C9560-659 Related Links

C9560-659 Dropmark  |   C9560-659 Wordpress  |   C9560-659 Dropmark-Text  |   C9560-659 Issu  |   C9560-659 Blogspot  |   C9560-659 RSS Feed  |   C9560-659 Box.net  |   C9560-659 zoho.com  |   C9560-659 publitas.com  |  
Pass4sure IBM C9560-659 with our VCE braindumps. - Killexams

Real Exam Questions/Answers of C9560-659

Killexams Updated C9560-659

Complete examcollection is provided Here   |   View Vendors, Tracks Home

C9560-659 - Fundamentals of Applying IBM SmartCloud Control Desk V1 - BrainDump Information

Vendor Name : IBM
Exam Code : C9560-659
Exam Name : Fundamentals of Applying IBM SmartCloud Control Desk V1
Questions and Answers : 105 Q & A
Updated On : March 22, 2019
PDF Download Mirror : C9560-659 Braindumps
Get Full Version : Killexams C9560-659 Full Version


Simply think about these C9560-659 Questions and study control


At killexams.com, we give surveyed IBM C9560-659 tutoring assets which can be the best to pass C9560-659 test, and to get authorized by IBM. It is an extraordinary inclination to quicken your vocation as an expert in the Information Technology undertaking. We are content with our notoriety of supporting individuals pass the C9560-659 exam of their first attempts. Our prosperity costs in the previous years had been actually amazing, on account of our happy customers currently ready to help their profession inside the rapid path. killexams.com is the essential decision among IT experts, particularly the individuals looking to move up the chain of command goes speedier in their separate partnerships. IBM is the venture pioneer in records age, and getting ensured by them is a guaranteed approach to win with IT professions. We enable you to do precisely that with our inordinate lovely IBM C9560-659 tutoring materials.

IBM C9560-659 is ubiquitous all around the globe, and the business undertaking and programming arrangements given by utilizing them are grasped by method for about the greater part of the associations. They have helped in driving bunches of offices on the beyond any doubt shot course of pass. Extensive data of IBM items are taken into preparation a totally essential capability, and the specialists certified by method for them are very esteemed in all associations.

We offer real C9560-659 pdf exam questions and answers braindumps in groups. Download PDF and Practice Tests. Pass IBM C9560-659 digital book Exam rapidly and effectively. The C9560-659 braindumps PDF compose is to be had for perusing and printing. You can print more prominent and exercise regularly. Our pass rate is high to 98.9% and the comparability percent between our C9560-659 syllabus ponder manual and actual exam is 90% construct absolutely with respect to our seven-yr instructing background. Do you need accomplishments inside the C9560-659 exam in only one attempt? I am as of now breaking down for the IBM C9560-659 real exam.

As the only thing in any way important here is passing the C9560-659 - Fundamentals of Applying IBM SmartCloud Control Desk V1 exam. As all which you require is a high score of IBM C9560-659 exam. The best one viewpoint you have to do is downloading braindumps of C9560-659 exam courses now. We will never again will give you a chance to down with our cash back guarantee. The specialists also protect rhythm with the greatest progressive exam so you can give the a great many people of updated materials. Three months free get section to as an approach to them through the date of purchase. Each applicant may likewise bear the cost of the C9560-659 exam dumps through killexams.com at a low cost. Regularly there might be a decrease for all individuals all.

Within the sight of the legitimate exam substance of the brain dumps at killexams.com you may effectively extend your specialty. For the IT experts, it's far critical to adjust their aptitudes predictable with their calling prerequisite. We make it smooth for our clients to take accreditation exam with the assistance of killexams.com demonstrated and certified exam material. For a splendid future in its realm, our brain dumps are the top notch decision.

killexams.com Huge Discount Coupons and Promo Codes are as under;
WC2017: 60% Discount Coupon for all exams on website
PROF17: 10% Discount Coupon for Orders greater than $69
DEAL17: 15% Discount Coupon for Orders greater than $99
DECSPECIAL: 10% Special Discount Coupon for All Orders


A best dumps composing is an absolutely fundamental element that makes it simple a decent method to take IBM certifications. Be that as it may, C9560-659 braindumps PDF gives accommodation for applicants. The IT accreditation is a significant troublesome task if one does now not find right direction inside the type of honest to goodness valuable asset material. Subsequently, we've genuine and up and coming substance material for the instruction of accreditation exam.


C9560-659 dumps, C9560-659 Discount Coupon, C9560-659 Promo Code, C9560-659 vce, Free C9560-659 vce, Download Free C9560-659 dumps, Free C9560-659 brain dumps, pass4sure C9560-659, C9560-659 practice test, C9560-659 practice exam, killexams.com C9560-659, C9560-659 real questions, C9560-659 actual test, C9560-659 PDF download, Pass4sure C9560-659 Download, C9560-659 help, C9560-659 examcollection, Passleader C9560-659, exam-labs C9560-659, Justcertify C9560-659, certqueen C9560-659, C9560-659 testking


View Full Exam »

Customer Reviews about C9560-659

Testimonials Here   |   View Vendors, Tracks Home

C9560-659 - Fundamentals of Applying IBM SmartCloud Control Desk V1 - Reviews

Our customers are always happy to give their reviews about the exams. Most of them are our permanent users. They do not rely on others except our team and they get exam confidence by using our questions and answers and exam simulator.

I got C9560-659 licensed in 2 days coaching.

I retained the same wide kind of as I should. A score of 89% changed into a awesome come about for my 7-day making plans. My planning of the exam C9560-659 became sad, due to the fact the problems had been excessively intense for me to get it. For fast reference I emulated the killexams.com dumps aide and it gave exquisite backing. The short-period answershad been decently clarified in primary dialect. Masses favored.

Prepare these C9560-659 real exam questions and feel confident.

C9560-659 Exam was my purpose for this yr. A very lengthy New Years resolution to position it in full C9560-659 . I without a doubt thought that analyzing for this exam, making ready to skip and sitting the C9560-659 exam would be simply as loopy because it sounds. Thankfully, I discovered a few critiques of killexams.com online and decided to apply it. It ended up being absolutely really worth it as the package had protected each question I got on the C9560-659 exam. I passed the C9560-659 definitely pressure-unfastened and came out of the trying out center glad and comfortable. Definitely worth the money, I suppose this is the exceptional exam enjoy viable.

Did you tried this great source of real exam questions.

The killexams.com dump is straightforward to apprehend and sufficient to put together for the C9560-659 exam. No different test dump I used in conjunction with the Dumps. My heartfelt thanks to you for creating such an enormously effective, simple material for the hard exam. I never thought I may want to pass this exam easily without any tries. You people made it take place. I spoke back 76 questions maximum correctly within the real exam. thank you for offering me an revolutionary product.

Little study for C9560-659 exam, great success.

As I had one and simplest week nearby before the exam C9560-659. So, I relied on upon the Q&A of killexams.com for quick reference. It contained quick-duration replies in a systemic way. huge thanks to you, you convert my international. that is the best exam answer in the event that i have confined time.

So smooth questions in C9560-659 exam! i used to be already enough prepared.

I retained the same wide kind of as I should. A score of 89% changed into a awesome come about for my 7-day making plans. My planning of the exam C9560-659 became sad, due to the fact the problems had been excessively intense for me to get it. For fast reference I emulated the killexams.com dumps aide and it gave exquisite backing. The short-period answershad been decently clarified in primary dialect. Masses favored.

wherein to register for C9560-659 examination?

I retained the same number of as I could. A score of 89% was a decent come about for my 7-day planning. My planning of the exam C9560-659 was sad, as the themes were excessively intense for me to get it. For speedy reference I emulated the killexams.com dumps aide and it gave great backing. The short-length answers were decently clarified in basic dialect. Much appreciated.

New Syllabus C9560-659 Exam questions are provided here.

I desired to have certification in C9560-659 exam and that i pick out killexams.com question and solution for it. The entirety is brilliantly organized with killexams.com I used it for topics like facts collecting and desires in C9560-659 exam and i had been given89 score attempting all the query and it took me almost an hour and 20 mins. Large way to killexams.

Take gain of C9560-659 examination Q&A and get certified.

Your C9560-659 mock test papers helped me a lot in an organised and well structured preparation for the exam. Thanks to you I scored 90%. The explanation given for each answer in the mock test is so good that it gave the real revision effect to study material.

I found a very good source of C9560-659 material.

To make certain the fulfillment in the C9560-659 exam, I sought assist from the killexams.com. I selected it for numerous motives: their test on the C9560-659 exam thoughts and policies changed into superb, the material is in reality user friendly, superb quality and very imaginative. Most significantly, Dumps removed all of the issues at the related subjects. Your material supplied generous contribution to my practise and enabled me to succeed. I can firmly nation that it helped me gather my fulfillment.

it's far splendid! I got dumps of C9560-659 examination.

attempted loads to clear my C9560-659 exam taking help from the books. however the difficult motives and toughinstance made things worse and i skipped the check two times. subsequently, my quality pal suggested me the question& solution by way of killexams.com. And agree with me, it worked so well! The quality contents were brilliant to go through and apprehend the subjects. I should without problems cram it too and answered the questions in barely a hundred and eighty minutes time. Felt elated to skip rightly. thanks, killexams.com dumps. thanks to my cute pal too.

View Practice Questions »

See more IBM exam dumps

Direct Downloads Here   |   View Vendors, Latest Home

Real Exam Questions and Answers of exams

We offer a huge collection of IBM exam questions and answers, study guides, practice exams, Exam Simulator.

000-736 | C2070-585 | 000-206 | 000-583 | LOT-956 | LOT-921 | 000-474 | C2090-735 | M6040-420 | C2150-400 | 000-138 | 000-424 | C9520-911 | M2180-759 | 000-568 | 000-877 | LOT-987 | A2090-558 | M2040-642 | 000-238 | 000-635 | M2140-726 | 000-N38 | C2140-820 | 000-M235 | LOT-952 | A2090-611 | C2030-102 | C2020-706 | 00M-240 | C2040-924 | C5050-280 | 000-046 | 000-N32 | LOT-955 | C2010-568 | A2090-312 | LOT-989 | 000-297 | 00M-643 | M2080-241 | 000-580 | C2050-724 | C9060-521 | M2170-741 | 00M-641 | A2150-195 | 000-314 | 00M-220 | C9520-929 |

View Complete IBM Collection »

Latest Exams added

Recently Updated Here   |   View Vendors, Latest Home

Latest Real Exam Questions and Answers Added to Killexams.com

We keep our visitors and customers updated regarding the latest technology certifications by providing reliable and authentic exam preparation material. Our team remain busy in updating C9560-659 exam training material as well as reviewing the real exam changes. They try best to provide each and every relevant information about the test for the candidate to get good marks and come out of test center happily.

156-727-77 | 1Z0-936 | 1Z0-980 | 1Z0-992 | 250-441 | 3312 | 3313 | 3314 | 3V00290A | 7497X | AZ-302 | C1000-031 | CAU301 | CCSP | DEA-41T1 | DEA-64T1 | HPE0-J55 | HPE6-A07 | JN0-1301 | PCAP-31-02 | 1Y0-340 | 1Z0-324 | 1Z0-344 | 1Z0-346 | 1Z0-813 | 1Z0-900 | 1Z0-935 | 1Z0-950 | 1Z0-967 | 1Z0-973 | 1Z0-987 | A2040-404 | A2040-918 | AZ-101 | AZ-102 | AZ-200 | AZ-300 | AZ-301 | FortiSandbox | HP2-H65 | HP2-H67 | HPE0-J57 | HPE6-A47 | JN0-662 | MB6-898 | ML0-320 | NS0-159 | NS0-181 | NS0-513 | PEGACPBA73V1 | 1Z0-628 | 1Z0-934 | 1Z0-974 | 1Z0-986 | 202-450 | 500-325 | 70-537 | 70-703 | 98-383 | 9A0-411 | AZ-100 | C2010-530 | C2210-422 | C5050-380 | C9550-413 | C9560-517 | CV0-002 | DES-1721 | MB2-719 | PT0-001 | CPA-REG | CPA-AUD | AACN-CMC | AAMA-CMA | ABEM-EMC | ACF-CCP | ACNP | ACSM-GEI | AEMT | AHIMA-CCS | ANCC-CVNC | ANCC-MSN | ANP-BC | APMLE | AXELOS-MSP | BCNS-CNS | BMAT | CCI | CCN | CCP | CDCA-ADEX | CDM | CFSW | CGRN | CNSC | COMLEX-USA | CPCE | CPM | CRNE | CVPM | DAT | DHORT | CBCP | DSST-HRM | DTR | ESPA-EST | FNS | FSMC | GPTS | IBCLC | IFSEA-CFM | LCAC | LCDC | MHAP | MSNCB | NAPLEX | NBCC-NCC | NBDE-I | NBDE-II | NCCT-ICS | NCCT-TSC | NCEES-FE | NCEES-PE | NCIDQ-CID | NCMA-CMA | NCPT | NE-BC | NNAAP-NA | NRA-FPM | NREMT-NRP | NREMT-PTE | NSCA-CPT | OCS | PACE | PANRE | PCCE | PCCN | PET | RDN | TEAS-N | VACC | WHNP | WPT-R | 156-215-80 | 1D0-621 | 1Y0-402 | 1Z0-545 | 1Z0-581 | 1Z0-853 | 250-430 | 2V0-761 | 700-551 | 700-901 | 7765X | A2040-910 | A2040-921 | C2010-825 | C2070-582 | C5050-384 | CDCS-001 | CFR-210 | NBSTSA-CST | E20-575 | HCE-5420 | HP2-H62 | HPE6-A42 | HQT-4210 | IAHCSMM-CRCST | LEED-GA | MB2-877 | MBLEX | NCIDQ | VCS-316 | 156-915-80 | 1Z0-414 | 1Z0-439 | 1Z0-447 | 1Z0-968 | 300-100 | 3V0-624 | 500-301 | 500-551 | 70-745 | 70-779 | 700-020 | 700-265 | 810-440 | 98-381 | 98-382 | 9A0-410 | CAS-003 | E20-585 | HCE-5710 | HPE2-K42 | HPE2-K43 | HPE2-K44 | HPE2-T34 | MB6-896 | VCS-256 | 1V0-701 | 1Z0-932 | 201-450 | 2VB-602 | 500-651 | 500-701 | 70-705 | 7391X | 7491X | BCB-Analyst | C2090-320 | C2150-609 | IIAP-CAP | CAT-340 | CCC | CPAT | CPFA | APA-CPP | CPT | CSWIP | Firefighter | FTCE | HPE0-J78 | HPE0-S52 | HPE2-E55 | HPE2-E69 | ITEC-Massage | JN0-210 | MB6-897 | N10-007 | PCNSE | VCS-274 | VCS-275 | VCS-413 |

View Recently Added Exams »

See more dumps

Direct Downloads Here   |   View Vendors, Latest Home

Real Exam Questions and Answers of exams

Here are some exams that you can explore by clicking the link below. There are thousands of exams that we provide to our candidates covering almost all the areas of certifications.

C2020-612 | CEMAP-1 | 1Z0-535 | LOT-952 | HP0-S27 | CPSM1 | 700-039 | 000-711 | 000-M79 | HP0-727 | 920-804 | C9530-404 | 646-223 | 70-498 | 000-N05 | 500-260 | 000-991 | 000-138 | OG0-023 | HP0-697 | JN0-341 | IBMSPSSMBPDM | DHORT | HP2-896 | VCS-273 | 650-082 | 000-700 | E20-591 | L50-502 | C2120-800 | 650-367 | 190-834 | 000-816 | 000-M249 | 132-S-911.2 | DC0-200 | 6104 | HP2-E57 | CLSSGB | HP2-B67 | ISTQB-Level-1 | E20-380 | NS0-159 | PK0-003 | 1Y0-230 | 000-082 | A2070-581 | 70-705 | 000-881 | 70-743 |

View Practice Questions »

Top of the list Vendors

Certification Vendors Here   |   View Exams, Latest Home

Industry Leading Vendors

Top notch vendors that dominate the entire world market by their technology and experties. We try to cover almost all the technology vendors and their certification areas so that our customers and visitors obtain all the information about test at one place.

Fujitsu | Huawei | The-Open-Group | Exin | Symantec | ECCouncil | NCIDQ | Dassault | ISEB | AIIM | Pegasystems | iSQI | Riverbed | Palo-Alto | ECDL | Fortinet | Salesforce | Trainers | AccessData | Banking | Genesys | CWNP | ISA | Enterasys | Cloudera | APA | IAHCSMM | PayPal | ASIS | FCTC | P&C | ExtremeNetworks | Tibco | Counselor | Sybase | Certiport | College-Board | Motorola | IBQH | ComputerAssociates | Cisco | Altiris | IFPUG | GIAC | Network-General | Medical | SOA | IQN | RSA | Wonderlic |

View Practice Questions »

Sample Real Exam Questions/Answers

Certification Vendors Here   |   View Exams, Latest Home

C9560-659 Demo and Sample

Note: Answers are below each question.
Samples are taken from full version.

Pass4sure C9560-659 dumps | Killexams.com C9560-659 real questions | [HOSTED-SITE]



Killexams.com C9560-659 Dumps and Real Questions

100% Real Questions - Exam Pass Guarantee with High Marks - Just Memorize the Answers



C9560-659 exam Dumps Source : Fundamentals of Applying IBM SmartCloud Control Desk V1

Test Code : C9560-659
Test Name : Fundamentals of Applying IBM SmartCloud Control Desk V1
Vendor Name : IBM
Q&A : 105 Real Questions

try this notable source of real take a look at Questions.
I spent sufficient time reading those material and passed the C9560-659 exam. The stuff is right, and whilst those are thoughts dumps, that means these materials are constructed at the actual exam stuff, I dont understand those who attempt to complain about the C9560-659 questions being extremely good. In my case, no longer all questions had been one hundred% the equal, however the topics and trendy approach have been certainly correct. So, friends, in case you study tough enough youll do just nice.


Questions had been precisely equal as I got!
killexams.com absolutely you are maximum top notch mentor ever, the manner you train or guide is unmatchable with any other service. I were given tremendous help from you in my try to try C9560-659. i used to be now not sure approximatelymy success but you made it in simplest 2 weeks thats simply notable. I am very thankful to you for presenting such richhelp that these days i have been capable of marks exceptional grade in C9560-659 exam. If im successful in my discipline its due to you.


it is first-rate perfect to prepare C9560-659 exam with real exam questions.
im very happy with the C9560-659 QAs, it helped me lot in exam center. i can certainly come for different IBM certifications also.


i found the entirety had to clear C9560-659 exam.
I got seventy nine% in C9560-659 exam. Your test material became very helpful. A large thank you kilexams!


Right place to get C9560-659 Latest Brain dump paper.
Mysteriously I answerered all questions in this exam. Much obliged killexams.com It is a magnificent asset for passing exams. I suggest everybody to simply use killexams.com. I read numerous books however neglected to get it. In any case in the wake of using killexams.com Questions & Answers, I found the straight forwardness in planning question and answers for the C9560-659 exam. I saw all the themes well.


positioned an accurate supply for actual C9560-659 real exam questions.
i bought this because of the C9560-659 questions, I concept I should do the QAs element simply primarily based on my previous experience. Yet, the C9560-659 questions provided through killexams.com had been simply as beneficial. So you really need focused prep material, I passed without difficulty, all manner to killexams.com.


New Syllabus C9560-659 exam questions are furnished right here.
I have to say that killexams.com are the best place I will always rely on for my future exams too. At first I used it for the C9560-659 exam and passed successfully. At the scheduled time, I took half time to complete all the questions. I am very happy with the Q&A study resources provided to me for my personal preparation. I think it is the ever best material for the safe preparation. Thanks team.


How lots C9560-659 exam fee?
killexams.com had enabled a pleasing enjoy the entire while I used C9560-659 prep useful resource from it. I accompaniedthe examine courses, exam engine and, the C9560-659 to each tiniest little element. It modified into due to such fabulousmanner that I became proficient inside the C9560-659 exam curriculum in remember of days and have been given the C9560-659 certification with an excellent score. I am so grateful to each single character at the back of the killexams.com platform.


No supply is greater effective than this C9560-659 supply.
thank you plenty killexams.com team, for making ready awesome practice tests for the C9560-659 exam. its milesobvious that without killexams.com exam engine, students cant even think about taking the C9560-659 exam. I attemptedmany different assets for my exam practise, however I couldnt discover myself confident enough for taking the C9560-659 exam. killexams.com exam guide makes clean exam coaching, and offers self belief to the scholars for taking exam without difficulty.


were given no hassle! 3 days training of C9560-659 ultra-modern dumps is required.
This braindump from helped me get my C9560-659 certification. Their materials are really helpful, and the exam simulator is just great, it fully simulates the C9560-659 exam. The exam itself was tricky, so Im happy I used Killexams. Their bundles cover everything you need, and you wont get any unpleasant surprises during your exam.


IBM Fundamentals of Applying IBM

IBM Apologizes For 'Racial Slurs' On Recruitment site | killexams.com Real Questions and Pass4sure dumps

Tech large IBM issued an apology Monday after its recruitment webpages had "racial slurs" in its drop-down menu. In online application forms for positions inside the company, candidates had been requested their ethnicity and among the options to choose between had been Yellow, Mulatto and Black.

The incident got here to gentle after a jobseeker making use of for a technical role in IBM contacted the Register about the contents of the types prior this month. The jobseeker became greatly surprised to peer the slurs listed for a mandatory enter field labeled: "Please state your ethnic neighborhood."

"Naturally, i was bowled over to peer this on an application from what I generally agree with to be a respected and precise technology company," the job hopeful, who become now not named, advised the Register. "It made me believe as although there are biases and prejudices that exist, that may go unchecked or not noted, that can also even be directly contrary to what the company as a whole tries to latest as their values and graphic. also, the proven fact that it is 2019, and to see whatever like this, blows my mind."

among the words Caucasian, Black, Indigenous, Yellow, was the term Mulatto, which is an out of date and offensive time period used to describe blended race individuals with black and white folks. using the time period "Yellow" relating to americans of East Asian starting place has been historically linked to violence, discrimination and exclusion.

"Our recruiting websites temporarily and inappropriately solicited information regarding job applicant ethnicity," Edward Barbini, IBM’s vice chairman of exterior family members, informed the Register on Monday night, apologizing to those affected by the contents of the kind. "those questions were eliminated automatically when we grew to become privy to the challenge and we express regret. IBM hiring is in keeping with expertise and qualifications. We do not use race or ethnicity in the hiring technique and any responses we acquired to these questions could be deleted."

"IBM has long rejected all kinds of racial discrimination and we are taking appropriate steps to make certain this does not happen once again,” Barbini introduced.

IBMa symbol sits illuminated outside the IBM pavilion on the hole day of the world mobile Congress on the Fira Gran by means of complex in Barcelona, Feb. 22, 2016. photograph: Getty images/David Ramos


Supermicro hardware weaknesses let researchers backdoor an IBM cloud server | killexams.com Real Questions and Pass4sure dumps

Supermicro hardware weaknesses let researchers backdoor an IBM cloud serverenlarge Jeremy Brooks / Flickr reader comments forty three with 39 posters participating Share this story
  • Share on facebook
  • Share on Twitter
  • Share on Reddit
  • more than 5 years have handed considering that researchers warned of the serious protection dangers that a established administrative tool poses to servers used for one of the vital most delicate and mission-critical computing. Now, new research suggests how baseboard management controllers, as the embedded hardware is called, threaten top rate cloud capabilities from IBM and might be different suppliers.

    additional analyzing “Bloodsucking leech” places a hundred,000 servers liable to strong attacks in brief, BMCs are motherboard-connected microcontrollers that give wonderful manage over servers inner datacenters. the use of the intelligent Platform management Interface, admins can reinstall operating programs, deploy or adjust apps, and make configuration alterations to large numbers of servers, without physically being on premises and, in many instances, with out the servers being became on. In 2013, researchers warned that BMCs that came preinstalled in servers from Dell, HP, and other identify-manufacturer producers were so poorly secured that they gave attackers a stealthy and convenient solution to take over whole fleets of servers internal datacenters.

    Researchers at security enterprise Eclypsium on Tuesday plan to put up a paper about how BMC vulnerabilities threaten a top rate cloud service supplied through IBM and perhaps other suppliers. The top rate carrier is referred to as bare-steel cloud computing, an option provided to purchasers who are looking to shop principally sensitive information but don't need it to intermingle on the equal servers different shoppers are the use of. The premium lets customers purchase unique entry to dedicated actual servers for so long as necessary and, when the servers are not any longer obligatory, return them to the cloud provider. The issuer, in conception, wipes the servers clear so that they may also be safely used with the aid of another naked-metal consumer.

    Eclypsium's analysis demonstrates that BMC vulnerabilities can undermine this mannequin by permitting a consumer to depart a backdoor to be able to remain energetic once the server is reassigned. The backdoor leaves the consumer open to quite a lot of assaults, together with facts theft, denial of provider, and ransomware.

    To prove their point, the researchers commissioned a naked-metal server from IBM's SoftLayer cloud carrier. The server became using a BMC from Supermicro, a hardware brand with a big range of common firmware vulnerabilities. The researchers confirmed the BMC changed into running the latest firmware, recorded the chassis and product serial numbers, after which made a moderate modification to the BMC firmware in the sort of a single bitflip internal a comment. The researchers additionally created an additional consumer account within the BMC's intelligent Platform administration Interface.

    The researchers then again the server to IBM and requested new ones. eventually, the researchers had been assigned one with the same chassis and product serial number as the server that they had prior to now obtained and modified. An inspection of the server failed to inspire self assurance. in accordance with the record:

    We did be aware that the extra IPMI person became eliminated with the aid of the reclamation system, besides the fact that children the BMC firmware containing the flipped bit changed into nevertheless present. This indicated that the servers' BMC firmware was now not re-flashed throughout the server reclamation process. The aggregate of using susceptible hardware and never re-flashing the firmware makes it possible for a malicious party to implant the server's BMC code and inflict damage or steal data from IBM purchasers that use that server sooner or later.

    enlarge

    We also seen that BMC logs had been retained throughout provisioning, and BMC root password remained the identical throughout provisioning. by means of now not deleting the logs, a new customer may profit perception into the moves and behaviors of the outdated owner of the machine, whereas understanding the BMC root password may permit an attacker to greater with ease benefit control over the machine in the future.

    no longer the primary time extra reading To stay away from hacking, disable prevalent Plug and Play now Eclysium researchers aren't the most effective ones to document how weaknesses in Supermicro BMCs can put bare-metal cloud users at risk. In 2012, researchers at protection enterprise Rapid7 found that the Supermicro controllers had been at risk of hacks transmitted over a laptop's commonplace plug and play networking protocols that gave attackers unfettered access. They went on to combine those insights with new findings from researcher Dan Farmer that confirmed a way to build extremely complicated-to-detect backdoors within the BMCs.

    To the chagrin of the researchers, they found the exploits persisted to work in opposition t bare-metallic servers regardless of new measures cloud providers introduced in an attempt to mitigate the vulnerability. HD Moore—who on the time turned into Rapid7's chief research officer and is now vice president of research and development at Atredis companions—stated an IPMI feature known as a keyboard controller vogue made backdooring the BMC of naked-metallic servers viable. As became the case with IBM SoftLayer, a unique cloud provider didn't detect and re-flash modified firmware.

    "it is ridiculously dangerous to make use of a dedicated (naked-steel) server if the BMC is enabled," Moore spoke of in an interview. "There is no make sure that the BMC hasn't been backdoored before your server become provisioned. The excessive-end cloud providers have hardware solutions to safeguard towards these attacks, however any one the use of stock supermicro boards is going to be at risk."

    In a longer message to Ars, Moore provided greater particulars round his analysis in 2012 and 2013:

    while investigating the have an effect on of the libupnp vulnerabilities in late 2012, we decided that tremendous Micro BMCs were affected and wrote a Metasploit module to profit remote root shells on these contraptions by means of that vector. shortly after, in 2013, Dan Farmer released his research into IPMI, and we persevered searching on the exposure created by super Micro BMCs, with a watch towards the potential of both a number and a BMC to subvert every different. The procedure changed into covered in a weblog post and we continued searching into super Micro BMC concerns in regular.

    One scenario we checked out became whether committed server providers (what we name naked-metallic cloud nowadays) correctly included the BMC interfaces and whether an attack on a rented server might outcomes in everlasting entry to that hardware. We decided that this changed into possible and that there weren't any fantastic solutions to it, but we only had a few ISPs as records facets. starting in 2013, we saw predominant changes to how dedicated server providers protected and isolated the BMC interfaces, nonetheless it wasn't enough to prevent a everlasting backdoor from being delivered by an attacker.

    committed server providers answered to the public vulnerabilities in IPMI and libupnp by means of placing the BMC network interfaces at the back of firewalls and altering the admin passwords on the BMCs in order that an off-the-cuff person of the rented server couldn't interface with it. This didn't stay away from entry to the BMC, as the IPMI over KCS channel enables a brand new admin consumer to be created and in the case of tremendous Micro at the least, the firmware to be re-flashed. We proven that we may re-flash a committed server with an older edition of the firmware and then make the most it the usage of the libupnp vulnerability.

    This resulted in study entry to the nvram of the BMC and a root shell within the BMC's Linux-primarily based OS. The nvram contained the plaintext passwords, that have been shared throughout all servers at that particular company. We observed that the BMC might access BMCs linked to different consumer's servers via the dedicated network, and that the firmware can be modified in order that future updates would no longer follow. creating a malicious firmware photo for super Micro BMCs is trivial using public equipment (https://github.com/devicenull/ipmi_firmware_tools).

    We didn't post those consequences, but it surely led to more due diligence on our part when deciding on dedicated servers for our personal use, and somewhat a number of conversations with Zach Wikholm at Cari.internet, who changed into juggling linked issues of their information core, including active exploitation of tremendous Micro BMC vulnerabilities.

    In a press release, IBM officers wrote:

    We are not aware of any customer or IBM statistics being put at risk because of this mentioned expertise vulnerability, and we've taken moves to eliminate the vulnerability. Given the remediation steps we have taken and the degree of issue required to exploit this vulnerability, we accept as true with the potential affect to customers is low. whereas the document focuses on IBM, this became in reality a potential business-extensive vulnerability for all cloud carrier suppliers, and we thank Eclypsium for bringing it to the consideration of the trade.

    In a weblog publish posted Monday, IBM officers stated the countermeasures include "forcing all BMCs, including folks that are already reporting up-to-date firmware, to be re-flashed with manufacturing facility firmware earlier than they're re-provisioned to other customers. All logs in the BMC firmware are erased and all passwords to the BMC firmware are regenerated."

    Moore, for his part, remained unconvinced the measure will safely offer protection to towards the BMC hacks as a result of, he noted, "application-based re-flashing tools may also be subverted via an attacker that has already flashed a malicious picture. I don't feel IBM can solve it wanting bodily disabling the BMC by the use of a motherboard jumper."


    analysis: IBM CEO announces Chapter 2 of Cloud and AI at IBM consider 2019 | killexams.com Real Questions and Pass4sure dumps

    In 2013, IBM had a wakeup call.

    It lost an important cloud deal at the CIA to AWS. IBM protested the contract exposing previously confidential details. In a excessive profile choice, decide Thomas Wheeler ruled against IBM regardless of the apparent bigger fee bid submitted by AWS. The final analysis is AWS’ cloud providing was viewed as superior to IBM’s.

    under twenty-four months into her tenure as IBM’s CEO, Ginni Rometty understood the crucial. IBM had to make a circulate to get into the public cloud game or it would be left out within the cold, a lot like HP, Cisco, EMC, VMware, and different enormous tech businesses on the time. IBM paid $2B to acquire Softlayer and has seeing that changed the platform into a potential offering from which it intends to re-write the cloud narrative.

    right here’s a paraphrase of the premise put forth by way of IBM’s Chairman and CEO at this week’s IBM believe conference in San Francisco:  

    Chapter one of the cloud represented about 20% of the workload opportunity. It become largely about moving loads of new and client-facing purposes to the cloud. Chapter two is concerning the difficult stuff. It’s about scaling AI and growing hybrid clouds. It’s about bringing the cloud working model to all these mission-vital apps and enabling shoppers to manipulate information, workloads, and apps and movement them between distinctive clouds. here is 1000000000000 dollar probability and IBM intends to be #1.

    IBM is not on my own in its aspiration. massive organizations like Cisco, VMware, and even HPE have a bit of similar aspirations. As does ServiceNow and a bunch of smaller professional establishments. and naturally, the public cloud giants together with AWS and Microsoft have their personal ideas about Chapter 2 of the cloud era.

    To claim a management position in Chapter 2, IBM is spending $34B to acquire crimson Hat. here's an immense stream on the chess board and underscores that the IBM Cloud and a decade of attempting to commercialize Watson aren’t sufficient to win the day. somewhat it sees open source, Kubernetes, containers, microservices, and developers as a lynchpin to success in the subsequent chapter of the cloud.

    a quick evaluation of Chapter One

    There’s a whole lot debate about who first created the term cloud computing. There’s little doubt although that Jeff Barr’s blog publish in the summer of 2006, announcing AWS’ Elastic Compute Cloud, ushered within the up to date period of cloud - so-known as Chapter 1. In his post, Barr wrote:

    With Amazon EC2, you don’t need to purchase hardware in improve of your needs. instead, you effectively turn up the dial, spawning more digital CPUs, as your processing wants develop.  

    His fact underscored probably the most fundamental price proposition of cloud - pay for less than what you employ model. This, of route, was the primary of a large number of improvements and services - all attainable with the swipe of a credit card, to be dialed up on demand. Startups flocked and tapped world-class information core capabilities in the past most effective obtainable to massive businesses.

    The financial downturn of 2007-2009 led CFOs to mandate a shift from Capex to Opex and when the economic climate grew to become up, companies realized that their cloud event enabled lots more suitable agility. Shadow IT-powered the subsequent phase of increase and as “cloud creep” permeated the market - IT hopped on board and hasn’t appeared back.

    specifically, Microsoft transformed itself to the cloud the usage of the formulation of: 1) An open source mind-set - alignment and support (open compute, linux on .web, and so forth.); 2) Cloudify all things Microsoft and making Azure, not home windows, the core of its universe; and three) bundling workplace 365 to show earnings from now not simplest IaaS but SaaS.

    Joined by using Google, which used its dominant world search infrastructure to stake its declare within the cloud, the large three lead the way for a brand new economic model according to scale, innovation and automation, making use of utility economics to the theory of infrastructure deployment and administration services (See Figures 1 & 2 below).

    commercial enterprise IT Economics 1990-2010SiliconAngle.com

    commercial enterprise IT Economics 2010-2030SiliconAngle.com

    Key points within the Charts:

  • historically, the marginal cost of application methods zero whereas services have negative economies of scale;
  • With cloud - infrastructure services music extra carefully to utility economics - enabling big scale (and profitability) for these with extent (i.e. AWS, Microsoft, and Google);
  • typical infrastructure companies combat to hang on to legacy installed bases;
  • Cloud corporations with a SaaS portfolio (Oracle, IBM, Microsoft) have “up-the-stack” value merits they can use as a bulwark towards the commoditization of their businesses.
  • IBM’s prospects for Chapter 2 management depend on facts

    before diving into the pink Hat piece of the puzzle, we must element again to facts. In our view, IBM is working intently with purchasers to build a digital enterprise material where information remains the underpinning of its method to power a new period of analytics according to AI. IBM sees statistics as a fundamental ingredient in bringing contextual relevance to enterprise applications. What we’re seeing is because of IBM’s massive services company and deep industry skills it’s earned the right to support valued clientele construct digital networks and radically change company models. IBM’s huge valued clientele are becoming this. They’re no longer looking to IBM to without problems deliver services or cozy their infrastructure or sell them SaaS - rather they’re hunting for IBM to assist them seriously change and bring new company fashions. We’re seeing this in healthcare, fiscal capabilities, agriculture, power, coverage and almost all industries through which IBM has a presence globally.

    IBM’s opportunity as we see it is to support corporations take into account the way to make funds the use of information. not necessarily through directly promoting their statistics however figuring out a way to monetize information. What we see IBM doing is taking what has been mostly piecemeal, statistics-oriented AI projects and creating what Rometty calls “outside / In” - i.e. client event oriented applications and “internal / Out” - i.e. workflow and new the way to work purposes - each which contribute to bottom line outcomes. greater importantly, IBM wants to help the consumer absolutely radically change their business operations.

    to achieve this, IBM is providing a enterprise platform - fueled with the aid of data, and a computing device intelligence platform - i.e. tooling and capabilities to extract value from information and operationalize AI.

    Enter red Hat  

    IBM didn’t release any new details about crimson Hat at suppose, most likely because of regulatory concerns. but with red Hat, IBM can permit a new breed of utility builders - for agencies - the use of cloud-native tooling. facts is the important thing ingredient to emerging company applications and with purple Hat in its portfolio, IBM can “cloudify” and “statistics-fy” businesses and position itself as up to date and principal. extra importantly, it can dramatically scale pink Hat’s company globally.

    purple Hat for IBM emerges as a automobile for generating by-product leverage out of IBM ecosystem utility and industry talents. With RHEL, OpenShift and eight million purple Hat developers, IBM can assist its shoppers modernize their software portfolios and radically change enterprise operations...developing a new breed of digital company developers.

    trust statements made by means of Ginni Rometty and Jim Whitehurst right through their mini roadshow after saying the red Hat acquisition. Ginni kept asserting “this isn’t a backend loaded deal.” What did she imply? In our view, she become virtually explaining the company case for IBM paying a 60%+ premium over purple Hat’s stock fee previous to the deal being announced. primarily, IBM has a major installed base of services customers (a $20+B captive possibility in our estimate) at which it will possibly element crimson Hat PaaS tooling to modernize utility portfolios and build the longer term digital enterprise platform for/with purchasers.

    So out of the chute, IBM can immediately begin scaling pink Hat’s business, marrying deep trade knowledge, the sprawling IBM SaaS portfolio, the IBM Cloud (the place applicable), AI infused in every single place and red Hat PaaS to join client facts, workloads, and purposes to any cloud or on-prem setting up.

    long run, IBM can, along with its consumers, completely undertake up to date application development practices to codify its deep business capabilities and construct out transformative company and AI systems to aid incumbent companies compete within the digital era.

    The competitive panorama

    if you don’t personal a public cloud, you go difficult after multi-cloud. To wit: VMware exited public cloud after years of trying to commercialize VCloud Air. It at last settled on a cope with AWS and sold off its public cloud. VMware is Dell’s ace within the hole for multi-cloud. Cisco lately introduced its multi-cloud approach at Cisco are living Barcelona which comes at the problem from a powerful place in networking. As networks flatten - Cisco can be the glue between clouds with application management and orchestration framework for networked data-- no longer a foul strategy. HP tried and failed within the public cloud video game and HPE is making an attempt to be a company of multi-cloud capabilities but is largely relying on packaging its hardware, capabilities and some minimal application content.

    of these gamers, handiest Cisco has any meaningful presence with developers. IBM with purple Hat gets entry to eight million devs.

    As such, IBM has a higher position than these gamers-- albeit more complex. It owns a public cloud presence and while not very nearly as gigantic as AWS in IaaS, IBM has a big SaaS portfolio. Like Oracle, it doesn’t must compete for commodity enterprise in opposition t AWS, reasonably it may possibly sell value “up the stack” the use of SaaS as a high-value play. As smartly, it’s AI runs on the cloud and it just announced at consider that it’s opening up Watson to run on any on-prem, public or hybrid cloud (an extended past due movement in our opinion). up to now, if you desired Watson you could only get it on IBM’s cloud.

    Microsoft certainly could have its say in Chapter 2 of the cloud. With its acquisition of GitHub and big software estate, mixed with a leading cloud at scale, Microsoft holds loads of cards. it's investing in AI and has a strong statistics attitude.

    Google Cloud is resetting with new management and is taking part in the long game. It evidently has AI chops and a strong records attitude.

    Then there’s AWS. Amazon’s announcement of Outposts suggests that it may well and should evolve and alter its spots. these days, AWS makes a powerful case for a single versus a multi-cloud strategy - arguing that distinctive clouds are less cozy, greater complicated and greater expensive. whereas credible in its place, the fact is multi-cloud is like multi-supplier. There’s not a procurement czar inside of each enterprise so one can dictate a single cloud. As such if AWS sees an opportunity to manage assorted clouds it is going to enter the house in our view.

    final ideas

    the brand new “innovation cocktail” combines statistics + AI + Cloud. a common records model brings a competitive knowledge in the digital world. laptop intelligence (AI) applied to data drives insights and cloud enables scale and attracts innovation via ecosystems. IBM is combining these three points to compete within the next chapter of know-how industry increase.

    IBM, like Microsoft, is cloudifying its choices to assist its valued clientele’ digital transformations. with the aid of bringing the cloud to its products, building facts networks with shoppers, applying AI far and wide and leveraging purple Hat, it could catalyze a brand new class of enterprise developers and go difficult after the multi-cloud probability that exists.

    We trust, besides the fact that children, that the multi-cloud world may be messy. today, multi-cloud is as a good deal a multi- (cloud) dealer occurrence versus a deliberate method. then again, consumers will continue to choose horses for lessons - which means the appropriate cloud for the right workload - and that allows you to inevitably result in diverse clouds and alternatives for simplified administration, safety, governance, and statistics leverage.

    today, about half of IBM’s income comes from so-known as Strategic Imperatives. That piece must develop faster than the other half declines. furthermore, about sixty percent of IBM’s income comes from consulting and professional functions. The good information there is it offers IBM deep visibility and relationships into practically all global industries. The downside is that company doesn’t scale as neatly. As such IBM’s most efficient electricity is its most useful problem. The wonderful opportunity facing IBM is to codify that deep trade capabilities in utility, using information as the key ingredient for brand new company functions developed on cloud-native PaaS tooling - and scaling to the cloud, any cloud.  

    it really is a differentiable story and one that protects IBM from getting Amazon’d whereas at the identical time enabling the business to drive margin improvements over time. IBM’s Rometty has spent the last 5-6 years preparing the business for this next chapter.

    Now huge Blue needs to exhibit that Elephants can dance, sprint and run marathons.

    comply with the entire IBM consider 2019 reside video coverage here: https://www.thecube.web/ibmthink2019

    ship us feedback on Twitter @furrier @dvellante


    While it is very hard task to choose reliable certification questions / answers resources with respect to review, reputation and validity because people get ripoff due to choosing wrong service. Killexams.com make it sure to serve its clients best to its resources with respect to exam dumps update and validity. Most of other's ripoff report complaint clients come to us for the brain dumps and pass their exams happily and easily. We never compromise on our review, reputation and quality because killexams review, killexams reputation and killexams client confidence is important to us. Specially we take care of killexams.com review, killexams.com reputation, killexams.com ripoff report complaint, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. If you see any false report posted by our competitors with the name killexams ripoff report complaint internet, killexams.com ripoff report, killexams.com scam, killexams.com complaint or something like this, just keep in mind that there are always bad people damaging reputation of good services due to their benefits. There are thousands of satisfied customers that pass their exams using killexams.com brain dumps, killexams PDF questions, killexams practice questions, killexams exam simulator. Visit Killexams.com, our sample questions and sample brain dumps, our exam simulator and you will definitely know that killexams.com is the best brain dumps site.

    [OPTIONAL-CONTENTS-2]


    HP0-738 questions answers | 7591X dumps questions | C9520-422 free pdf | BI0-132 brain dumps | MOS-W3C real questions | C2120-800 free pdf download | PRINCE2-Practitioner braindumps | 156-215-71 questions and answers | C2040-917 cram | 000-641 braindumps | 642-457 practice exam | 212-065 practice test | 310-540 study guide | C2090-549 study guide | C9020-568 Practice test | HP0-176 exam prep | 000-299 study guide | P2070-072 test prep | C9560-654 exam questions | 000-086 practice questions |


    Murder your C9560-659 exam at first attempt!
    We are doing great struggle to provide you with actual Fundamentals of Applying IBM SmartCloud Control Desk V1 exam questions and answers, along explanations. Each Q&A on killexams.com has been showed by means of IBM certified experts. They are tremendously qualified and confirmed humans, who have several years of professional experience recognized with the IBM assessments. They check the question according to actual test.

    The quality way to get success in the IBM C9560-659 exam is which you should get dependable braindumps. We guarantee that killexams.com is the most direct pathway towards IBM Fundamentals of Applying IBM SmartCloud Control Desk V1 exam. You may be effective with full fact. You can see loose questions at killexams.com earlier than you purchase the C9560-659 exam objects. Our brain dumps are in one of a kind choice the same as the actual exam design. The questions and answers made via the certified professionals. They come up with the revel in of taking the actual exam. A hundred% guarantee to pass the C9560-659 real exam. killexams.com Huge Discount Coupons and Promo Codes are as beneath;
    WC2017 : 60% Discount Coupon for all exams on internet site
    PROF17 : 10% Discount Coupon for Orders greater than $69
    DEAL17 : 15% Discount Coupon for Orders greater than $ninety nine
    DECSPECIAL : 10% Special Discount Coupon for All Orders
    Click http://killexams.com/pass4sure/exam-detail/C9560-659

    If you are looking for C9560-659 Practice Test containing Real Test Questions, you are at right place. We have compiled database of questions from Actual Exams in order to help you prepare and pass your exam on the first attempt. All training materials on the site are Up To Date and verified by our experts.

    killexams.com provide latest and updated Practice Test with Actual Exam Questions and Answers for new syllabus of IBM C9560-659 Exam. Practice our Real Questions and Answers to Improve your knowledge and pass your exam with High Marks. We ensure your success in the Test Center, covering all the topics of exam and build your Knowledge of the C9560-659 exam. Pass 4 sure with our accurate questions.

    100% Pass Guarantee

    Our C9560-659 Exam PDF contains Complete Pool of Questions and Answers and Brain dumps checked and verified including references and explanations (where applicable). Our target to assemble the Questions and Answers is not only to pass the exam at first attempt but Really Improve Your Knowledge about the C9560-659 exam topics.

    C9560-659 exam Questions and Answers are Printable in High Quality Study Guide that you can download in your Computer or any other device and start preparing your C9560-659 exam. Print Complete C9560-659 Study Guide, carry with you when you are at Vacations or Traveling and Enjoy your Exam Prep. You can access updated C9560-659 Exam Q&A from your online account anytime.

    nside seeing the bona fide exam material of the brain dumps at killexams.com you can without a lot of an extend develop your claim to fame. For the IT specialists, it is basic to enhance their capacities as showed by their work need. We make it basic for our customers to carry certification exam with the help of killexams.com confirmed and honest to goodness exam material. For an awesome future in its domain, our brain dumps are the best decision. A best dumps creating is a basic segment that makes it straightforward for you to take IBM certifications. In any case, C9560-659 braindumps PDF offers settlement for candidates. The IT assertion is a critical troublesome attempt if one doesnt find genuine course as obvious resource material. Thus, we have genuine and updated material for the arranging of certification exam. It is fundamental to collect to the guide material in case one needs toward save time. As you require packs of time to look for revived and genuine exam material for taking the IT certification exam. If you find that at one place, what could be better than this? Its simply killexams.com that has what you require. You can save time and maintain a strategic distance from trouble in case you buy Adobe IT certification from our site.

    killexams.com Huge Discount Coupons and Promo Codes are as under;
    WC2017 : 60% Discount Coupon for all exams on website
    PROF17 : 10% Discount Coupon for Orders greater than $69
    DEAL17 : 15% Discount Coupon for Orders greater than $99
    DECSPECIAL : 10% Special Discount Coupon for All Orders


    Download your Fundamentals of Applying IBM SmartCloud Control Desk V1 Study Guide immediately after buying and Start Preparing Your Exam Prep Right Now!

    [OPTIONAL-CONTENTS-4]


    Killexams M2150-810 test prep | Killexams M70-301 Practice Test | Killexams 9A0-064 real questions | Killexams MB6-527 cheat sheets | Killexams 250-308 test questions | Killexams LOT-916 practice questions | Killexams 650-159 braindumps | Killexams 1Z0-449 mock exam | Killexams 500-275 exam prep | Killexams EX0-105 dumps | Killexams 000-646 practice exam | Killexams 1Y0-A20 questions and answers | Killexams HP0-733 pdf download | Killexams C2030-284 dump | Killexams MK0-201 questions answers | Killexams 050-854 VCE | Killexams 000-M78 practice questions | Killexams STAAR test prep | Killexams 1Z0-963 free pdf | Killexams M2020-620 free pdf |


    [OPTIONAL-CONTENTS-5]

    View Complete list of Killexams.com Brain dumps


    Killexams 000-M48 test prep | Killexams M2150-756 practice exam | Killexams HP0-216 free pdf download | Killexams 1Y0-230 VCE | Killexams BCB-Analyst brain dumps | Killexams 00M-240 practice questions | Killexams FN0-405 Practice Test | Killexams ACF-CCP free pdf | Killexams M8060-729 dumps | Killexams HP0-S40 questions and answers | Killexams 200-310 real questions | Killexams HPE2-T27 cram | Killexams TT0-101 dumps questions | Killexams 310-091 braindumps | Killexams MORF test prep | Killexams 310-100 questions answers | Killexams TB0-105 pdf download | Killexams 9L0-613 examcollection | Killexams HPE2-T34 dump | Killexams CSCP exam prep |


    Fundamentals of Applying IBM SmartCloud Control Desk V1

    Pass 4 sure C9560-659 dumps | Killexams.com C9560-659 real questions | [HOSTED-SITE]

    Ask HN: Who is hiring? (April 2014) | killexams.com real questions and Pass4sure dumps

    Ask HN: Who is hiring? (April 2014) 337 points by whoishiring on Apr 1, 2014 | hide | past | web | favorite | 531 comments Please lead with the location of the position and include the keywords INTERN, REMOTE, or VISA if the corresponding sort of candidate is welcome. Feel free to post any job that may interest HN readers from executive assistant to machine learning expert to CTO.

    Also see: Ask HN: Freelancer? Seeking freelancer? (April 2014) http://news.ycombinator.com/item?id=7507753


    Binders in my office | killexams.com real questions and Pass4sure dumps

    G.Chiozzi's Binders

    This section is an index of the contents of the document binders in my office. You can find here copies of ESO documents, presentations, articles and manuals of application.

    The most usefull section is probably the one describing the binders with my collection of articles. They are ordered by topics and are copies or original of the most interesting technical things I read every month.

    Every binder is identified by a letter and a number.

    Note: All entries are kept in a single file, to make searching easier. Unfortunately the drawback is that the document is quite big, making it boring to download from a remote site.

    Index: Generic ESO Documents. Programming standards Bind Title Number -------------------------------------------------------------------------- ESO1 ESO Software Policy GEN-POL-ESO-00000-3011 ESO1 Templates for documents Generic VLT Documents. Programming standards Bind Title Number -------------------------------------------------------------------------- A1 VLT Level 1 Requirements VLT-SPE-ESO-00000-1423 A1 VLT Software Concept Specification VLT-SPE-ESO-10000-0010 A1 VLT Software Requirements Specification VLT-SPE-ESO-10000-0011 A1 VLT Software Management Plan VLT-PLA-ESO-00000-0006 A1 VLT Software Programming Standards VLT-PRO-ESO-10000-0228 A1 VLT Software Guidelines for the Dev. Appl. Soft. VLT-MAN-ESO-17210-0667 A1 Graphical User Interface Common Conventions VLT-SPE-ESO-17210-0266 A1 VLT Electronic Design Specification VLT-SPE-ESO-10000-0015 A1 VLT Software Documentation Review Procedure VLT-PRO-ESO-10000-0201 A1 VLT Directive for Preparation of Acceptance Test VLT-INS-ESO-00000-1091 A1 VLT Software FrameMaker Conventions VLT-INS-ESO-00000-0541 A1 Software Engineering for the VLT project (slides) A1 Programming in C++. Rules and Recommendation - ELLEMTEL A1 Reccomented C style and coding standards - L.W.Cannon et al., 1990 A1 Purify and PureCoverage presentation In a separate satchel: -- ESO Safety Program (Safety, Health and Env. Prot.) SAF-POL-ESO-00000-0001 -- Safety Instructions: working beneath M1 Mirror VLT-INS-ESO-00000-0537 VLT Software User Manuals Bind Title Number -------------------------------------------------------------------------- A2 VLT Integration Plan VLT-PLA-ESO-10000-0936 A2 VLT Integration general presentation A2 VLT Commissioning Plan VLT-PLA-ESO-10000-0937 A2 VLT Control Room Layout VLT-VEL-ESO-00096-0042 A2 VLT On-Line Data Flow Requirement Specification VLT-SPE-ESO-19000-0749 A2 VLT Data Products Checking Tool User Req. VLT-SPE-ESO-19000-1608 A2 Draft req. for VLT log file analysis tools Memorandum 14/01/97 A2 Draft Engineering Logs requirements specification VLT-SPE-ESO-xxxxx/xxxx A2 ESO Milan Lan Link Vertical Services Proposal ESO-VS-MILAN/001/1/TW/Serco A2 ESO World Wide Web Project ESO-MAN-ESO-00000-1306 A2 VLT Common Software Survey B3/1 TCS UT Book VLT-MAN-ESO-10200-1634 B3/1 TCS Requirements Specification VLT-SPE-ESO-10000-0200 B3/1 TCS Requirements on Star Catalogue System VLT-SPE-ESO-17230-0640 B3/1 TCS ICD TCS - Star Catalogue system VLT-ICD-ESO-17230-0641 B3/1 TCS ICD TCS - Instrumentation Software VLT-ICD-ESO-17240-17230 B3/1 TCS ICD TCS - Cassegrain and Nasmyth Adapter-Rota VLT-ICD-ESO-11400-17230 B3/4 TCS Telescope Control System User Manual VLT-MAN-ESO-17230-0942 B3/4 TCS Integration Module - tcsBUILD User Manual VLT-MAN-ESO-17230-1541 B3/4 TCS Interface Design Description VLT-SPE-ESO-17230-0941 B3/4 TCS Auto Guide Design Description VLT-SPE-ESO-17230-0933 B3/4 TCS Atmosferic Dispersion Corrector DD VLT-SPE-ESO-17230-1046 B3/4 TCS Enclosure Coordination Module DD VLT-SPE-ESO-17230-1040 B3/4 TCS Pointing Modelling DD VLT-SPE-ESO-17230-nnnn B3/4 TCS Astronomical Site Monitor Contro. Soft. FS VLT-SPE-ESO-17441-1175 B3/5 Coude' LCU Control Software Func. Spec. VLT-SPE-ESO-11520-0708 B3/5 Coude' Control Software User Manual VLT-PLA-ESO-11520-0760 B3/5 Coude' Control Software Acceptance Test Plan VLT-PLA-ESO-11520-0762 B3/5 Hydrostatic Bear. and Cooling Sys. Func. Spec. VLT-SPE-ESO-11320-0931 B3/5 Hydrostatic Bear. and Cooling Sys. Des. Desc. VLT-SPE-ESO-11320-0964 B3/5 Adapter-Rotator LCU Control Software Func. Spec. VLT-SPE-ESO-11400-0940 B3/5 Nasmith Adapter Rotator Nr.3 System Performance.. VLT-TRE-ESO-11423-1318 B3/5 TCS Chopping and M2 Coordination DD VLT-SPE-ESO-17230-1360 M2 Software Documents Bind Title Number -------------------------------------------------------------------------- B3/6 VLT M2 Technical Specification VLT-SPE-ESO-11200-0340 B3/6 VLT M2 Software Requirements Specification VLT-SPE-ESO-11200-0002 B3/6 VLT M2 Software Functional Specification VLT-SPE-DOR-11200-0010 B3/6 VLT M2 Software Design Description VLT-SPE-DOR-11200-0011 B3/6 VLT M2 Software Tilt/Chopping User Manual VLT-SPE-DOR-11200-0003 B3/6 VLT M2 Software User Manual VLT-SPE-DOR-11200-0004 VLT Guide/FS/M2 docs Bind Title Number -------------------------------------------------------------------------- B3/7 Overview of Chopping and Field Stab. Modes VLT-TEL-93/0244 B3/7 A first assessment of field stabilization perf. VLT-TRE-ESO-11000-0695 B3/7 Image motion due to telescope excitation by wind VLT-TRE-ESO-11000-0854 B3/7 Influence of sensor delay on field stab. perf.. VLT-TRE-ESO-11000-1097 B3/7 Tracking analysis at NTT, T.Erm B3/7 Analysis of Tracking Performance, T.Erm B3/7 A Guide to Better Autoguiding, T.Erm B3/7 Star tracking with Kalman Filter, T.Erm B3/7 VLT Pointing and Tracking Simulations with M2 Compensation, B.Jensen B3/7 VLT Subject to Wind Gusts, B.Jensen B3/7 Telescope Performance Evaluation, 1998 ESO Conference on VLT B3/7 Notes and emails on guiding/field stabilisation/chopping VLT HOS Software Bind Title Number -------------------------------------------------------------------------- B4 VLT LAN's Specification VLT-SPE-ESO-17120-0270 B4 TR on Curr. Status of VLT Lan Specific. and Req. VLT-TRE-ESO-17120-0969 B4 Final Lay-out of VLT Control LANs VLT-SPE-ESO-17120-1355 B4 Final Lay-out of VLTI Control LANs VLT-SPE-ESO-15410-1957 B4 HOS Functional Specification VLT-SPE-ESO-17230-0001 B4 HOS/Sequencer Functional specification VLT-SPE-ESO-17220-0314 B4 HOS/Sequencer Design Description VLT-SPE-ESO-17220-0736 B4 Remote Operation Software Functional specification VLT-SPE-ESO-18000-0001 B4 Real-Time Display Software Specification VLT-SPE-ESO-17240-0250 B4 ICD between VLT Control Software and OHS VLT-SPE-ESO-17240-19200 B4 BOSS / Base OS Stub Design Description VLT-SPE-ESO-17240-1925 VLT LCU Software/Drivers Bind Title Number -------------------------------------------------------------------------- B5 Local Control Unit Software Specification VLT-SPE-ESO-17210-0002 B5 LCU Common Software Specification for phase 2 VLT-SPE-ESO-17210-0711 B5 LCU Diagnostic Software Specification VLT-SPE-ESO-17210-0743 B5 LCU Application Server Framework LSF Re. Spec VLT-SPE-ESO-17210-2860 B5 LCU Application Server Framework LSF Det. Design VLT-SPE-ESO-17210-2051 B5 LCU Common Software Server Framework User Man VLT-MAN-ESO-17210-2252 B5 Tools dfor Advanced Control Design Desc. VLT-SPE-ESO-17210-2630 B5 Technical Report on Writing LCU Applications N-TRE-ESO-100-006 B5 Motor Control module User Manual (part II -SDL) VLT-MAN-ESO-17210-0776 B5 Motor Control module Acceptance Test Plan VLT-VER-ESO-17210-0598 B5 Motor Control module Acceptance Test Report VLT-VER-ESO-17210-0599 B5 Tech. Rep. on evaluation of LCU Ethernet Boards VLT-TRE-ESO-17130-1368 B5 NET-1 Ethernet Interface Driver User Manual VLT-MAN-ESO-17210-1369 B5 VMIVME-5576 Reflective Memory Board Driver Spe. VLT-SPE-ESO-15400-1374 B5 Tech. Rep on Future LCU HW Architecture VLT-TRE-ESO-17130-1806 VLT CCS Design Documents Bind Title Number -------------------------------------------------------------------------- B6 CCS Functional Specification VLT-SPE-ESO-17210-0001 B6 CCS/User Interface Functional Specification VLT-SPE-ESO-17210-0225 B6 CCS Design Description VLT-SPE-ESO-17210-0419 B6 CCS Scan System Design Description VLT-SPE-ESO-17210-0557 B6 CCS On Line Database Design Description VLT-SPE-ESO-17210-0552 B6 CCS Message System Design Description VLT-SPE-ESO-17210-0560 B6 CCS Logging System Design Description VLT-SPE-ESO-17210-0554 B6 CCS Error System Design Description VLT-SPE-ESO-17210-0553 B6 CCS Alarm System Design Description VLT-SPE-ESO-17210-0782 B6 CCS Stress Test System VLT-SPE-ESO-17210-1157 B6 Access and Configuration Control Design Desc. VLT-SPE-ESO-17230-0906 VLT Instrumentation Software Bind Title Number -------------------------------------------------------------------------- B7 VLT Instrumentation Software Specification VLT-SPE-ESO-17212-0001 B7 INS Common Software Specification VLT-SPE-ESO-17240-0385 B7 Set-up Files and FITS Log Handling - slx Design D. VLT-SPE-ESO-17240-0666 B8 UVES Software Requirement and Func. Spec. VLT-SPE-ESO-13200-0001 B8 UVES Control Software Architectural Des. Desc. VLT-SPE-ESO-13200-0002 B8 NTT Upgrade-Software - EMMI Functional Spec. N-SPE-ESO-112-014 B8 NTT Upgrade-Software - EMMI Design Description N-SPE-ESO-112-039 B8 ISAAC Software Specification VLT-SPE-ESO-14100-0556 B8 ISAAC ICS Design Description VLT-SPE-ESO-14100-0851 B8 ISAAC ICS Design Description VLT-SPE-ESO-14100-0851 B8 ISAAC/SOFI Observation Software User Manual VLT-SPE-ESO-14100-1510 B8 ISAAC Installation Tool for the ISSAC SW UM VLT-MAN-ESO-17240-1759 B8 VLT Test Camera Software Design Description VLT-SPE-ESO-11960-1092 B8 VLT Test Camera ICS User and Maint Manual VLT-MAN-ESO-11960-1608 B8 FITS Headers for the VLT Test Camera, Int. Memo BL-st/9-98 VLT CCS Technical Reports Bind Title Number -------------------------------------------------------------------------- B9 CCS Stress Test System User Manual VLT-TRE-ESO-17210-1345 B9 Tech. Rep. on CCS performance VLT-TRE-ESO-17210-0699 B9 Tech. Rep. on CCS Scan System Performance Test VLT-TRE-ESO-17210-0840 B9 Tech. Rep. on CCS Performance of MAY97 release VLT-TRE-ESO-17210-1344 B9 Tech. Rep. on the Protocol Converter Dec95-May97 VLT-TRE-ESO-17210-1364 B9 Tech. Rep. on YEAR200 Compliance, guidelines for VLT-TRE-ESO-17210-1704 B9 Tec. rep. on Investigation of future LCU HW Arc. VLT-TRE-ESO-17130-1806 B9 Tec. rep. on usage of investigation tools to support environment behaviour debugging VLT-TRE-ESO-xxxxx-xxxx VLT CCD Control Software Bind Title Number -------------------------------------------------------------------------- B10 CCD Detectors Control Software Functional Spec. VLT-SPE-ESO-17240-0227 B10 CCD Detectors Control Software Design Description VLT-SPE-ESO-17240-0601 B10 CCD prototype SW - On-Line Test Report VLT-ELE-0031/95 B10 Tech. Rep. on Image Processing Algorithms for TCCD VLT-TRE-ESO-17240-1689 NTT Telescope Bind Title Number -------------------------------------------------------------------------- N0 NTT Control System High Level Description N-MAN-ESO-000-079 N0 NTT Upgrade-Software - TCS Func. Spec. N-SPE-ESO-109-033 N0 NTT Upgrade-Software - TCS System Archit. Desc. N-SPE-ESO-109-034 N0 NTT Computer Console and Network Spec. N-SPE-ESO-111-057 N0 NTT TCS Integration User Manual N-MAN-ESO-111-067 N0 NTT Upgrade Big Bang Book - Part 1 N-SPE-ESO-100-068 N0 NTT Upgrade Big Bang Book - Part 2 N-SPE-ESO-100-072 N0 Tech. Rep. on Interfacing CAMAC to VLT N-TRE-ESO-112-011 ALMA Planning and Meetings Bind Title Number -------------------------------------------------------------------------- AL0 Generic docs and emails AL0 European SW Meeting 27/10/1999 AL0 ESO ALMA Day slides, 15/12/1999 AL0 Antenna API - An Antenna Motion API for the ALMA AL0 Real Time OS - Choice of RTOS for ALMA, P.T.Wallace - Choice of RTOS for ALMA - Another View, J.M.Stewart ALMA Contracts and Collaborations Bind Title Number -------------------------------------------------------------------------- AL0b Cosylab AL0b AOT Trieste AL0b CERN Laser ALMA Generic Documents Bind Title Number -------------------------------------------------------------------------- AL1 ALMA SW Science Requirements and Use Cases (2001-05-03) AL1 ALMA Initial Software Analysis (2001-02-22) AL1 ALMA System Software Architecture Specification (2001/12/05 AL1 ALMA Project Book, CVhap 12, Computing (2000-09-29) AL1 MilliMeter Array (MMA) Project Book AL1 Monitor and Control Points for the MMA (MMA memo #1) AL1 ALMA Monitor and Control Bus Requirements (MMA memo #5) AL1 ALMA Monitor and Control System (MMA memo #6) AL1 ALMA Monitor and Control Bus Draft Interface Spec (memo #7) AL1 ALMA Monitor and Control Bus Slave Node Implem. Guide AL1 ALMA Monitor and Control Frequently Asked Questions AL1 Operating the VLA, the VLBA and the MMA (MMA memo #258) (2001-04-30) AL1 ALMA Antenna Mount Requirements and Use Cases R.Heald A.Perrigouard (2000-10-07) AL1 A telescope pointing algorithm for ALMA (ALMA memo#366) AL1 ALMA Operational Issues (2001-01-25) AL1 ALMA Software and Hardware Standards AL1 ALMA Software Documentation Standard AL1 ALMA C Coding Standards AL1 ALMA C++ Coding Standards AL1 Suggested SW Engineering Practices, ALMA Phase 1 AL1 ALMA Software Glossary 2000-05-21 ALMA Test Interferometer Bind Title Number -------------------------------------------------------------------------- AL2 An Antenna Motion API for ALMA (+comments from GCH. B.Glendenning, R.Heald, S.Scott, F.Stauffer 1999-10-20 AL2 ALMA Test Interferometer Project Book (2000-02-03) AL2 ALMA Test Interferometer Control Software Requirements (2001-02-15) AL2 ALMA Test Interferometer Control Software Design Concept (2001-11-16, 2001-02-15) AL2 Comments on TICS Requirements/Design Concept AL2 ALMA Tech. Rep. on SW Engineering Activity AL2 ALMA Test Correlator Control Computer Software Design (2000-03-08) AL2 ALMA Test Correlator Engineering UI Notes (2001-02-21) AL2 ALMA Test Interferometer Raw Data Format (2001-04-26) AL2 Generic Monitor and Control Points - ALMA.08002.006 AL2 Nutator/Monitor and Control ICD - ALMA03003.08002.0013 AL2 TIX Client Server Design AL2 ALMA TICS installation procedures and notes AL2 DB2 installation ALMA Common Software Bind Title Number -------------------------------------------------------------------------- AL3 ACS SW Development Plan AL3 ACS Planning AL3 Minutes of meeting and various documents on the IJS collaboration AL3 The Control System for the Accelerator of ANKA B.Jeram et al. EPAC98 AL3 The CORBA IDL Interfaces for Accelerator Control. ACI DRAFT Version 3 EPAC98 AL3 Implementing Distributed Controlled Objects with CORBA M.Plesko PCaPAC99 AL3 Java Beans of Accelerator Devices for Rapid Application Development M.Plesko, G.Tkacik, M.Dach, S.Hunt PCaPAC99 AL3 The CORBA IDL Interface for Accelerator Control M.Plesko PCaPAC99 AL3 A Control System based on Web, Java, CORBA and fieldbus technologies M.Dach et al. PCaPAC99 AL3 I/O Control with PC and Fieldbus K.Kenda et al. PCaPAC99 AL3 Distributed Components in Control B.Jeram et al ICALEPCS '99, Trieste AL3 High Performance Control Applications with Java M.Sekoranja et al. PCaPAC2000 AL3 Managing the development of a new Control System J.Dovc et al. PCaPAC2000 AL3 How to build professional control system applications M.Plesko PCaPAC2000 AL3 ANKA Control System takes control J.Dovc PCaPAC2000 AL3 A Guerrilla approach to Control System Development M.Plesko et al. ICALEPCS 2001 AL3 The Control System Modeling Language K.Zagar et al. ICALEPCS 2001 AL3 Experiences with advanced CORBA services G.Milcinski et al. ICALEPCS 2001 AL3 Visual DCT - Visual EPICS Database Configuration Tool M.Sekoranja et al. ICALEPCS 2001 AL3 New ABeans for TINE Java Control Applications J.Dovc et al. ICALEPCS 2001 AL3 ANKA ACS Installation Report AL3 Trieste collaboration AL3b ALMA Common SW Technical Requirements (2000-06-05 and older) AL3b ALMA Common SW Feature List (1999-11-20) AL3b ALMA Common SW Architecture 2.0 and Notes (comments) AL3b Notes for ACS Logging and Archiving AL3b ACS Time System AL3b ALMA Project - Tech. Rep. on Common software platform, G.Raffi LSA-TRE-ESO-10000-0300 AL3b Device Requirements and Use Cases R.Heald, 2000-05-09 AL3b ALMA Joint SW Meeting, ACS Status Slides, 03/04/2000 AL3b VLT Common SW Survey draft AL3b Common SW minutes of meetings and presentations AL3c ACS Errors and Alarms - Design and Initial Implem. of Diagnostic and Error Reporting System of SMA Q.Zhang, SMA Technical Memo 132, 01/1999 - Fault Detection in the Caltec Millimeter Array R.P.Finch, S.L.Scott Astr. Soc. of Pacific, 108:714-717, 1996 August AL3c ACS and Offline: Task, Parameters, etc. - Data Analysis Framework Requirements D.Schiebel 2004-03-29 - ACS-AIPS++ Integration Report ALMA Offline Subsystem 2004-04-13 - Scalable Data Analysis Framework (Draft) D.Tody 2004-04 - Comments on Scalable Data Analysis Framework G.Chiozzi 2004-04-30 - Protopipeline Review Meeting Summary L.Davis 2004-05-08 - PC-IRAF v2.12 Installation Guide D.Tody M.Fitzpatrick IRAF Group May 2002 - PyRAF v.1.1.1 Source Release. Installation Instructions Space Telescope Science Institute 2004-06-01 AL3c ACS Bulk Data - ACS Bulk Data Transfer examples (old printout). - CORBA Audio/Video Streams Specification OMG - The Design and Performance of a CORBA Audio/Video Streaming Service S.Mungee, N.Surendranm D.C.Schmidt AL3c ACS Performance tests - Real Time Event Channel Performance on a Submarine Communications Network A.C.Weaver - ACS Perofrmance PPT presentation Cosylab 1st ACS Workshop, March 2004 - ACSBenchmarking suite User's Documentation Cosylab March 2004 - Usability of ACS-3.0 Notification Channel D.Wischolek Uni Bochum March 2004 AL3c CDB - Implementing a COnfiguration Database Browser H.Raffi BSc Degree in Computing Science supervised by Prof. Brueggeman-Klein (TUM), G.Chiozzi (ESO) 2003-11-10 AL4 ACS Installation CDs and procedures AL4 ACS and AMS Kitt Peak 2000 Test AL4 Kitt Peak 1999: ESO Common Software Demonstration Project - Statement of Work - Test Procedure - Kitt Peak Test Plan - Test Procedure - Regenerate SW Info and docs on other Radio Telescopes Bind Title Number -------------------------------------------------------------------------- AL5 IRAM 30-m Telescope Spectral Line On-The-Fly Mapping AL5 The 30m Manual - IRAM AL5 Submillimeter Frontend & Backend Control Commands D.Muders, J.Hatchell, R.Lemke, M.Olberg, H.Hafok 2001-11-08 ALMA - SW Development Plans Bind Title Number -------------------------------------------------------------------------- AL7 ALMA Computing Phase 2 Kick-Off Meeting, Apr 23-25 2002 AL7 SW Computing Plan AL7 SW Dev. Plan. for Science SW Requirements AL7 SW Dev. Plan. for SW Engineering Plan AL7 SW Dev. Plan. for Executive Subsystem AL7 SW Dev. Plan. for Control Software AL7 SW Dev. Plan. for Correlator Subsystem AL7 SW Dev. Plan. for Pipeline Software Subsystem AL7 SW Dev. Plan. for Dynamic Scheduler Subsystem AL7 SW Dev. Plan. for Proposal Observation Preparation AL7 SW Dev. Plan. for Off-Line Data Reduction AL7 SW Dev. Plan. for Data Reduction UI AL7 SW Dev. Plan. for Telescope Calibration SW AL7 SW Dev. Plan. for Pipeline SW ALMA - Papers and Presentations Bind Title Number -------------------------------------------------------------------------- AL10 The ALMA Common Software (ACS) as a basis for a distributed software development G.Raffi, G.Chiozzi, B.Glendenning ADASS XI, Victoria BC, Canada, Sep. 2001 AL10 Common Software for the ALMA Project G.Chiozzi et al. ICALEPCS 2001, San Jose, CA, USA, Nov.2001 AL10 Distributed Control System for the Test Interferometer of the ALMA Project M.Pokorny et al. ICALEPCS 2001, San Jose, CA, USA, Nov.2001 AL10 ALMA Software G.Raffi ESO Wide Review 2002 Telescope pointing and Tracking Bind Title Number -------------------------------------------------------------------------- B11 Geometrical Transformations for the Gemini Telescope B11 Gemini Pointing Algorithms B11 Proposals for Keck Telescope Pointing Algorithms, P.T. Wallace B11 Telescope Pointing Machine Specification v.1.7 B11 VLT TCS Pointing, various notes B11 TPoint and Slalib reference B11 Field and pupil rotations for the VLT unit tel. VLT Rep No.63 B11 Optics: papers/book chapters on pupils, stops and so on Other Telescopes Bind Title Number -------------------------------------------------------------------------- B12 Gemini Design Description B12 Gemini Lessons Learned Workshop B12 The SOFIA Mission Control Subsystem Software B12 VST FDR Section 9 TCS VST-FDR-Control-Software-rel-1.0 B12 Keck Telescope Control System slides - ADASS'99 conference B13 Gran Telescopio Canarias, Conceptual Design B13 GTC CS - Development Case RPT/CTRL/0075-R B13 GTC CS - Enclosure and Services UC model survey ESP/CTRL/0033-R B13 GTC CS - Secondary Mirror UC model survey ESP/CTRL/0034-R B13 GTC CS - Configuration Service UC model survey ESP/CTRL/0035-R B13 GTC CS - Primary Mirror UC model survey ESP/CTRL/0039-R B13 GTC CS - Evaluation of ORBs for the GTC CS RPT/CTRL/0070-R Generic Object Oriented Bind Title Number -------------------------------------------------------------------------- OO1 OOWG Comunications OO1 Evaluations of software tools and libraries OO1 String mailing list OO1 Bibliography and books reviews OO1 The annual JOOP listing of OOP books & videos, JOOP Sept 96 OO1 The annual JOOP listing of OOP books & videos, JOOP Sept 97 OO1 University Video Communications OO1 OOWG Presentations' transparencies OO1 Use Cases For Requirements Capture and Tracing G.Chiozzi, Tutorial at ICALEPCS'99, Trieste, 04/10/1999 OO1 Use Cases For Requirements Capture and Tracing and UML as a standard modeling language for SW projects G.Chiozzi, ESO IT Talk #1, Garching, 09/12/1999 Papers on Object Oriented Design Binder: OO2 -------------------------------------------------------------------------- J.Odell - Approaches to finite-state machine modeling - JOOP, Jan 1995 G.Booch J.Rumbaugh - Introduction to the Unified Method. Unifying the Booch & OMT Methods. Slides. J.Rumbaugh - OMT: The object Model - JOOP, Jan 1995 J.Rumbaugh - Taking things in context: using composites to build models - JOOP Nov/Dec 1995 J.Rumbaugh - To form a more perfect union: Unifying the OMT and Booch methods - JOOP Jan 1996 J.Rumbaugh - Introduction to the Unified Method: unifying the Booch and OMT methods - slides of CERN talk Nov 1996 J.Rumbaugh - A state of mind: modeling behaviour - JOOP July-August 1996 J.Rumbaugh - A matter of intent: How to define subclasses- JOOP Sept 1996 M.Ackroyd - Object-oriented design of a finite state machine - JOOP, June 1995 J.A.Campbell V.J.Joseph - The object Oriented Design and Implementation of a Relational Database Managemement System - JOOP, July-August 1995 B.W.Boehm - A Spiral model of Software Development and Enhancement - COMPUTER, May '88 D.D'Souza - Jave: Design and modeling opportunities - JOOP, Sept 1996 A.T.Jolin - Usability and Class Library Design - Dr.Dobb's, Oct. 1996 F.W.Fang A.C.So R.J.Kreindler - The Visual Modeling technique: an introduction and overview - JOOP, July 96 M.Arruat F.Di Maio N.Gomez-Rojo Y.Pujante - Recent Developments in the Application of Object Oriented Technologies in the CERN PS Controls - ICALEPCS 1997, Baijing, China, Nov 1997 L.R.Mattingly H.Rao - Writing Effective Use Cases and Introducing Collaboration Cases JOOP, October 1998 A.Cockburn - Structuring Use Cases with Goals JOOP, Sep-Oct 1997 and Nov-Dec 1997 G.Booch - UML in Action G.Booch, Guest Editor Communication of the ACM, October 1999 UML 2001: A Standardisation Odyssey C.Kobryn Using Patterns in the UML G.Larsen Turning Clockwise: Using UML in the Real-Time Domain B.Selic UMLoquent: Expression of AWACS Software Design A.E.Bell R.W.Schmidt Modeling Web Application Architectures with UML J.Conallen R.C.Martin - Papers from www.objectmentor.com page Design Patterns and Design Principle UML Tutorial: Class Diagrams Collaboration Diagrams Sequence Diagrams Finite State Machines Button, whose got the button? S.W.Ambler - Mapping Objects to Relational Databases,Oct. 2000 http://www.AmbySoft.com/mappingObjects.pdf S.W.Ambler - Mapping Objects to Relational Databases, Nov. 2000 http://www.AmbySoft.com/persistenceLayer.pdf A.Cockburn - The Methodology Space Humans and Technology tech. rep. HaT TR.97.03, 1997 M.M.Lee - Object-Oriented Analysis in the Real World http://www.projtech.com S.J.Mellor - Building and using a work breakdown structure http://www.projtech.com S.J.Mellor - The Case for Using Use Cases http://www.projtech.com S,Shaler, D.Grand, S.J.Mellor - The Project Matrix: a Model for SW Engineering Project Management http://www.projtech.com Papers and documents on Java Binder: OOJC1 -------------------------------------------------------------------------- M.Chavan P.Ballester - First ESO Java Seminar Sun Microsystems - Java IDL Guide B.Morgan - Building Distributed Applications with Java and Corba Dr.Dobb's Journal, Apr. 1998 B.Danilko - A Graphical Java Front End to C++ Programs C/C++ Users Journal, June 1998 S.Singhal, B.Nguyen - The Java Factor Communications of the ACM, June 1998 P.Tyma - Why are we using Java again? Communications of the ACM, June 1998 K.Nilsen - Adding Real-Time capabilities to Java Communications of the ACM, June 1998 D.Brutzman - The Virtual Reality Modeling Language and Java Communications of the ACM, June 1998 H.Lewis - Utilisation of Java Software at the VLT, VLT Internal Report, Sep. 1998 H.Lewis - VLT Seminars on Java 1) Java Beans 2) High level and EPICS engineering GUIs 3) Keck AO User Interface Garching, Aug.-Sep. 1998 ChiMu OO and Java Development: Guidelines and Resources ChiMu Corporation, 1997-1998 Java Code Conventions Sun Microsystems - 1997 G.Hamilton - Java Beans Sun Microsystems - 1997 M.A.Cusumano D.B.Yoffie - What Netscape Learned from Cross-Platform Software Development Communication of the ACM, October 1999 L.Prechelt - Comparing Java vs. C/C++. Efficiency Differences to Interpersonal Differences Communication of the ACM, October 1999 E.Henry, E.Lycklama - How do you plug Java memory leaks? Dr.Dobb's Journal, February 2000 J.Amsterdam - Java References Dr.Dobb's Journal, February 2000 The Real-Time Specification for Java The Real-Time for Java Expert Group g.Bollella et al. Papers and documents on Corba Binder: COR1 -------------------------------------------------------------------------- R.Resendes M.Laukien - Introduction to CORBA Distributed Objects Dr.Dobb's Journal, Apr. 1998 K.Seetharaman - The CORBA Connection Communications of the ACM, Oct. 1998 J.Siegel - CORBA and the OMA in Enterprise Computing Communications of the ACM, Oct. 1998 S.Vinoski - New Features for CORBA 3.0 Communications of the ACM, Oct. 1998 D.C.Schmidt - Evaluating architectures for Multithreaded Object Request Brokers Communications of the ACM, Oct. 1998 M.Henning - Binding, migration and scalability in CORBA Communications of the ACM, Oct. 1998 D.Houlding - A CORBA Bean Framework Dr.Dobb's Journal, Nov. 1998 J.M.Shacklette J.Illian - CORBA Program Development, Part I,II,III Linux Journal, May/June/July 1999 Use Of CORBA in the DFS, ESO Internal Draft, VLT-SPE-ESO-19000-XXXX Patterns and Performance of Real-Time ORBs D.C.Schmidt Applying C++, Pattenrs and Components to Develop an IDL Compiler for CORBA AMI Callbacks A.B.Arulanthu et al. SIGS C++ Report, March 2000 Object Iterconnections, Scalable and efficient architecture for CORBA Asynchronous Messaging A.B.Arulanthu et al. SIGS C++ Report A CORBA Language Mapping for TCL F.Pilhofer Combat F.Pilhofer J.Graybeal et al. - SOFIA's CORBA Experiences: Instances of Software Development Mao's CORBA Browser Writing and Using CORBA Components F.Pilhofer April 2002 CORBA Component Model Tutorial OMG CCM Implementation Group April 2002 CCM Tools Tutorial E.Teiniker, L.Johnson 2004-03-31 OMG Docs - Binder: COR1 OMG IDL Style Guide OMG CORBA Services, 13 - Property Service OMG Time Service Specification OMG Telecom Log Service Specification ACE/TAO Docs - Binder: COR1 The Adaptive Communication Environment: "ACE", a Tutorial U.Syyid Using ACE try Macros to Enhance CORBA Portability Error Handling Chapter 8 from TAO Developer's Guide, OCI ORBacus Docs - Binder: COR2 ORBacus for C++ and Java ORBacus Notify ORBACUS T-Log Papers on other arguments Binder: OO2 -------------------------------------------------------------------------- M.C.Carthy - What is Multi-Threading? - Linux Journal, Feb. 1997 S.Ball - An enchription system for software registration - C/C++ Users Journal, Aug. 1996 D.N.Gray J.Hotchkiss S.LaForge A.Shalit T.Weinberg - Modern languages and Microsoft's Component Object Model Communications of the ACM, May 1998 A.Shah H.Xiao - Using Shared Libraries across Platforms C/C++ Users Journal, May. 1998 S.Chen - The Paradox of Digital Preservation IEEE Computer, March 2001 Collections of papers Binder: OO2 -------------------------------------------------------------------------- COMPUTER October 1992, Special issue on Inheritance & Classification D.C.Rine B.Bhargava - Guest Editors' Introduction: Object Oriented Computing COMPUTER Oct. 1992 P.Wegner - Object-Oriented and Conventional Analysis and Design Methodologies COMPUTER Oct. 1992 B.Meyer - Applying "Design by Contract" COMPUTER Oct. 1992 D.Ungar R.B.Smith C.Chambers C.W.Mercer - Object, Message and Performance: how they coexist in Self COMPUTER Oct. 1992 Y.Ishikawa H.Tokuda C.W.Mercer - An Object Oriented Real-Time Programming Language COMPUTER Oct. 1992 D.L.Wells J.A.Blakeley C.W.Thompson - Architecture of an Open Object-Oriented Database Management System COMPUTER Oct. 1992 P.K.Egbert W.J.Kubitz - Application Graphics Modeling Support Through Object Orientation COMPUTER Oct. 1992 Communications of the ACM Sept. 1994, Special issue on OO Software Testing R.V.Binder - Introduction Communications of the ACM, Sept. 1994 P.J.Jorgensen C.Erickson - Object-Oriented Integration Testing Communications of the ACM, Sept. 1994 G.M.Murphy P.Townsend P.Sze Wong - Experiences with Cluster and Class Testing Communications of the ACM, Sept. 1994 R.M.Poston - Automated Testing from Object Models Communications of the ACM, Sept. 1994 J.D.McGregor T.D.Korson - Integrating Object-Oriented Testing and Development Processes Communications of the ACM, Sept. 1994 T.R.Arnold W.A.Fuson - Testing in a "Perfect World" Communications of the ACM, Sept. 1994 R.V.Binder - Design for Testability in Object Oriented Systems Communications of the ACM, Sept. 1994 Communications of the ACM Oct. 1995, Special issue on OO Experiences and future trends COMPUTER September 1996, Managing OO development B.Sadr P.J.Dousette - An OO Project Managemement Strategy COMPUTER, Oct. 1996 J.D.Williams - Managing Iteration in OO Projects COMPUTER, Oct. 1996 S.Moser O.Nierstrasz - The effect of Object-Oriented Frameworks on developer productivity COMPUTER, Oct. 1996 S.Sparks K.Benner C.Faris - Managing Object-Oriented Framework reuse COMPUTER, Oct. 1996 J.P.Corriveau - Traceability process for large OO projects COMPUTER, Oct. 1996 COMPUTER October 1996, Special Issue: 50 years of computing Communications of the ACM Oct. 1996, Special issue on Software Patterns A.Cockburn - The interaction of Social Issues and Software Architecture Communications of the ACM, Oct. 1996 M.P.Cline - Pros and cons of adopting and applying patterns in the real world Communications of the ACM, Oct. 1996 A.Aarsten D.Brugali G.Menga - Designing concurrent distributed control systems Communications of the ACM, Oct. 1996 M.Fayad M.P.Cline - Aspects of software adaptability Communications of the ACM, Oct. 1996 B.Goldfedder L.Rising - A training experience with patterns Communications of the ACM, Oct. 1996 Communications of the ACM Apr. 1997, The debugging scandal and what to do about it M.Eisenstand - My Hairiest Bug War Stories Communications of the ACM, Apr. 1997 D.Ungar H.Lieberman C.Fry - Debugging and the experience of immediacy Communications of the ACM, Apr. 1997 R.Baecker C.DiGiano A.Marcus - Software visualization for debugging Communications of the ACM, Apr. 1997 C.Fry - Programming on an already full brain Communications of the ACM, Apr. 1997 J.Dominique P.Mulholland - Fostering debugging communities on the Web Communications of the ACM, Apr. 1997 R.N.Smith M.Wolczko D.Ungar - From Kansas to Oz: collaborative debugging when a shared wolr breaks Communications of the ACM, Apr. 1997 Papers on Real-Time Systems Binder: OO2 -------------------------------------------------------------------------- E.D.Jensen - Distributed Real-Time Operating systems - Dr.Dobb's, Feb. 1995 M.J.Choonoles C.C.Gilliam - Real-time object-oriented system design using the object modeling technique (OMT) - JOOP, June 1995 L.Nigro - A real-time architecture based on Shlaer-Mellor object lifecycles - JOOP March-April 1995 T.B.Blakeslee J.Liband - Real time debugging techniques, Embedded Systems Programming, Vol.8 Num.4 B.Marick - A summary of subsystem testing M.Barabanov, V.Yodaiken - Introducing Real-Time Linux - Linux Journal, Feb. 1997 Rational Corp. - Unified Modeling Language For Real-Time Systems Design K.W.Smith - Real-Time Object-Oriented Modeling Dr.Dobb's Journal, Dec. 1997 D.V.Gadre S.Engineer - A Data Acquisition System for Linux Dr.Dobb's Journal, Beb. 1998 T.Ebert - CAP, Control Application Platform 4D-Engineering Real-Time Distributed Object Computing: An Emerging Field IEEE Computer Special Issue, June 2000 G.Bollella - The Real-Time Specification for Java D.C.Schmidt, F.Kuhns - An Overview of the Real-Time CORBA Spec. B.Selic - A Generic Framework for Modeling Resources with UML K.H.Kim - APIs for Real-Time Distributed Object Programming Papers on Software Quality Binder: OO3 -------------------------------------------------------------------------- Quality at Risk as Demand for Training Soars - JOOP Europe Winter 1995 E.Swanstrom - Beyond methodology transfer: OO mentoring meets project management - JOOP March-April 1995 P.Sparaco - Ariane Probe Seeks Cause Of Sudden Pitch and Yaw J.M.Jezequel B.Meyer - Design by Contract: The Lessons of Ariane Computer, Jan. 1997 J.L.Lions - Ariane 5, Flight 501 Failure. Report by the Inquiry Board Paris, Jul. 1996 A.Jock - How Software doesn't work - Byte, December 1995 R.L.Glass - The next date crisis and the ones after that Communications of the ACM, Jan 1997 C.Fox W.Frakes - The Quality Approach: is it delivering? Communications of the ACM, Jun 1997 J.Herbsleb D.Zubrov et al. - Software quality and the Capability Maturity Model Communications of the ACM, Jun 1997 C.Hollenbach R.Young A.Plugrad D.Smith - Combining quality and Software Improvement Communications of the ACM, Jun 1997 L.J.Arthur - Quantum improvements in software system quality Communications of the ACM, Jun 1997 M.A.Cusumano R.W.Selby - How Microsoft builds software Communications of the ACM, Jun 1997 K.Ewisi-Mensah - Critical Issues in Abandoned IS Development Projects Communications of the ACM, Sep 1997 D.Gillibrand K.Liu - Quality Metrics for Object-Oriented Design JOOP Jan. 1998 J.D.McGregor - Quality, Thy Name Is Not Testing JOOP Mar./Apr. 1998 A.K.Onoma W.T.Tsai M.H.Poonawala H.Suganuma - Regression Testing in an Industrial Environment Communications of the ACM, May 1998 R.Comerford T.S.Perry - Brooding on the Year 2000 IEEE Spectrum, June 1998 D.Lefkon B.Payne - Making embedded systems Year 2000 compliant IEEE Spectrum, June 1998 T.O'Reilly - Lessons from Open-Source Software Development Communications of the ACM, April 1999 R.L.Glass - Inspections - Some Surprising Findings Communications of the ACM, April 1999 F.Shull, I.Rus, V.Basili - How Perspective-Based Reading can Improve Requirements Inspection IEEE Computer, July 2000 Papers on Object-Oriented Training Binder: OO3 -------------------------------------------------------------------------- M.Dodani - Object-oriented shock therapy - JOOP, Jul/Aug 1996 M.E.Fayad W.Tsai M.L.Fulghum - Transition to Object Oriented Software Development, Communications of the ACM, Feb. 1996 The Fall 1996 JOOP guide to Education & Training JOOP Oct. 1996 The JOOP Listing of Mentoring and Training Providers JOOP Oct. 98 A.Jaaksi - A Method for Your First Object-Oriented Project JOOP Jan. 1998 M.L.Manns H.Sharp M.Prieto P.McLaughlin - Capturing Successful Practices in OT Education and Training JOOP Mar./Apr. 1998 B.Meyer - Software Engineering in Academy IEEE Computer, May 2001 Papers on Astronomy and Telescope's Control Binder: OO3 -------------------------------------------------------------------------- C.Barbieri F.Rampazzi - TNG e' realta' L'astronomia, Genuary 1996 C.Barbieri - Il Telescopio Nazionale Galileo Il Nuovo Saggiatore, Bollettino della Societa' Italiana di Fisica Vol. 13 Anno 1997 No.4 J.M.Filgueira - A Distributed Object-Oriented Telescope Control System based on RT-Corba and ATM ICALEPCS 1997, Baijing, China, Nov 1997 G.M.Heiligman et al. - The SOFIA Mission Control Subsystem Software 194th meeting of the American Astronomical Society, June 1999 SPIE Cenference - Astronomical Telescopes and Instruments for the 21st century, Kona, Hawaii, 15-16 March 1994 J.E.Nelson P.Gillingham - An Overview of the Performance of the W.M.Keck Observatory SPIE Proceedings vol. 2199, Mar. 1994 P.Wizinowich T.Mast J.Nelson M.DiVittorio - The Optical Quality of the W.M.Keck Telescope SPIE Proceedings vol. 2199, Mar. 1994 R.Cohen T.Mast J.Nelson - Performance of the W.M.Keck Telescope Active Mirror Control System SPIE Proceedings vol. 2199, Mar. 1994 H.Lewis W.Lupton M.Sirota T.Mast J.Nelson - Pointing and Tracking Performance of the W.M.Keck Telescope SPIE Proceedings vol. 2199, Mar. 1994 M.J.Sirota P.M.Thompson - Azimuth/Elevation servo performance of the W.M.Keck Telescope SPIE Proceedings vol. 2199, Mar. 1994 D.Enard - ESO VLT: Status of the main 8m telescopes SPIE Proceedings vol. 2199, Mar. 1994 P.Dierickx - Error budget and expected performance of the VLT main unit telescopes SPIE Proceedings vol. 2199, Mar. 1994 M.J.Cullum D.Enard M.Ravensbergen - Control of image position errors with the VLT SPIE Proceedings vol. 2199, Mar. 1994 M.Quattri et al. - VLT 8m Unit Telescope Main Structure: Design Solutions and Performance Calculation SPIE Proceedings vol. 2199, Mar. 1994 M.Ravensbergen - Main axes servo systems of the VLT SPIE Proceedings vol. 2199, Mar. 1994 B.Gilli - Workstation Environment for the VLT SPIE Proceedings vol. 2199, Mar. 1994 B.Gustafsson - VLT Local Control Unit Real Time Environment SPIE Proceedings vol. 2199, Mar. 1994 SPIE Cenference - Telescope Control Systems, Orlando, Florida 19-21 April 1995 J.W.Percival - Remote observing from the bottom up: the architecture of the WYNE telescope control system SPIE Proceedings vol. 2479, April 1995 D.Mills - WYIN telescope graphical user interfaces SPIE Proceedings vol. 2479, April 1995 K.Wirenstrand - VLT Telescope Control Software, an overview SPIE Proceedings vol. 2479, April 1995 W.Lupton - Software infrastructure for the Keck II telescope SPIE Proceedings vol. 2479, April 1995 C.Bonoli et al. - TNG Control System: computer architecture, interfacing and synchronization SPIE Proceedings vol. 2479, April 1995 M.Ravensberger K.Wirenstrand - Time reference system of the VLT SPIE Proceedings vol. 2479, April 1995 S.Wampler - Role of scenarios and walk-throughs in telescope design SPIE Proceedings vol. 2479, April 1995 D.Mancini E.Cascone - TNG Control System: hardware, software and methods adopted to improve the performance of the fully digital drive system SPIE Proceedings vol. 2479, April 1995 B.Gilli - VLT Tracking and Guiding Software SPIE Proceedings vol. 2479, April 1995 M.Ravensbergen R.Merino C.P.Wang - Encoders for the altitude and azimuth axes of the VLT SPIE Proceedings vol. 2479, April 1995 R.K.Bhatia - Telescope alignment: if the zero-coma condition sufficient? SPIE Proceedings vol. 2479, April 1995 N.Robbier D.R.Blanco C.A.Roddier - WIYN telescope active optics system SPIE Proceedings vol. 2479, April 1995 ICALEPCS 1995: R.Barillere et al. - CICERO: Control Information systems Concepts based on Encapsulated Real Time Objects Proceedings ICALEPCS 1995, Chicago L.R.Dalesio M.Kraimer W.Watson M.Clausen - Distributed Software Development in the EPICS Collaboration Proceedings ICALEPCS 1995, Chicago I.Ivanov K.Cahill B.Hendricks - Presentation of data from the Fermilab Datalogging System Proceedings ICALEPCS 1995, Chicago J.A.Carwardine - An introduction to Plant Monitoring through the EPICS Control System M.J.Knott - Communication in Support of Software Sharing and Collaboration Development Proceedings ICALEPCS 1995, Chicago J.D.Fox H.Hindi - Control Theory with Applications to Accelerators Proceedings ICALEPCS 1995, Chicago D.Bulfone et al. - Controls in the Past Year of ELETTRA Operation Proceedings ICALEPCS 1995, Chicago R.J.McGonegal S.B.Wampler - The Gemini Control System Proceedings ICALEPCS 1995, Chicago A.Balestra F.Pasian M.Pucillo P.Santin C.Vuerli - Controlling Telescope Observation from the Astronomer's own desk: the case of TNG Proceedings ICALEPCS 1995, Chicago D.J.Ciarlette R.Gerig - Operational experience from a large EPICS based accelerator facility Proceedings ICALEPCS 1995, Chicago W.McDowell - Panel Discussion on EPICS Proceedings ICALEPCS 1995, Chicago J.Chen G.Heyes et al. - CDEV: An Object Oriented Class Library for Developing Device Control Applications Proceedings ICALEPCS 1995, Chicago F.Momal C.Pinto-Pereira - Using World-Wide_Web for Control Systems Proceedings ICALEPCS 1995, Chicago H.Laeger S.Lechner - WWW for information on CERN energy consumption Proceedings ICALEPCS 1995, Chicago SPIE Cenference - Optical Telescopes of Today and Tomorrow, Landskrona, Sweden 29 May - 2 June 1996 G.M.Smith - Keck II Status Report SPIE Proceedings vol. 2871, June 1996 M.Mountain, F.Gillet, R.Kurz - The Gemini 8-M Telescopes Project SPIE Proceedings vol. 2871, June 1996 K.Norio - Status and Perspective of Subaru Telescope Project SPIE Proceedings vol. 2871, June 1996 J.M.Hill - The Large Binocular Telescope Project SPIE Proceedings vol. 2871, June 1996 E.Manil - End to end modeling of the VLT SPIE Proceedings vol. 2871, June 1996 M.Quattri et al. - VLT 8m Unit Telescope Main Structure SPIE Proceedings vol. 2871, June 1996 O. von der Luehe, F.Derie et al. - Interferometry with the ESO VLT SPIE Proceedings vol. 2871, June 1996 P.Salinari - The Large Binocular Telescope Interferometer SPIE Proceedings vol. 2871, June 1996 V.Baumer, P.Sacre' - Operational model for VLT temperature and flow control SPIE Proceedings vol. 2871, June 1996 P.Y.Bely - NGST: A feasibility study of the Next Generation Space Telescope SPIE Proceedings vol. 2871, June 1996 N.Hubin - VLT Adaptive optics at the European Southern Observatory SPIE Proceedings vol. 2871, June 1996 R.Ragazzoni, A.Baruffolo, F.Bortoletto, M.D'Alessandro - The adaptive optics module for TNG: a status report SPIE Proceedings vol. 2871, June 1996 W.Lupton - The Keck II Telescope Control System SPIE Proceedings vol. 2871, June 1996 M.J.Sirota et al. - Autoguider servo design and testing of the W.M.Keck Telescope SPIE Proceedings vol. 2871, June 1996 G.Raffi K.Wirenstrand - The VLT control software in its final test phase SPIE Proceedings vol. 2871, June 1996 A.Wallander - Uning NTT as prototype for VLT. The new NTT control system SPIE Proceedings vol. 2871, June 1996 S.Wampler - The Software Design of the Gemini 8m Telescopes SPIE Proceedings vol. 2871, June 1996 P.Wallace - Pointing and tracking software for the Gemini 8-metre telescopes SPIE Proceedings vol. 2871, June 1996 T.Erm - Analysis of tracking performance SPIE Proceedings vol. 2871, June 1996 SPIE Cenference 3112 - Telescopes Control Systems II San Diego CA, USA 27-28 July 1997 G.Chiozzi K.Wirenstrand M.Ravensbergen B.Gilli - Integration tests of the VLT Telescope Control Systam SPIE Proceedings vol. 3112, July 1997, pp.141-151 A.Wallander J.Spyromilio - NTT Project: a field test for the VLT software and hardware SPIE Proceedings vol. 3112, July 1997, pp.9-19 E.Allaert G.Raffi - Preparation for VLT software commisioning at Paranal SPIE Proceedings vol. 3112, July 1997, pp.20-27 J.Wilkes M.Fisher - Selection of tape encoding system for the main axis of the Gemini telescopes SPIE Proceedings vol. 3112, July 1997, pp.30-41 M.Peron et al. - VLT Data Flow System: the NTT prototype experience SPIE Proceedings vol. 3112, July 1997, pp.60-65 A.Conrad J.Gathright R.Kibrick - Remote observing with the Keck Telescopes SPIE Proceedings vol. 3112, July 1997, pp.99-110 J.Bailey R.Prestage - The portable telescope control system project SPIE Proceedings vol. 3112, July 1997, pp.124-131 L.Miglietta V.Bilioni C.Braccesi V.Pante - Large Binocular Telescope: the control system of the position actuator of the 8.4m borosilicate honeycomb primary mirrors SPIE Proceedings vol. 3112, July 1997, pp.132-140 S.S.Smith K.Gillies - User Interface for the Control of the Gemini Telescopes SPIE Proceedings vol. 3112, July 1997, pp.152-159 D.Gwo - A robust guide-star tracking algorithm proposed for Gravity Probe-B relativity mission SPIE Proceedings vol. 3112, July 1997, pp.320-327 D.Mancini E.Cascone P.Schipani - Galileo High-Resolution Encoder System SPIE Proceedings vol. 3112, July 1997, pp.328-334 D.Mancini M.Brescia E.Cascone P.Schipani - A Neural Variable Structure Controller for Telescope Pointing and Tracking Improvement SPIE Proceedings vol. 3112, July 1997, pp.335-342 E.Cascone D.Mancini P.Schipani - Galileo Telescope model dentification SPIE Proceedings vol. 3112, July 1997, pp.343-350 Papers on C/C++ programming Binder: OO2 -------------------------------------------------------------------------- P.Suel - Extending C++ for Distributed Applications - Dr'Bobb's, Feb. 1995 D.Ford - Associations in C++ - Dr.Dobb's Aug. 1994 J.Rogers - Locking Without Deadlocks - C/C++ Users Journal, Nov. 1995 J.Dugger - Multithreading in C++ - C/C++ Users Journal, Nov. 1995 N.Hunt - Automatically tracking test case execution - JOOP, Nov/Dec 1995 N.Hunt - Performance testing C++ code - JOOP, Jan 1996 J.J.P.Tsai Y.Bi S.J.Yang - Debugging for timing-constraint violations IEEE Software, March 1996 H.Lu - ELF: From the programmer's perspective T.Cargill - Managing Dynamic Objects in C++ - Dr.Dobb's, June 1996 D.Zigmond - STL Iterators - Dr.Dobb's, June 1996 T.Linenbach - Reusable Bynary Associations in C++ - Dr.Dobb's, June 1996 Allan - AnAsynchronous Design Pattern - Dr.Dobb's, June 1996 P.Arnaud - Dynamic Message Passing in C++ - Dr.Dobb's, Aug. 1996 D.Zigmond - STL algorithms - Dr.Dobb's, Aug. 1996 M.D.Carroll M.A.Ellis - Obstacles to Inheritability in C++ - C/C++ Users Journal, Aug. 1996 S.Blaha - Object-Oriented Interprocess Communication - Dr.Dobb's, Aug. 1996 G.Messer - A C++ Chronograph Class - C/C++ Users Journal, Sep. 1996 S.Hartmann - A reusable PID control class - C/C++ Users Journal, Feb. 1997 D.Wisehart - Software for Fail-safe Applications - C/C++ Users Journal, Feb. 1997 M.Remy - Portable Signal Handling Under UNIX - C/C++ Users Journal, Mar97 P.Anderson - C Multidimensional Arrays at Run Time - Dr.Dobb's, Aug '89 J.W.Ross - Calling C Functions with Variably Dimensioned Arrays - Dr.Dobb's, Aug 1993 A.Rahimi - A Muldimensional Array Class - C/C++ Users Journal, Jul. 1997 H.Schmidt - Me and my arrow (auto-pointer template) - C/C++ Users Journal, Aug. 1997 A.Stevens - The Proposed C++ Standard: Evolution, Revolution, Innovation, Invention, convolution - Dr.Dobb's Journal, Sep. 1997 B.D.Roseblum - Improve Your Programming with Asserts Dr.Dobb's, Dec. 1997 J.Bansija C.Davis - Automated Metrics and Object-Oriented Development Dr.Dobb's, Dec. 1997 J.Shankel - Implementing Abstract Factory as an STL Container Dr.Dobb's, Dec. 1997 M.Spertus - C++ and Garbage Collection Dr.Dobb's, Dec. 1997 J.Beveridge - Moving Templates out of Header Files C/C++ User Journal, Nov. 1997 D.Lea - A Memory Allocator web page F.Kaduch D.Jan P.Vidal - Object-Oriented Finite-State Machines C/C++ User Journal, Feb. 1998 B.Reck - Thread Synchronization with Reference-Counting Handles C/C++ User Journal, Feb. 1998 D.Pomerants - Testing Error Handlers by Simulating Errors C/C++ User Journal, June 1998 F.Wild - C++ Interfaces Dr. Dobb's Journal, Aug. 1998 C.Allison - What's New in Standard C++ C/C++ User Journal, Dec. 1998 S.Meyers - More Effective C++, 35 new ways to improve your programs and design, Selected Chapters from the book - 1996 C++/OO courses, tutorials specs Bind Title -------------------------------------------------------------------------- OO5 G.Chiozzi - C++ Introductory Tutorial, varius documentation, 1995 OO5 J.T.Baldwin - C++ Inspection Check List, 1991 OO6 G.Booch J.Rumbaugh - Unified Method for OO Development Documentation Set, Rational Corporation, 1996 OO6 A Rational Development Process (RUP), Rational Corporation, 1999 OO6 Introducing the Object Modelling Technique (ESO slides) OO6 Fundamentals of Software through Pictures for OMT Student Workbook S1 VLT On-line Data Flow Analysis Document VLT-SPE-ESO-10100-0790 C++ class libraries Bind Title -------------------------------------------------------------------------- OO7 Standard Template Library Reference OO7 M.J.Vilot - The C++ Standard Library - Dr.Dobb's, Aug. 1995 OO7 D.Zigmond - Generic Programming and the C++ STL - Dr.Dobb's, Aug. 1995 OO7 P.J.Plauger - The Header .... series of papers C/C++ User Journal OO7 Mumit's STL Newbie guide OO7 JThreads/C++, Java-like Threads for C++ OO8 Working Paper for Draft Proposal International Standard for Information Systems - Programming Language C++ X3J16/95-0087 April 1995 Papers on control theory Bind Title -------------------------------------------------------------------------- V1 S.Orlosky G.Avolio - Basic of rotary optical encoders Control Engineering, Nov. 1997 V1 V.J.VanDoren - How Software Tools Simplify Loop Tuning Control Engineering, Nov. 1997 V1 V.J.VanDoren - Advanced Control Software Goes Beyond PID Control Engineering, Jan. 1998 V1 J.Mandell B.Cook - SCADA Systems 'Dampen' Infrastructure Problems Control Engineering, Jan. 1998 V1 Windows CE movesfrom Pocket to Control G.A.Mintchell Control Engineering, May 1999 V1 Is a new Control Room in Your Future? D.Harrold, I.Nimmo Control Engineering, May 1999 V1 Digital Feedback Control of Telescopes Performance and Requirements F.Biancat Marchet, M.Dimmler, ESO Papers on generic IT arguments Bind Title -------------------------------------------------------------------------- V1 Interviews: J.Woehr - An Interview with Donald Knuth - Dr.Dobb's Apr. 1996 J.C.Dvorak - Buzz Off (Lou Gestner and IBM) - PC Computing B.Morris - Big Blue - Fortune Apr. 14, 1997 V1 J.Keaton - Employment 2005: Boom or Bust for Computer Professionals? IEEE Computer May 1996 V1 N.Terzi C.Rizzuto - Proposta di un codice di comportamento verso i giovani fisici - Il Nuovo Saggiatore, Maggio 1997 V1 P.J.Douglas G.M.Alliger R.Goldberg - Refining the curriculum: Client-Server and Object-Oriented Training Computer, June 1996 V1 B.H.Barnes - Assessing Computer Technology in Europe Communications of the ACM, May 1998 V1 A Career Management Model K.Sandholtz Dr.Dobb's Journal Fall 1998 V1 Surviving the Technical Interview J.Saturia Dr.Dobb's Journal Fall 1998 V1 Becoming a Computer Consultant J.Ruhl Dr.Dobb's Journal Fall 1998 V1 How to be a STAR engineer R.E.Kelley Spectrum October 1999 V1 L.Krumenaker - Roboscopes - Internet World, May 1996 V1 A.Peleg S.Wilkie U.Weiser - Intel MMX for Multimedia PCs - Communications of the ACM, Jan 1997 V1 R.Comerford - The battle for the desktop - IEEE Spectrum, May 1997 V1 IEEE Spectrum March 1997, Sharing virtual worlds, special report R.Braham R.Comerford - Sharing virtual worlds IEEE Spectrum, Mar. 1997 R.C.Waters J.W.Barrus - The rise of shared virtual environments IEEE Spectrum, Mar. 1997 R.Rockwell - An infrastructure for social software IEEE Spectrum, Mar. 1997 B.Roehle - Chaneling the data flood IEEE Spectrum, Mar. 1997 C.R.Karr D.Reece R.Franceschini - Synthetic soldiers IEEE Spectrum, Mar. 1997 D.B.Anderson M.A.Casey - The sound dimension IEEE Spectrum, Mar. 1997 V1 R.D.Beer R.D.Quinn H.J.Chiel R.E.Ritzmann - Biologically inspired approaches to robotics Communication of the ACM, Mar. 1997 V1 T.S.Perry - In search of the future of Air Traffic Control IEEE Spectrum, Aug. 1997 V1 D.R.Gentner J.Grudin - Design Models for Computer-Human Interfaces Computer, June 1996 V1 P.Morreale - Agents on the Move IEEE Spectrum, Apr. 1998 V1 N.F.Johnson S.Jajodia - Exploring Steganography: Seeing the Unseen IEEE Computer. Feb. 1998 Papers on non-IT arguments Bind Title -------------------------------------------------------------------------- V1 R.Braham - Ballistic missile defense: it's back IEEE Spectrum, Sep. 1997 V1 W.Sweet, F.Felix, J.Beard, - Nuclear Energy: Special Report IEEE Spectrum, Nov. 1997 V1 P.Creola - Space Visions for the 21st Century Europhysics News January/February 1998 V1 Special Issue on Fusion Research Europhysics News November/December 1998 V1 F.Romanelli - Le ricerche sulla fusione termonucleare controllata condotte sul tokamak FTU Il Nuovo Saggiatore, Bollettino della Societa' Italiana di Fisica Vol. 13 Anno 1997 No.5-6 V1 L.Geppert W.Sweet - Technology 1998: Analysis & Forecast Issue IEEE Spectrum, Jan. 1998 V1 J.Oberg - Shuttle-Mir's lessons for the International Space Station IEEE Spectrum, June 1998 S.J.Marcus - Woe is MIR IEEE Spectrum, June 1998 V1 Europe Report IEEE Spectrum, October 1998 V1 Missiles for all: the new global threat? J.Oberg IEEE Spectrum, March 1999 V1 The U.S.-Russian Space Relationship: symbolism at any cost? J.Oberg IEEE Spectrum, July 1999 V1 La Figura di Marie Curie a cento anni dalla scoperta del radio U.Amaldi Il Nuovo Saggiatore, vol.14, 1998, No. 6 V1A New Eye Opens (the Gemini first telescope) G.Stix Scientific American, April 1999 V1A Riccardo Giacconi Laureato Nobel R.Ruffini Il Nuovo Saggiatore VLT papers and presentations Bind Title -------------------------------------------------------------------------- V2 G.Chiozzi DBL Database Loader, Extended CCS, Event Handling Toolkit VLT Control Software tutorial, ESO 19/06/95 V2 G.Chiozzi T.J.Accardo The Very Large Telescope real time database. An Object Oriented Approach based over RTAP European RTAP User Group Conference 1995 Lyon, France 11-12 April 1995 V2 G.Chiozzi CCS Database Loader Tutorial Internal course, ESO 03/04/95 V2 G.Chiozzi An object-oriented event-driven architecture for the VLT Telescope Control Software ICALEPCS 1995, Chicago, USA, Oct 1995 V2 G.Chiozzi VLT Object Oriented Design VLT Software Review, ESO, Apr. 1996 V2 G.Chiozzi SW Technology for Next Generation ESO Control Software Trieste Meeting on Y2K Real-time Control in Physics Trieste, 14-15 of January 1999 V2 G.Chiozzi ESO Annual Review 1999 - TCS Activities & ATCS ESO internal presentation Garching bei Muenchen, February 1999 V2 G.Chiozzi Auxiliary Telescopes Control Software ESO internal presentation Garching bei Muenchen, 09 of June 1999 V2 G.Chiozzi Real-Time Control Systems: a "One Document" Object Oriented Development Process ICALEPCS 1999, Trieste, Italy, Oct 1999 V2 G.Filippi Software Engineering For ESO's VLT Project ICALEPCT 1993, Berlin, Oct. 1993 V2 G.Raffi Control Software for the ESO VLT ICALEPCS 1991, Tsukuba, Nov. 1991 V2 G.Raffi Trends in instrumentation software ASTRONET 1993 workshop V2 G.Raffi Status of ESO Very Large Telescope control software ICALEPCS 1995, Chicago, USA, Oct 1995 V2 G.Raffi The VLT control software development and installation ICALEPCS 1997, Baijing, China, Nov 1997 V2 G.Filippi Software Practices Used in the ESO Very Large Telescope Control Software ICALEPCS 1999, Trieste, Italy, Oct 1999 V2 European Southern Observatory VLT Customer Case History, Wind River, 1999 V3 G.Chiozzi P.Duhoux R.Karban VLTI Auxiliary Telescopes: a full Object Oriented approach Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4009-03 V3 K.Wirenstrand G.Chiozzi R.Karban VLT Telescope Control Software installation and commissioning Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4009-20 V3 G.Chiozzi R.Karban K.Wirenstrand Field Stabilisation on the ESO VLT Telescopes Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4009-11 V3 UT Commissioning Field Stabilization tests on Kueyen VLT-TRE-ESO-10200-XXXX V3 B.Koehler C.Flebus VLTI Auxiliary Telescopes Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4006-03 V3 A.Wallander J.Spyromilio K.Wirenstrand Commissioning VLT Unit Telescopes: methods and results Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4004 © gchiozzi@eso.org

    Last modified: Mon Feb 19 11:45:08 CET 2007


    Network management troubleshooting | killexams.com real questions and Pass4sure dumps

    This text is excerpted from the eBook Tips and Tricks Guide to Network Configuration Management, Chapter 3: Network Management Troubleshooting

    The book from which this chapter is excerpted presents tips and tricks for four network configuration management topics. For ease of use, the questions and their solutions are divided into sections based on topic, and each question is numbered based on the topic, including Topic 1: Change Management Best Practices, Topic 2: Network Management Security, Topic 3: Network Management Troubleshooting, Topic 4: Change Management Techniques, Topic 5: Selecting and Deploying a Network Device Management Solution, and Topic 6: Enterprise Network Device Management.

    To download/read the eBook in its entirety, visit: http://www.alterpoint.com/ebook

    Topic 3: Network Management Troubleshooting Q 3.1: What is the first step toward fixing a router that isn’t working? >> One change at a time, please! The idea of using a known-good backup to recover from a device failure only works if you tend to make a small number of changes at a time, let them settle to ensure that they’re working properly, then immediately make a backup. If you’re in the habit of making a raft of changes at once, you’ll have a much more difficult time tracking down the change that caused the problem. >> There’s no such thing as a minor change! Every single change to your network devices should go through your change management process. No change is too minor. We’ve all heard the story about the technician who blew dust out of a router’s cooling fan. He blew hard enough to stop the fan, causing the router to overheat and restart itself at seemingly random intervals. Had that simple maintenance action—cleaning out the router—been logged as a change, a senior administrator might have guessed that the problem was in the cooling fan, and checked that out first for a speedier resolution to the problem. Q 3.2: How can change management contribute to improved network performance?

    A: Managing large networks is a complex, difficult task. Suppose you took a job at a large corporation with tens of thousands of users spread across dozens of offices. Your job, you're told, is to find out why network performance is slow. Where do you start?

    You could whip out your network analysis tools and start analyzing bandwidth utilization, broadcast traffic, router load, switch bandwidth, firewall utilization, and so forth, but doing so would require tons of time and might never point to a real performance bottleneck. If you do find a bottleneck, all you could really do is start shooting in the dark, making device configuration changes in an attempt to fix the bottleneck. More often than not, that practice simply reveals additional bottlenecks, creating an unending process of network configuration changes that never really improve performance. If you're after actual results, your best starting place is gathering some basic performance trend information and analyzing the network's change-management log.

    If you can pin down a rough point in time when performance started to become less than optimal, you can start analyzing the changes that were made to the network's infrastructure devices around that time. You might discover, for example, a switch to a less-efficient routing protocol, or you might find that the routers connecting the various offices are providing packet filtering services. You might discover incorrectly configured multicast boundaries that are resulting in excess WAN traffic. Regardless, the configuration history can point to potential problems that contribute to the network's current condition. Discovering those problems empirically could take weeks or more, but finding them in the configuration history can be much, much easier.

    The fact is that modern networks are becoming too large and too complex to manage as a single unit. Instead, you have to manage them in bits and pieces, and you have to manage them in small chunks of time. For example, suppose your company is getting ready to make a whole series of network device reconfigurations designed to improve performance or simply designed to increase network addressing capacity. Before making the changes, you can take a complete set of performance measurements. By taking another set of measurements after the changes are complete, you can determine the performance impact of the change, and relate those changes to specific configuration changes from the configuration history. You're not attempting to manage the network's overall performance. Instead, you're simply trying to manage the performance delta, or difference between the two configurations. Some administrators refer to this process as managing in increments, and it's an effective way to keep on top of large, complex networks.

    Of course, managing in increments is only possible if you have a solid change-management process in place. The change-management process provides some important capabilities:

  • Change management provides a logical checkpoint, allowing you the opportunity to take performance measurements before and after a discreet set of changes
  • Change management provides a history, enabling you to compare before and after configurations and relate them to measured performance changes
  • Change management provides a rollback mechanism, making it easier to revert to a previous configuration if the performance of a new configuration isn’t what you desired.
  • Ideally, you'll have access to software that can help gather and maintain device configuration information for historical and analytical purposes. That software might even allow you to store performance measurements so that you can save a performance baseline with each set of changes, defining a point in time at which that performance was measured and relating it to the device configuration that resulted in the performance.

    Q 3.3: What are some industry best practices for troubleshooting network devices?

    A: Network devices have been around a long time, and the technology industry has developed several best practices that make troubleshooting easier and often let you avoid the need to troubleshoot altogether. As author Scott M. Ballew states in his book Managing IP Networks with Cisco Routers (O’Reilly and Associates), “The best way to handle network problems is to avoid them.”

    Here are some additional tips I've picked up over the years:

  • Create detailed documentation of your network’s physical connections. One of the most common reasons for network downtime is swapped cables, and a detailed map of which wires go where can be a huge benefit during troubleshooting. Given the alternative—tugging on wires until you figure out where they go, making documentation is a great investment in time
  • As I’ve described in other tips, document every change you make to network devices’ configurations, and have backup configurations ready in case a change backfires
  • Your first troubleshooting step should often be to simply undo whatever it was you did last. Backup configuration files can make doing so very easy and will let you review the problem-causing changes at your leisure
  • Make as few changes as possible at a time; that way, if problems occur, you’ll have fewer changes to sort through to find the cause. How long you wait between changes is a matter of personal taste; I like to wait at least 1 week so that my network can experience the full range of a week’s workload before I certify the change as a success. Of course, in a busy network environment that uses the latest technologies, limiting your workload can be difficult or impossible, making third-party change-management tools all the more valuable.
  • Experienced administrators have learned these tips through trial and error. You likely have a few other common practices you follow in your environment to keep things running smoothly.

    Q 3.4: How can I determine whether a new product or a consultant makes changes to our network devices?

    A: Large companies are likely to have any number of consultants and contractors running around on different projects at any given time. Some of them might have the authority to make changes to your network devices, probably with the understanding that they document any changes they make. However, there’s always a change or two that gets made right before the weekend that doesn’t make it into the documentation.

    In addition, it’s possible for new software applications to make changes to your network devices. Suppose you’re evaluating a new network performance monitoring solution that needs to query information from your routers. Or perhaps you’re installing an enterprise management solution that needs credentials to access your managed network devices. In these cases, the software might make minor configuration changes to your devices without your knowledge. That’s not necessarily a bad thing; the changes made by these software packages are usually minor and simply make it easier for the software to do its job. But you still need to know about those changes in order to control your device change management process. So what can you do?

    Unfortunately, very few network devices are designed to automatically notify an administrator when their configurations are changed. After all, only an administrator should have the credentials to make a change, so the devices quite reasonably assume that the administrator made any changes and doesn’t need to be notified.

    A: The first question you should ask is "What changed?" Very few network devices go belly up on their own; you’ll find that it usually requires human involvement to really screw things up. Assuming that you’ve eliminated some kind of hardware failure as the cause of the problem, the culprit is most likely a recent change made to the device’s configuration. Of course, if the hardware is at fault, you simply need to replace the hardware and restore your configuration from a backup. Restoring from a backup—you do have a backup of the router’s configuration, don’t you?—is a good first step even if the hardware is fine. Ideally, the backup configuration will resolve the problem, and you can use a tool to compare the old and new configurations to determine the differences. That’s not exactly troubleshooting the problem, but unless you’re working in a lab, your goal should be to restore the device to operation first, and figure out what caused the problem later. If you don’t actually have a recent backup, shame on you! Hopefully you have change management documentation that describes the changes that have been made to the router in recent memory. Start examining those changes to see which ones might apply to the problem you’re having. If necessary, manually undo each change, one at a time, until the problem goes away. Other changes might involve a device operating system (OS) upgrade or patch. In such cases, you should never make a change without understanding how you can rollback to the prior (working) version of the OS. If necessary, keep a spare router on hand in case the OS upgrade or patch kills your production unit. The goal, in any event, is to not worry so much about troubleshooting the current problem, and to simply fall back to the last configuration that worked. Keep in mind that not all changes need to involve the router’s configuration files or OS. For example, perhaps your company recently hired someone to straighten out that rat’s nest of a wiring closet, and that person accidentally plugged the router into the wrong subnet when he or she put the closet back together. The wiring closet change should have been documented as a network change, and would tip you off that you need to check out the router’s interfaces to see what they’re plugged into. Of course, if you don’t have a change management program in place or, at least, a backup of the router’s configuration, you’re out of easy options. You’ll need to start troubleshooting the problem the hard way, which might eventually involve completely reloading the router’s factory configuration and rebuilding your configuration from scratch. Such drastic measures highlight the importance of both backups and a solid change management methodology. Manually Detecting Changes

    Most higher-end network devices allow you to use Trivial File Transfer Protocol (TFTP) to transfer the devices’ configuration files to a TFTP server (I explained how to set up a TFTP server in tip 4.2). If you regularly dump your devices’ configurations to TFTP and save the files, you have a baseline from which to check for changes to the devices’ configuration. For example, suppose you downloaded a router’s configuration into a file you named Router5Feb03.txt. A contractor recently finished installing a new enterprise management solution, and you want to see if any changes were made to Router5. Just follow these steps:

    1. Enter    telnet routername    to Telnet to the router that you want to back up (for this example, I’ll assume you’re using a Cisco     router; change the following commands as necessary if you’re using a different device). Obviously,     you could also use the router’s IP address instead of a name.2. Log on to the router.3. Enter    enable    and provide the correct password. Doing so enters privileged mode and lets you access the router’s     configuration.4. Enter    write network    then enter the IP address of your TFTP server.5. Enter the name of the configuration file (I’ll use Router5Mar03.txt for this example).6. Press Enter to confirm the write. Ensure that the router responds with an [OK] prompt after writing the     configuration.7. Enter    exit    to log out of the router.

    Now you’ve got two text files, one with the old configuration and one with the new configuration. You simply need to compare the two. Assuming you’re running on a UNIX computer, enter the following

    Diff -abls Router5Feb03.txt Router5Mar03.txt

    If you’re using Windows, you can use a graphical version of Diff, called CSDiff, which I mentioned first in tip 4.2. It’s available from Component Software and makes it much easier to spot changes between versions of a text file. Best of all, it’s a free tool. Figure 3.1 shows how CSDiff highlights the differences between two text files.

    Figure 3.1: Using CSDiff to analyze the differences in a router configuration file

    Unfortunately, watching for changes manually is a lot of work. You have to regularly monitor for changes on each and every network device or you could easily miss one. Because the whole point of this exercise is to pick up changes that you didn’t know were being made, you need to have a change detection system that’s a bit more automated.

    Proactive Change Notification >> Software management solutions often use a more sophisticated comparison than a simple Diff. Instead, they create a cryptographic checksum of each version of a configuration file. The checksum can only be the same if no changes were made to the file; if any changes occur, the checksum is different, and the software knows to investigate more closely to determine exactly which changes occurred.

    Using a checksum—rather than a line-by-line comparison—allows these software packages to accurately and quickly compare configuration files that might include thousands of lines of text.

    Ideally, your change management software should allow you to configure daily reports. That way, you’ll be able to carefully review changes on a day-to-day basis rather than waiting a week or more and having to review dozens of potential changes. For example, as Figure 3.2 shows, DeviceAuthority provides a great deal of flexibility in scheduling reports. You can also configure reports to be emailed to multiple recipients. For example, I like to receive a copy of the report myself, and I have another copy sent to my Help desk manager for archival. Whenever we’re conducting a process audit, a third copy is emailed to an auditor, who compares the report to our official change log to verify our compliance with our internal change management process.

    Figure 3.2: Creating a daily schedule keeps you on top of unexpected device changes and is a useful tool for auditing your change management process.

    Although these change management software solutions involve additional expense and require effort to deploy, they provide a much better means of keeping tabs on your network devices than a manual process.

    Enter device change management software. Most of the big players in this field, including AlterPoint DeviceAuthority, Tripwire, and Cisco’s CiscoWorks can immediately notify you via email when a network device’s configuration changes. These solutions run on a server, and periodically (usually daily, although you can configure more frequent intervals) download your devices’ configuration files. They then perform an internal comparison—not unlike the manual Diff I used earlier—to compare the most recent configuration with the last one they downloaded. If they spot any changes, they generate an email to an administrator. Automation on the Cheap
  • Commanding devices to dump their configuration files via TFTP. If you have any devices that don’t support TFTP, you’re going to have a hard time automating a means of retrieving their configuration settings. Software solutions can pull configuration data from just about any kind of managed device, so if you have a lot of non-TFTP devices, you have one more argument for purchasing a software package.
  • Comparing new and old configuration files.
  • Emailing the results.
  • Each of these tasks can be performed on Windows- or UNIX-based computers, although the exact techniques obviously differ. Because Windows is the most common desktop OS, I’ll focus on techniques for Windows. Where possible, I’ll mention UNIX alternatives.

    If you’re completely unable to implement a change management software solution, you’re not completely out of luck. You can still automate parts of the manual detection process and provide some basic functionality for keeping track of unexpected changes to network devices. Basically, you need to break down the process into its component steps, and come up with a means of automating each step: Automating the Configuration File Dump http://www.cyber.com.au/cyber/product/cybertel

    Use the scriptable Telnet client of your choice to create a batch file. For example, suppose you decide to use the ZOC client, and you create a script named GetRouter5.zrx. This REXX script logs onto a particular router and commands it to write its configuration to a TFTP server. You’d then create a batch file, I’ll use Router5.bat as the filename, that contains the following text:

    ZOC /RUN:SCRIPTGetRouter5.zrx /U

    Note that the /U parameter places ZOC into unattended mode, forcing it to take the default settings for any prompts rather than hanging and waiting for a reply.

    After the batch file is ready, use Windows’ Task Scheduler to schedule the batch file to run once a day, say at around 1:00 AM. On UNIX systems, you can use CRON to set up a similar automation, using a scriptable Telnet client for UNIX. So every morning at 1:00 AM, this batch file will run and command the router to dump its configuration to your TFTP server.

    >> If you have multiple devices (and who doesn’t?), simply create a Telnet script for each one. Include multiple lines in your batch file, with each line executing the Telnet client and one Telnet script. The batch file will then run through each device in turn, commanding them to dump their configuration to TFTP. You need to be able to script a Telnet session to automatically log onto your devices and command a TFTP dump. Unfortunately, Windows’ built-in Telnet client doesn’t support scripting. However, you can get a scriptable Telnet client, called Cybersource Scriptable Telnet, from . Another scriptable client, which I prefer, is the ZOC Terminal Emulator and Telnet/SSH Client available from http://www.emtec.com. ZOC understands a superset of the REXX scripting language, which make it a pretty powerful automation tool. Automating the File Comparison MKS

    diff -ir -c folder1 folder2

    The cool part about this utility is that it can compare all of the files in a folder. So suppose you’ve stored your most recent configuration files in a folder named Old, and you’ve had your devices TFTP their current configurations to a folder named Current. You could execute the following command:

    diff -ir -c Old Current > changed.txt

    This command will compare each and every file in the two folders and write the results to a file named Changed.txt. The results will include each changed line, plus an additional three lines before and after the change to help you locate the change’s context. If you’re using this technique, it’s important that your devices dump their configurations to the same filename each time. Simply create a new batch file— probably on your TFTP server, where the files are located—and schedule it to run by using Task Scheduler. If you set it to run at about 3:00 AM, that should give your first batch file time to complete.

    You don’t want a fancy GUI to automate file comparison, so CSDiff isn’t really appropriate. Instead, you want a basic command-line Diff (like the UNIX guys have) that will output differences to a file. You can get one from . The syntax to use is: Emailing the File Comparison Results

    —clemail -quiet -from changes@domain.com—to recipient@domain.com—subject “Report”—bodyfile changed.txt—smtpserver mail.domain.com—smtpport 25

    Of course, you’ll need to type all of that on a single line. Schedule the batch file to run at about 4:00 AM, after the second file finishes running, and you should have an email waiting in your mailbox when you get to work.

    So there you have it, a no-cost (or low-cost, depending on how much you pay for the various utilities you’ll need) solution for automatically detecting changes to network device configurations and emailing those changes to you in a daily report. It’s a lot of work to set up, and you’ll need to fine-tune it to work in your environment. After a while, I suspect you’ll start looking at those change management solutions with a new appreciation for the work that they do!

    Q 3.5: Troubleshooting network devices is complicated. Is there a general framework that can make it easier?

    A: There’s no industry-standard framework to make network device troubleshooting easier, but there are several resources that can help you develop a framework that works in your environment:

    As I’ve mentioned in previous tips, the best place to start troubleshooting network devices is to look at what has recently changed. You can usually trace most device problems to a recent configuration change that’s not working out as well as you’d hoped; network change management software or even simple text file comparisons of device configurations can help highlight recent changes and let you quickly focus your troubleshooting efforts.

    Q 3.6: What is the best way to start troubleshooting router problems?

    A: That’s a tall order! Routers are complex, powerful computers in their own right, and can have several problems: routing tables can be wrong, CPU utilization can be high, network interfaces might be down, passwords can be lost, or the router might simply crash.

    The best way to start, no matter what the problem, is with a step-by-step troubleshooting flowchart. Most routers’ documentation includes basic troubleshooting flowcharts, which are designed to help narrow the problem as much as possible.

    Most manufacturers, including Cisco, Nortel, and 3Com, offer flowcharts for their devices and provide them for download from their Web sites. For example, Cisco 7304 router troubleshooting is available at https://www.cisco.com/pcgi-bin/tsa7304/trouble.pl?tree=7304. You start by selecting from a basic menu of problems (for example, high CPU utilization, interface issues, IOS upgrade, line card issues, password recovery, power, PXF feature support, router crash, and startup). Suppose you were to select interface issues from the main menu; the troubleshooter would walk you through a variety of questions to narrow the problem:

  • Are you using an ATM interface?
  • What is the output of show interfaces pos?
  • What encapsulation method-such as frame relay or PPP-are you using?
  • At the end, the troubleshooter displays a recommended solution. This might include links to other portions of the troubleshooting tree to eliminate or confirm potential causes of the problem.

    Cisco also offers these flowcharts in PDF format so that you don’t need Internet access to use them. For the 7304 router, you can download PDF flowcharts by going to https://www.cisco.com/pcgi-bin/tsa7304/flows.pl?tree=7304, then clicking Flow Charts in the left-hand menu.

    >> Cisco offers flowcharts for most of its network devices, and you can access all of them from the support section of Cisco’s Web site. Q 3.7: We have a number of junior administrators, so we need to make network device troubleshooting more of a science and less of an art. What can we do?

    A: You can create a sound troubleshooting methodology. To do so, simply answer this question: “How do you find a wolf in Siberia?” Sounds frivolous, but it’s a similar task to network device troubleshooting, which can often seem to an inexperienced administrator like looking for a needle in a haystack. The answer provides the solution: Build a wolf-proof fence down the middle of Siberia, and look for the wolf on one side. If he’s not there, divide what’s left in half again, and repeat. Technically, the technique is referred to as a binary search.

    An Example ProblemConsider the network diagram that Figure 3.3 shows. Imagine that the client using the laptop computer isn’t able to communicate with the desktop computer in Office 1.

    Figure 3.3: Sample troubleshooting problem.

    This is a simplistic example, but it will serve to illustrate a troubleshooting methodology, which can be used for any problem, no matter how complex.

    Identifying the Problem DomainThe first step is to simply make a list of everything that could be causing the problem. Experienced administrators do this in their head, but it’s worth writing down the list if you’re just getting the hang of troubleshooting. In this case, the list might include:

  • Laptop unplugged
  • Laptop network stack failure
  • Desktop unplugged
  • Desktop network stack failure
  • Router in Office 3 failed
  • Router in Office 1 failed
  • WAN link failed
  • DNS server not working
  • Bad routes in Office 1 router
  • Bad routes in Office 3 router
  • It’s important to make this list because doing so will rule out elements that might seem to be problems—such as the router in Office 2—that obviously aren’t. Of course, the ability to generate a list such as this example list requires a thorough understanding of how the network is built (having documentation such as the network diagram is invaluable) and a thorough knowledge of how the network operates. For example, if you don’t know how computers resolve names to IP addresses, you might not suspect the DNS server.

    Breaking the Testable Systems in HalfNext, develop some logical means of dividing the land in half. In this case, about half the potential problems seem to be router-related, and the other half are client-related; breaking the list along those lines creates a basically even set of possibilities.

    Router Problems Client Problems Bad routes in Office 1 router Laptop unplugged Bad routes in Office 3 router Desktop unplugged Office 1 router failed Stack failure in laptop Office 2 router failed Stack failure in desktop Bad WAN line DNS server failed

    Figure 3.4 illustrates how this process effectively divides your suspect subsystems into a logical half.

    Figure 3.4: Dividing the suspect subsystems into half.

    Now you need to build your wolf-proof fence down the middle by conducting a test.

    Performing TestsThe only useful troubleshooting tests are those that allow you to definitively eliminate some potential problem. For example, suppose you determine that the laptop computer also can’t connect to a server in Office 2. What have you proven? Well, nothing, really. You can’t even say for sure that the Office 3 router is OK, although it’s now less likely that it has failed or has a bad route. In other words, you haven’t built a wolf-proof fence at all.

    Suppose, however, that you are able to connect to computers on the Office 3 network from the laptop, and connect to computers on the Office 1 network from the desktop. That’s a definitive test: you can eliminate half of your suspect systems from the list because you’ve proven that they work.

    >> Stuck for tests? Go one-by-one. If you can’t readily think of a test that will result in your wolf-proof fence, you can just eliminate half of the list on a subsystem one at a time. For example, you can check the connections on both computers and ensure that they can ping their gateways to ensure that their stacks are functioning. You can use nslookup to test the DNS server(s) to eliminate them from the list. However, efficient troubleshooting requires you to be able to divide the list in such a way that one or two tests can eliminate half the list. That type of efficiency comes primarily with string knowledge of how the network works and with good old experience.

    Divide, Conquer, RepeatWith half the list out of the way, you can start working on the other half. Figure 3.5 illustrates the systems you’ve eliminated, including DNS servers at each office (shown in the diagram as Server1B and Server3B), the client computers, and their network connections.

    Figure 3.5: Half the suspect systems eliminated, with just the green-colored half to go.

    Additional tests at this point could involve logging on to one of the two routers and attempting to ping the other one. That test, if it worked, would eliminate the WAN links as a potential suspect and let you know that at least the routers’ external interfaces are up and running. You’d be down to a quarter of your original list, and the odds would start looking good for a bad route in one of the routers. Manually checking the routing tables would let you know whether that was the problem.

    ShortcutsIn some cases, you might be able to go after the entire list of suspect systems with one good test. For example, running tracert from the laptop to the desktop will help you eliminate most, if not all, of the suspect systems. If DNS has failed, tracert will tell you so. If it’s a local connectivity issue, you’ll see that in the results. If a router has a bad route, you’ll see that in the results, too. A WAN failure won’t be distinguishable from a failed router interface, but you’ll at least have narrowed the list to two possible candidates.

    >> Know your tools! Another trick to performing this methodology is having thorough knowledge of the troubleshooting tools at your disposal. Knowing what ping, pathping, and tracert can do, for example, will enable you to select the most effective test for eliminating a particular subsystem.

    Selecting the right testing tools can make all the difference, particular with regard to efficiency. For example, if you were following the troubleshooting path I’ve been using, you might have spent an hour or so figuring out that a bad route was at fault. Tracert, however, could have brought you to this conclusion in 5 minutes or so. However, you would have found the problem either way, eventually, proving that the methodology is useful even to an administrator without years of experience.

    Now It’s a ScienceWhere do most new administrators get caught up? First, they might not completely understand how the network functions, so they ignore suspect subsystems and spend their time troubleshooting only part of the problem. Second, they often don’t perform conclusive tests—they might incorrectly eliminate a suspect subsystem, and waste time looking for wolves in the wrong part of Siberia.

    It’s a simple methodology, one that experienced administrators follow almost without thinking about it—which makes it difficult to teach to newer personnel. To summarize:

  • Identify the actual cause of the problem
  • List suspect subsystems
  • Break the list into halves so that one half can be eliminated by one or two conclusive tests
  • Perform conclusive tests to focus on one half or the other; repeat the process by splitting what’s left into half
  • Ensure that all tests can conclusively eliminate something; essentially, all tests must prove that something is either working or not with no room for question
  • This tried-and-true methodology becomes instinctive through experience, but for less experienced technical professionals, it can make the daunting task of network troubleshooting more approachable, methodical, and efficient.

    Tips and Tricks Guide to Network Configuration Management

    To download/read the eBook in its entirety, visit: http://www.alterpoint.com/ebook

    You’re ready to email Changed.txt, the file that contains any changes found in your device configuration files. You’ll need a command-line email utility, such as BySoft’s Command Line E-mailer at http://www.bysoft.se. Create a third batch file with this command: Copyright 2003 Realtimepublishers.com, Inc. This text is excerpted from the eBook , Chapter 3: Network Management Troubleshooting


    Direct Download of over 5500 Certification Exams

    3COM [8 Certification Exam(s) ]
    AccessData [1 Certification Exam(s) ]
    ACFE [1 Certification Exam(s) ]
    ACI [3 Certification Exam(s) ]
    Acme-Packet [1 Certification Exam(s) ]
    ACSM [4 Certification Exam(s) ]
    ACT [1 Certification Exam(s) ]
    Admission-Tests [13 Certification Exam(s) ]
    ADOBE [93 Certification Exam(s) ]
    AFP [1 Certification Exam(s) ]
    AICPA [2 Certification Exam(s) ]
    AIIM [1 Certification Exam(s) ]
    Alcatel-Lucent [13 Certification Exam(s) ]
    Alfresco [1 Certification Exam(s) ]
    Altiris [3 Certification Exam(s) ]
    Amazon [2 Certification Exam(s) ]
    American-College [2 Certification Exam(s) ]
    Android [4 Certification Exam(s) ]
    APA [1 Certification Exam(s) ]
    APC [2 Certification Exam(s) ]
    APICS [2 Certification Exam(s) ]
    Apple [69 Certification Exam(s) ]
    AppSense [1 Certification Exam(s) ]
    APTUSC [1 Certification Exam(s) ]
    Arizona-Education [1 Certification Exam(s) ]
    ARM [1 Certification Exam(s) ]
    Aruba [6 Certification Exam(s) ]
    ASIS [2 Certification Exam(s) ]
    ASQ [3 Certification Exam(s) ]
    ASTQB [8 Certification Exam(s) ]
    Autodesk [2 Certification Exam(s) ]
    Avaya [96 Certification Exam(s) ]
    AXELOS [1 Certification Exam(s) ]
    Axis [1 Certification Exam(s) ]
    Banking [1 Certification Exam(s) ]
    BEA [5 Certification Exam(s) ]
    BICSI [2 Certification Exam(s) ]
    BlackBerry [17 Certification Exam(s) ]
    BlueCoat [2 Certification Exam(s) ]
    Brocade [4 Certification Exam(s) ]
    Business-Objects [11 Certification Exam(s) ]
    Business-Tests [4 Certification Exam(s) ]
    CA-Technologies [21 Certification Exam(s) ]
    Certification-Board [10 Certification Exam(s) ]
    Certiport [3 Certification Exam(s) ]
    CheckPoint [41 Certification Exam(s) ]
    CIDQ [1 Certification Exam(s) ]
    CIPS [4 Certification Exam(s) ]
    Cisco [318 Certification Exam(s) ]
    Citrix [48 Certification Exam(s) ]
    CIW [18 Certification Exam(s) ]
    Cloudera [10 Certification Exam(s) ]
    Cognos [19 Certification Exam(s) ]
    College-Board [2 Certification Exam(s) ]
    CompTIA [76 Certification Exam(s) ]
    ComputerAssociates [6 Certification Exam(s) ]
    Consultant [2 Certification Exam(s) ]
    Counselor [4 Certification Exam(s) ]
    CPP-Institue [2 Certification Exam(s) ]
    CPP-Institute [1 Certification Exam(s) ]
    CSP [1 Certification Exam(s) ]
    CWNA [1 Certification Exam(s) ]
    CWNP [13 Certification Exam(s) ]
    Dassault [2 Certification Exam(s) ]
    DELL [9 Certification Exam(s) ]
    DMI [1 Certification Exam(s) ]
    DRI [1 Certification Exam(s) ]
    ECCouncil [21 Certification Exam(s) ]
    ECDL [1 Certification Exam(s) ]
    EMC [129 Certification Exam(s) ]
    Enterasys [13 Certification Exam(s) ]
    Ericsson [5 Certification Exam(s) ]
    ESPA [1 Certification Exam(s) ]
    Esri [2 Certification Exam(s) ]
    ExamExpress [15 Certification Exam(s) ]
    Exin [40 Certification Exam(s) ]
    ExtremeNetworks [3 Certification Exam(s) ]
    F5-Networks [20 Certification Exam(s) ]
    FCTC [2 Certification Exam(s) ]
    Filemaker [9 Certification Exam(s) ]
    Financial [36 Certification Exam(s) ]
    Food [4 Certification Exam(s) ]
    Fortinet [13 Certification Exam(s) ]
    Foundry [6 Certification Exam(s) ]
    FSMTB [1 Certification Exam(s) ]
    Fujitsu [2 Certification Exam(s) ]
    GAQM [9 Certification Exam(s) ]
    Genesys [4 Certification Exam(s) ]
    GIAC [15 Certification Exam(s) ]
    Google [4 Certification Exam(s) ]
    GuidanceSoftware [2 Certification Exam(s) ]
    H3C [1 Certification Exam(s) ]
    HDI [9 Certification Exam(s) ]
    Healthcare [3 Certification Exam(s) ]
    HIPAA [2 Certification Exam(s) ]
    Hitachi [30 Certification Exam(s) ]
    Hortonworks [4 Certification Exam(s) ]
    Hospitality [2 Certification Exam(s) ]
    HP [750 Certification Exam(s) ]
    HR [4 Certification Exam(s) ]
    HRCI [1 Certification Exam(s) ]
    Huawei [21 Certification Exam(s) ]
    Hyperion [10 Certification Exam(s) ]
    IAAP [1 Certification Exam(s) ]
    IAHCSMM [1 Certification Exam(s) ]
    IBM [1532 Certification Exam(s) ]
    IBQH [1 Certification Exam(s) ]
    ICAI [1 Certification Exam(s) ]
    ICDL [6 Certification Exam(s) ]
    IEEE [1 Certification Exam(s) ]
    IELTS [1 Certification Exam(s) ]
    IFPUG [1 Certification Exam(s) ]
    IIA [3 Certification Exam(s) ]
    IIBA [2 Certification Exam(s) ]
    IISFA [1 Certification Exam(s) ]
    Intel [2 Certification Exam(s) ]
    IQN [1 Certification Exam(s) ]
    IRS [1 Certification Exam(s) ]
    ISA [1 Certification Exam(s) ]
    ISACA [4 Certification Exam(s) ]
    ISC2 [6 Certification Exam(s) ]
    ISEB [24 Certification Exam(s) ]
    Isilon [4 Certification Exam(s) ]
    ISM [6 Certification Exam(s) ]
    iSQI [7 Certification Exam(s) ]
    ITEC [1 Certification Exam(s) ]
    Juniper [64 Certification Exam(s) ]
    LEED [1 Certification Exam(s) ]
    Legato [5 Certification Exam(s) ]
    Liferay [1 Certification Exam(s) ]
    Logical-Operations [1 Certification Exam(s) ]
    Lotus [66 Certification Exam(s) ]
    LPI [24 Certification Exam(s) ]
    LSI [3 Certification Exam(s) ]
    Magento [3 Certification Exam(s) ]
    Maintenance [2 Certification Exam(s) ]
    McAfee [8 Certification Exam(s) ]
    McData [3 Certification Exam(s) ]
    Medical [69 Certification Exam(s) ]
    Microsoft [374 Certification Exam(s) ]
    Mile2 [3 Certification Exam(s) ]
    Military [1 Certification Exam(s) ]
    Misc [1 Certification Exam(s) ]
    Motorola [7 Certification Exam(s) ]
    mySQL [4 Certification Exam(s) ]
    NBSTSA [1 Certification Exam(s) ]
    NCEES [2 Certification Exam(s) ]
    NCIDQ [1 Certification Exam(s) ]
    NCLEX [2 Certification Exam(s) ]
    Network-General [12 Certification Exam(s) ]
    NetworkAppliance [39 Certification Exam(s) ]
    NI [1 Certification Exam(s) ]
    NIELIT [1 Certification Exam(s) ]
    Nokia [6 Certification Exam(s) ]
    Nortel [130 Certification Exam(s) ]
    Novell [37 Certification Exam(s) ]
    OMG [10 Certification Exam(s) ]
    Oracle [279 Certification Exam(s) ]
    P&C [2 Certification Exam(s) ]
    Palo-Alto [4 Certification Exam(s) ]
    PARCC [1 Certification Exam(s) ]
    PayPal [1 Certification Exam(s) ]
    Pegasystems [12 Certification Exam(s) ]
    PEOPLECERT [4 Certification Exam(s) ]
    PMI [15 Certification Exam(s) ]
    Polycom [2 Certification Exam(s) ]
    PostgreSQL-CE [1 Certification Exam(s) ]
    Prince2 [6 Certification Exam(s) ]
    PRMIA [1 Certification Exam(s) ]
    PsychCorp [1 Certification Exam(s) ]
    PTCB [2 Certification Exam(s) ]
    QAI [1 Certification Exam(s) ]
    QlikView [1 Certification Exam(s) ]
    Quality-Assurance [7 Certification Exam(s) ]
    RACC [1 Certification Exam(s) ]
    Real-Estate [1 Certification Exam(s) ]
    RedHat [8 Certification Exam(s) ]
    RES [5 Certification Exam(s) ]
    Riverbed [8 Certification Exam(s) ]
    RSA [15 Certification Exam(s) ]
    Sair [8 Certification Exam(s) ]
    Salesforce [5 Certification Exam(s) ]
    SANS [1 Certification Exam(s) ]
    SAP [98 Certification Exam(s) ]
    SASInstitute [15 Certification Exam(s) ]
    SAT [1 Certification Exam(s) ]
    SCO [10 Certification Exam(s) ]
    SCP [6 Certification Exam(s) ]
    SDI [3 Certification Exam(s) ]
    See-Beyond [1 Certification Exam(s) ]
    Siemens [1 Certification Exam(s) ]
    Snia [7 Certification Exam(s) ]
    SOA [15 Certification Exam(s) ]
    Social-Work-Board [4 Certification Exam(s) ]
    SpringSource [1 Certification Exam(s) ]
    SUN [63 Certification Exam(s) ]
    SUSE [1 Certification Exam(s) ]
    Sybase [17 Certification Exam(s) ]
    Symantec [134 Certification Exam(s) ]
    Teacher-Certification [4 Certification Exam(s) ]
    The-Open-Group [8 Certification Exam(s) ]
    TIA [3 Certification Exam(s) ]
    Tibco [18 Certification Exam(s) ]
    Trainers [3 Certification Exam(s) ]
    Trend [1 Certification Exam(s) ]
    TruSecure [1 Certification Exam(s) ]
    USMLE [1 Certification Exam(s) ]
    VCE [6 Certification Exam(s) ]
    Veeam [2 Certification Exam(s) ]
    Veritas [33 Certification Exam(s) ]
    Vmware [58 Certification Exam(s) ]
    Wonderlic [2 Certification Exam(s) ]
    Worldatwork [2 Certification Exam(s) ]
    XML-Master [3 Certification Exam(s) ]
    Zend [6 Certification Exam(s) ]





    References :


    Dropmark : http://killexams.dropmark.com/367904/11740133
    Wordpress : http://wp.me/p7SJ6L-1pL
    Dropmark-Text : http://killexams.dropmark.com/367904/12306854
    Issu : https://issuu.com/trutrainers/docs/c9560-659
    Blogspot : http://killexamsbraindump.blogspot.com/2017/11/pass4sure-c9560-659-real-question-bank.html
    RSS Feed : http://killexams.com/datafiles/rss/C9560-659-rss.xml
    Box.net : https://app.box.com/s/04xpsn795bexqpwndfcmj3rr5uedsggu
    zoho.com : https://docs.zoho.com/file/62c50c96d93b9c9b54e51b7d3aa5285c0e579






    View Practice Questions »

    We Make Sure Q&A work for you!

    See Entry Test Preparation   |   Project Management, English Tests Home

    Pass4sure PDFs (Pass4sure Questions and Answers), Viewable at all devices like PC Windows (all versions), Linux (All versions), Mac / iOS (iPhone/iPad and all other devices), Android (All versions). It support High Quality Printable book format. You can print and carry anywhere with you, as you like.

    Testing and Training Engine Software (Pass4sure Exam Simulator) Compatible with All Windows PC (Windows 10/9/8/7/Vista/XP/2000/98 etc). Mac (Through Wine, Virtual Windows PC, Dual boot). It prepares your test for all the topics of exam, gives you exam tips and tricks by asking tricky questions, uses latest practice quiz to train you for the real test taking experience in learning mode as well as real test mode. Provides performance graphs and training history etc.

    Read more »

    More Useful Links about C9560-659

    Certification Vendors Here   |   View Exams, Latest Home

    Information Links



    References:


    Killexams Exam Study Notes | study guides - list.php
    Pass4sure [EC] Certification Exam Questions and Answers - www.founco.com
    Certification Questions and Answers | Exam Simulator | Study Guides - allsoulsholidayclub.co.uk
    Real exam Questions and Answers with Exam Simulators - kamerainstallation.php
    Pass4sure [EC] Certification Exam Study Notes - pass4sure-cert.php
    Certification Questions and Answers | Exam Simulator | Study Guides - www.rafflesdesignltd.com
    Get Great Success with Pass4sure Exam Questions/Answers - alchemiawellness.com
    Kill exams certification Training Exams - levantoupoeira.php
    Kill exams certification Training Exams - www.sitespin.co.za
    Killexams [EC] Exam Study Notes | study guides - pass4sure-cert.php
    Killexams [EC] Exam Study Notes | study guides - pass4sure-cert.php

    View Practice Questions »

    Services Overview

    We provide Pass4sure Questions and Answers and exam simulators for the candidates to prepare their exam and pass at first attempt.

    Contact Us

    As a team are working hard to provide the candidates best study material with proper guideline to face the real exam.

    Address: 15th floor, 7# building 16 Xi Si Huan.
    Telephone: +86 10 88227272
    FAX: +86 10 68179899
    Others: +301 - 0125 - 01258