...2013 PoSHServer Documentation AUTHOR: YUSUF OZTURK (MVP) http://www.poshserver.net Contents Introduction............................................................................................................................................. 2 Installation ............................................................................................................................................... 2 How to start PoSHServer? ....................................................................................................................... 5 How to run PoSHServer jobs with different user credentials?.............................................................. 11 How to set default document?.............................................................................................................. 12 How to change log schedule?................................................................................................................ 12 How to enable basic authentication?.................................................................................................... 13 How to enable windows authentication? ............................................................................................. 15 How to enable directory browsing? ...................................................................................................... 15 How to enable IP restriction? ................................................................................
Words: 3517 - Pages: 15
...FINAL YEAR PROJECT On DESIGNING A SIMULATOR TO IMPLEMENT A JOB SCHEDULER BASED ON DIFFERENT POPULAR CPU SCHEDULING ALGORITHMS Submitted as partial fulfillment for the award of BACHELOR OF TECHNOLOGY Session 2014-15 In Computer Science & Engineering Under the guidance of Mr.MrinmoySen By AnanyaDas(11/CS/15, ananyadas092@gmail.com, +919681851782) AnshumanMahanty(11/CS/23, anshumanmahanty1@gmail.com, +917501169824) SayaniBanerjee(11/CS/93, sayanibanerjee.1@gmail.com, +919046422003) HALDIA INSTITUTE OF TECHNOLOGY, HALDIA CERTIFICATE This is to certify that the final year project (CS792) on ‘Designing a Simulator implementing job scheduler based on different popular CPU scheduling algorithms’ has been completed and submitted successfully by the project members Ananya Das (11/CS/15), Anshuman Mahanty (11/CS/23) and Sayani Banerjee (11/CS/93). ------------------------- -------------------------------- --------------------------- Mr. Tarun Kumar Ghosh Mr. Sourav Mandal, Mr. Mrinmoy Sen Head of the Department, Convenor, Asst. Prof., Project Mentor, Asst. Prof., Computer Science & Engg. Project Evaluation Committee Department of CSE ACKNOWLEDGEMENTS We use this opportunity to express our gratitude to everyone who has supported us through the ongoing course of this final year project. The project owes its success not just...
Words: 6989 - Pages: 28
...Ind. Eng. Chem. Res. 2010, 49, 8657–8669 8657 Single-Stage Scheduling of Multiproduct Batch Plants: An Edible-Oil Deodorizer Case Study Songsong Liu,† Jose M. Pinto,‡ and Lazaros G. Papageorgiou*,† Centre for Process Systems Engineering, Department of Chemical Engineering, UniVersity College London, Torrington Place, London WC1E 7JE, U.K., and Process Systems R&D, Praxair Inc., 39 Old Ridgebury Rad, Danbury, Connecticut 06810 This article considers the short-term scheduling of a single-stage batch edible-oil deodorizer that can process multiple products in several product groups. Sequence-dependent changeovers occur when switching from one product group to another. Based on the incorporation of products into product groups, mixed integer linear programming (MILP) models are proposed for two scenarios, with and without backlogs. Then, the models are successfully applied to a real-world case with 70 product orders over a 128-h planning horizon. Compared with a literature model developed for a similar problem, the proposed models exhibit significantly better performance. 1. Introduction In the past decade, a large number of optimization models and approaches have been proposed for batch scheduling and planning. A number of reviews on the planning and scheduling of batch processes have been presented in the literature.1-6 Initially, discrete-time formulation models using the state-task network7 (STN) or resource-task network8 (RTN) were used for batch scheduling problems...
Words: 7686 - Pages: 31
...1. What is the primary place to store log files on a local Linux system and what are recommended procedures for that location? Almost all logfiles are located under /var/log directory It is very important that the information that comes from syslog not be compromised. Making the files in /var/log readable and writable by only a limited number of users is a good start. 2. Why remote logging to a central server is considered a best practice? To identify a baseline system state with the use of the logs & to keep the information from prying eyes. 3. What is the syntax and file you would edit with the necessary entries to send syslogs from your Linux system to a logging server at 172.130.1.254? su –c ’ vi/etc/rsyslog.conf ‘, then remove the # from in front of $ModLoadimudp and $UDPServerRun514 if it hasn’t already been done. Then add a line below remote host with the following syntax *.*@@172.130.1.254:541 4. Why is the “Tripwire” application considered a file integrity checker? File Integrity Monitoring is available as a standalone solution or as part of Tripwire’s Security Configuration Management suite, where you have continual assurance of the integrity of security configurations and complete visibility and control of all change for your continuous monitoring, change audit and compliance demands. 5. Could rkhunter be considered a file integrity checker? Why or why not? Rootkit Hunter is considered a file integrity checker because it...
Words: 608 - Pages: 3
...SAD workshop 12-Revision Following questions cover the revision for the topic for this unit and also are the examples of short answer type questions that could be asked. Please attempt these question in class and discuss with your tutor during workshop time. 1. What is information technology and why is it important? 2. Describe three systems development methodologies and three development approaches /methods. 3. What are four types of feasibility? Which type focuses on total cost of ownership? Which type is influenced primarily by users? 4. Describe the six steps in a typical preliminary investigation. Why should an analyst be careful when using the word problem? 5. Identify and briefly describe five common fact-finding methods. 6. What is risk management, and why is it important? Provide an example. 7. What is agile approaches/methods? Are they better than traditional approaches/methods? Why or why not? 8. What is context diagram? Draw a context diagram that represents the information system at a typical library. 9. Explain the relationship between logical and physical design. 10. What is the difference between a detail report, a summary report, and an exception report? 11. What is a DBMS? Briefly describe the components of a DBMS. 12. Is batch processing still relevant? Why or why not? 13. Why is a post-implementation evaluation important? Who should conduct it, and why? 14...
Words: 262 - Pages: 2
...Q.1 a) There are various processing methods in terms of accounting. Processing method refers to the system through a data related to accounting or any other field is gathered in order to generate meaningful analysis and results from that data. The two most important processing methods are batch processing and online real time processing. The basic difference between the two methods is that of time frequency with which the data is entered in to the system for information purposes. Under batch processing the data is assembled in batches, and then it is entered into system for processing. E.g. a company may like to record its inventory at the end of every month. So instead of taking inventory and processing it into system daily, the inventory is recorded every day and at the end of the month, the entire “batch” of inventory is recorded in the system for processing. While in the online real time processing the transaction is processed or entered in to the system as soon as the transaction is done. The best example of online real time processing is the ATM Card or Debit Card. As soon as a transaction takes place on the ATM, it is recorded and is processed right on the spot. Thus in online real time processing the actual balance perfectly reflects the current position. Q.1 b) The grandfather-father-son technique refers to the data backup technique. In grandfather-father-son technique the data backup is maintained in such a way that if the most recent data backup is lost...
Words: 818 - Pages: 4
...1.2 Roles and responsibilities of accommodation: Front Desk administrator and Staff The front desk staff will take suspicions by phone, cancel reservations, check in visitors, check guests out, and keep the front reception desk area and entrance hall clean and respectable. As a front desk negotiator, you may be necessary to help in other areas of the hotel, such as cleaning, during demanding seasons or if staff is short-staffed .You will be in charge for large amounts of cash, authorizing guest refunds, and attractive care of any guest complaints or room issues. Housekeeping Staff and Laundry Housekeepers are in charge for the sanitation of all rooms in such a way that a guest would not appreciate someone had just checked out of the space earlier that same daybreak. You will also stripe all linen off each double bed and make each bed according to the hotel principles. The guest rooms are carefully cleaned and clean before a guest arrives. Smaller hotels may need the housekeepers to do the laundry, which will require you to wash, dry and fold all linens, as well as sheets, pillowcases, comforters and blankets. As a laundry person, you would be requisite to also take away stains that may be in any linen, when potential. Hotel receptionists, like hostesses in a bistro, are the first contact a person has when incoming an organization. A Hilton and Marriott hotel receptionist gives a first intuition of the entire hotel. Helpful, personable, specialized and efficient overhaul...
Words: 374 - Pages: 2
...CONTENTS S.No. Title 1 Introduction 1.1 project background 1.2 Problem statement 1.3 Project objectives 2 Project Deliverables 2.1 Introduction project management and 2.2 planning 2.3 Analysis 2.4 Design 2.5 Implementation 2.6 2.7 3 Testing Evaluation Research 3.1 Research on strategy 3.2 Research on similar project 3.3 Research on methodologies Research on Development 3.4 tools 4 References Page Number 1 1 3 3 3 3 4 5 5 6 7 8 8 8 8 9 12 14 1 THE WORKING OF ATM Chapter 1: Introduction 1.1 project background Automated teller Goods (Automatic teller equipment) will often be a growing number of utilized these days as a possible easy and simple, hassle-free assortment with regards to guide Tellers. However, there may be present research upwards with regards to quite a few apparent many different numerous insecurities by way of ATMs, their own features and the way they may be successful. This kind of forms identifies what sort of financial institution works usually in addition to signifies specific issues regarding security through employing these kinds of Cash machine gadgets. Evaluation signifies that existing Bank techniques appear to offer we “security through obscurity” instead of the a lot encouraged “open, specialist review” strategy. This may at risk of become due to Financial institution businesses never improving their unique executive so that we can preserve computability along with ATM machine vendors. Work with a considerably guarded style concerning financial...
Words: 5025 - Pages: 21
...The article presents a study which aims to analyze the role of information technology (IT) in the Indian banking industry. Indian banks are investing heavily in the technologies such as automated teller machine (ATMs), net banking, mobile banking, tele -banking, credit cards, debit cards, smart cards, call centers, CRM, data warehousing etc. It is essential to evaluate the impact of information technology on the performance of Indian banks in terms of extended value added services and customer satisfaction thereby. Foreign banks and Private sector banks which took more IT initiative, were found to be more efficient and more competent force than public sector banks in India. Based on the article, technological innovations have enabled the industry to open up efficient delivery channels. It is said that IT has helped the banking industry to deal with the challenges the new economy poses. The study examines the views of banking customers on the implementation of IT in banks. According to the author, private and foreign banks use more IT-related banking services than public sector banks. Keywords and Abbreviations: Awareness level, Banking sector, Customer Satisfaction, ITeS, Security ATM – Automated Teller Machines / Any Time Money CBS – Core Banking Solution IAM – Investment and Assets Management CRM – Customer Relationship Management GRC – Governance Risk and Compliance IDRBT - Institute for Development and Research in Banking Technology...
Words: 318 - Pages: 2
...Information Systems Description Assignment Business Information Systems 100 School of Information Systems Curtin University 23/7/12 • v4.0 Student and Workshop Details | | | |Information |Enter Your Details | |Student Name: |Thet Khant Oo | |Student Number: |16187025 | | | | |Assessment Item: |IS Description Assignment | |Institution / Location: |Curtin Singapore/Singapore | | | | |Workshop Leader Name: ...
Words: 1767 - Pages: 8
...Running head: ASSIGNMENT 2: USE CASES Assignment 2: Use Cases Lawrence A. Mayo, Jr. Dr. Johnnie E. Drake CIS 210 11/4/12 Abstract Your abstract should be one paragraph and should not exceed 120 words. It is a summary of the most important elements of your paper. All numbers in the abstract, except those beginning a sentence, should be typed as digits rather than words. To count the number of words in this paragraph, select the paragraph, and on the Tools menu click Word Count. Assignment 2: Use Cases A use case is a methodology that is used in system analysis as a means to identify, clarify, and organize system requirements. The use cases has make up of several possible sequences for users to interact with a system of a particular environment that is in relation to a particular goal. There are a group of elements that the use case consists of, these elements in be in either the classes or interfaces category. Use cases give a description of how users will perform tasks. There are two main parts of a use case; the steps a user will take to accomplish a particular task on the ATM machine, and the way the ATM should respond to the user's actions. A use case will begin with a user's goal and end when that goal is fulfilled. A use case will describe the interaction sequence between a user and an ATM machine. Each use case captures the actor (the user of the ATM machine), the interaction (what does the user want to do?), and the goal (what is the user's goal?). Writing...
Words: 1139 - Pages: 5
...Use Cases Christopher Dole Professor Jennifer Merritt CIS210: Systems Analysis and Development 3 February 2013 A use case diagram demonstrates the uses and requirements of a process and its actors. When creating use case diagrams they should be simple and easy to understand so that all levels of outside users can see and understand the roles they have in the overall project (Chen, Slides 6,7). In my first use case we see a use case that addresses the actors and actions for an ATM withdrawal. The use case diagram is simplified and shows how a customer will use an ATM machine to request a withdrawal. It shows the initial interaction in which it is understood the customer will need to enter their ATM Card and provide their PIN to gain access to the account information that is magnetically stored on their card. The high level overview shows a real basic path of the customer requesting a withdrawal and the ATM sending the request to the bank where it receives a confirmation or denial of funds available and then a response is sent to the customer in the form of approval and funds dispersed or a denial. Both will provide a receipt to the customer with the updated balance information or reason for denial. This simple image would be something to provide an Administrator or the like who would be interested simply in the quick path of what is expected. The next UML diagram I included breaks the USE Case into a more specific pattern that shows the events that will take place within...
Words: 1948 - Pages: 8
...Topic: “The effects of road traffic congestion on residential decision- making of inhabitants of the city of Accra- A case study of communities along three congested routes” Transportation is essentially a response to the mobility needs of people, and this must be done in a timely fashion in order for people to realize its full benefits. Consequently, transportation plays a crucial role in the socio-economic and politico-cultural development of people and their communities. However, there are some related problems (such as congestion, mobility gaps, urban sprawl, and emissions amongst others) that come with it. In Ghana, transportation is almost synonymous with road transport as it is the major means by which peoples’ mobility needs are answered on daily basis. Road traffic congestion in the city of Accra has almost become an’ acceptable norm’ since residents have to live with this phenomenon every passing day of their lives. The factors responsible for this trend are as follows: growth in the population of Accra over the last 15 years (and this has been estimated to double in the next 20 years) associated with a continuing trend of reduction in population density; expansion in built-up area; growth in per capital income (which has also been estimated to have increased five folds over the last 15 years) with a concomitant increase in car ownership. Currently over 70% of major roads in Accra and Kumasi-the two biggest cities in the country- are said to be congested and should the...
Words: 567 - Pages: 3
...ase CIS210: Systems Analysis & Design Week 6/Assignment 2: ATM Use Case November 15, 2015 The use case in this narrative describes the process and flow of data when a bank customer uses their debit or credit card when withdrawing funds from their account. The use case actors in this scenario are the bank itself and the customer. As a pre-verified condition, the following has already been introduced or pre-existing already within the bank location: a network connection within the bank and to the ATM, an ATM on-site and cash available for withdrawals from the ATM. * In this use case, the ATM withdrawal is consistent with that of data flow and customer selected options, similar to the process of a flow chart. This particular use case scenario, the following events are completed to withdraw funds from an ATM account: (Step 1) The use case begins when a customer inserts their debit/credit card into the ATM. (Step 2) After use case is initialized, the ATM network must validate the customer by requesting for card PIN. (Step 3) Various options are presented for the customer including balance, transfer, withdrawal, fast cash, etc. As part of this use case scenario, the customer wants a withdrawal transaction from the ATM. (Step 4) Customer selects “Withdrawal” from the available accounts shown on ATM display. (Step 7) ATM displays the amount a customer may withdraw with pre-determined amounts ($10, $20, $30, etc.) or “Other” option for customer to request a specific amount...
Words: 1393 - Pages: 6
...1. EXECUTIVE SUMMARY The project proposal is devoted to studying the current situation in the banking sector Nepal and to revealing of its core dependencies and potential risks in particular. The problem of the project is based on the statement that the banking sector in nepal exists only at rudimentary level because it has evolved difficult transition from highly centralized and planned economy to government-sector dominated, commodity-focused market economy of today. This project of “Banking" will give us the platform to use the software for basic banking purposes ranging from cash withdrawls to cash deposites.Using this software,customoers can access their bank accounts in order to make cash withdrawals,debit card cash advances and check their account balances.Moreover it also provides us with the background and infrastructres to run an ATM card. Through the project the focus has been on using the ATM on a simple and reliable manner which makes use of normal database and input/output operations to give the desired results to the customer. This project is based upon the basic uses and functioning of the ATM as a whole where a customer can create a bank account, deposit his/her balance and retrieve money using a credit or a debit card. Banking system software keeps the day to day transaction record as a part of complete banking.It can keep the information of the account type,account opening form,deposit and withdrawal and searches the transacton,transaction reports,individual...
Words: 1152 - Pages: 5