A telescope pointing algorithm for ALMA (ALMA memo#366) AL1 ALMA Operational Issues (2001-01-25) AL1 ALMA Software and Hardware Standards AL1 ALMA Software Documentation Standard AL1 ALMA C Coding Standards AL1 ALMA C++ Coding Standards AL1 Suggested SW Engineering Practices, ALMA facet 1 AL1 ALMA Software Glossary 2000-05-21 ALMA Test Interferometer Bind Title Number -------------------------------------------------------------------------- AL2 An Antenna Motion API for ALMA (+comments from GCH. B.Glendenning, R.Heald, S.Scott, F.Stauffer 1999-10-20 AL2 ALMA Test Interferometer Project book (2000-02-03) AL2 ALMA Test Interferometer Control Software Requirements (2001-02-15) AL2 ALMA Test Interferometer Control Software Design Concept (2001-11-16, 2001-02-15) AL2 Comments on TICS Requirements/Design Concept AL2 ALMA Tech. Rep. on SW Engineering Activity AL2 ALMA Test Correlator Control Computer Software Design (2000-03-08) AL2 ALMA Test Correlator Engineering UI Notes (2001-02-21) AL2 ALMA Test Interferometer Raw Data Format (2001-04-26) AL2 Generic Monitor and Control Points - ALMA.08002.006 AL2 Nutator/Monitor and Control ICD - ALMA03003.08002.0013 AL2 TIX Client Server Design AL2 ALMA TICS installation procedures and notes AL2 DB2 installation ALMA Common Software Bind Title Number -------------------------------------------------------------------------- AL3 ACS SW development Plan AL3 ACS Planning AL3 Minutes of meeting and various documents on the IJS collaboration AL3 The Control System for the Accelerator of ANKA B.Jeram et al. EPAC98 AL3 The CORBA IDL Interfaces for Accelerator Control. ACI DRAFT Version 3 EPAC98 AL3 Implementing Distributed Controlled Objects with CORBA M.Plesko PCaPAC99 AL3 Java Beans of Accelerator Devices for Rapid Application Development M.Plesko, G.Tkacik, M.Dach, S.Hunt PCaPAC99 AL3 The CORBA IDL Interface for Accelerator Control M.Plesko PCaPAC99 AL3 A Control System based on Web, Java, CORBA and fieldbus technologies M.Dach et al. PCaPAC99 AL3 I/O Control with PC and Fieldbus K.Kenda et al. PCaPAC99 AL3 Distributed Components in Control B.Jeram et al ICALEPCS '99, Trieste AL3 high Performance Control Applications with Java M.Sekoranja et al. PCaPAC2000 AL3 Managing the development of a modern Control System J.Dovc et al. PCaPAC2000 AL3 How to build professional control system applications M.Plesko PCaPAC2000 AL3 ANKA Control System takes control J.Dovc PCaPAC2000 AL3 A Guerrilla approach to Control System Development M.Plesko et al. ICALEPCS 2001 AL3 The Control System Modeling Language K.Zagar et al. ICALEPCS 2001 AL3 Experiences with advanced CORBA services G.Milcinski et al. ICALEPCS 2001 AL3 Visual DCT - Visual EPICS Database Configuration Tool M.Sekoranja et al. ICALEPCS 2001 AL3 modern ABeans for TINE Java Control Applications J.Dovc et al. ICALEPCS 2001 AL3 ANKA ACS Installation Report AL3 Trieste collaboration AL3b ALMA Common SW Technical Requirements (2000-06-05 and older) AL3b ALMA Common SW Feature List (1999-11-20) AL3b ALMA Common SW Architecture 2.0 and Notes (comments) AL3b Notes for ACS Logging and Archiving AL3b ACS Time System AL3b ALMA Project - Tech. Rep. on Common software platform, G.Raffi LSA-TRE-ESO-10000-0300 AL3b Device Requirements and utilize Cases R.Heald, 2000-05-09 AL3b ALMA Joint SW Meeting, ACS Status Slides, 03/04/2000 AL3b VLT Common SW Survey draft AL3b Common SW minutes of meetings and presentations AL3c ACS Errors and Alarms - Design and Initial Implem. of Diagnostic and Error Reporting System of SMA Q.Zhang, SMA Technical Memo 132, 01/1999 - foible Detection in the Caltec Millimeter Array R.P.Finch, S.L.Scott Astr. Soc. of Pacific, 108:714-717, 1996 August AL3c ACS and Offline: Task, Parameters, etc. - Data Analysis Framework Requirements D.Schiebel 2004-03-29 - ACS-AIPS++ Integration Report ALMA Offline Subsystem 2004-04-13 - Scalable Data Analysis Framework (Draft) D.Tody 2004-04 - Comments on Scalable Data Analysis Framework G.Chiozzi 2004-04-30 - Protopipeline Review Meeting Summary L.Davis 2004-05-08 - PC-IRAF v2.12 Installation Guide D.Tody M.Fitzpatrick IRAF Group May 2002 - PyRAF v.1.1.1 Source Release. Installation Instructions Space Telescope Science Institute 2004-06-01 AL3c ACS Bulk Data - ACS Bulk Data Transfer examples (old printout). - CORBA Audio/Video Streams Specification OMG - The Design and Performance of a CORBA Audio/Video Streaming Service S.Mungee, N.Surendranm D.C.Schmidt AL3c ACS Performance tests - actual Time Event Channel Performance on a Submarine Communications Network A.C.Weaver - ACS Perofrmance PPT presentation Cosylab 1st ACS Workshop, March 2004 - ACSBenchmarking suite User's Documentation Cosylab March 2004 - Usability of ACS-3.0 Notification Channel D.Wischolek Uni Bochum March 2004 AL3c CDB - Implementing a COnfiguration Database Browser H.Raffi BSc Degree in Computing Science supervised by Prof. Brueggeman-Klein (TUM), G.Chiozzi (ESO) 2003-11-10 AL4 ACS Installation CDs and procedures AL4 ACS and AMS Kitt Peak 2000 Test AL4 Kitt Peak 1999: ESO Common Software Demonstration Project - Statement of Work - Test Procedure - Kitt Peak Test Plan - Test Procedure - Regenerate SW Info and docs on other Radio Telescopes Bind Title Number -------------------------------------------------------------------------- AL5 IRAM 30-m Telescope Spectral Line On-The-Fly Mapping AL5 The 30m Manual - IRAM AL5 Submillimeter Frontend & Backend Control Commands D.Muders, J.Hatchell, R.Lemke, M.Olberg, H.Hafok 2001-11-08 ALMA - SW development Plans Bind Title Number -------------------------------------------------------------------------- AL7 ALMA Computing facet 2 Kick-Off Meeting, Apr 23-25 2002 AL7 SW Computing Plan AL7 SW Dev. Plan. for Science SW Requirements AL7 SW Dev. Plan. for SW Engineering Plan AL7 SW Dev. Plan. for Executive Subsystem AL7 SW Dev. Plan. for Control Software AL7 SW Dev. Plan. for Correlator Subsystem AL7 SW Dev. Plan. for Pipeline Software Subsystem AL7 SW Dev. Plan. for Dynamic Scheduler Subsystem AL7 SW Dev. Plan. for Proposal Observation Preparation AL7 SW Dev. Plan. for Off-Line Data Reduction AL7 SW Dev. Plan. for Data Reduction UI AL7 SW Dev. Plan. for Telescope Calibration SW AL7 SW Dev. Plan. for Pipeline SW ALMA - Papers and Presentations Bind Title Number -------------------------------------------------------------------------- AL10 The ALMA Common Software (ACS) as a basis for a distributed software development G.Raffi, G.Chiozzi, B.Glendenning ADASS XI, Victoria BC, Canada, Sep. 2001 AL10 Common Software for the ALMA Project G.Chiozzi et al. ICALEPCS 2001, San Jose, CA, USA, Nov.2001 AL10 Distributed Control System for the Test Interferometer of the ALMA Project M.Pokorny et al. ICALEPCS 2001, San Jose, CA, USA, Nov.2001 AL10 ALMA Software G.Raffi ESO Wide Review 2002 Telescope pointing and Tracking Bind Title Number -------------------------------------------------------------------------- B11 Geometrical Transformations for the Gemini Telescope B11 Gemini Pointing Algorithms B11 Proposals for Keck Telescope Pointing Algorithms, P.T. Wallace B11 Telescope Pointing Machine Specification v.1.7 B11 VLT TCS Pointing, various notes B11 TPoint and Slalib reference B11 sphere and pupil rotations for the VLT unit tel. VLT Rep No.63 B11 Optics: papers/book chapters on pupils, stops and so on Other Telescopes Bind Title Number -------------------------------------------------------------------------- B12 Gemini Design Description B12 Gemini Lessons erudite Workshop B12 The SOFIA Mission Control Subsystem Software B12 VST FDR Section 9 TCS VST-FDR-Control-Software-rel-1.0 B12 Keck Telescope Control System slides - ADASS'99 conference B13 Gran Telescopio Canarias, Conceptual Design B13 GTC CS - development Case RPT/CTRL/0075-R B13 GTC CS - Enclosure and Services UC model survey ESP/CTRL/0033-R B13 GTC CS - Secondary Mirror UC model survey ESP/CTRL/0034-R B13 GTC CS - Configuration Service UC model survey ESP/CTRL/0035-R B13 GTC CS - Primary Mirror UC model survey ESP/CTRL/0039-R B13 GTC CS - Evaluation of ORBs for the GTC CS RPT/CTRL/0070-R Generic object Oriented Bind Title Number -------------------------------------------------------------------------- OO1 OOWG Comunications OO1 Evaluations of software tools and libraries OO1 String mailing list OO1 Bibliography and books reviews OO1 The annual JOOP listing of OOP books & videos, JOOP Sept 96 OO1 The annual JOOP listing of OOP books & videos, JOOP Sept 97 OO1 University Video Communications OO1 OOWG Presentations' transparencies OO1 utilize Cases For Requirements Capture and Tracing G.Chiozzi, Tutorial at ICALEPCS'99, Trieste, 04/10/1999 OO1 utilize Cases For Requirements Capture and Tracing and UML as a touchstone modeling language for SW projects G.Chiozzi, ESO IT Talk #1, Garching, 09/12/1999 Papers on object Oriented Design Binder: OO2 -------------------------------------------------------------------------- J.Odell - Approaches to finite-state machine modeling - JOOP, Jan 1995 G.Booch J.Rumbaugh - Introduction to the Unified Method. Unifying the Booch & OMT Methods. Slides. J.Rumbaugh - OMT: The object Model - JOOP, Jan 1995 J.Rumbaugh - Taking things in context: using composites to build models - JOOP Nov/Dec 1995 J.Rumbaugh - To contour a more impeccable union: Unifying the OMT and Booch methods - JOOP Jan 1996 J.Rumbaugh - Introduction to the Unified Method: unifying the Booch and OMT methods - slides of CERN talk Nov 1996 J.Rumbaugh - A status of mind: modeling behaviour - JOOP July-August 1996 J.Rumbaugh - A matter of intent: How to define subclasses- JOOP Sept 1996 M.Ackroyd - Object-oriented design of a finite status machine - JOOP, June 1995 J.A.Campbell V.J.Joseph - The object Oriented Design and Implementation of a Relational Database Managemement System - JOOP, July-August 1995 B.W.Boehm - A Spiral model of Software development and Enhancement - COMPUTER, May '88 D.D'Souza - Jave: Design and modeling opportunities - JOOP, Sept 1996 A.T.Jolin - Usability and Class Library Design - Dr.Dobb's, Oct. 1996 F.W.Fang A.C.So R.J.Kreindler - The Visual Modeling technique: an introduction and overview - JOOP, July 96 M.Arruat F.Di Maio N.Gomez-Rojo Y.Pujante - Recent Developments in the Application of object Oriented Technologies in the CERN PS Controls - ICALEPCS 1997, Baijing, China, Nov 1997 L.R.Mattingly H.Rao - Writing effectual utilize Cases and Introducing Collaboration Cases JOOP, October 1998 A.Cockburn - Structuring utilize Cases with Goals JOOP, Sep-Oct 1997 and Nov-Dec 1997 G.Booch - UML in Action G.Booch, Guest Editor Communication of the ACM, October 1999 UML 2001: A Standardisation Odyssey C.Kobryn Using Patterns in the UML G.Larsen Turning Clockwise: Using UML in the Real-Time Domain B.Selic UMLoquent: Expression of AWACS Software Design A.E.Bell R.W.Schmidt Modeling Web Application Architectures with UML J.Conallen R.C.Martin - Papers from www.objectmentor.com page Design Patterns and Design Principle UML Tutorial: Class Diagrams Collaboration Diagrams Sequence Diagrams Finite status Machines Button, whose got the button? S.W.Ambler - Mapping Objects to Relational Databases,Oct. 2000 http://www.AmbySoft.com/mappingObjects.pdf S.W.Ambler - Mapping Objects to Relational Databases, Nov. 2000 http://www.AmbySoft.com/persistenceLayer.pdf A.Cockburn - The Methodology Space Humans and Technology tech. rep. HaT TR.97.03, 1997 M.M.Lee - Object-Oriented Analysis in the actual World http://www.projtech.com S.J.Mellor - structure and using a drudgery breakdown structure http://www.projtech.com S.J.Mellor - The Case for Using utilize Cases http://www.projtech.com S,Shaler, D.Grand, S.J.Mellor - The Project Matrix: a Model for SW Engineering Project Management http://www.projtech.com Papers and documents on Java Binder: OOJC1 -------------------------------------------------------------------------- M.Chavan P.Ballester - First ESO Java Seminar Sun Microsystems - Java IDL Guide B.Morgan - structure Distributed Applications with Java and Corba Dr.Dobb's Journal, Apr. 1998 B.Danilko - A Graphical Java Front halt to C++ Programs C/C++ Users Journal, June 1998 S.Singhal, B.Nguyen - The Java Factor Communications of the ACM, June 1998 P.Tyma - Why are they using Java again? Communications of the ACM, June 1998 K.Nilsen - Adding Real-Time capabilities to Java Communications of the ACM, June 1998 D.Brutzman - The Virtual Reality Modeling Language and Java Communications of the ACM, June 1998 H.Lewis - Utilisation of Java Software at the VLT, VLT Internal Report, Sep. 1998 H.Lewis - VLT Seminars on Java 1) Java Beans 2) high flush and EPICS engineering GUIs 3) Keck AO User Interface Garching, Aug.-Sep. 1998 ChiMu OO and Java Development: Guidelines and Resources ChiMu Corporation, 1997-1998 Java Code Conventions Sun Microsystems - 1997 G.Hamilton - Java Beans Sun Microsystems - 1997 M.A.Cusumano D.B.Yoffie - What Netscape erudite from Cross-Platform Software Development Communication of the ACM, October 1999 L.Prechelt - Comparing Java vs. C/C++. Efficiency Differences to Interpersonal Differences Communication of the ACM, October 1999 E.Henry, E.Lycklama - How enact you plug Java reminiscence leaks? Dr.Dobb's Journal, February 2000 J.Amsterdam - Java References Dr.Dobb's Journal, February 2000 The Real-Time Specification for Java The Real-Time for Java Expert Group g.Bollella et al. Papers and documents on Corba Binder: COR1 -------------------------------------------------------------------------- R.Resendes M.Laukien - Introduction to CORBA Distributed Objects Dr.Dobb's Journal, Apr. 1998 K.Seetharaman - The CORBA Connection Communications of the ACM, Oct. 1998 J.Siegel - CORBA and the OMA in Enterprise Computing Communications of the ACM, Oct. 1998 S.Vinoski - modern Features for CORBA 3.0 Communications of the ACM, Oct. 1998 D.C.Schmidt - Evaluating architectures for Multithreaded Object Request Brokers Communications of the ACM, Oct. 1998 M.Henning - Binding, migration and scalability in CORBA Communications of the ACM, Oct. 1998 D.Houlding - A CORBA Bean Framework Dr.Dobb's Journal, Nov. 1998 J.M.Shacklette J.Illian - CORBA Program Development, allotment I,II,III Linux Journal, May/June/July 1999 utilize Of CORBA in the DFS, ESO Internal Draft, VLT-SPE-ESO-19000-XXXX Patterns and Performance of Real-Time ORBs D.C.Schmidt Applying C++, Pattenrs and Components to Develop an IDL Compiler for CORBA AMI Callbacks A.B.Arulanthu et al. SIGS C++ Report, March 2000 object Iterconnections, Scalable and efficient architecture for CORBA Asynchronous Messaging A.B.Arulanthu et al. SIGS C++ Report A CORBA Language Mapping for TCL F.Pilhofer Combat F.Pilhofer J.Graybeal et al. - SOFIA's CORBA Experiences: Instances of Software Development Mao's CORBA Browser Writing and Using CORBA Components F.Pilhofer April 2002 CORBA Component Model Tutorial OMG CCM Implementation Group April 2002 CCM Tools Tutorial E.Teiniker, L.Johnson 2004-03-31 OMG Docs - Binder: COR1 OMG IDL Style Guide OMG CORBA Services, 13 - Property Service OMG Time Service Specification OMG Telecom Log Service Specification ACE/TAO Docs - Binder: COR1 The Adaptive Communication Environment: "ACE", a Tutorial U.Syyid Using ACE try Macros to Enhance CORBA Portability oversight Handling Chapter 8 from TAO Developer's Guide, OCI ORBacus Docs - Binder: COR2 ORBacus for C++ and Java ORBacus Notify ORBACUS T-Log Papers on other arguments Binder: OO2 -------------------------------------------------------------------------- M.C.Carthy - What is Multi-Threading? - Linux Journal, Feb. 1997 S.Ball - An enchription system for software registration - C/C++ Users Journal, Aug. 1996 D.N.Gray J.Hotchkiss S.LaForge A.Shalit T.Weinberg - Modern languages and Microsoft's Component object Model Communications of the ACM, May 1998 A.Shah H.Xiao - Using Shared Libraries across Platforms C/C++ Users Journal, May. 1998 S.Chen - The Paradox of Digital Preservation IEEE Computer, March 2001 Collections of papers Binder: OO2 -------------------------------------------------------------------------- COMPUTER October 1992, Special issue on Inheritance & Classification D.C.Rine B.Bhargava - Guest Editors' Introduction: object Oriented Computing COMPUTER Oct. 1992 P.Wegner - Object-Oriented and Conventional Analysis and Design Methodologies COMPUTER Oct. 1992 B.Meyer - Applying "Design by Contract" COMPUTER Oct. 1992 D.Ungar R.B.Smith C.Chambers C.W.Mercer - Object, Message and Performance: how they coexist in Self COMPUTER Oct. 1992 Y.Ishikawa H.Tokuda C.W.Mercer - An object Oriented Real-Time Programming Language COMPUTER Oct. 1992 D.L.Wells J.A.Blakeley C.W.Thompson - Architecture of an Open Object-Oriented Database Management System COMPUTER Oct. 1992 P.K.Egbert W.J.Kubitz - Application Graphics Modeling Support Through object Orientation COMPUTER Oct. 1992 Communications of the ACM Sept. 1994, Special issue on OO Software Testing R.V.Binder - Introduction Communications of the ACM, Sept. 1994 P.J.Jorgensen C.Erickson - Object-Oriented Integration Testing Communications of the ACM, Sept. 1994 G.M.Murphy P.Townsend P.Sze Wong - Experiences with Cluster and Class Testing Communications of the ACM, Sept. 1994 R.M.Poston - Automated Testing from object Models Communications of the ACM, Sept. 1994 J.D.McGregor T.D.Korson - Integrating Object-Oriented Testing and development Processes Communications of the ACM, Sept. 1994 T.R.Arnold W.A.Fuson - Testing in a "Perfect World" Communications of the ACM, Sept. 1994 R.V.Binder - Design for Testability in object Oriented Systems Communications of the ACM, Sept. 1994 Communications of the ACM Oct. 1995, Special issue on OO Experiences and future trends COMPUTER September 1996, Managing OO development B.Sadr P.J.Dousette - An OO Project Managemement Strategy COMPUTER, Oct. 1996 J.D.Williams - Managing Iteration in OO Projects COMPUTER, Oct. 1996 S.Moser O.Nierstrasz - The consequence of Object-Oriented Frameworks on developer productivity COMPUTER, Oct. 1996 S.Sparks K.Benner C.Faris - Managing Object-Oriented Framework reuse COMPUTER, Oct. 1996 J.P.Corriveau - Traceability process for great OO projects COMPUTER, Oct. 1996 COMPUTER October 1996, Special Issue: 50 years of computing Communications of the ACM Oct. 1996, Special issue on Software Patterns A.Cockburn - The interaction of sociable Issues and Software Architecture Communications of the ACM, Oct. 1996 M.P.Cline - Pros and cons of adopting and applying patterns in the actual world Communications of the ACM, Oct. 1996 A.Aarsten D.Brugali G.Menga - Designing concurrent distributed control systems Communications of the ACM, Oct. 1996 M.Fayad M.P.Cline - Aspects of software adaptability Communications of the ACM, Oct. 1996 B.Goldfedder L.Rising - A training relish with patterns Communications of the ACM, Oct. 1996 Communications of the ACM Apr. 1997, The debugging scandal and what to enact about it M.Eisenstand - My Hairiest Bug War Stories Communications of the ACM, Apr. 1997 D.Ungar H.Lieberman C.Fry - Debugging and the relish of immediacy Communications of the ACM, Apr. 1997 R.Baecker C.DiGiano A.Marcus - Software visualization for debugging Communications of the ACM, Apr. 1997 C.Fry - Programming on an already full brain Communications of the ACM, Apr. 1997 J.Dominique P.Mulholland - Fostering debugging communities on the Web Communications of the ACM, Apr. 1997 R.N.Smith M.Wolczko D.Ungar - From Kansas to Oz: collaborative debugging when a shared wolr breaks Communications of the ACM, Apr. 1997 Papers on Real-Time Systems Binder: OO2 -------------------------------------------------------------------------- E.D.Jensen - Distributed Real-Time Operating systems - Dr.Dobb's, Feb. 1995 M.J.Choonoles C.C.Gilliam - Real-time object-oriented system design using the object modeling technique (OMT) - JOOP, June 1995 L.Nigro - A real-time architecture based on Shlaer-Mellor object lifecycles - JOOP March-April 1995 T.B.Blakeslee J.Liband - actual time debugging techniques, Embedded Systems Programming, Vol.8 Num.4 B.Marick - A summary of subsystem testing M.Barabanov, V.Yodaiken - Introducing Real-Time Linux - Linux Journal, Feb. 1997 Rational Corp. - Unified Modeling Language For Real-Time Systems Design K.W.Smith - Real-Time Object-Oriented Modeling Dr.Dobb's Journal, Dec. 1997 D.V.Gadre S.Engineer - A Data Acquisition System for Linux Dr.Dobb's Journal, Beb. 1998 T.Ebert - CAP, Control Application Platform 4D-Engineering Real-Time Distributed object Computing: An Emerging Field IEEE Computer Special Issue, June 2000 G.Bollella - The Real-Time Specification for Java D.C.Schmidt, F.Kuhns - An Overview of the Real-Time CORBA Spec. B.Selic - A Generic Framework for Modeling Resources with UML K.H.Kim - APIs for Real-Time Distributed object Programming Papers on Software Quality Binder: OO3 -------------------------------------------------------------------------- character at Risk as claim for Training Soars - JOOP Europe Winter 1995 E.Swanstrom - Beyond methodology transfer: OO mentoring meets project management - JOOP March-April 1995 P.Sparaco - Ariane Probe Seeks cause Of Sudden Pitch and Yaw J.M.Jezequel B.Meyer - Design by Contract: The Lessons of Ariane Computer, Jan. 1997 J.L.Lions - Ariane 5, Flight 501 Failure. Report by the probe Board Paris, Jul. 1996 A.Jock - How Software doesn't drudgery - Byte, December 1995 R.L.Glass - The next date exigency and the ones after that Communications of the ACM, Jan 1997 C.Fox W.Frakes - The character Approach: is it delivering? Communications of the ACM, Jun 1997 J.Herbsleb D.Zubrov et al. - Software character and the Capability Maturity Model Communications of the ACM, Jun 1997 C.Hollenbach R.Young A.Plugrad D.Smith - Combining character and Software Improvement Communications of the ACM, Jun 1997 L.J.Arthur - Quantum improvements in software system quality Communications of the ACM, Jun 1997 M.A.Cusumano R.W.Selby - How Microsoft builds software Communications of the ACM, Jun 1997 K.Ewisi-Mensah - censorious Issues in Abandoned IS development Projects Communications of the ACM, Sep 1997 D.Gillibrand K.Liu - character Metrics for Object-Oriented Design JOOP Jan. 1998 J.D.McGregor - Quality, Thy cognomen Is Not Testing JOOP Mar./Apr. 1998 A.K.Onoma W.T.Tsai M.H.Poonawala H.Suganuma - Regression Testing in an Industrial Environment Communications of the ACM, May 1998 R.Comerford T.S.Perry - Brooding on the Year 2000 IEEE Spectrum, June 1998 D.Lefkon B.Payne - Making embedded systems Year 2000 compliant IEEE Spectrum, June 1998 T.O'Reilly - Lessons from Open-Source Software Development Communications of the ACM, April 1999 R.L.Glass - Inspections - Some Surprising Findings Communications of the ACM, April 1999 F.Shull, I.Rus, V.Basili - How Perspective-Based Reading can improve Requirements Inspection IEEE Computer, July 2000 Papers on Object-Oriented Training Binder: OO3 -------------------------------------------------------------------------- M.Dodani - Object-oriented shock therapy - JOOP, Jul/Aug 1996 M.E.Fayad W.Tsai M.L.Fulghum - Transition to object Oriented Software Development, Communications of the ACM, Feb. 1996 The tumble 1996 JOOP guide to Education & Training JOOP Oct. 1996 The JOOP Listing of Mentoring and Training Providers JOOP Oct. 98 A.Jaaksi - A system for Your First Object-Oriented Project JOOP Jan. 1998 M.L.Manns H.Sharp M.Prieto P.McLaughlin - Capturing Successful Practices in OT Education and Training JOOP Mar./Apr. 1998 B.Meyer - Software Engineering in Academy IEEE Computer, May 2001 Papers on Astronomy and Telescope's Control Binder: OO3 -------------------------------------------------------------------------- C.Barbieri F.Rampazzi - TNG e' realta' L'astronomia, Genuary 1996 C.Barbieri - Il Telescopio Nazionale Galileo Il Nuovo Saggiatore, Bollettino della Societa' Italiana di Fisica Vol. 13 Anno 1997 No.4 J.M.Filgueira - A Distributed Object-Oriented Telescope Control System based on RT-Corba and ATM ICALEPCS 1997, Baijing, China, Nov 1997 G.M.Heiligman et al. - The SOFIA Mission Control Subsystem Software 194th meeting of the American Astronomical Society, June 1999 SPIE Cenference - Astronomical Telescopes and Instruments for the 21st century, Kona, Hawaii, 15-16 March 1994 J.E.Nelson P.Gillingham - An Overview of the Performance of the W.M.Keck Observatory SPIE Proceedings vol. 2199, Mar. 1994 P.Wizinowich T.Mast J.Nelson M.DiVittorio - The Optical character of the W.M.Keck Telescope SPIE Proceedings vol. 2199, Mar. 1994 R.Cohen T.Mast J.Nelson - Performance of the W.M.Keck Telescope active Mirror Control System SPIE Proceedings vol. 2199, Mar. 1994 H.Lewis W.Lupton M.Sirota T.Mast J.Nelson - Pointing and Tracking Performance of the W.M.Keck Telescope SPIE Proceedings vol. 2199, Mar. 1994 M.J.Sirota P.M.Thompson - Azimuth/Elevation servo performance of the W.M.Keck Telescope SPIE Proceedings vol. 2199, Mar. 1994 D.Enard - ESO VLT: Status of the main 8m telescopes SPIE Proceedings vol. 2199, Mar. 1994 P.Dierickx - oversight budget and expected performance of the VLT main unit telescopes SPIE Proceedings vol. 2199, Mar. 1994 M.J.Cullum D.Enard M.Ravensbergen - Control of image position errors with the VLT SPIE Proceedings vol. 2199, Mar. 1994 M.Quattri et al. - VLT 8m Unit Telescope Main Structure: Design Solutions and Performance Calculation SPIE Proceedings vol. 2199, Mar. 1994 M.Ravensbergen - Main axes servo systems of the VLT SPIE Proceedings vol. 2199, Mar. 1994 B.Gilli - Workstation Environment for the VLT SPIE Proceedings vol. 2199, Mar. 1994 B.Gustafsson - VLT Local Control Unit actual Time Environment SPIE Proceedings vol. 2199, Mar. 1994 SPIE Cenference - Telescope Control Systems, Orlando, Florida 19-21 April 1995 J.W.Percival - Remote observing from the bottom up: the architecture of the WYNE telescope control system SPIE Proceedings vol. 2479, April 1995 D.Mills - WYIN telescope graphical user interfaces SPIE Proceedings vol. 2479, April 1995 K.Wirenstrand - VLT Telescope Control Software, an overview SPIE Proceedings vol. 2479, April 1995 W.Lupton - Software infrastructure for the Keck II telescope SPIE Proceedings vol. 2479, April 1995 C.Bonoli et al. - TNG Control System: computer architecture, interfacing and synchronization SPIE Proceedings vol. 2479, April 1995 M.Ravensberger K.Wirenstrand - Time reference system of the VLT SPIE Proceedings vol. 2479, April 1995 S.Wampler - Role of scenarios and walk-throughs in telescope design SPIE Proceedings vol. 2479, April 1995 D.Mancini E.Cascone - TNG Control System: hardware, software and methods adopted to improve the performance of the fully digital drive system SPIE Proceedings vol. 2479, April 1995 B.Gilli - VLT Tracking and Guiding Software SPIE Proceedings vol. 2479, April 1995 M.Ravensbergen R.Merino C.P.Wang - Encoders for the altitude and azimuth axes of the VLT SPIE Proceedings vol. 2479, April 1995 R.K.Bhatia - Telescope alignment: if the zero-coma condition sufficient? SPIE Proceedings vol. 2479, April 1995 N.Robbier D.R.Blanco C.A.Roddier - WIYN telescope active optics system SPIE Proceedings vol. 2479, April 1995 ICALEPCS 1995: R.Barillere et al. - CICERO: Control Information systems Concepts based on Encapsulated actual Time Objects Proceedings ICALEPCS 1995, Chicago L.R.Dalesio M.Kraimer W.Watson M.Clausen - Distributed Software development in the EPICS Collaboration Proceedings ICALEPCS 1995, Chicago I.Ivanov K.Cahill B.Hendricks - Presentation of data from the Fermilab Datalogging System Proceedings ICALEPCS 1995, Chicago J.A.Carwardine - An introduction to Plant Monitoring through the EPICS Control System M.J.Knott - Communication in advocate of Software Sharing and Collaboration Development Proceedings ICALEPCS 1995, Chicago J.D.Fox H.Hindi - Control Theory with Applications to Accelerators Proceedings ICALEPCS 1995, Chicago D.Bulfone et al. - Controls in the Past Year of ELETTRA Operation Proceedings ICALEPCS 1995, Chicago R.J.McGonegal S.B.Wampler - The Gemini Control System Proceedings ICALEPCS 1995, Chicago A.Balestra F.Pasian M.Pucillo P.Santin C.Vuerli - Controlling Telescope Observation from the Astronomer's own desk: the case of TNG Proceedings ICALEPCS 1995, Chicago D.J.Ciarlette R.Gerig - Operational relish from a great EPICS based accelerator facility Proceedings ICALEPCS 1995, Chicago W.McDowell - Panel Discussion on EPICS Proceedings ICALEPCS 1995, Chicago J.Chen G.Heyes et al. - CDEV: An object Oriented Class Library for Developing Device Control Applications Proceedings ICALEPCS 1995, Chicago F.Momal C.Pinto-Pereira - Using World-Wide_Web for Control Systems Proceedings ICALEPCS 1995, Chicago H.Laeger S.Lechner - WWW for information on CERN energy consumption Proceedings ICALEPCS 1995, Chicago SPIE Cenference - Optical Telescopes of Today and Tomorrow, Landskrona, Sweden 29 May - 2 June 1996 G.M.Smith - Keck II Status Report SPIE Proceedings vol. 2871, June 1996 M.Mountain, F.Gillet, R.Kurz - The Gemini 8-M Telescopes Project SPIE Proceedings vol. 2871, June 1996 K.Norio - Status and Perspective of Subaru Telescope Project SPIE Proceedings vol. 2871, June 1996 J.M.Hill - The great Binocular Telescope Project SPIE Proceedings vol. 2871, June 1996 E.Manil - halt to halt modeling of the VLT SPIE Proceedings vol. 2871, June 1996 M.Quattri et al. - VLT 8m Unit Telescope Main Structure SPIE Proceedings vol. 2871, June 1996 O. von der Luehe, F.Derie et al. - Interferometry with the ESO VLT SPIE Proceedings vol. 2871, June 1996 P.Salinari - The great Binocular Telescope Interferometer SPIE Proceedings vol. 2871, June 1996 V.Baumer, P.Sacre' - Operational model for VLT temperature and rush control SPIE Proceedings vol. 2871, June 1996 P.Y.Bely - NGST: A feasibility study of the Next Generation Space Telescope SPIE Proceedings vol. 2871, June 1996 N.Hubin - VLT Adaptive optics at the European Southern Observatory SPIE Proceedings vol. 2871, June 1996 R.Ragazzoni, A.Baruffolo, F.Bortoletto, M.D'Alessandro - The adaptive optics module for TNG: a status report SPIE Proceedings vol. 2871, June 1996 W.Lupton - The Keck II Telescope Control System SPIE Proceedings vol. 2871, June 1996 M.J.Sirota et al. - Autoguider servo design and testing of the W.M.Keck Telescope SPIE Proceedings vol. 2871, June 1996 G.Raffi K.Wirenstrand - The VLT control software in its final test phase SPIE Proceedings vol. 2871, June 1996 A.Wallander - Uning NTT as prototype for VLT. The modern NTT control system SPIE Proceedings vol. 2871, June 1996 S.Wampler - The Software Design of the Gemini 8m Telescopes SPIE Proceedings vol. 2871, June 1996 P.Wallace - Pointing and tracking software for the Gemini 8-metre telescopes SPIE Proceedings vol. 2871, June 1996 T.Erm - Analysis of tracking performance SPIE Proceedings vol. 2871, June 1996 SPIE Cenference 3112 - Telescopes Control Systems II San Diego CA, USA 27-28 July 1997 G.Chiozzi K.Wirenstrand M.Ravensbergen B.Gilli - Integration tests of the VLT Telescope Control Systam SPIE Proceedings vol. 3112, July 1997, pp.141-151 A.Wallander J.Spyromilio - NTT Project: a sphere test for the VLT software and hardware SPIE Proceedings vol. 3112, July 1997, pp.9-19 E.Allaert G.Raffi - Preparation for VLT software commisioning at Paranal SPIE Proceedings vol. 3112, July 1997, pp.20-27 J.Wilkes M.Fisher - Selection of tape encoding system for the main axis of the Gemini telescopes SPIE Proceedings vol. 3112, July 1997, pp.30-41 M.Peron et al. - VLT Data rush System: the NTT prototype experience SPIE Proceedings vol. 3112, July 1997, pp.60-65 A.Conrad J.Gathright R.Kibrick - Remote observing with the Keck Telescopes SPIE Proceedings vol. 3112, July 1997, pp.99-110 J.Bailey R.Prestage - The portable telescope control system project SPIE Proceedings vol. 3112, July 1997, pp.124-131 L.Miglietta V.Bilioni C.Braccesi V.Pante - Large Binocular Telescope: the control system of the position actuator of the 8.4m borosilicate honeycomb primary mirrors SPIE Proceedings vol. 3112, July 1997, pp.132-140 S.S.Smith K.Gillies - User Interface for the Control of the Gemini Telescopes SPIE Proceedings vol. 3112, July 1997, pp.152-159 D.Gwo - A robust guide-star tracking algorithm proposed for Gravity Probe-B relativity mission SPIE Proceedings vol. 3112, July 1997, pp.320-327 D.Mancini E.Cascone P.Schipani - Galileo High-Resolution Encoder System SPIE Proceedings vol. 3112, July 1997, pp.328-334 D.Mancini M.Brescia E.Cascone P.Schipani - A Neural Variable Structure Controller for Telescope Pointing and Tracking Improvement SPIE Proceedings vol. 3112, July 1997, pp.335-342 E.Cascone D.Mancini P.Schipani - Galileo Telescope model dentification SPIE Proceedings vol. 3112, July 1997, pp.343-350 Papers on C/C++ programming Binder: OO2 -------------------------------------------------------------------------- P.Suel - Extending C++ for Distributed Applications - Dr'Bobb's, Feb. 1995 D.Ford - Associations in C++ - Dr.Dobb's Aug. 1994 J.Rogers - Locking Without Deadlocks - C/C++ Users Journal, Nov. 1995 J.Dugger - Multithreading in C++ - C/C++ Users Journal, Nov. 1995 N.Hunt - Automatically tracking test case execution - JOOP, Nov/Dec 1995 N.Hunt - Performance testing C++ code - JOOP, Jan 1996 J.J.P.Tsai Y.Bi S.J.Yang - Debugging for timing-constraint violations IEEE Software, March 1996 H.Lu - ELF: From the programmer's perspective T.Cargill - Managing Dynamic Objects in C++ - Dr.Dobb's, June 1996 D.Zigmond - STL Iterators - Dr.Dobb's, June 1996 T.Linenbach - Reusable Bynary Associations in C++ - Dr.Dobb's, June 1996 Allan - AnAsynchronous Design Pattern - Dr.Dobb's, June 1996 P.Arnaud - Dynamic Message Passing in C++ - Dr.Dobb's, Aug. 1996 D.Zigmond - STL algorithms - Dr.Dobb's, Aug. 1996 M.D.Carroll M.A.Ellis - Obstacles to Inheritability in C++ - C/C++ Users Journal, Aug. 1996 S.Blaha - Object-Oriented Interprocess Communication - Dr.Dobb's, Aug. 1996 G.Messer - A C++ Chronograph Class - C/C++ Users Journal, Sep. 1996 S.Hartmann - A reusable PID control class - C/C++ Users Journal, Feb. 1997 D.Wisehart - Software for Fail-safe Applications - C/C++ Users Journal, Feb. 1997 M.Remy - Portable Signal Handling Under UNIX - C/C++ Users Journal, Mar97 P.Anderson - C Multidimensional Arrays at race Time - Dr.Dobb's, Aug '89 J.W.Ross - Calling C Functions with Variably Dimensioned Arrays - Dr.Dobb's, Aug 1993 A.Rahimi - A Muldimensional Array Class - C/C++ Users Journal, Jul. 1997 H.Schmidt - Me and my arrow (auto-pointer template) - C/C++ Users Journal, Aug. 1997 A.Stevens - The Proposed C++ Standard: Evolution, Revolution, Innovation, Invention, convolution - Dr.Dobb's Journal, Sep. 1997 B.D.Roseblum - improve Your Programming with Asserts Dr.Dobb's, Dec. 1997 J.Bansija C.Davis - Automated Metrics and Object-Oriented Development Dr.Dobb's, Dec. 1997 J.Shankel - Implementing Abstract Factory as an STL Container Dr.Dobb's, Dec. 1997 M.Spertus - C++ and Garbage Collection Dr.Dobb's, Dec. 1997 J.Beveridge - lamentable Templates out of Header Files C/C++ User Journal, Nov. 1997 D.Lea - A reminiscence Allocator web page F.Kaduch D.Jan P.Vidal - Object-Oriented Finite-State Machines C/C++ User Journal, Feb. 1998 B.Reck - Thread Synchronization with Reference-Counting Handles C/C++ User Journal, Feb. 1998 D.Pomerants - Testing oversight Handlers by Simulating Errors C/C++ User Journal, June 1998 F.Wild - C++ Interfaces Dr. Dobb's Journal, Aug. 1998 C.Allison - What's modern in touchstone C++ C/C++ User Journal, Dec. 1998 S.Meyers - More effectual C++, 35 modern ways to improve your programs and design, Selected Chapters from the book - 1996 C++/OO courses, tutorials specs Bind Title -------------------------------------------------------------------------- OO5 G.Chiozzi - C++ Introductory Tutorial, varius documentation, 1995 OO5 J.T.Baldwin - C++ Inspection Check List, 1991 OO6 G.Booch J.Rumbaugh - Unified system for OO Development Documentation Set, Rational Corporation, 1996 OO6 A Rational development Process (RUP), Rational Corporation, 1999 OO6 Introducing the object Modelling Technique (ESO slides) OO6 Fundamentals of Software through Pictures for OMT Student Workbook S1 VLT On-line Data rush Analysis Document VLT-SPE-ESO-10100-0790 C++ class libraries Bind Title -------------------------------------------------------------------------- OO7 touchstone Template Library Reference OO7 M.J.Vilot - The C++ touchstone Library - Dr.Dobb's, Aug. 1995 OO7 D.Zigmond - Generic Programming and the C++ STL - Dr.Dobb's, Aug. 1995 OO7 P.J.Plauger - The Header .... series of papers C/C++ User Journal OO7 Mumit's STL Newbie guide OO7 JThreads/C++, Java-like Threads for C++ OO8 Working Paper for Draft Proposal International touchstone for Information Systems - Programming Language C++ X3J16/95-0087 April 1995 Papers on control theory Bind Title -------------------------------------------------------------------------- V1 S.Orlosky G.Avolio - Basic of rotary optical encoders Control Engineering, Nov. 1997 V1 V.J.VanDoren - How Software Tools Simplify Loop Tuning Control Engineering, Nov. 1997 V1 V.J.VanDoren - Advanced Control Software Goes Beyond PID Control Engineering, Jan. 1998 V1 J.Mandell B.Cook - SCADA Systems 'Dampen' Infrastructure Problems Control Engineering, Jan. 1998 V1 Windows CE movesfrom Pocket to Control G.A.Mintchell Control Engineering, May 1999 V1 Is a modern Control leeway in Your Future? D.Harrold, I.Nimmo Control Engineering, May 1999 V1 Digital Feedback Control of Telescopes Performance and Requirements F.Biancat Marchet, M.Dimmler, ESO Papers on generic IT arguments Bind Title -------------------------------------------------------------------------- V1 Interviews: J.Woehr - An Interview with Donald Knuth - Dr.Dobb's Apr. 1996 J.C.Dvorak - Buzz Off (Lou Gestner and IBM) - PC Computing B.Morris - tremendous Blue - Fortune Apr. 14, 1997 V1 J.Keaton - Employment 2005: Boom or Bust for Computer Professionals? IEEE Computer May 1996 V1 N.Terzi C.Rizzuto - Proposta di un codice di comportamento verso i giovani fisici - Il Nuovo Saggiatore, Maggio 1997 V1 P.J.Douglas G.M.Alliger R.Goldberg - Refining the curriculum: Client-Server and Object-Oriented Training Computer, June 1996 V1 B.H.Barnes - Assessing Computer Technology in Europe Communications of the ACM, May 1998 V1 A Career Management Model K.Sandholtz Dr.Dobb's Journal tumble 1998 V1 Surviving the Technical Interview J.Saturia Dr.Dobb's Journal tumble 1998 V1 Becoming a Computer Consultant J.Ruhl Dr.Dobb's Journal tumble 1998 V1 How to breathe a STAR engineer R.E.Kelley Spectrum October 1999 V1 L.Krumenaker - Roboscopes - Internet World, May 1996 V1 A.Peleg S.Wilkie U.Weiser - Intel MMX for Multimedia PCs - Communications of the ACM, Jan 1997 V1 R.Comerford - The battle for the desktop - IEEE Spectrum, May 1997 V1 IEEE Spectrum March 1997, Sharing virtual worlds, special report R.Braham R.Comerford - Sharing virtual worlds IEEE Spectrum, Mar. 1997 R.C.Waters J.W.Barrus - The ascend of shared virtual environments IEEE Spectrum, Mar. 1997 R.Rockwell - An infrastructure for sociable software IEEE Spectrum, Mar. 1997 B.Roehle - Chaneling the data flood IEEE Spectrum, Mar. 1997 C.R.Karr D.Reece R.Franceschini - Synthetic soldiers IEEE Spectrum, Mar. 1997 D.B.Anderson M.A.Casey - The sound dimension IEEE Spectrum, Mar. 1997 V1 R.D.Beer R.D.Quinn H.J.Chiel R.E.Ritzmann - Biologically inspired approaches to robotics Communication of the ACM, Mar. 1997 V1 T.S.Perry - In search of the future of Air Traffic Control IEEE Spectrum, Aug. 1997 V1 D.R.Gentner J.Grudin - Design Models for Computer-Human Interfaces Computer, June 1996 V1 P.Morreale - Agents on the Move IEEE Spectrum, Apr. 1998 V1 N.F.Johnson S.Jajodia - Exploring Steganography: Seeing the Unseen IEEE Computer. Feb. 1998 Papers on non-IT arguments Bind Title -------------------------------------------------------------------------- V1 R.Braham - Ballistic missile defense: it's back IEEE Spectrum, Sep. 1997 V1 W.Sweet, F.Felix, J.Beard, - Nuclear Energy: Special Report IEEE Spectrum, Nov. 1997 V1 P.Creola - Space Visions for the 21st Century Europhysics tidings January/February 1998 V1 Special Issue on Fusion Research Europhysics tidings November/December 1998 V1 F.Romanelli - Le ricerche sulla fusione termonucleare controllata condotte sul tokamak FTU Il Nuovo Saggiatore, Bollettino della Societa' Italiana di Fisica Vol. 13 Anno 1997 No.5-6 V1 L.Geppert W.Sweet - Technology 1998: Analysis & Forecast Issue IEEE Spectrum, Jan. 1998 V1 J.Oberg - Shuttle-Mir's lessons for the International Space Station IEEE Spectrum, June 1998 S.J.Marcus - Woe is MIR IEEE Spectrum, June 1998 V1 Europe Report IEEE Spectrum, October 1998 V1 Missiles for all: the modern global threat? J.Oberg IEEE Spectrum, March 1999 V1 The U.S.-Russian Space Relationship: symbolism at any cost? J.Oberg IEEE Spectrum, July 1999 V1 La Figura di Marie Curie a cento anni dalla scoperta del radio U.Amaldi Il Nuovo Saggiatore, vol.14, 1998, No. 6 V1A modern Eye Opens (the Gemini first telescope) G.Stix Scientific American, April 1999 V1A Riccardo Giacconi Laureato Nobel R.Ruffini Il Nuovo Saggiatore VLT papers and presentations Bind Title -------------------------------------------------------------------------- V2 G.Chiozzi DBL Database Loader, Extended CCS, Event Handling Toolkit VLT Control Software tutorial, ESO 19/06/95 V2 G.Chiozzi T.J.Accardo The Very great Telescope actual time database. An object Oriented Approach based over RTAP European RTAP User Group Conference 1995 Lyon, France 11-12 April 1995 V2 G.Chiozzi CCS Database Loader Tutorial Internal course, ESO 03/04/95 V2 G.Chiozzi An object-oriented event-driven architecture for the VLT Telescope Control Software ICALEPCS 1995, Chicago, USA, Oct 1995 V2 G.Chiozzi VLT object Oriented Design VLT Software Review, ESO, Apr. 1996 V2 G.Chiozzi SW Technology for Next Generation ESO Control Software Trieste Meeting on Y2K Real-time Control in Physics Trieste, 14-15 of January 1999 V2 G.Chiozzi ESO Annual Review 1999 - TCS Activities & ATCS ESO internal presentation Garching bei Muenchen, February 1999 V2 G.Chiozzi Auxiliary Telescopes Control Software ESO internal presentation Garching bei Muenchen, 09 of June 1999 V2 G.Chiozzi Real-Time Control Systems: a "One Document" object Oriented development Process ICALEPCS 1999, Trieste, Italy, Oct 1999 V2 G.Filippi Software Engineering For ESO's VLT Project ICALEPCT 1993, Berlin, Oct. 1993 V2 G.Raffi Control Software for the ESO VLT ICALEPCS 1991, Tsukuba, Nov. 1991 V2 G.Raffi Trends in instrumentation software ASTRONET 1993 workshop V2 G.Raffi Status of ESO Very great Telescope control software ICALEPCS 1995, Chicago, USA, Oct 1995 V2 G.Raffi The VLT control software development and installation ICALEPCS 1997, Baijing, China, Nov 1997 V2 G.Filippi Software Practices Used in the ESO Very great Telescope Control Software ICALEPCS 1999, Trieste, Italy, Oct 1999 V2 European Southern Observatory VLT Customer Case History, Wind River, 1999 V3 G.Chiozzi P.Duhoux R.Karban VLTI Auxiliary Telescopes: a full object Oriented approach Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4009-03 V3 K.Wirenstrand G.Chiozzi R.Karban VLT Telescope Control Software installation and commissioning Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4009-20 V3 G.Chiozzi R.Karban K.Wirenstrand sphere Stabilisation on the ESO VLT Telescopes Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4009-11 V3 UT Commissioning sphere Stabilization tests on Kueyen VLT-TRE-ESO-10200-XXXX V3 B.Koehler C.Flebus VLTI Auxiliary Telescopes Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4006-03 V3 A.Wallander J.Spyromilio K.Wirenstrand Commissioning VLT Unit Telescopes: methods and results Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4004 © gchiozzi@eso.org

    Last modified: Mon Feb 19 11:45:08 CET 2007



    Direct Download of over 5500 Certification Exams

    3COM [8 Certification Exam(s) ]
    AccessData [1 Certification Exam(s) ]
    ACFE [1 Certification Exam(s) ]
    ACI [3 Certification Exam(s) ]
    Acme-Packet [1 Certification Exam(s) ]
    ACSM [4 Certification Exam(s) ]
    ACT [1 Certification Exam(s) ]
    Admission-Tests [13 Certification Exam(s) ]
    ADOBE [93 Certification Exam(s) ]
    AFP [1 Certification Exam(s) ]
    AICPA [2 Certification Exam(s) ]
    AIIM [1 Certification Exam(s) ]
    Alcatel-Lucent [13 Certification Exam(s) ]
    Alfresco [1 Certification Exam(s) ]
    Altiris [3 Certification Exam(s) ]
    Amazon [2 Certification Exam(s) ]
    American-College [2 Certification Exam(s) ]
    Android [4 Certification Exam(s) ]
    APA [1 Certification Exam(s) ]
    APC [2 Certification Exam(s) ]
    APICS [2 Certification Exam(s) ]
    Apple [69 Certification Exam(s) ]
    AppSense [1 Certification Exam(s) ]
    APTUSC [1 Certification Exam(s) ]
    Arizona-Education [1 Certification Exam(s) ]
    ARM [1 Certification Exam(s) ]
    Aruba [6 Certification Exam(s) ]
    ASIS [2 Certification Exam(s) ]
    ASQ [3 Certification Exam(s) ]
    ASTQB [8 Certification Exam(s) ]
    Autodesk [2 Certification Exam(s) ]
    Avaya [96 Certification Exam(s) ]
    AXELOS [1 Certification Exam(s) ]
    Axis [1 Certification Exam(s) ]
    Banking [1 Certification Exam(s) ]
    BEA [5 Certification Exam(s) ]
    BICSI [2 Certification Exam(s) ]
    BlackBerry [17 Certification Exam(s) ]
    BlueCoat [2 Certification Exam(s) ]
    Brocade [4 Certification Exam(s) ]
    Business-Objects [11 Certification Exam(s) ]
    Business-Tests [4 Certification Exam(s) ]
    CA-Technologies [21 Certification Exam(s) ]
    Certification-Board [10 Certification Exam(s) ]
    Certiport [3 Certification Exam(s) ]
    CheckPoint [41 Certification Exam(s) ]
    CIDQ [1 Certification Exam(s) ]
    CIPS [4 Certification Exam(s) ]
    Cisco [318 Certification Exam(s) ]
    Citrix [47 Certification Exam(s) ]
    CIW [18 Certification Exam(s) ]
    Cloudera [10 Certification Exam(s) ]
    Cognos [19 Certification Exam(s) ]
    College-Board [2 Certification Exam(s) ]
    CompTIA [76 Certification Exam(s) ]
    ComputerAssociates [6 Certification Exam(s) ]
    Consultant [2 Certification Exam(s) ]
    Counselor [4 Certification Exam(s) ]
    CPP-Institue [2 Certification Exam(s) ]
    CPP-Institute [1 Certification Exam(s) ]
    CSP [1 Certification Exam(s) ]
    CWNA [1 Certification Exam(s) ]
    CWNP [13 Certification Exam(s) ]
    Dassault [2 Certification Exam(s) ]
    DELL [9 Certification Exam(s) ]
    DMI [1 Certification Exam(s) ]
    DRI [1 Certification Exam(s) ]
    ECCouncil [21 Certification Exam(s) ]
    ECDL [1 Certification Exam(s) ]
    EMC [129 Certification Exam(s) ]
    Enterasys [13 Certification Exam(s) ]
    Ericsson [5 Certification Exam(s) ]
    ESPA [1 Certification Exam(s) ]
    Esri [2 Certification Exam(s) ]
    ExamExpress [15 Certification Exam(s) ]
    Exin [40 Certification Exam(s) ]
    ExtremeNetworks [3 Certification Exam(s) ]
    F5-Networks [20 Certification Exam(s) ]
    FCTC [2 Certification Exam(s) ]
    Filemaker [9 Certification Exam(s) ]
    Financial [36 Certification Exam(s) ]
    Food [4 Certification Exam(s) ]
    Fortinet [12 Certification Exam(s) ]
    Foundry [6 Certification Exam(s) ]
    FSMTB [1 Certification Exam(s) ]
    Fujitsu [2 Certification Exam(s) ]
    GAQM [9 Certification Exam(s) ]
    Genesys [4 Certification Exam(s) ]
    GIAC [15 Certification Exam(s) ]
    Google [4 Certification Exam(s) ]
    GuidanceSoftware [2 Certification Exam(s) ]
    H3C [1 Certification Exam(s) ]
    HDI [9 Certification Exam(s) ]
    Healthcare [3 Certification Exam(s) ]
    HIPAA [2 Certification Exam(s) ]
    Hitachi [30 Certification Exam(s) ]
    Hortonworks [4 Certification Exam(s) ]
    Hospitality [2 Certification Exam(s) ]
    HP [746 Certification Exam(s) ]
    HR [4 Certification Exam(s) ]
    HRCI [1 Certification Exam(s) ]
    Huawei [21 Certification Exam(s) ]
    Hyperion [10 Certification Exam(s) ]
    IAAP [1 Certification Exam(s) ]
    IAHCSMM [1 Certification Exam(s) ]
    IBM [1530 Certification Exam(s) ]
    IBQH [1 Certification Exam(s) ]
    ICAI [1 Certification Exam(s) ]
    ICDL [6 Certification Exam(s) ]
    IEEE [1 Certification Exam(s) ]
    IELTS [1 Certification Exam(s) ]
    IFPUG [1 Certification Exam(s) ]
    IIA [3 Certification Exam(s) ]
    IIBA [2 Certification Exam(s) ]
    IISFA [1 Certification Exam(s) ]
    Intel [2 Certification Exam(s) ]
    IQN [1 Certification Exam(s) ]
    IRS [1 Certification Exam(s) ]
    ISA [1 Certification Exam(s) ]
    ISACA [4 Certification Exam(s) ]
    ISC2 [6 Certification Exam(s) ]
    ISEB [24 Certification Exam(s) ]
    Isilon [4 Certification Exam(s) ]
    ISM [6 Certification Exam(s) ]
    iSQI [7 Certification Exam(s) ]
    ITEC [1 Certification Exam(s) ]
    Juniper [63 Certification Exam(s) ]
    LEED [1 Certification Exam(s) ]
    Legato [5 Certification Exam(s) ]
    Liferay [1 Certification Exam(s) ]
    Logical-Operations [1 Certification Exam(s) ]
    Lotus [66 Certification Exam(s) ]
    LPI [24 Certification Exam(s) ]
    LSI [3 Certification Exam(s) ]
    Magento [3 Certification Exam(s) ]
    Maintenance [2 Certification Exam(s) ]
    McAfee [8 Certification Exam(s) ]
    McData [3 Certification Exam(s) ]
    Medical [69 Certification Exam(s) ]
    Microsoft [368 Certification Exam(s) ]
    Mile2 [2 Certification Exam(s) ]
    Military [1 Certification Exam(s) ]
    Misc [1 Certification Exam(s) ]
    Motorola [7 Certification Exam(s) ]
    mySQL [4 Certification Exam(s) ]
    NBSTSA [1 Certification Exam(s) ]
    NCEES [2 Certification Exam(s) ]
    NCIDQ [1 Certification Exam(s) ]
    NCLEX [2 Certification Exam(s) ]
    Network-General [12 Certification Exam(s) ]
    NetworkAppliance [36 Certification Exam(s) ]
    NI [1 Certification Exam(s) ]
    NIELIT [1 Certification Exam(s) ]
    Nokia [6 Certification Exam(s) ]
    Nortel [130 Certification Exam(s) ]
    Novell [37 Certification Exam(s) ]
    OMG [10 Certification Exam(s) ]
    Oracle [269 Certification Exam(s) ]
    P&C [2 Certification Exam(s) ]
    Palo-Alto [4 Certification Exam(s) ]
    PARCC [1 Certification Exam(s) ]
    PayPal [1 Certification Exam(s) ]
    Pegasystems [11 Certification Exam(s) ]
    PEOPLECERT [4 Certification Exam(s) ]
    PMI [15 Certification Exam(s) ]
    Polycom [2 Certification Exam(s) ]
    PostgreSQL-CE [1 Certification Exam(s) ]
    Prince2 [6 Certification Exam(s) ]
    PRMIA [1 Certification Exam(s) ]
    PsychCorp [1 Certification Exam(s) ]
    PTCB [2 Certification Exam(s) ]
    QAI [1 Certification Exam(s) ]
    QlikView [1 Certification Exam(s) ]
    Quality-Assurance [7 Certification Exam(s) ]
    RACC [1 Certification Exam(s) ]
    Real-Estate [1 Certification Exam(s) ]
    RedHat [8 Certification Exam(s) ]
    RES [5 Certification Exam(s) ]
    Riverbed [8 Certification Exam(s) ]
    RSA [15 Certification Exam(s) ]
    Sair [8 Certification Exam(s) ]
    Salesforce [5 Certification Exam(s) ]
    SANS [1 Certification Exam(s) ]
    SAP [98 Certification Exam(s) ]
    SASInstitute [15 Certification Exam(s) ]
    SAT [1 Certification Exam(s) ]
    SCO [10 Certification Exam(s) ]
    SCP [6 Certification Exam(s) ]
    SDI [3 Certification Exam(s) ]
    See-Beyond [1 Certification Exam(s) ]
    Siemens [1 Certification Exam(s) ]
    Snia [7 Certification Exam(s) ]
    SOA [15 Certification Exam(s) ]
    Social-Work-Board [4 Certification Exam(s) ]
    SpringSource [1 Certification Exam(s) ]
    SUN [63 Certification Exam(s) ]
    SUSE [1 Certification Exam(s) ]
    Sybase [17 Certification Exam(s) ]
    Symantec [134 Certification Exam(s) ]
    Teacher-Certification [4 Certification Exam(s) ]
    The-Open-Group [8 Certification Exam(s) ]
    TIA [3 Certification Exam(s) ]
    Tibco [18 Certification Exam(s) ]
    Trainers [3 Certification Exam(s) ]
    Trend [1 Certification Exam(s) ]
    TruSecure [1 Certification Exam(s) ]
    USMLE [1 Certification Exam(s) ]
    VCE [6 Certification Exam(s) ]
    Veeam [2 Certification Exam(s) ]
    Veritas [33 Certification Exam(s) ]
    Vmware [58 Certification Exam(s) ]
    Wonderlic [2 Certification Exam(s) ]
    Worldatwork [2 Certification Exam(s) ]
    XML-Master [3 Certification Exam(s) ]
    Zend [6 Certification Exam(s) ]





    References :


    Dropmark : http://killexams.dropmark.com/367904/11740133
    Wordpress : http://wp.me/p7SJ6L-1pL
    Dropmark-Text : http://killexams.dropmark.com/367904/12306854
    Issu : https://issuu.com/trutrainers/docs/c9560-659
    Blogspot : http://killexamsbraindump.blogspot.com/2017/11/pass4sure-c9560-659-real-question-bank.html
    RSS Feed : http://killexams.com/datafiles/rss/C9560-659-rss.xml
    Box.net : https://app.box.com/s/04xpsn795bexqpwndfcmj3rr5uedsggu
    zoho.com : https://docs.zoho.com/file/62c50c96d93b9c9b54e51b7d3aa5285c0e579






    Back to Main Page





    Killexams exams | Killexams certification | Pass4Sure questions and answers | Pass4sure | pass-guaratee | best test preparation | best training guides | examcollection | killexams | killexams review | killexams legit | kill example | kill example journalism | kill exams reviews | kill exam ripoff report | review | review quizlet | review login | review archives | review sheet | legitimate | legit | legitimacy | legitimation | legit check | legitimate program | legitimize | legitimate business | legitimate definition | legit site | legit online banking | legit website | legitimacy definition | pass 4 sure | pass for sure | p4s | pass4sure certification | pass4sure exam | IT certification | IT Exam | certification material provider | pass4sure login | pass4sure exams | pass4sure reviews | pass4sure aws | pass4sure security | pass4sure cisco | pass4sure coupon | pass4sure dumps | pass4sure cissp | pass4sure braindumps | pass4sure test | pass4sure torrent | pass4sure download | pass4surekey | pass4sure cap | pass4sure free | examsoft | examsoft login | exams | exams free | examsolutions | exams4pilots | examsoft download | exams questions | examslocal | exams practice |

    www.pass4surez.com | www.killcerts.com | www.search4exams.com | http://smresidences.com.ph/