Dont waste your time on searching internet, just cross for those C9560-659 Questions and solutions.

C9560-659 exam questions | C9560-659 free online test | C9560-659 test exam | C9560-659 practice test | C9560-659 study questions - partillerocken.com



C9560-659 - Fundamentals of Applying IBM SmartCloud Control Desk V1 - Dump Information

Vendor : IBM
Exam Code : C9560-659
Exam Name : Fundamentals of Applying IBM SmartCloud Control Desk V1
Questions and Answers : 105 Q & A
Updated On : December 13, 2018
PDF Download Mirror : Pass4sure C9560-659 Dump
Get Full Version : Pass4sure C9560-659 Full Version


Did you tried this extremely good source of actual test questions.

I was trying to get ready for my C9560-659 test that was around the corner, I found myself to be lost in the books and wandering far away from the real point. I didnt understand a single word and that was really concerning because I had to prepare as soon as possible. Giving up on my books I decided to register myself on this partillerocken and that was the best decision. I cruised through my C9560-659 test and was able to get a decent score so thank you very much.

Do not waste your time on searching, just get these C9560-659 Questions from real test.

Thankyou partillerocken..ive cleared my C9560-659 examination with 92%. Your query bank was very beneficial. If all peoplepractices a hundred% sincerely out of your query set and research all the questions nicely, then hes going to definately be successful. till now i have cleared 3 other tests all with the help of your site. thank you again.

Exactly same questions in real test, WTF!

Knowing thoroughly about my time constraint, commenced out trying to find an clean way out before the C9560-659 exam. After a protracted searh, placed the question and answers via way of partillerocken which without a doubt made my day. Offering all probably questions with their quick and pointed solutions helped hold near subjects in a brief time and felt happy to secure real marks inside the exam. The materials also are clean to memorise. I am inspired and satiated with my results.

Did you tried this great source of actual test questions.

Im very glad with this bundle as I have been given over 96% in this C9560-659 examination. I look at the professional C9560-659 manual a bit, but I guess partillerocken modified into my number one training useful resource. I memorized most of the questions and answers, and also invested the time to in fact understand the eventualities and tech/practice centeredparts of the examination. I think that by way of manner of itself purchasing the partillerocken package deal does not assure that you maybypass your exam - and a few assessments are virtually difficult. However, in case you have a study their materials difficult and actually positioned your thoughts and your coronary heart into your examination steerage, then partillerocken sincerely beats some otherexamination prep alternatives to be had obtainable.

simply attempt these actual test questions and achievement is yours.

Like many others, ive currently handed the C9560-659 exam. In my case, sizable majority of C9560-659 examination questions got hereexactly from this manual. The solutions are correct, too, so if you are preparing to take your C9560-659 examination, you cancompletely depend upon this internet site.

just rely on this C9560-659 actual exam source.

Hi group, ive completed C9560-659 in first try and thank you lots on your useful question financial institution.

Great source of great actual test questions, accurate answers.

It is about new C9560-659 examination. I bought this C9560-659 braindump before I heard of replace so I notion I had spent cashon some thing i might no longer be able to use. I contacted partillerocken assist personnel to double test, and they cautioned me the C9560-659 examination have been up to date nowadays. As I checked it towards the extremely-cutting-edge C9560-659 examination goalsit virtually appears up to date. A number of questions were added compared to older braindumps and all regionsprotected. Im impressed with their overall performance and customer support. Searching beforehand to taking my C9560-659 exam in 2 weeks.

it's miles incredible ideal to put together C9560-659 exam with ultra-modern dumps.

I dont feel alone throughout exams anymore due to the fact i have a high-quality have a look at accomplice in the form of this partillerocken. not handiest that but I additionally have instructors whore prepared to guide me at any time of the day. This equal guidance turned into given to me for the duration of my assessments and it didnt be counted whether it changed into day or night time, all my queries were replied. im very grateful to the lecturers right here for being so greatand friendly and assisting me in clearing my very difficult exam with C9560-659 have a look at fabric and C9560-659 look at and sureeven C9560-659 self examine is first rate.

Take a smart move to pass C9560-659

partillerocken is a dream come true! This brain dump has helped me pass the C9560-659 exam and now Im able to apply for better jobs, and I am in a position to pick a better employer. This is something I could not even dream of a few years ago. This exam and certification is very focused on C9560-659, but I found that other employers will be interested in you, too. Just the fact that you passed C9560-659 exam shows them that you are a good candidate. partillerocken C9560-659 preparation bundle has helped me get most of the questions right. All topics and areas have been covered, so I did not have any major issues while taking the exam. Some C9560-659 product questions are tricky and a little misleading, but partillerocken has helped me get most of them right.

forget about the whole thing! simply forcus on those C9560-659 Questions and answers if you want to pass.

Im so glad I purchased C9560-659 exam prep. The C9560-659 exam is tough since its very broad, and the questions cover everything you see in the blueprint. partillerocken was my main preparation source, and they cover everything perfectly, and there have been tons of related questions on the exam.

See more IBM dumps

000-286 | 000-M605 | 000-M30 | 000-807 | 000-S32 | 000-N10 | C2170-010 | 000-740 | COG-702 | 000-559 | C9510-318 | C2040-440 | 000-597 | C2070-580 | C2040-917 | MSC-331 | 000-534 | 000-702 | LOT-440 | M2090-615 | 000-869 | C2090-603 | P2170-036 | C2090-625 | 00M-639 | C4090-958 | LOT-988 | 000-887 | C9550-606 | 000-600 | C2040-421 | 000-996 | 000-180 | C9020-970 | 000-935 | 000-605 | C2180-404 | M2060-730 | C2150-537 | 000-N33 | 000-R17 | C2180-181 | A4120-784 | 000-561 | 000-914 | 000-671 | C9520-422 | 00M-220 | C2040-928 | 000-724 |

Latest Exams added on partillerocken

1Z0-628 | 1Z0-934 | 1Z0-974 | 1Z0-986 | 202-450 | 500-325 | 70-537 | 70-703 | 98-383 | 9A0-411 | AZ-100 | C2010-530 | C2210-422 | C5050-380 | C9550-413 | C9560-517 | CV0-002 | DES-1721 | MB2-719 | PT0-001 | CPA-REG | CPA-AUD | AACN-CMC | AAMA-CMA | ABEM-EMC | ACF-CCP | ACNP | ACSM-GEI | AEMT | AHIMA-CCS | ANCC-CVNC | ANCC-MSN | ANP-BC | APMLE | AXELOS-MSP | BCNS-CNS | BMAT | CCI | CCN | CCP | CDCA-ADEX | CDM | CFSW | CGRN | CNSC | COMLEX-USA | CPCE | CPM | CRNE | CVPM | DAT | DHORT | CBCP | DSST-HRM | DTR | ESPA-EST | FNS | FSMC | GPTS | IBCLC | IFSEA-CFM | LCAC | LCDC | MHAP | MSNCB | NAPLEX | NBCC-NCC | NBDE-I | NBDE-II | NCCT-ICS | NCCT-TSC | NCEES-FE | NCEES-PE | NCIDQ-CID | NCMA-CMA | NCPT | NE-BC | NNAAP-NA | NRA-FPM | NREMT-NRP | NREMT-PTE | NSCA-CPT | OCS | PACE | PANRE | PCCE | PCCN | PET | RDN | TEAS-N | VACC | WHNP | WPT-R | 156-215-80 | 1D0-621 | 1Y0-402 | 1Z0-545 | 1Z0-581 | 1Z0-853 | 250-430 | 2V0-761 | 700-551 | 700-901 | 7765X | A2040-910 | A2040-921 | C2010-825 | C2070-582 | C5050-384 | CDCS-001 | CFR-210 | NBSTSA-CST | E20-575 | HCE-5420 | HP2-H62 | HPE6-A42 | HQT-4210 | IAHCSMM-CRCST | LEED-GA | MB2-877 | MBLEX | NCIDQ | VCS-316 | 156-915-80 | 1Z0-414 | 1Z0-439 | 1Z0-447 | 1Z0-968 | 300-100 | 3V0-624 | 500-301 | 500-551 | 70-745 | 70-779 | 700-020 | 700-265 | 810-440 | 98-381 | 98-382 | 9A0-410 | CAS-003 | E20-585 | HCE-5710 | HPE2-K42 | HPE2-K43 | HPE2-K44 | HPE2-T34 | MB6-896 | VCS-256 | 1V0-701 | 1Z0-932 | 201-450 | 2VB-602 | 500-651 | 500-701 | 70-705 | 7391X | 7491X | BCB-Analyst | C2090-320 | C2150-609 | IIAP-CAP | CAT-340 | CCC | CPAT | CPFA | APA-CPP | CPT | CSWIP | Firefighter | FTCE | HPE0-J78 | HPE0-S52 | HPE2-E55 | HPE2-E69 | ITEC-Massage | JN0-210 | MB6-897 | N10-007 | PCNSE | VCS-274 | VCS-275 | VCS-413 |

See more dumps on partillerocken

920-160 | 77-882 | JK0-U31 | 000-799 | 311-232 | 000-842 | HP0-757 | 351-080 | CAS-002 | HP0-660 | ES0-006 | HP0-Y11 | HP2-K33 | 000-M49 | 400-251 | IAAP-CAP | 650-082 | NS0-101 | 9L0-005 | 310-502 | LOT-983 | CSCP | 000-750 | F50-521 | 000-667 | 70-552-VB | 1V0-602 | FN0-405 | HP3-R95 | 1Z0-451 | 1Z0-591 | MOS-E2E | IFSEA-CFM | C2090-730 | 156-815-70 | SCNS-EN | 400-251 | C2180-374 | 000-355 | HP2-T21 | 000-M41 | 9A0-182 | 1Z1-507 | 650-026 | C_TADM70_73 | FC0-TS1 | 1Y0-308 | 700-039 | NS0-150 | P8010-088 |

C9560-659 Questions and Answers

Pass4sure C9560-659 dumps | Killexams.com C9560-659 real questions | [HOSTED-SITE]

C9560-659 Fundamentals of Applying IBM SmartCloud Control Desk V1

Study Guide Prepared by Killexams.com IBM Dumps Experts


Killexams.com C9560-659 Dumps and Real Questions

100% Real Questions - Exam Pass Guarantee with High Marks - Just Memorize the Answers



C9560-659 exam Dumps Source : Fundamentals of Applying IBM SmartCloud Control Desk V1

Test Code : C9560-659
Test Name : Fundamentals of Applying IBM SmartCloud Control Desk V1
Vendor Name : IBM
Q&A : 105 Real Questions

you recognize the fine and fastest manner to pass C9560-659 examination? I got it.
My call is Suman Kumar. Ive were given 89.25% in C9560-659 exam after getting your check materials. Thanks for imparting this form of beneficial examine material as the reasons to the answers are first-rate. Thanks killexams.Com for the super query financial organization. The excellent trouble about this query bank is the one of a kind answers. It permits me to apprehend the concept and mathematical calculations.


strive out those actual C9560-659 questions.
This C9560-659 unload is exceptional and is certainly really worth the money. Im now not crazy approximately deciding to buy stuff like that, however for the reason that exam is so luxurious and demanding, I decided it might be smarter to get a protection internet, meaning this package deal. This killexams.com sell off is simply desirable, the questions are legitimate and the solutions are correct, which ive double checked with a few buddies (every so often examination dumps give you incorrect answers, but now not this one). All in all, I handed my examination just the manner I hoped for, and now I suggest killexams.com to anybody.


Use real C9560-659 dumps with actual and popularity.
With simplest two weeks to move for my C9560-659 exam, I felt so helpless considering my negative education. however, needed to pass the test badly as I desired to alternate my task. eventually, i found the query and answer by way ofkillexams.com which eliminated my issues. The content material of the manual was rich and particular. The easy and quick answers helped make out the subjects without problems. awesome manual, killexams. also took help from C9560-659 reliable Cert guide and it helped.


Get those Q&As and go to vacations to put together.
im very glad with the C9560-659 QAs, it helped me lot in examination center. i can without a doubt come for different IBM certifications also.


I clearly experienced C9560-659 examination questions, there's not anything like this.
Its concise solutions helped me to perform good marks noting all questions below the stipulated time in C9560-659. Being an IT grasp, my competencies with appreciate are so forth need to be suitable. Not withstanding, proceeding with a customary employment with giant responsibilities, it became not easy for me to take a solid making plans. At that factor, I found out about the typically organized question and answer aide of killexams.Com dumps.


Can you believe, all C9560-659 questions I prepared were asked.
i am ranked very excessive amongst my magnificence friends on the list of awesome college students but it simplestoccurred once I registered on this killexams.com for a few exam assist. It became the excessive ranking studyingapplication in this killexams.com that helped me in joining the high ranks together with different exceptional students of my magnificence. The assets in this killexams.com are commendable due to the fact theyre particular and extraordinarily beneficial for practise thru C9560-659 pdf, C9560-659 dumps and C9560-659 books. i am glad to write these phrases of appreciation due to the fact this killexams.com deserves it. thanks.


splendid source! I were given actual test questions of C9560-659 exam.
I am C9560-659 certified now, thanks to this killexams.com website. They have a great collection of brain dumps and exam preparation resources, I also used them for my C9560-659 certification last year, and this time their sftuff is just as good. The questions are authentic, and the testing engine works fine. No problems detected. I just ordered it, practiced for a week or so, then went in and passed the C9560-659 exam. This is what the perfect exam preparation should be like for everyone, I recommend killexams.


wherein have to I test in for C9560-659 exam?
This killexams.Com from helped me get my C9560-659 accomplice confirmation. Their materials are simply beneficial, and the examination simulator is virtually wonderful, it completely reproduces the exam. Topics are smooth very with out troubles the usage of the killexams.Com observe fabric. The exam itself changed into unpredictable, so Im satisfied I applied killexams.Com Q&A. Their packs unfold all that I want, and that i wont get any unsavory shocks amid your examination. Thanx guys.


Really great experience!
Hello there fellows, just to tell you that I passed C9560-659 exam a day or two ago with 88% marks. Yes, the exam is hard and killexams.com Q&A and Exam Simulator does make life simpler - a great deal! I think this unit is the unrivaled reason I passed the exam. As a matter of first importance, their exam simulator is a gift. I generally adored the inquiry and-answer organization and tests of different types in light of the fact that this is the most ideal approach to learn.


wherein am i able to locate C9560-659 latest and up to date dumps questions?
every time I want to pass my certification take a look at to maintain my task, I immediately go to killexams.com and seek the specified certification take a look at, purchase and prepare the check. It clearly is worth admiring because, I constantly skip the check with exact scores.


IBM Fundamentals of Applying IBM

IBM looks to Disrupt Scientific analysis on the Blockchain | killexams.com Real Questions and Pass4sure dumps

The use circumstances for distributed ledger technology are on the upward thrust, as evidenced by IBM’s most fresh patent utility for open scientific analysis on the blockchain.

The tech significant envisions a system in which a blockchain represents an scan with particular person blocks produced from mission accessories together with analysis data, information analysis and effects in addition to put up-statistics evaluation and more all with block-linking capabilities to mirror the fame of modifications. The patent, which was filed with the U.S. Patent and Trademark office at yr-conclusion 2017, comes on the heels of a separate blockchain patent filed through IBM with an augmented reality and gaming center of attention.

The scientific research neighborhood has been plagued with a scarcity of transparency for information collection tied to the evaluation system, in line with which the blockchain is a probable antidote. Chief among the concerns is a scarcity of “devoted data” and maintaining tips from unauthorized adjustments, all of which the blockchain solves with facets like immutability and data protection.

IBM isn’t the handiest entity that is looking to disrupt this procedure amid what has been described as a “reproducibility disaster in analysis” and falsified records. but previously, different solutions involving the blockchain have fallen brief in addressing key points surrounding confidentiality, accessibility, using algorithms for tasks comparable to “automated correction” and more, all of which IBM takes on in its patent utility. The business also aspects to “limited platforms that allow for sharing guidance about scientific research and showing clear statistics assortment and evaluation steps,” which interferes with researchers getting credit score for the work they’ve performed.

IBM’s solution comprises a nimble computing ambiance for experiments on the blockchain, one that depends heavily on but isn't restricted to a cloud computing mannequin by which facts uploaded to public databases will also be tracked. They describe a blockchain equipment that is 2-pronged, comprised of both “the trustworthiness of the blockchain thought with open scientific research.” Their technology accomplishes this through placing scientific experiments on the blockchain, together with “data amassed, analysis performed and/or effects accomplished and in doing so bolsters the “trustworthiness and reproducibility of the facts and effects” amid the immutable nature of the blockchain.

IBM describes a “first block of research information and a 2nd block of analysis facts representing a log of an analysis carried out on the research records.” The expertise isn’t for static suggestions because the information can even be analyzed for the “reliability and provenance” of the guidance.

typical, the technology is designed to accelerate the scientific research procedure, giving the analysis group greater equipment to bring together, analyze, draw conclusions and make corrections on their work, a system that also spills into peer experiences, replicating experiments and evaluating the relevance of data all with the benefit of records safety that is inherent with the blockchain.

Featured picture from Shutterstock.

The put up IBM looks to Disrupt Scientific research on the Blockchain regarded first on CCN.


How IBM and pink Hat Will affect Your Cloud method | killexams.com Real Questions and Pass4sure dumps

Barring a heavy-surpassed strategy to the recent acquisition, IBM and crimson Hat can do some extraordinary issues out there.

IBM is a long method from making actual machines. That part of the enterprise went with Lenovo a couple of years in the past. So, what has been their focus ever seeing that? application and features. And, amongst those utility items and functions has been the cloud.

unless these days, you may also have heard little about IBM’s cloud presence. despite the fact i can assure you it’s there, it became basically struggling to compete with the likes of AWS, Azure, and even GCP. Now, with predictions like these from Gartner pointing out that by way of 2020, ninety% of organizations will adopt hybrid infrastructure administration capabilities and that the market in normal can be value $240 billion or extra – this became nearly as good a time as any to definitely take a dive into the cloud management and beginning ecosystem.

Image: Shutterstock

photo: Shutterstock

And IBM in fact took the plunge. in fact, this became the greatest acquisition or deal that IBM has ever gambled on all over its 107-12 months existence. In figuring out the know-how they simply took below their big Blue wings, it might actually repay.

What this ability for IBM, purple Hat, and your cloud

Let’s beginning with IBM. It’s been a difficult ride for this firm. as soon as conventional for regular increase and innovation, IBM has been struggling in terms of keeping up with primary business gamers. This stagnation changed into new and definitely uncomfortable for IBM’ers and fans alike. So, what to do? purchase a magnificent, multinational, open-source application enterprise that’s been constructing some main solutions. This contains purple Hat enterprise Linux, middleware solution JBoss, CloudForms, and the very powerful cloud and container management equipment – OpenShift.

For IBM, this capacity opening the aperture into a quick-paced and growing to be hybrid cloud market. Most of all, this potential targeting enterprise consumers and arming them with leading equipment around cloud administration. basically, the use of some of the trade’s most fulfilling container management options (OpenShift) will give IBM valued clientele the forms of equipment and capabilities to approach digital transformation efforts as well as complete technology modernization shifts.

The whole concept of "monolith to microservices" can be encompassed via this IBM+purple Hat deal. know-how like OpenShift will supply IBM a leading Kubernetes management platform able to offering real-world cloud-native options. This isn’t just IBM paperware from now on, with pink Hat, the ammunition is absolutely there. combine this with a much bigger portfolio of middleware and strong cloud-able (and validated) developer equipment and you have a extremely mighty story for hybrid cloud deployment and management.

“With IBM’s fresh circulation to containerize its middleware, nowadays’s landmark partnership between IBM and purple Hat offers valued clientele with extra alternative and adaptability. Our commonplace vision for hybrid cloud the usage of container architectures enables hundreds of thousands of organizations – from banks, to airlines, to executive groups - to entry leading technology from both businesses while not having to choose between public and private cloud.”

- Arvind Krishna, Senior vice chairman, IBM Hybrid Cloud

For IBM, red Hat (and OpenShift) is an instantaneous gateway right into a developer neighborhood that’s literally designing the architecture for business corporations and their hybrid cloud initiatives. Did IBM pay a top class for red Hat? You greater believe it. become it value it? Time will inform. Coming from behind isn't convenient, however this is a very good means to place a rapid engine to your cloud company.

For red Hat, there are pretty massive advantages, too. other than the big amounts of components and scale capabilities, red Hat is entrenching itself even extra into an business market that’s primed and able for the cloud. Now, think about leveraging crimson Hat tools to influence all of those stunning IBM customers that have been itching for an IBM-able hybrid cloud structure.

“through extending our lengthy-standing collaboration with IBM, we’re bringing collectively two main business utility systems in pink Hat OpenShift Container Platform and IBM Cloud deepest and adding the energy of IBM’s software and cloud options.”

- Paul Cormier, President, products and technologies, pink Hat

in line with a recent crimson Hat commentary, throughout the acquisition, IBM and purple Hat purchasers can now:

  • Maximize their existing expertise investments and move them extra simply to the hybrid cloud with IBM Cloud deepest and crimson Hat OpenShift serving as the regular foundation;
  • build and deploy containerized applications on one single, built-in container platform IBM Cloud private presenting a single view of all enterprise statistics;
  • allow developers to design, modernize, and set up new purposes greater right now while taking potential of IBM’s cloud-primarily based services akin to artificial intelligence (AI), cyber web of issues (IoT) and blockchain with IBM Cloud inner most on crimson Hat OpenShift Container Platform.
  • “becoming a member of forces with IBM,” stated pink Hat CEO Jim Whitehurst, “will deliver us with a stronger degree of scale, components and capabilities to speed up the affect of open supply as the basis for digital transformation and produce crimson Hat to an even wider viewers, all whereas keeping our enjoyable way of life and unwavering commitment to open supply innovation.”

    this is where I should pump the brakes, just a bit of. I in reality hope that IBM doesn’t go heavy-surpassed in making an attempt to exchange purple Hat’s market definition and culture. because if it tries to push crimson Hat to undertake a broader IBM cultural and corporate model, I don’t definitely see it ending neatly. Plus, I’m certain there are actually extra concerns from latest crimson Hat consumers: What’ll occur to RHEL? How does this affect licensing and the tools that i take advantage of? Do I deserve to analyze competitors like Pivotal or other options like Cloud Foundry? again, time will inform how this may all play out. My hope is for a simple integration, whereas preserving red Hat just as astonishing as it is these days.

    finally, it’s critical to have in mind what this can imply to your hybrid cloud and general cloud administration solution. Barring a heavy-handed method to this acquisition, IBM and pink Hat can do some definitely brilliant things in the market. here is honestly the first time in a long time that IBM pushed itself into the forefront of cloud, container, and hybrid cloud innovation. The enjoyable part is how IBM will integrate other options, Watson as an instance, into purple Hat products. If completed correct, there may also be loads of advantages for the consumer, organisations, and the cloud in well-known. I’m staying confident.

    invoice is an enthusiastic technologist with journey in loads of industries. This comprises statistics center, cloud, virtualization, protection, AI, mobility, area options, and an awful lot extra. His architecture work contains giant virtualization and cloud deployments in addition to ... View Full Bio We welcome your feedback on this theme on our social media channels, or [contact us directly] with questions in regards to the site.

    greater Insights


    Cloudy climate forward for IBM and purple Hat? | killexams.com Real Questions and Pass4sure dumps

    the area is buzzing concerning the application industry’s largest acquisition ever. This “online game altering” IBM acquisition of pink Hat for $34 billion eclipses Microsoft’s $26.2 billion of LinkedIn, which set the outdated list. And it’s the third greatest tech acquisition in historical past at the back of Dell buying EMC for $sixty four billion in 2015 and Avago’s buyout of Broadcom for $37 billion the same 12 months.

    Wall highway certainly receives fearful when it sees these lofty expense tags. IBM’s inventory changed into down four.2 percent following the announcement, and there are doubtless more concerns over a broader IBM selloff round how tons IBM is purchasing purple Hat.

    This units the stage for massive expectations on IBM to leverage this asset as a critical turning factor in its heritage. in view that IBM’s Watson AI poster child has failed to create sustainable increase, could this be their ideal chance to correct the ship as soon as and for all? Or is that this mega merger a complicated conflict of cultures and items with a purpose to make it tough to recognise the complete advantage?

    huge Blue’s been in huge obstacle

    When the chips are down, it’s time to go all in. massive Blue definitely shocked the expertise world when it announced it might do its biggest deal ever and purchase pink Hat for a huge 11x premium. The fact is that purple Hat became now not always trying to be obtained, so overpaying became the handiest conceivable alternative. And if IBM didn’t pay, Google, Amazon, VMWare and even Alibaba would have.

    determined instances demand determined measures. IBM has been struggling to reveal boom in new markets for rather a while. earlier than 2018, it had 22 straight quarters of salary decline. And it has lost over $28 billion in income over the past six years. Its revenue on the conclusion if 2017 become $79.14 billion, the bottom in two decades and the more severe annual quantity in view that 1997, when IBM revenues were $seventy eight.51 billion, except for inflation.

    In early 2018, IBM was capable of produce three consecutive quarters of salary boom, but that turned into above all because of the introduction of a brand new line of IBM Z mainframe computer systems.

    IBM has been a business in decline for a long time. It’s hard to maintain a enterprise with shrinking sales.

    Too ancient to develop?

    IBM is more than a hundred years historical and certainly suffers from comparisons to younger and nimbler agencies corresponding to Amazon, Google, fb, and Apple that have posted record growth in recent instances. Amazon’s fresh profits have surpassed $2 billion, for instance.

    if you contrast IBM to Microsoft, one other historical world utility company, it’s startling to look the difference in how Microsoft has been capable of reposition itself as growth business in line with the cloud.

    In 1990, when Microsoft liberate windows 3.0, IBM had revenues of $sixty nine billion (handiest $10 billion shy of what it has nowadays), while Microsoft had around $800 million. Microsoft surpassed IBM in revenue in 2015 and crossed the $100 billion annual profits mark in 2018.

    during the last a number of years, as IBM’s profits shrank, Microsoft invested in its “business cloud” enterprise that encompasses Azure, office 365, and Dynamics 365, bringing in over $23 billion in new revenues. Microsoft has these days been firing on all cylinders whereas IBM experienced growth stalls.

    sluggish to get to the cloud

    IBM’s success within the hardware enterprise, in particular it’s Z-sequence mainframes, pressured it to give protection to its turf and distracted it from seeing the future influence of cloud. AWS begun offering public cloud capabilities lower back in 2006. As late as 2011, IBM become barely citing the be aware “cloud” in its annual reviews or revenue calls. The company at last realized in 2013 that cloud computing changed into the future and made a hail-Mary purchase of SoftLayer to bridge the gap, paying $2 billion after which investing an additional $1 billion to combine the platform.

    It’s challenging to set up enormous market share in the event you’re late to the party. Softlayer’s global market share is still a distant fifth in the back of AWS, Microsoft, Google, and even brisker newcomer Alibaba, which handed IBM’s cloud revenues in June of 2018.

    IBM made a number of different cloud-connected acquisitions, including Gravitant (a cloud brokerage and management utility), Bluebox (a private cloud as a service platform according to OpenStack), Sanovi (a hybrid cloud healing and migration application), Lighthouse and CrossIdeas (both cloud security platforms), and CSL international (a cloud virtualization platform).

    regardless of these acquisitions within the cloud market, IBM has didn't truly monetize these products and profit market share in the cloud.

    The company has failed to capitalize on innovations before: Watson AI became at the proper of its online game when it debuted on Jeopardy in 2011 to beat human contestants but immediately fell at the back of Amazon, Google, and Microsoft.

    Will red Hat be the savior?

    crimson Hat is the world’s greatest provider of open-supply business software options. crimson Hat’s bread and butter Linux company continues to deliver growth in particular as it powers many contemporary AI and analytics workloads. Its mannequin has evolved from in simple terms on-premise to a healthy subscription company used on public cloud systems comparable to Amazon net features (AWS), Microsoft Azure, and Google Cloud Platform (GCP).

    crimson Hat has also extended into open middleware solutions akin to OpenStack, a cloud infrastructure platform, and OpenShift, a platform for managing application containers. OpenShift has lengthy been a smartly-saved secret as Cloud Native Computing foundation (CNCF) has grabbed many of the headlines with its Kubernetes container orchestration platform. IBM has an opportunity to leverage its advertising and marketing and world reach to inspire mainframe and legacy shoppers to adopt OpenShift. These systems have been incredibly leveraged in private and hybrid cloud deployments, notably in industries like telecommunications.

    There isn't any doubt that purple Hat gives IBM a lots extra credible cloud story. however the question definitely is, is it too late?

    The acquisition is certainly first rate information for organizations trying to shift basic container-based applications and digital machines to the cloud. however, Amazon has already captured a major a part of that market.

    whereas the acquisition of crimson Hat offers IBM a robust position within the hybrid-cloud market, which should be regularly occurring for enterprises that aren't taking the time to decommission or re-architect legacy functions, the quickly-turning out to be public cloud market may be the battleground of the long run.

    Will the mixing get messy?

    IBM has had a spotty listing when it comes to integrating and capitalizing on enormous acquisitions.

    whereas the majority of IBM’s M&A has been in the area of utility, revenue in the section has been disappointing. perhaps what's concerning is that adjusting for acquisitions, IBM’s software enterprise continues to say no — mostly due to the indisputable fact that these tremendous acquisitions have become a part of the IBM cloth and business as commonplace.

    Can IBM integrate some thing as big as purple Hat without interfering with its core price proposition? Many worry that large Blue will try to “blue wash” their platform of option.

    And there’s the query of no matter if these two distinct company cultures can come collectively – IBM, a gradual boom business not making an awful lot progress in the cloud house, and red Hat, an creative, open supply business it truly is constructing foundational accessories for operating within the cloud.

    We’ve considered lifestyle clashes derail many different high profile mergers equivalent to HP/Compaq, HP/Autonomy, Microsoft/Nokia, AOL/Time Warner, dash/Nextel and Alcatel/Lucent. IBM will should embrace the open source community and strategy.

    The joint company will face important platform selections on the cloud front. IBM has a public cloud that competes with AWS and Microsoft. however developers use crimson Hat’s Linux on many public clouds. whereas that multi-cloud approach will assist IBM usher in earnings throughout the public clouds, it is going to create battle with its own Softlayer cloud offering. IBM has struggled to control this classification of channel and product conflict correctly in the past.

    after which there's the way forward for IBM’s own AIX working system vs. Linux — not to point out the SCO-IBM Unix lawsuit still lingering in the courts.

    additionally to observe are the lesser regular pink Hat storage items like purple Hat Ceph (an object file storage) and pink Hat Gluster (a NAS product). As purple Hat integrates into IBM’s hybrid cloud community, these storage items might be separated from IBM, which may create confusion and battle.

    So while IBM actually faces a lot of possibility with the acquisition, there is not any assure this huge bet will pay off. IBM needed a bold circulation. however within the short term, we're not likely to look any unexpected movement of IBM’s position in the public cloud space. All eyes will be on its potential to catapult into the hybrid cloud market. For that, the business will should make sure it doesn’t get in its personal way.

    Frank Palermo is the executive vice president at Virtusa’s global Digital business, where he is chargeable for technology practices in UX, mobility, social, cloud, analytics, huge facts, and IoT.


    C9560-659 Fundamentals of Applying IBM SmartCloud Control Desk V1

    Study Guide Prepared by Killexams.com IBM Dumps Experts


    Killexams.com C9560-659 Dumps and Real Questions

    100% Real Questions - Exam Pass Guarantee with High Marks - Just Memorize the Answers



    C9560-659 exam Dumps Source : Fundamentals of Applying IBM SmartCloud Control Desk V1

    Test Code : C9560-659
    Test Name : Fundamentals of Applying IBM SmartCloud Control Desk V1
    Vendor Name : IBM
    Q&A : 105 Real Questions

    you recognize the fine and fastest manner to pass C9560-659 examination? I got it.
    My call is Suman Kumar. Ive were given 89.25% in C9560-659 exam after getting your check materials. Thanks for imparting this form of beneficial examine material as the reasons to the answers are first-rate. Thanks killexams.Com for the super query financial organization. The excellent trouble about this query bank is the one of a kind answers. It permits me to apprehend the concept and mathematical calculations.


    strive out those actual C9560-659 questions.
    This C9560-659 unload is exceptional and is certainly really worth the money. Im now not crazy approximately deciding to buy stuff like that, however for the reason that exam is so luxurious and demanding, I decided it might be smarter to get a protection internet, meaning this package deal. This killexams.com sell off is simply desirable, the questions are legitimate and the solutions are correct, which ive double checked with a few buddies (every so often examination dumps give you incorrect answers, but now not this one). All in all, I handed my examination just the manner I hoped for, and now I suggest killexams.com to anybody.


    Use real C9560-659 dumps with actual and popularity.
    With simplest two weeks to move for my C9560-659 exam, I felt so helpless considering my negative education. however, needed to pass the test badly as I desired to alternate my task. eventually, i found the query and answer by way ofkillexams.com which eliminated my issues. The content material of the manual was rich and particular. The easy and quick answers helped make out the subjects without problems. awesome manual, killexams. also took help from C9560-659 reliable Cert guide and it helped.


    Get those Q&As and go to vacations to put together.
    im very glad with the C9560-659 QAs, it helped me lot in examination center. i can without a doubt come for different IBM certifications also.


    I clearly experienced C9560-659 examination questions, there's not anything like this.
    Its concise solutions helped me to perform good marks noting all questions below the stipulated time in C9560-659. Being an IT grasp, my competencies with appreciate are so forth need to be suitable. Not withstanding, proceeding with a customary employment with giant responsibilities, it became not easy for me to take a solid making plans. At that factor, I found out about the typically organized question and answer aide of killexams.Com dumps.


    Can you believe, all C9560-659 questions I prepared were asked.
    i am ranked very excessive amongst my magnificence friends on the list of awesome college students but it simplestoccurred once I registered on this killexams.com for a few exam assist. It became the excessive ranking studyingapplication in this killexams.com that helped me in joining the high ranks together with different exceptional students of my magnificence. The assets in this killexams.com are commendable due to the fact theyre particular and extraordinarily beneficial for practise thru C9560-659 pdf, C9560-659 dumps and C9560-659 books. i am glad to write these phrases of appreciation due to the fact this killexams.com deserves it. thanks.


    splendid source! I were given actual test questions of C9560-659 exam.
    I am C9560-659 certified now, thanks to this killexams.com website. They have a great collection of brain dumps and exam preparation resources, I also used them for my C9560-659 certification last year, and this time their sftuff is just as good. The questions are authentic, and the testing engine works fine. No problems detected. I just ordered it, practiced for a week or so, then went in and passed the C9560-659 exam. This is what the perfect exam preparation should be like for everyone, I recommend killexams.


    wherein have to I test in for C9560-659 exam?
    This killexams.Com from helped me get my C9560-659 accomplice confirmation. Their materials are simply beneficial, and the examination simulator is virtually wonderful, it completely reproduces the exam. Topics are smooth very with out troubles the usage of the killexams.Com observe fabric. The exam itself changed into unpredictable, so Im satisfied I applied killexams.Com Q&A. Their packs unfold all that I want, and that i wont get any unsavory shocks amid your examination. Thanx guys.


    Really great experience!
    Hello there fellows, just to tell you that I passed C9560-659 exam a day or two ago with 88% marks. Yes, the exam is hard and killexams.com Q&A and Exam Simulator does make life simpler - a great deal! I think this unit is the unrivaled reason I passed the exam. As a matter of first importance, their exam simulator is a gift. I generally adored the inquiry and-answer organization and tests of different types in light of the fact that this is the most ideal approach to learn.


    wherein am i able to locate C9560-659 latest and up to date dumps questions?
    every time I want to pass my certification take a look at to maintain my task, I immediately go to killexams.com and seek the specified certification take a look at, purchase and prepare the check. It clearly is worth admiring because, I constantly skip the check with exact scores.


    Obviously it is hard assignment to pick solid certification questions/answers assets concerning review, reputation and validity since individuals get sham because of picking incorrectly benefit. Killexams.com ensure to serve its customers best to its assets concerning exam dumps update and validity. The vast majority of other's sham report objection customers come to us for the brain dumps and pass their exams cheerfully and effectively. We never trade off on our review, reputation and quality because killexams review, killexams reputation and killexams customer certainty is vital to us. Uniquely we deal with killexams.com review, killexams.com reputation, killexams.com sham report grievance, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. In the event that you see any false report posted by our rivals with the name killexams sham report grievance web, killexams.com sham report, killexams.com scam, killexams.com dissension or something like this, simply remember there are constantly terrible individuals harming reputation of good administrations because of their advantages. There are a great many fulfilled clients that pass their exams utilizing killexams.com brain dumps, killexams PDF questions, killexams hone questions, killexams exam simulator. Visit Killexams.com, our specimen questions and test brain dumps, our exam simulator and you will realize that killexams.com is the best brain dumps site.


    Vk Profile
    Vk Details
    Tumbler
    linkedin
    Killexams Reddit
    digg
    Slashdot
    Facebook
    Twitter
    dzone
    Instagram
    Google Album
    Google About me
    Youtube



    NSE4-5-4 test prep | 050-v71x-CSESECURID practice questions | C2040-423 test prep | 000-997 VCE | 050-v70-CSEDLPS02 study guide | 650-331 questions answers | CCP free pdf download | 000-280 practice exam | AND-401 free pdf | 6001-1 braindumps | 1Y0-610 Practice test | 920-164 test prep | 642-979 mock exam | 090-161 bootcamp | 00M-244 brain dumps | HP0-S32 study guide | 000-974 free pdf | 2B0-100 test questions | 600-212 examcollection | RTRP brain dumps |


    [OPTIONAL-CONTENTS-3]

    Searching for C9560-659 exam dumps that works in real exam?
    Is it accurate to say that you are searching for IBM C9560-659 Dumps of real questions for the Fundamentals of Applying IBM SmartCloud Control Desk V1 Exam prep? We give most refreshed and quality C9560-659 Dumps. Detail is at http://killexams.com/pass4sure/exam-detail/C9560-659. We have aggregated a database of C9560-659 Dumps from actual exams keeping in mind the end goal to give you a chance to get ready and pass C9560-659 exam on the first attempt. Simply remember our Q&A and unwind. You will pass the exam.

    Are you looking for Pass4sure IBM C9560-659 Dumps containing real exams questions and answers for the Fundamentals of Applying IBM SmartCloud Control Desk V1 Exam prep? We provide most updated and quality source of C9560-659 Dumps that is http://killexams.com/pass4sure/exam-detail/C9560-659. We have compiled a database of C9560-659 Dumps questions from actual exams in order to let you prepare and pass C9560-659 exam on the first attempt. killexams.com Huge Discount Coupons and Promo Codes are as under;
    WC2017 : 60% Discount Coupon for all exams on website
    PROF17 : 10% Discount Coupon for Orders greater than $69
    DEAL17 : 15% Discount Coupon for Orders greater than $99
    OCTSPECIAL : 10% Special Discount Coupon for All Orders

    We have our specialists working persistently for the gathering of real exam questions of C9560-659. All the pass4sure questions and answers of C9560-659 gathered by our group are inspected and updated by our C9560-659 ensured group. We stay associated with the competitors showed up in the C9560-659 test to get their reviews about the C9560-659 test, we gather C9560-659 exam tips and traps, their experience about the strategies utilized as a part of the real C9560-659 exam, the mix-ups they done in the real test and after that enhance our material appropriately. When you experience our pass4sure questions and answers, you will feel sure about every one of the subjects of test and feel that your knowledge has been enormously progressed. These pass4sure questions and answers are not simply hone questions, these are real exam questions and answers that are sufficient to pass the C9560-659 exam at first attempt.

    IBM certifications are very required crosswise over IT associations. HR administrators lean toward applicants who have a comprehension of the theme, as well as having finished certification exams in the subject. All the IBM certification help provided on killexams.com are acknowledged around the world.

    It is true to say that you are searching for real exams questions and answers for the Fundamentals of Applying IBM SmartCloud Control Desk V1 exam? We are here to give you one most updated and quality sources that is killexams.com, We have gathered a database of questions from real exams so as to give you a chance to plan and pass C9560-659 exam on the very first attempt. All preparation materials on the killexams.com site are progressive and checked by industry specialists.

    Why killexams.com is the Ultimate decision for confirmation planning?

    1. A quality item that Help You Prepare for Your Exam:

    killexams.com is a definitive planning hotspot for passing the IBM C9560-659 exam. We have deliberately consented and collected real exam questions and answers, which are updated with an indistinguishable recurrence from real exam is updated, and investigated by industry specialists. Our IBM certified specialists from numerous associations are capable and qualified/confirmed people who have investigated each inquiry and answer and explanation segment keeping in mind the end goal to enable you to comprehend the idea and pass the IBM exam. The most ideal approach to plan C9560-659 exam isnt perusing a course reading, however taking practice real questions and understanding the right answers. Practice questions help set you up for the ideas, as well as the strategy in which questions and answer choices are introduced amid the real exam.

    2. Easy to understand Mobile Device Access:

    killexams give to a great qualification easy to use access to killexams.com items. The concentration of the site is to give exact, updated, and to the direct material toward enable you to study and pass the C9560-659 exam. You can rapidly find the real questions and solution database. The webpage is versatile amicable to permit think about anyplace, as long as you have web association. You can simply stack the PDF in portable and concentrate anyplace.

    3. Access the Most Recent Fundamentals of Applying IBM SmartCloud Control Desk V1 Real Questions and Answers:

    Our Exam databases are frequently updated during the time to incorporate the most recent real questions and answers from the IBM C9560-659 exam. Having Accurate, real and current real exam questions, you will pass your exam on the main attempt!

    4. Our Materials is Verified by killexams.com Industry Experts:

    We are doing battle to giving you actual Fundamentals of Applying IBM SmartCloud Control Desk V1 exam questions and answers, alongside explanations. Each Q&A on killexams.com has been confirmed by IBM certified specialists. They are exceptionally qualified and confirmed people, who have numerous times of expert experience identified with the IBM exams.

    5. We Provide all killexams.com Exam Questions and Include Detailed Answers with Explanations:

    Not at all like numerous other exam prep sites, killexams.com gives updated real IBM C9560-659 exam questions, as well as nitty gritty answers, explanations and charts. This is vital to help the hopeful comprehend the right answer, as well as knowledges about the alternatives that were wrong.

    killexams.com Huge Discount Coupons and Promo Codes are as under;
    WC2017 : 60% Discount Coupon for all exams on website
    PROF17 : 10% Discount Coupon for Orders greater than $69
    DEAL17 : 15% Discount Coupon for Orders greater than $99
    OCTSPECIAL : 10% Special Discount Coupon for All Orders


    [OPTIONAL-CONTENTS-4]


    Killexams 1Z0-863 bootcamp | Killexams 000-463 test questions | Killexams 000-G40 real questions | Killexams 000-058 practice test | Killexams 310-345 brain dumps | Killexams DHORT real questions | Killexams 000-852 dumps | Killexams C2040-410 exam questions | Killexams HP0-417 cheat sheets | Killexams CPA exam prep | Killexams 1Y0-A14 free pdf | Killexams 1Z0-821 sample test | Killexams 400-151 exam prep | Killexams 190-721 free pdf download | Killexams COG-135 brain dumps | Killexams 1Z0-508 dump | Killexams ISEBSWTINT-001 braindumps | Killexams P2090-068 practice questions | Killexams ECP-541 practice questions | Killexams 1Z0-035 braindumps |


    [OPTIONAL-CONTENTS-5]

    View Complete list of Killexams.com Brain dumps


    Killexams 060-DSFA680 practice test | Killexams 250-308 study guide | Killexams 70-774 pdf download | Killexams TMPTE VCE | Killexams 1Z0-507 exam questions | Killexams ISEBSWTINT-001 cram | Killexams IIA-CIA-Part1 exam prep | Killexams 000-559 free pdf | Killexams HP0-753 examcollection | Killexams 9L0-061 test questions | Killexams HP3-C11 braindumps | Killexams MB3-209 exam prep | Killexams CBEST Practice test | Killexams HP2-B22 test prep | Killexams 000-M96 study guide | Killexams HP2-E15 free pdf | Killexams MB5-857 test prep | Killexams HP3-042 study guide | Killexams 000-956 brain dumps | Killexams 9A0-034 brain dumps |


    Fundamentals of Applying IBM SmartCloud Control Desk V1

    Pass 4 sure C9560-659 dumps | Killexams.com C9560-659 real questions | [HOSTED-SITE]

    Ask HN: Who is hiring? (December 2013) | killexams.com real questions and Pass4sure dumps

    Ask HN: Who is hiring? (December 2013) 286 points by whoishiring on Dec 1, 2013 | hide | past | web | favorite | 322 comments Please lead with the location of the position and include the keywords INTERN, REMOTE, or H1B if the corresponding sort of candidate is welcome. Feel free to post any job that may interest HN readers from executive assistant to machine learning expert to CTO.

    Also see: Ask HN: Freelancer? Seeking freelancer? (December 2013) http://news.ycombinator.com/item?id=6827545


    What's New in Windows Server 2003 and ProLiant Architecture and Tools | killexams.com real questions and Pass4sure dumps

    There probably hasn't been a time in the modern era of computing where there was more widespread concern for security. Only a few years ago, security was one of those dark corners of the industry for hard-core types, but largely ignored by most of us. Today, securing computing resources ripples from the largest corporation to the most computer-illiterate home consumer, trying to prevent sophisticated hackers not only from infecting their computers with destructive viruses, but also from stealing information or using their computer as an ad hoc server.

    NOTE

    Jan de Clercq of HP's Security Office provided much of the technical information and technical review of this section. Jan is one of HP's leading security experts. I highly recommend his new book, Windows Server 2003 Security Infrastructures, Digital Press, 2004.

    Windows 2000 made some huge strides in securing the computing environment with features such as Kerberos for authentication and authorization, IP Security (IPSec) for remote access security, and the Encrypted File System (EFS) for protecting sensitive data. Windows NT and 2000 provided Certificate Services, which gave Administrators the ability to install their own CA and secure the certificates in their enterprise inexpensively, enticing smaller companies to implement Public Key Infrastructures (PKI).

    Security issues always provide room for improvement, and Windows Server 2003 and Windows XP have taken a step forward in a number of areas. Think of XP as a Windows 2003 client—they both have very similar and compatible features. Significant security feature improvements in Windows XP and Windows Server 2003 include

    The following sections provide a brief description of each issue. Refer to Jan de Clercq's books listed in the "References" section at the end of the chapter for more information.

    Also known as SAFER, these policies are Microsoft's first attempt to provide stronger cryptographic compliance with Federal Information Processing Standards (FIPS) 140-1. FIPS determines whether products meet the standard and evaluates overall security provided by a cryptosystem. The kernel mode driver, FIPS.SYS, supports EFS (efs.sys), IPSec (ipsec.sys), and other crypto functions. Although this is only a level 1 compliance intended for general PC use, it is nonetheless a start. The idea with SAFER policies is to provide the Administrator the ability to grant granular client-level security policies to restrict the access to read, write, or execute software on computers.

    Because the "How To" basics of configuring these policies are reasonably well documented in the Microsoft KB 324036 article "How to use Software Restriction Policies in Windows Server 2003," I'll use the space here to describe some important concepts and implementation recommendations.

    Software Restriction Policies is implemented through GPO settings located in the GPO tree Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies, and in User Configuration\Windows Settings\Security Settings\Software Restriction Policies. When you drill down to this location on a new policy, a warning appears in the right pane of the GPO Editor, "No Software Restriction Policies Defined," as shown in Figure 1.23. Right-click on the Software Restriction Policies in the left pane and click New Software Restriction Policies. You will then see two folders titled Security Levels and Additional Rules. Security Levels defines a high-level access policy, whereas Additional Rules allows you to define specific rules, including the following:

    Think of Security Levels as the locked condition on the front door to a building. There are two options (look in the Security Levels folder in the GPO): Disallowed and Unrestricted. The Disallowed option locks the front door and requires all who enter to provide proper credentials. No public access. Employees with ID badges only. The Unrestricted option leaves the front door unlocked, allowing anyone to enter the building. Inside the building are special rooms (programs and files on the PC) that also have locks on the door. These locks are the four classes of rules described in the previous section. If the front door is Disallowed, then you don't get access unless you can prove you have access to a room in the building. The guard escorts you to that room (or rooms), but you can't go anywhere else. This obviously is a high-security condition. If the front door is set to Unrestricted, anyone can walk in and roam through the building and enter any room that is not locked. However, if a room is locked (that is, a rule has been created to restrict access to a program), you have to be granted specific access to get in. I recommend, as does Microsoft's KB 310791 article "Description of the Software Restriction Policies in Windows XP," you use the Unrestricted option because it simply locks out certain files and programs. Unrestricted is the default. Setting the Disallowed mode, unless it is in a very controlled environment, will generate a lot of help desk calls if it's not well planned and tested.

    These are the keys to the rooms—the exceptions to the lockout. Note that four Registry path policies are created by default in the Additional Rules folder. Figure 1.24 shows the default Registry path rules, as viewed in the GPMC. They are all defined as Unrestricted and are applied to

    The purpose of these policies is to permit access to critical directory space when you've set the Security Level to Disallowed. These policies allow access to areas like c:\> Program files.

    Figure 1.24Figure 1.24 The additional rules defined by default in Software Restriction Policies are shown using the GPMC snap-in.

    So far these rules seem fairly straightforward. If you want to put the admin pack on every PC, but restrict users from running it, you set the SAFER policy to Unrestricted, and then create a path policy to restrict domain users from executing it. Pretty simple until you get multiple rules defined in multiple policies and perhaps in a combination of User and Computer Configuration settings.

    NOTE

    The description of functionality described here is based on my experience and testing and asking questions of Microsoft PSS. I have not seen any Microsoft documentation to confirm or deny these assertions. Your mileage may vary, so be sure you test these policies before implementing.

    If multiple Software Restriction Policies are defined, things get complicated. Several design rules apply to the application of these policies. Understanding them is critical to obtaining the desired results.

  • Closest match applies the rule. That is, if Rule 1 allows access to c:\*.exe and Rule 2 denies access to C:\payrollapp.exe, then the user would be unable to run payrollapp.exe because Rule 2 is a closer match to the program being run.

  • Most restrictive rules apply. Apply most-restrictive path rules further down in the directory tree than less-restrictive ones.

  • Rules are processed in the following order:

  • Security Level (highest priority)

  • Hash

  • Certificate

  • Path

  • Internet Zone rule

  • Default rules

  • Software Restriction Policies accumulate from multiple GPOs and are evaluated together. They do not obey normal SDOU (Site Domain Organizational Unit) processing of GPOs, and they can be applied at the Computer and User Configuration sections of each GPO.

  • Security Levels determine how the Additional Rules are defined. If the Security Level is Unrestricted, the Additional Rules should be designed to restrict access. If the Security Level is Disallowed, the Additional Rules should be designed to allow access.

  • Software restriction policies—especially when setting general categories (such as entire directories) to be disallowed—can have unexpected results. For instance, disallowing access to *.vbs to prevent virus deposited files from running can also restrict access to logon scripts and other valid scripts.

  • Always thoroughly test these policies.

  • Define the policies in individual GPOs. This makes them easier to manage and troubleshoot.

  • Avoid applying Software Restriction Policies from multiple locations (domains and OUs) if possible. Applying them from fewer locations makes the results easier to predict and troubleshoot.

  • To restrict Administrators from a Software Restriction Policy defined in User Configuration, restrict the appropriate Administrators' accounts and/or groups by removing the Apply Group Policy directly on the GPO.

  • To restrict Administrators from a Software Restriction Policy defined in Computer Configuration, you can remove the Apply Group Policy directly from the appropriate user or group, or you can go to Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies\Enforcement. In the Enforcement Properties page, under the Apply Software Restriction policies to the following users, select All Users Except Local Administrators.

  • Make certain you have not inadvertently restricted access to valid files such as logon scripts and directories and files that should be scanned by antivirus programs. Testing should expose these types of flaws.

  • Evaluation of these policies at this time seems like a bit of black magic. As of this writing, Microsoft had not seen a lot of customers using these policies, but in the work I've done with the policies, I've found they are difficult to design and it's difficult to get the desired results if you have a lot of them. Again, adding complexity to these policies results in a high probability of failure, so you must test them thoroughly. You can apply them to User Config and Computer Config on multiple levels (domain and OU), and then have them all sorted by rule precedence, closest match, and most restrictive. Keep these GPOs in as few domains and OUs as possible, keep the rules simple and well planned, and avoid applying them to both User Config and Computer Config in the GPO.

    Sample Rules

    Let's look at a couple of examples of rules. Suppose we have six policies defined in a Domain SAFER Policy defined at the domain:

  • Security Level: Unrestricted

  • Hash Rule 1: hash of Payroll.exe (v4.2) set to Unrestricted

  • Hash Rule 2: hash of Payroll.exe (v4.1) set to Disallowed

  • Certificate Rule 1: Applications Certificate set to Unrestricted

  • Path Rule 1: C:\RestrictedApps set to Disallowed

  • Path Rule 2: C:\RestrictedApps\*.exe set to Unrestricted

  • Using these rules, a user attempting to run the following programs would have these results:

  • User runs the program: C:\restrictedApps\Payroll.exe (v4.1).

  • Security Level set to Unrestricted allows access.

    Path Rule 1 allows access.

    Hash Rule 1 disallows access.

    Certificate Rule 1 applies because this app was digitally signed by the certificate owned by the Applications group and is set to Unrestricted.

    Result: Hash Rule 2 applies because it is most specific (denies access to the exact file name, whereas the others refer to directories or groups of files). Access is granted.

  • User runs the program: C:\restrictedApps\backupfiles.exe.

  • Security Level set to Unrestricted allows access.

    Path Rule 1 disallows access to C:\restrictedApps.

    Path Rule 2 allows access to C:\restrictedApps\*.exe.

    Result: Because Path Rule 1 denies access to the directory, Path Rule 2 never applies. Access is denied. Remember that the most-restrictive path rules should be applied deeper in the tree than the least-restrictive ones.

  • Suppose the same rules are defined, but the Security Level is set to Disallowed. Path Rule 1 and Hash Rule 2 are not needed because the Security Level is set to Disallowed. With that setting, all you need to do is define rules to allow access to programs that you want the user to access.

    Microsoft has attempted to help with some exceptions to these rules. In the Software Restriction Policies folder in the GPO, you'll see three policies besides the two folders. These policies are

  • Enforcement: Allows you to exclude .dlls from restricted programs, and to exclude local admins.

  • Designated File Types: By default, policies only apply to normal executable types, such as .exe, .dll, and .vbs. This option allows you to add other types to it, such as .bat, .cmd, .msi, and others, including a blank so you can add one that isn't in the list.

  • Trusted Publishers: Defines users who can choose trusted publishers (for certificates).

  • In summary of Software Restriction Policies, I'd say to use them very carefully and only after extensive testing so you understand what the ramifications are. They have some value in the security configuration of the enterprise, but they are complex and can create a lot of problems if you aren't careful.

    Some good resources for SAFER policies include the Microsoft whitepaper, and Jeremy Moskowitz's Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP, and Windows 2000, Sybex, March 2004.

    Internet Connection (Personal) Firewall

    Also referred to as the Personal Firewall, this feature is provided with Windows XP as built-in protection for each computer. It isn't the most secure firewall, but it's probably sufficient for casual home users. If firewalls are implemented elsewhere, the personal firewall in XP is usually required to not be enabled. To enable the Internet Connection Firewall, open a network connection's Properties page, go to the Advanced tab, and select the Protect My Computer and Network by Limiting or Preventing Access to this Computer from the Internet check box. Click the Settings button to access the Advanced Settings pane, shown in Figure 1.25 to configure advanced settings, including

  • Services: Allows you to select services such as FTP, Telnet, HTTP, and Remote Desktop that the users of this computer are allowed to access. Default is no access. So if you turn this firewall on and can't get to a Web site, the reason is probably wasn't enabled.

  • Security Logging: Allows configuring options to log dropped packets and successful connections (or not), to specify a log file name and location (default is %systemroot%\pfirewall.log), and to set a log file size limit.

  • ICMP: Permits configuring of ICMP traffic, such as Allow Incoming Echo Request, Allow Outgoing Search Request, Allow Incoming Router Request, and other options. By default, all are disabled.

  • NOTE

    Windows XP Service Pack 2 enables the Internet Connection Firewall by default.

    EFS (Encrypting File System) Enhancements

    Although Windows 2000 EFS brought a level of security to local files, it had a number of deficiencies:

  • Stealing a local account password is easy using common hacker tools in standalone mode.

  • Encrypted files stored on file servers are decrypted on the server and then transported in clear text across the network to the user's workstation. Because EFS needs access to the user's private key, which is held in the profile, the server must be "trusted for delegation" and have access to the user's local profile.

  • Inability to share EFS encrypted files.

  • Figure 1.25Figure 1.25 Internet Connection Firewall Advanced Settings enable you to define what the user is allowed to do.

    EFS has been enhanced in Windows XP and Windows Server 2003 to support sharing of encrypted files. Windows 2000, Windows Server 2003, and Windows XP all store the EFS metadata in the NTFS. Thus, encrypted files on NTFS volumes in Windows 2000 and Windows Server 2003. Sharing an encrypted file is enabled by opening the file's Properties page, clicking the Advanced button, and selecting the Details button in the Advanced Attributes area. You can add users who you want to share the file with to the list.

    Note that EFS file sharing is set at the file level—not the folder level——and inheritance of EFS file-sharing metadata is not supported.

    Another option for sharing encrypted files in Windows Server 2003 is to use Web folders. Windows Server 2003's support for the transport of EFS metadata using the WebDAV protocol, an extension of HTTP 1.1, makes Web folders an excellent alternative to sharing files on file servers, and is recommended by Microsoft. WebDAV is supported on IE v5.0 on the client and IIS v5.0 and later on the server. For more information about WebDAV, see the WebDAV Resources FAQs at http://www.webdav.org/other/faq.html.

    To configure a Web folder on the server running IIS, go to the properties sheet of the encrypted file (or any file), go to the Web Sharing tab, and select the Share this Folder option. Table 1.5 provides a side-by-side comparison of features between the Web folders and File Shares.

    Table 1.5 Comparison of EFS Features Between File Shares and Web Folders

    Remote EFS Operations On . . .

    . . . File Shares

    . . . Web Folders

    Where does EFS encryption/decryption occur?

    Files are encrypted and decrypted on the file server.

    Files are encrypted and decrypted on the user machine.

    Are the files secured during transmission over the network?

    Files are sent in the clear over the network connection.

    Files remain encrypted while being sent over the network connection.

    What technology is or can be used to secure the transmission of the files over the network?

    Requires IPSec to secure the file transfer between file server and user machine.

    Does not require IPSec to secure the file transfer; relies on the WebDAV EFS extensions to securely transmit the file.

    Must the file server be "trusted for delegation?"

    Requires file server to be "trusted for delegation."

    Does not require file server to be "trusted for delegation."

    Does the solution require a copy of the user profile on the file server?

    Requires availability of user profile on the file server (local or roaming profile).

    Does not require availability of user profile on the file server.

    Where does the EFS file-sharing authorization process take place for users?

    EFS checks for other user certificates on the file server and/or in the AD

    EFS checks for other user certificates on the local machine and/or in the AD.

    (Table reprinted by permission from Jan de Clercq, Hewlett-Packard Company.)

    Credential Manager

    Single Sign On (SSO) capability has been a frequent request from users and Administrators who find it challenging to keep track of all the credentials needed to log on to the domain, or use Microsoft Passport credentials and Smart Card credentials. Managers who must keep getting validated to perform administrative tasks on various computers also have requested this capability. Windows Server 2003 introduces Credential Manager, a client-based SSO solution that uses an intelligent credential-caching mechanism that keeps credentials in a store on the client, requiring the user to provide a single username/password to open the store. Credentials in the store can consist of a user account and password; a user account, certificate, and private key (which can be stored on a smart card); or Microsoft Passport credentials.

    The credential store is part of the user profile and supports roaming and can optionally be disabled by the Administrator via the GPO. This is done by opening a GPO and going to Windows Settings\Security Settings\Local Policies\Security Options and enabling the option Network Access: do not allow storage of credentials or .NET Passports for network authentication.

    This feature is available in Windows Server 2003, Windows XP Pro, and Windows XP Home operating systems.

    Public Key Infrastructure (PKI) Improvements

    Microsoft provided an out-of-the-box, user-defined and administered CA in the Windows NT 4.0 Option pack. This might not have been the most effective and robust product on the market, but it was cheap (and was included at no extra cost with Windows 2000). This allowed small- and medium-size companies, who couldn't afford the high cost of third-party companies such as VeriSign and Entrust, to fortify their security systems. However, according to one of HP's security experts, consultant Jan de Clercq, "ease of use and security don't easily coexist." But considering the improvements made in Windows Server 2003 security features, especially in the PKI arena, Jan stated that "Given the low cost and the advanced PKI features of Windows.NET, it may be a product that will bring PKI to the masses." Let's see what features are now available to make this possible.

    Cross Certification Trust Model

    Windows 2000 used a hierarchical CA trust model, shown in Figure 1.26, whereby the parent (root) CA was linked to the child (subordinate) CA by trusts. Only one root CA can be in the forest, and the only way to configure it to trust certificates issued by other CAs in other forests was to reconfigure the entire CA structure using Certificate Trust Lists. This might be desirable in multiforest enterprises or to link extranets.

    Note that the CA hierarchy is not specifically tied to the domain hierarchy. Rather, it might more appropriately be associated with geographies of the enterprise to provide accessible CAs to users and computers in each geography.

    Windows Server 2003 introduces the Cross Certification trust model, which allows CAs in different organizations (forests) to trust each other and is in addition to the subordinate trust model. The Cross Certification model permits the Administrator some freedom in configuring the trust relationships with the extranet partners, by specifying whether it is a one-way or two-way trust, and by controlling the issuance and usage scope of the CA agreement via naming constraint, application, and issuance policy rules.

    Cross certification provides the ability to create transitive cross forest trusts, as described in the "Creating a Cross Forest Trust" section in this chapter.

    Figure 1.26Figure 1.26 Hierarchical CA structure with the root (enterprise) CA at the top and subordinate (issuing) CAs below.

    Editable Certificate Templates (v2)

    Windows 2000 provided v1 certificate templates that were not editable. Windows 2003 provides v2 templates that are editable and include a mechanism to modify v1 templates and convert them to v2. The v2 templates facilitate cross certification and policy enforcement, which allows configuration of certificate trust relationships across forest boundaries. This could be trusts to CAs in other forests within the company or to a CA in a business partner's extranet. This also allows a CA to issue certificates to a CA in another forest and can link a policy to this cross certification. The policy can limit the issuance and usage scope of the CA cross- certification agreement.

    A new Certificate Templates snap-in is included in Certificate Services for Windows Server 2003, as shown in Figure 1.27. Note that the icons for v1 and v2 templates are a different color, the Minimum Supported column identifies v2 templates as Windows 2003 and Auto Enrollment functionality is listed. This snap-in is used to modify Version 2 templates to perform the following functions:

  • Create a new template, modify an existing template, or duplicate an existing template.

  • Modify template properties such as certificate lifetime, renewal period, whether it is published in AD, Issuance Requirements such as re-enrollment, extensions, and other properties.

  • Define accounts that can enroll and autoenroll a certificate template.

  • Enable a template for Autoenrollment.

  • Set which accounts can enroll and auto-enroll for a particular certificate template. This is done by right-clicking on a template, selecting its properties and modifying the template's Access Control List (ACL) in the "security" tab. Windows.NET ACLs contain an Access Control Entry (ACE) for "Enroll" and "AutoEnroll."

  • Figure 1.27Figure 1.27 Certificate Template snap-in.

    NOTE

    You can copy and save a v1 template as a v2 template and then configure it as desired. You also can select the Duplicate Template option when you right-click on the template in the Certificate Templates snap-in, which will make a duplicate and give you a head start on creating a similar one.

    Private Key Recovery

    Windows Server 2003 PKI made significant changes to the key recovery process, providing centralized key recovery services. An important component to this process is the Key Recovery Agent—usually one or more Administrators who have the ability to recover encrypted files, by means of a special public key stored in an EFS Recovery Agent certificate. The key recovery data is stored in the CA database. A user's archived private key is encrypted using a symmetric key, which is encrypted using a Key Recovery Agent's public key. These keys are stored in the CA database in the RawArchivedKey and KeyRecoveryHashes columns, respectively.

    To recover a user's private key, an Administrator must be added to the Recovery Agent list. The preparation for the Key Recovery process includes the following steps:

  • Issue the EFS Recovery Agent certificate to an Administrator.

  • Create a GPO called EFS Recovery, for example.

  • In the GPO, go to Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System. Define an EFS Policy. Select the Add a Recovery Agent option and add a user account that has the EFS recovery certificate (from step 2).

  • In the Certificate Authority snap-in, in the RootCA properties, select the Recovery Agents tab. Select the Archive the Key option and select the Add button. Select the Key Recovery Agent certificate in the next dialog box.

  • NOTE

    Multiple Administrators can be designated as Recovery Agents so that both public keys are required to recover private keys for an added measure of security.

    This four-step process will recover a private key in Windows Server 2003:

  • The Administrator who has the Recovery Agent rights (key) must know the User Principal Name (UPN) or serial number of the certificate whose private key he wants to recover.

    certutil –getkey <serial number or UPN> <outputfile>

    This exports the recovery data from the CA database.

  • From a command prompt, run the command:

    certutil –recoverkey <outputfile> <pkcs12file>

    This will convert the output file in a PKCS12 format and could store it on a floppy disk.

  • From a command prompt, run the command:

  • The PKCS12 file is provided to the appropriate user, who can then import it in his certificate store.

  • Enhanced Security Management—Effective Permissions Tab

    The Effective Permissions tab displays the cumulative permissions calculated from group membership and any inherited permissions, and displays the result applied to a given user. This is part of the Advanced Settings on the ACL properties page. For instance, right-click on an NTFS folder, go to Properties, select the Security tab, and then select the Advanced button. In the Effective Permissions tab, shown in Figure 1.28, you see a cumulative summary of all permissions applied to that user on that object.

    User Autoenrollment

    Windows 2000 Certificate Services provided a valuable feature in the autoenrollment and renewal of machine certificates. This allowed DCs to obtain and renew certificates. Windows Server 2003 now provides autoenrollment of users. You can do this in a Certificate Template by going to the Properties of the template, and then on the Security tab, giving Autoenroll the READ privilege. You also can enable it via Group Policy, as shown in Figure 1.29. In Computer Configuration\Windows Settings\Security Settings\Public Key Policies, check the Enroll Certificates Automatically option.

    Kerberos and Forest Trusts

    Windows 2000 was unable to create a transitive trust between forests, allowing only a one-way NTLM type trust that had to be created between individual domains in different forests—much like what we had to do in Windows NT to build trusts between all domains. Interestingly enough, this actually has a side benefit—because this type of trust can't be used by Kerberos, it solves a migration problem known as the "Pile On" issue, described in Chapter 3. Other than that, an NTLM trust isn't a good thing because it requires the Administrator to manage a lot of trusts between forests.

    Windows Server 2003 includes schema modifications made to the trusted domain object (TDO), which allows Kerberos to authenticate across the domain. This provides transitive trusts to be built across forests. That is, we create a trust between two forests, (one way or two way) and no other trust is needed. The Administrator does have some control over the trust, in making it a one-way trust or a two-way trust, and determining the default level of authentication that is allowed between forests (described in more detail in the next section).

    Figure 1.28Figure 1.28 Effective Permissions tab.

    Figure 1.29Figure 1.29 Using Group Policy to enable autoenrollment of users.

    Creating a Cross Forest Trust

    The preparatory steps to creating a cross forest trust include establishing DNS name resolution between the two forests, synchronizing system time between all computers in both forests (easier than it sounds), and setting the forest functional level to Windows 2003 (native). Windows Server 2003 provides three different ways to establish DNS name resolution between the two forests:

  • Create a stub zone in the forest root of each forest, for the other forest.

  • Create a secondary zone in the forest root of each forest, for the other forest.

  • Set up a conditional forwarder on the DNS server that is authoritative for each root zone for the other forest.

  • Test name resolution by pinging the root domain name of each forest from the other forest. In addition, you must ensure that the system time of all computers in both forests is within the allowable Kerberos time skew (default is five minutes). If the time skew between the two DCs contacted to build the trust is more than the allowable time skew, the trust might be created successfully, but authentication will fail.

    NOTE

    There is no default time synchronization between two forests. Because Kerberos authentication, by default, requires the system time of all computers to be within five minutes of each other, ensure the time between forests is synchronized. It is recommended that you configure the PDC emulator of the root domain in each forest to synchronize with the same external time source. Time synchronization is configured by default for a forest, but not between forests. More information is available in the "Time Services" section of Chapter 6.

    Setting the forest functional level is described in Chapter 3. To do this, all DCs in every domain must be Windows 2003 servers, and the domain functionality must be set to Windows Server 2003 (referred to as native, though the word "native" is not used in the UI). After the domains are all raised to Windows 2003, the forest must be raised to Windows 2003 native—similar to the way Windows 2000 domains were raised to native mode, but Windows 2000 didn't have a forest native mode.

    After the forest is at Windows 2003 level, Time Services are synchronized, and DNS name resolution is established between the two forests, the trust can be created. You create the trust just as you did in Windows 2000 by going to the Active Directory Domains and Trusts snap-in, choosing Domain Properties, selecting the Trusts tab, and clicking New Trust. This engages the New Trust Wizard. Some of the options specified in the wizard are described here, along with screen shots of the dialog boxes used in the wizard.

  • Trust Type: Can create an External Trust (downlevel, nontransitive trust) between domains, or a Forest Trust (transitive, Kerberos) between forests. The dialog box is shown in Figure 1.30.

  • Figure 1.30Figure 1.30 The New Trust Wizard allows you to create an External (NTLM type) Trust or a Forest Trust (Kerberos transitive trust).

  • Trust Direction—Incoming: Users in the source domain can be authenticated in the target domain or forest (source domain is the trusted domain). The dialog box is shown in Figure 1.31.

  • Trust Direction—Outgoing: Users in the target domain or forest can be authenticated in the source domain or forest (source domain is the trusting domain).

  • Trust Direction—Two Way: Outgoing and incoming trust. Users in source and target domains or forests can be authenticated in each domain.

  • Authentication Level—Forest-wide Authentication: Users from the other forest are automatically authenticated in the local forest. Essentially this makes the authenticated users in the other forest included in the authenticated users in the local forest. This is appropriate for a company with a multiple forest deployment, and users from both forests are equally trusted for resources in each forest. They can be denied access by changing permissions just like a single forest implementation. This is defined for the ingoing and the outgoing trust separately. The dialog box is shown in Figure 1.32.

  • Figure 1.31Figure 1.31 The Trust Direction dialog box lets you specify whether the trust is incoming (trusted), outgoing (trusting), or two–way.

  • Authentication Level—Selective Authentication: This scope requires users to be specifically trusted to access any resource. This is appropriate for enterprises that have business partner extranets as separate forests and want to grant limited and specific access. This is defined for the incoming and the outgoing trust separately.

  • The wizard also gives you the ability to choose to verify the trust. I recommend that you do so. After the trust is created, you will be able to see users and groups of the other forest in the object picker to assign permissions to resources. For instance, in Figure 1.33, we have a share on a server in forest CorpB.Net, and in assigning permissions, the users and groups of forest CorpA.Net are available. Note that all you see in the locations option of the object picker is the remote forest with a triangle-like icon. Child domains in that forest, if any, are not exposed. However, entering user or group names (including the use of wild cards) in the object picker will find objects in any domain in the remote forest. For instance, if you entered Admin as the name in the object picker, it would return the Administrator account for all domains in the remote forest.

    Figure 1.32Figure 1.32 Authentication scope options allow you to specify the default authentication between two forests.

    Figure 1.33Figure 1.33 The object picker displays the trusted forest for assigning rights.

    The cross forest trust will be a valuable benefit to enterprises with multiple forest deployments. Where Windows 2000's NTLM trusts have made multiple forests prohibitive to manage, Windows Server 2003's cross forest trusts could easily make the multiple forest configuration feasible.

    Conclusion

    This is by no means a comprehensive dissertation on security or even Windows 2003 security, but it does give a good overview of the many improvements provided in Windows Server 2003. Hopefully, after reading these issues, you will have some area you want more information on that might affect your Windows infrastructure and should be included in the migration plan. I have the good fortune of getting much of this information from HP's Jan de Clercq, a recognized security expert and author of two books regarding PKI and other security issues in the Windows environment. I highly recommend Jan's latest book, Windows Server 2003 Security Infrastructures, Digital Press, 2004.


    Binders in my office | killexams.com real questions and Pass4sure dumps

    G.Chiozzi's Binders

    This section is an index of the contents of the document binders in my office. You can find here copies of ESO documents, presentations, articles and manuals of application.

    The most usefull section is probably the one describing the binders with my collection of articles. They are ordered by topics and are copies or original of the most interesting technical things I read every month.

    Every binder is identified by a letter and a number.

    Note: All entries are kept in a single file, to make searching easier. Unfortunately the drawback is that the document is quite big, making it boring to download from a remote site.

    Index: Generic ESO Documents. Programming standards Bind Title Number -------------------------------------------------------------------------- ESO1 ESO Software Policy GEN-POL-ESO-00000-3011 ESO1 Templates for documents Generic VLT Documents. Programming standards Bind Title Number -------------------------------------------------------------------------- A1 VLT Level 1 Requirements VLT-SPE-ESO-00000-1423 A1 VLT Software Concept Specification VLT-SPE-ESO-10000-0010 A1 VLT Software Requirements Specification VLT-SPE-ESO-10000-0011 A1 VLT Software Management Plan VLT-PLA-ESO-00000-0006 A1 VLT Software Programming Standards VLT-PRO-ESO-10000-0228 A1 VLT Software Guidelines for the Dev. Appl. Soft. VLT-MAN-ESO-17210-0667 A1 Graphical User Interface Common Conventions VLT-SPE-ESO-17210-0266 A1 VLT Electronic Design Specification VLT-SPE-ESO-10000-0015 A1 VLT Software Documentation Review Procedure VLT-PRO-ESO-10000-0201 A1 VLT Directive for Preparation of Acceptance Test VLT-INS-ESO-00000-1091 A1 VLT Software FrameMaker Conventions VLT-INS-ESO-00000-0541 A1 Software Engineering for the VLT project (slides) A1 Programming in C++. Rules and Recommendation - ELLEMTEL A1 Reccomented C style and coding standards - L.W.Cannon et al., 1990 A1 Purify and PureCoverage presentation In a separate satchel: -- ESO Safety Program (Safety, Health and Env. Prot.) SAF-POL-ESO-00000-0001 -- Safety Instructions: working beneath M1 Mirror VLT-INS-ESO-00000-0537 VLT Software User Manuals Bind Title Number -------------------------------------------------------------------------- A2 VLT Integration Plan VLT-PLA-ESO-10000-0936 A2 VLT Integration general presentation A2 VLT Commissioning Plan VLT-PLA-ESO-10000-0937 A2 VLT Control Room Layout VLT-VEL-ESO-00096-0042 A2 VLT On-Line Data Flow Requirement Specification VLT-SPE-ESO-19000-0749 A2 VLT Data Products Checking Tool User Req. VLT-SPE-ESO-19000-1608 A2 Draft req. for VLT log file analysis tools Memorandum 14/01/97 A2 Draft Engineering Logs requirements specification VLT-SPE-ESO-xxxxx/xxxx A2 ESO Milan Lan Link Vertical Services Proposal ESO-VS-MILAN/001/1/TW/Serco A2 ESO World Wide Web Project ESO-MAN-ESO-00000-1306 A2 VLT Common Software Survey B3/1 TCS UT Book VLT-MAN-ESO-10200-1634 B3/1 TCS Requirements Specification VLT-SPE-ESO-10000-0200 B3/1 TCS Requirements on Star Catalogue System VLT-SPE-ESO-17230-0640 B3/1 TCS ICD TCS - Star Catalogue system VLT-ICD-ESO-17230-0641 B3/1 TCS ICD TCS - Instrumentation Software VLT-ICD-ESO-17240-17230 B3/1 TCS ICD TCS - Cassegrain and Nasmyth Adapter-Rota VLT-ICD-ESO-11400-17230 B3/4 TCS Telescope Control System User Manual VLT-MAN-ESO-17230-0942 B3/4 TCS Integration Module - tcsBUILD User Manual VLT-MAN-ESO-17230-1541 B3/4 TCS Interface Design Description VLT-SPE-ESO-17230-0941 B3/4 TCS Auto Guide Design Description VLT-SPE-ESO-17230-0933 B3/4 TCS Atmosferic Dispersion Corrector DD VLT-SPE-ESO-17230-1046 B3/4 TCS Enclosure Coordination Module DD VLT-SPE-ESO-17230-1040 B3/4 TCS Pointing Modelling DD VLT-SPE-ESO-17230-nnnn B3/4 TCS Astronomical Site Monitor Contro. Soft. FS VLT-SPE-ESO-17441-1175 B3/5 Coude' LCU Control Software Func. Spec. VLT-SPE-ESO-11520-0708 B3/5 Coude' Control Software User Manual VLT-PLA-ESO-11520-0760 B3/5 Coude' Control Software Acceptance Test Plan VLT-PLA-ESO-11520-0762 B3/5 Hydrostatic Bear. and Cooling Sys. Func. Spec. VLT-SPE-ESO-11320-0931 B3/5 Hydrostatic Bear. and Cooling Sys. Des. Desc. VLT-SPE-ESO-11320-0964 B3/5 Adapter-Rotator LCU Control Software Func. Spec. VLT-SPE-ESO-11400-0940 B3/5 Nasmith Adapter Rotator Nr.3 System Performance.. VLT-TRE-ESO-11423-1318 B3/5 TCS Chopping and M2 Coordination DD VLT-SPE-ESO-17230-1360 M2 Software Documents Bind Title Number -------------------------------------------------------------------------- B3/6 VLT M2 Technical Specification VLT-SPE-ESO-11200-0340 B3/6 VLT M2 Software Requirements Specification VLT-SPE-ESO-11200-0002 B3/6 VLT M2 Software Functional Specification VLT-SPE-DOR-11200-0010 B3/6 VLT M2 Software Design Description VLT-SPE-DOR-11200-0011 B3/6 VLT M2 Software Tilt/Chopping User Manual VLT-SPE-DOR-11200-0003 B3/6 VLT M2 Software User Manual VLT-SPE-DOR-11200-0004 VLT Guide/FS/M2 docs Bind Title Number -------------------------------------------------------------------------- B3/7 Overview of Chopping and Field Stab. Modes VLT-TEL-93/0244 B3/7 A first assessment of field stabilization perf. VLT-TRE-ESO-11000-0695 B3/7 Image motion due to telescope excitation by wind VLT-TRE-ESO-11000-0854 B3/7 Influence of sensor delay on field stab. perf.. VLT-TRE-ESO-11000-1097 B3/7 Tracking analysis at NTT, T.Erm B3/7 Analysis of Tracking Performance, T.Erm B3/7 A Guide to Better Autoguiding, T.Erm B3/7 Star tracking with Kalman Filter, T.Erm B3/7 VLT Pointing and Tracking Simulations with M2 Compensation, B.Jensen B3/7 VLT Subject to Wind Gusts, B.Jensen B3/7 Telescope Performance Evaluation, 1998 ESO Conference on VLT B3/7 Notes and emails on guiding/field stabilisation/chopping VLT HOS Software Bind Title Number -------------------------------------------------------------------------- B4 VLT LAN's Specification VLT-SPE-ESO-17120-0270 B4 TR on Curr. Status of VLT Lan Specific. and Req. VLT-TRE-ESO-17120-0969 B4 Final Lay-out of VLT Control LANs VLT-SPE-ESO-17120-1355 B4 Final Lay-out of VLTI Control LANs VLT-SPE-ESO-15410-1957 B4 HOS Functional Specification VLT-SPE-ESO-17230-0001 B4 HOS/Sequencer Functional specification VLT-SPE-ESO-17220-0314 B4 HOS/Sequencer Design Description VLT-SPE-ESO-17220-0736 B4 Remote Operation Software Functional specification VLT-SPE-ESO-18000-0001 B4 Real-Time Display Software Specification VLT-SPE-ESO-17240-0250 B4 ICD between VLT Control Software and OHS VLT-SPE-ESO-17240-19200 B4 BOSS / Base OS Stub Design Description VLT-SPE-ESO-17240-1925 VLT LCU Software/Drivers Bind Title Number -------------------------------------------------------------------------- B5 Local Control Unit Software Specification VLT-SPE-ESO-17210-0002 B5 LCU Common Software Specification for phase 2 VLT-SPE-ESO-17210-0711 B5 LCU Diagnostic Software Specification VLT-SPE-ESO-17210-0743 B5 LCU Application Server Framework LSF Re. Spec VLT-SPE-ESO-17210-2860 B5 LCU Application Server Framework LSF Det. Design VLT-SPE-ESO-17210-2051 B5 LCU Common Software Server Framework User Man VLT-MAN-ESO-17210-2252 B5 Tools dfor Advanced Control Design Desc. VLT-SPE-ESO-17210-2630 B5 Technical Report on Writing LCU Applications N-TRE-ESO-100-006 B5 Motor Control module User Manual (part II -SDL) VLT-MAN-ESO-17210-0776 B5 Motor Control module Acceptance Test Plan VLT-VER-ESO-17210-0598 B5 Motor Control module Acceptance Test Report VLT-VER-ESO-17210-0599 B5 Tech. Rep. on evaluation of LCU Ethernet Boards VLT-TRE-ESO-17130-1368 B5 NET-1 Ethernet Interface Driver User Manual VLT-MAN-ESO-17210-1369 B5 VMIVME-5576 Reflective Memory Board Driver Spe. VLT-SPE-ESO-15400-1374 B5 Tech. Rep on Future LCU HW Architecture VLT-TRE-ESO-17130-1806 VLT CCS Design Documents Bind Title Number -------------------------------------------------------------------------- B6 CCS Functional Specification VLT-SPE-ESO-17210-0001 B6 CCS/User Interface Functional Specification VLT-SPE-ESO-17210-0225 B6 CCS Design Description VLT-SPE-ESO-17210-0419 B6 CCS Scan System Design Description VLT-SPE-ESO-17210-0557 B6 CCS On Line Database Design Description VLT-SPE-ESO-17210-0552 B6 CCS Message System Design Description VLT-SPE-ESO-17210-0560 B6 CCS Logging System Design Description VLT-SPE-ESO-17210-0554 B6 CCS Error System Design Description VLT-SPE-ESO-17210-0553 B6 CCS Alarm System Design Description VLT-SPE-ESO-17210-0782 B6 CCS Stress Test System VLT-SPE-ESO-17210-1157 B6 Access and Configuration Control Design Desc. VLT-SPE-ESO-17230-0906 VLT Instrumentation Software Bind Title Number -------------------------------------------------------------------------- B7 VLT Instrumentation Software Specification VLT-SPE-ESO-17212-0001 B7 INS Common Software Specification VLT-SPE-ESO-17240-0385 B7 Set-up Files and FITS Log Handling - slx Design D. VLT-SPE-ESO-17240-0666 B8 UVES Software Requirement and Func. Spec. VLT-SPE-ESO-13200-0001 B8 UVES Control Software Architectural Des. Desc. VLT-SPE-ESO-13200-0002 B8 NTT Upgrade-Software - EMMI Functional Spec. N-SPE-ESO-112-014 B8 NTT Upgrade-Software - EMMI Design Description N-SPE-ESO-112-039 B8 ISAAC Software Specification VLT-SPE-ESO-14100-0556 B8 ISAAC ICS Design Description VLT-SPE-ESO-14100-0851 B8 ISAAC ICS Design Description VLT-SPE-ESO-14100-0851 B8 ISAAC/SOFI Observation Software User Manual VLT-SPE-ESO-14100-1510 B8 ISAAC Installation Tool for the ISSAC SW UM VLT-MAN-ESO-17240-1759 B8 VLT Test Camera Software Design Description VLT-SPE-ESO-11960-1092 B8 VLT Test Camera ICS User and Maint Manual VLT-MAN-ESO-11960-1608 B8 FITS Headers for the VLT Test Camera, Int. Memo BL-st/9-98 VLT CCS Technical Reports Bind Title Number -------------------------------------------------------------------------- B9 CCS Stress Test System User Manual VLT-TRE-ESO-17210-1345 B9 Tech. Rep. on CCS performance VLT-TRE-ESO-17210-0699 B9 Tech. Rep. on CCS Scan System Performance Test VLT-TRE-ESO-17210-0840 B9 Tech. Rep. on CCS Performance of MAY97 release VLT-TRE-ESO-17210-1344 B9 Tech. Rep. on the Protocol Converter Dec95-May97 VLT-TRE-ESO-17210-1364 B9 Tech. Rep. on YEAR200 Compliance, guidelines for VLT-TRE-ESO-17210-1704 B9 Tec. rep. on Investigation of future LCU HW Arc. VLT-TRE-ESO-17130-1806 B9 Tec. rep. on usage of investigation tools to support environment behaviour debugging VLT-TRE-ESO-xxxxx-xxxx VLT CCD Control Software Bind Title Number -------------------------------------------------------------------------- B10 CCD Detectors Control Software Functional Spec. VLT-SPE-ESO-17240-0227 B10 CCD Detectors Control Software Design Description VLT-SPE-ESO-17240-0601 B10 CCD prototype SW - On-Line Test Report VLT-ELE-0031/95 B10 Tech. Rep. on Image Processing Algorithms for TCCD VLT-TRE-ESO-17240-1689 NTT Telescope Bind Title Number -------------------------------------------------------------------------- N0 NTT Control System High Level Description N-MAN-ESO-000-079 N0 NTT Upgrade-Software - TCS Func. Spec. N-SPE-ESO-109-033 N0 NTT Upgrade-Software - TCS System Archit. Desc. N-SPE-ESO-109-034 N0 NTT Computer Console and Network Spec. N-SPE-ESO-111-057 N0 NTT TCS Integration User Manual N-MAN-ESO-111-067 N0 NTT Upgrade Big Bang Book - Part 1 N-SPE-ESO-100-068 N0 NTT Upgrade Big Bang Book - Part 2 N-SPE-ESO-100-072 N0 Tech. Rep. on Interfacing CAMAC to VLT N-TRE-ESO-112-011 ALMA Planning and Meetings Bind Title Number -------------------------------------------------------------------------- AL0 Generic docs and emails AL0 European SW Meeting 27/10/1999 AL0 ESO ALMA Day slides, 15/12/1999 AL0 Antenna API - An Antenna Motion API for the ALMA AL0 Real Time OS - Choice of RTOS for ALMA, P.T.Wallace - Choice of RTOS for ALMA - Another View, J.M.Stewart ALMA Contracts and Collaborations Bind Title Number -------------------------------------------------------------------------- AL0b Cosylab AL0b AOT Trieste AL0b CERN Laser ALMA Generic Documents Bind Title Number -------------------------------------------------------------------------- AL1 ALMA SW Science Requirements and Use Cases (2001-05-03) AL1 ALMA Initial Software Analysis (2001-02-22) AL1 ALMA System Software Architecture Specification (2001/12/05 AL1 ALMA Project Book, CVhap 12, Computing (2000-09-29) AL1 MilliMeter Array (MMA) Project Book AL1 Monitor and Control Points for the MMA (MMA memo #1) AL1 ALMA Monitor and Control Bus Requirements (MMA memo #5) AL1 ALMA Monitor and Control System (MMA memo #6) AL1 ALMA Monitor and Control Bus Draft Interface Spec (memo #7) AL1 ALMA Monitor and Control Bus Slave Node Implem. Guide AL1 ALMA Monitor and Control Frequently Asked Questions AL1 Operating the VLA, the VLBA and the MMA (MMA memo #258) (2001-04-30) AL1 ALMA Antenna Mount Requirements and Use Cases R.Heald A.Perrigouard (2000-10-07) AL1 A telescope pointing algorithm for ALMA (ALMA memo#366) AL1 ALMA Operational Issues (2001-01-25) AL1 ALMA Software and Hardware Standards AL1 ALMA Software Documentation Standard AL1 ALMA C Coding Standards AL1 ALMA C++ Coding Standards AL1 Suggested SW Engineering Practices, ALMA Phase 1 AL1 ALMA Software Glossary 2000-05-21 ALMA Test Interferometer Bind Title Number -------------------------------------------------------------------------- AL2 An Antenna Motion API for ALMA (+comments from GCH. B.Glendenning, R.Heald, S.Scott, F.Stauffer 1999-10-20 AL2 ALMA Test Interferometer Project Book (2000-02-03) AL2 ALMA Test Interferometer Control Software Requirements (2001-02-15) AL2 ALMA Test Interferometer Control Software Design Concept (2001-11-16, 2001-02-15) AL2 Comments on TICS Requirements/Design Concept AL2 ALMA Tech. Rep. on SW Engineering Activity AL2 ALMA Test Correlator Control Computer Software Design (2000-03-08) AL2 ALMA Test Correlator Engineering UI Notes (2001-02-21) AL2 ALMA Test Interferometer Raw Data Format (2001-04-26) AL2 Generic Monitor and Control Points - ALMA.08002.006 AL2 Nutator/Monitor and Control ICD - ALMA03003.08002.0013 AL2 TIX Client Server Design AL2 ALMA TICS installation procedures and notes AL2 DB2 installation ALMA Common Software Bind Title Number -------------------------------------------------------------------------- AL3 ACS SW Development Plan AL3 ACS Planning AL3 Minutes of meeting and various documents on the IJS collaboration AL3 The Control System for the Accelerator of ANKA B.Jeram et al. EPAC98 AL3 The CORBA IDL Interfaces for Accelerator Control. ACI DRAFT Version 3 EPAC98 AL3 Implementing Distributed Controlled Objects with CORBA M.Plesko PCaPAC99 AL3 Java Beans of Accelerator Devices for Rapid Application Development M.Plesko, G.Tkacik, M.Dach, S.Hunt PCaPAC99 AL3 The CORBA IDL Interface for Accelerator Control M.Plesko PCaPAC99 AL3 A Control System based on Web, Java, CORBA and fieldbus technologies M.Dach et al. PCaPAC99 AL3 I/O Control with PC and Fieldbus K.Kenda et al. PCaPAC99 AL3 Distributed Components in Control B.Jeram et al ICALEPCS '99, Trieste AL3 High Performance Control Applications with Java M.Sekoranja et al. PCaPAC2000 AL3 Managing the development of a new Control System J.Dovc et al. PCaPAC2000 AL3 How to build professional control system applications M.Plesko PCaPAC2000 AL3 ANKA Control System takes control J.Dovc PCaPAC2000 AL3 A Guerrilla approach to Control System Development M.Plesko et al. ICALEPCS 2001 AL3 The Control System Modeling Language K.Zagar et al. ICALEPCS 2001 AL3 Experiences with advanced CORBA services G.Milcinski et al. ICALEPCS 2001 AL3 Visual DCT - Visual EPICS Database Configuration Tool M.Sekoranja et al. ICALEPCS 2001 AL3 New ABeans for TINE Java Control Applications J.Dovc et al. ICALEPCS 2001 AL3 ANKA ACS Installation Report AL3 Trieste collaboration AL3b ALMA Common SW Technical Requirements (2000-06-05 and older) AL3b ALMA Common SW Feature List (1999-11-20) AL3b ALMA Common SW Architecture 2.0 and Notes (comments) AL3b Notes for ACS Logging and Archiving AL3b ACS Time System AL3b ALMA Project - Tech. Rep. on Common software platform, G.Raffi LSA-TRE-ESO-10000-0300 AL3b Device Requirements and Use Cases R.Heald, 2000-05-09 AL3b ALMA Joint SW Meeting, ACS Status Slides, 03/04/2000 AL3b VLT Common SW Survey draft AL3b Common SW minutes of meetings and presentations AL3c ACS Errors and Alarms - Design and Initial Implem. of Diagnostic and Error Reporting System of SMA Q.Zhang, SMA Technical Memo 132, 01/1999 - Fault Detection in the Caltec Millimeter Array R.P.Finch, S.L.Scott Astr. Soc. of Pacific, 108:714-717, 1996 August AL3c ACS and Offline: Task, Parameters, etc. - Data Analysis Framework Requirements D.Schiebel 2004-03-29 - ACS-AIPS++ Integration Report ALMA Offline Subsystem 2004-04-13 - Scalable Data Analysis Framework (Draft) D.Tody 2004-04 - Comments on Scalable Data Analysis Framework G.Chiozzi 2004-04-30 - Protopipeline Review Meeting Summary L.Davis 2004-05-08 - PC-IRAF v2.12 Installation Guide D.Tody M.Fitzpatrick IRAF Group May 2002 - PyRAF v.1.1.1 Source Release. Installation Instructions Space Telescope Science Institute 2004-06-01 AL3c ACS Bulk Data - ACS Bulk Data Transfer examples (old printout). - CORBA Audio/Video Streams Specification OMG - The Design and Performance of a CORBA Audio/Video Streaming Service S.Mungee, N.Surendranm D.C.Schmidt AL3c ACS Performance tests - Real Time Event Channel Performance on a Submarine Communications Network A.C.Weaver - ACS Perofrmance PPT presentation Cosylab 1st ACS Workshop, March 2004 - ACSBenchmarking suite User's Documentation Cosylab March 2004 - Usability of ACS-3.0 Notification Channel D.Wischolek Uni Bochum March 2004 AL3c CDB - Implementing a COnfiguration Database Browser H.Raffi BSc Degree in Computing Science supervised by Prof. Brueggeman-Klein (TUM), G.Chiozzi (ESO) 2003-11-10 AL4 ACS Installation CDs and procedures AL4 ACS and AMS Kitt Peak 2000 Test AL4 Kitt Peak 1999: ESO Common Software Demonstration Project - Statement of Work - Test Procedure - Kitt Peak Test Plan - Test Procedure - Regenerate SW Info and docs on other Radio Telescopes Bind Title Number -------------------------------------------------------------------------- AL5 IRAM 30-m Telescope Spectral Line On-The-Fly Mapping AL5 The 30m Manual - IRAM AL5 Submillimeter Frontend & Backend Control Commands D.Muders, J.Hatchell, R.Lemke, M.Olberg, H.Hafok 2001-11-08 ALMA - SW Development Plans Bind Title Number -------------------------------------------------------------------------- AL7 ALMA Computing Phase 2 Kick-Off Meeting, Apr 23-25 2002 AL7 SW Computing Plan AL7 SW Dev. Plan. for Science SW Requirements AL7 SW Dev. Plan. for SW Engineering Plan AL7 SW Dev. Plan. for Executive Subsystem AL7 SW Dev. Plan. for Control Software AL7 SW Dev. Plan. for Correlator Subsystem AL7 SW Dev. Plan. for Pipeline Software Subsystem AL7 SW Dev. Plan. for Dynamic Scheduler Subsystem AL7 SW Dev. Plan. for Proposal Observation Preparation AL7 SW Dev. Plan. for Off-Line Data Reduction AL7 SW Dev. Plan. for Data Reduction UI AL7 SW Dev. Plan. for Telescope Calibration SW AL7 SW Dev. Plan. for Pipeline SW ALMA - Papers and Presentations Bind Title Number -------------------------------------------------------------------------- AL10 The ALMA Common Software (ACS) as a basis for a distributed software development G.Raffi, G.Chiozzi, B.Glendenning ADASS XI, Victoria BC, Canada, Sep. 2001 AL10 Common Software for the ALMA Project G.Chiozzi et al. ICALEPCS 2001, San Jose, CA, USA, Nov.2001 AL10 Distributed Control System for the Test Interferometer of the ALMA Project M.Pokorny et al. ICALEPCS 2001, San Jose, CA, USA, Nov.2001 AL10 ALMA Software G.Raffi ESO Wide Review 2002 Telescope pointing and Tracking Bind Title Number -------------------------------------------------------------------------- B11 Geometrical Transformations for the Gemini Telescope B11 Gemini Pointing Algorithms B11 Proposals for Keck Telescope Pointing Algorithms, P.T. Wallace B11 Telescope Pointing Machine Specification v.1.7 B11 VLT TCS Pointing, various notes B11 TPoint and Slalib reference B11 Field and pupil rotations for the VLT unit tel. VLT Rep No.63 B11 Optics: papers/book chapters on pupils, stops and so on Other Telescopes Bind Title Number -------------------------------------------------------------------------- B12 Gemini Design Description B12 Gemini Lessons Learned Workshop B12 The SOFIA Mission Control Subsystem Software B12 VST FDR Section 9 TCS VST-FDR-Control-Software-rel-1.0 B12 Keck Telescope Control System slides - ADASS'99 conference B13 Gran Telescopio Canarias, Conceptual Design B13 GTC CS - Development Case RPT/CTRL/0075-R B13 GTC CS - Enclosure and Services UC model survey ESP/CTRL/0033-R B13 GTC CS - Secondary Mirror UC model survey ESP/CTRL/0034-R B13 GTC CS - Configuration Service UC model survey ESP/CTRL/0035-R B13 GTC CS - Primary Mirror UC model survey ESP/CTRL/0039-R B13 GTC CS - Evaluation of ORBs for the GTC CS RPT/CTRL/0070-R Generic Object Oriented Bind Title Number -------------------------------------------------------------------------- OO1 OOWG Comunications OO1 Evaluations of software tools and libraries OO1 String mailing list OO1 Bibliography and books reviews OO1 The annual JOOP listing of OOP books & videos, JOOP Sept 96 OO1 The annual JOOP listing of OOP books & videos, JOOP Sept 97 OO1 University Video Communications OO1 OOWG Presentations' transparencies OO1 Use Cases For Requirements Capture and Tracing G.Chiozzi, Tutorial at ICALEPCS'99, Trieste, 04/10/1999 OO1 Use Cases For Requirements Capture and Tracing and UML as a standard modeling language for SW projects G.Chiozzi, ESO IT Talk #1, Garching, 09/12/1999 Papers on Object Oriented Design Binder: OO2 -------------------------------------------------------------------------- J.Odell - Approaches to finite-state machine modeling - JOOP, Jan 1995 G.Booch J.Rumbaugh - Introduction to the Unified Method. Unifying the Booch & OMT Methods. Slides. J.Rumbaugh - OMT: The object Model - JOOP, Jan 1995 J.Rumbaugh - Taking things in context: using composites to build models - JOOP Nov/Dec 1995 J.Rumbaugh - To form a more perfect union: Unifying the OMT and Booch methods - JOOP Jan 1996 J.Rumbaugh - Introduction to the Unified Method: unifying the Booch and OMT methods - slides of CERN talk Nov 1996 J.Rumbaugh - A state of mind: modeling behaviour - JOOP July-August 1996 J.Rumbaugh - A matter of intent: How to define subclasses- JOOP Sept 1996 M.Ackroyd - Object-oriented design of a finite state machine - JOOP, June 1995 J.A.Campbell V.J.Joseph - The object Oriented Design and Implementation of a Relational Database Managemement System - JOOP, July-August 1995 B.W.Boehm - A Spiral model of Software Development and Enhancement - COMPUTER, May '88 D.D'Souza - Jave: Design and modeling opportunities - JOOP, Sept 1996 A.T.Jolin - Usability and Class Library Design - Dr.Dobb's, Oct. 1996 F.W.Fang A.C.So R.J.Kreindler - The Visual Modeling technique: an introduction and overview - JOOP, July 96 M.Arruat F.Di Maio N.Gomez-Rojo Y.Pujante - Recent Developments in the Application of Object Oriented Technologies in the CERN PS Controls - ICALEPCS 1997, Baijing, China, Nov 1997 L.R.Mattingly H.Rao - Writing Effective Use Cases and Introducing Collaboration Cases JOOP, October 1998 A.Cockburn - Structuring Use Cases with Goals JOOP, Sep-Oct 1997 and Nov-Dec 1997 G.Booch - UML in Action G.Booch, Guest Editor Communication of the ACM, October 1999 UML 2001: A Standardisation Odyssey C.Kobryn Using Patterns in the UML G.Larsen Turning Clockwise: Using UML in the Real-Time Domain B.Selic UMLoquent: Expression of AWACS Software Design A.E.Bell R.W.Schmidt Modeling Web Application Architectures with UML J.Conallen R.C.Martin - Papers from www.objectmentor.com page Design Patterns and Design Principle UML Tutorial: Class Diagrams Collaboration Diagrams Sequence Diagrams Finite State Machines Button, whose got the button? S.W.Ambler - Mapping Objects to Relational Databases,Oct. 2000 http://www.AmbySoft.com/mappingObjects.pdf S.W.Ambler - Mapping Objects to Relational Databases, Nov. 2000 http://www.AmbySoft.com/persistenceLayer.pdf A.Cockburn - The Methodology Space Humans and Technology tech. rep. HaT TR.97.03, 1997 M.M.Lee - Object-Oriented Analysis in the Real World http://www.projtech.com S.J.Mellor - Building and using a work breakdown structure http://www.projtech.com S.J.Mellor - The Case for Using Use Cases http://www.projtech.com S,Shaler, D.Grand, S.J.Mellor - The Project Matrix: a Model for SW Engineering Project Management http://www.projtech.com Papers and documents on Java Binder: OOJC1 -------------------------------------------------------------------------- M.Chavan P.Ballester - First ESO Java Seminar Sun Microsystems - Java IDL Guide B.Morgan - Building Distributed Applications with Java and Corba Dr.Dobb's Journal, Apr. 1998 B.Danilko - A Graphical Java Front End to C++ Programs C/C++ Users Journal, June 1998 S.Singhal, B.Nguyen - The Java Factor Communications of the ACM, June 1998 P.Tyma - Why are we using Java again? Communications of the ACM, June 1998 K.Nilsen - Adding Real-Time capabilities to Java Communications of the ACM, June 1998 D.Brutzman - The Virtual Reality Modeling Language and Java Communications of the ACM, June 1998 H.Lewis - Utilisation of Java Software at the VLT, VLT Internal Report, Sep. 1998 H.Lewis - VLT Seminars on Java 1) Java Beans 2) High level and EPICS engineering GUIs 3) Keck AO User Interface Garching, Aug.-Sep. 1998 ChiMu OO and Java Development: Guidelines and Resources ChiMu Corporation, 1997-1998 Java Code Conventions Sun Microsystems - 1997 G.Hamilton - Java Beans Sun Microsystems - 1997 M.A.Cusumano D.B.Yoffie - What Netscape Learned from Cross-Platform Software Development Communication of the ACM, October 1999 L.Prechelt - Comparing Java vs. C/C++. Efficiency Differences to Interpersonal Differences Communication of the ACM, October 1999 E.Henry, E.Lycklama - How do you plug Java memory leaks? Dr.Dobb's Journal, February 2000 J.Amsterdam - Java References Dr.Dobb's Journal, February 2000 The Real-Time Specification for Java The Real-Time for Java Expert Group g.Bollella et al. Papers and documents on Corba Binder: COR1 -------------------------------------------------------------------------- R.Resendes M.Laukien - Introduction to CORBA Distributed Objects Dr.Dobb's Journal, Apr. 1998 K.Seetharaman - The CORBA Connection Communications of the ACM, Oct. 1998 J.Siegel - CORBA and the OMA in Enterprise Computing Communications of the ACM, Oct. 1998 S.Vinoski - New Features for CORBA 3.0 Communications of the ACM, Oct. 1998 D.C.Schmidt - Evaluating architectures for Multithreaded Object Request Brokers Communications of the ACM, Oct. 1998 M.Henning - Binding, migration and scalability in CORBA Communications of the ACM, Oct. 1998 D.Houlding - A CORBA Bean Framework Dr.Dobb's Journal, Nov. 1998 J.M.Shacklette J.Illian - CORBA Program Development, Part I,II,III Linux Journal, May/June/July 1999 Use Of CORBA in the DFS, ESO Internal Draft, VLT-SPE-ESO-19000-XXXX Patterns and Performance of Real-Time ORBs D.C.Schmidt Applying C++, Pattenrs and Components to Develop an IDL Compiler for CORBA AMI Callbacks A.B.Arulanthu et al. SIGS C++ Report, March 2000 Object Iterconnections, Scalable and efficient architecture for CORBA Asynchronous Messaging A.B.Arulanthu et al. SIGS C++ Report A CORBA Language Mapping for TCL F.Pilhofer Combat F.Pilhofer J.Graybeal et al. - SOFIA's CORBA Experiences: Instances of Software Development Mao's CORBA Browser Writing and Using CORBA Components F.Pilhofer April 2002 CORBA Component Model Tutorial OMG CCM Implementation Group April 2002 CCM Tools Tutorial E.Teiniker, L.Johnson 2004-03-31 OMG Docs - Binder: COR1 OMG IDL Style Guide OMG CORBA Services, 13 - Property Service OMG Time Service Specification OMG Telecom Log Service Specification ACE/TAO Docs - Binder: COR1 The Adaptive Communication Environment: "ACE", a Tutorial U.Syyid Using ACE try Macros to Enhance CORBA Portability Error Handling Chapter 8 from TAO Developer's Guide, OCI ORBacus Docs - Binder: COR2 ORBacus for C++ and Java ORBacus Notify ORBACUS T-Log Papers on other arguments Binder: OO2 -------------------------------------------------------------------------- M.C.Carthy - What is Multi-Threading? - Linux Journal, Feb. 1997 S.Ball - An enchription system for software registration - C/C++ Users Journal, Aug. 1996 D.N.Gray J.Hotchkiss S.LaForge A.Shalit T.Weinberg - Modern languages and Microsoft's Component Object Model Communications of the ACM, May 1998 A.Shah H.Xiao - Using Shared Libraries across Platforms C/C++ Users Journal, May. 1998 S.Chen - The Paradox of Digital Preservation IEEE Computer, March 2001 Collections of papers Binder: OO2 -------------------------------------------------------------------------- COMPUTER October 1992, Special issue on Inheritance & Classification D.C.Rine B.Bhargava - Guest Editors' Introduction: Object Oriented Computing COMPUTER Oct. 1992 P.Wegner - Object-Oriented and Conventional Analysis and Design Methodologies COMPUTER Oct. 1992 B.Meyer - Applying "Design by Contract" COMPUTER Oct. 1992 D.Ungar R.B.Smith C.Chambers C.W.Mercer - Object, Message and Performance: how they coexist in Self COMPUTER Oct. 1992 Y.Ishikawa H.Tokuda C.W.Mercer - An Object Oriented Real-Time Programming Language COMPUTER Oct. 1992 D.L.Wells J.A.Blakeley C.W.Thompson - Architecture of an Open Object-Oriented Database Management System COMPUTER Oct. 1992 P.K.Egbert W.J.Kubitz - Application Graphics Modeling Support Through Object Orientation COMPUTER Oct. 1992 Communications of the ACM Sept. 1994, Special issue on OO Software Testing R.V.Binder - Introduction Communications of the ACM, Sept. 1994 P.J.Jorgensen C.Erickson - Object-Oriented Integration Testing Communications of the ACM, Sept. 1994 G.M.Murphy P.Townsend P.Sze Wong - Experiences with Cluster and Class Testing Communications of the ACM, Sept. 1994 R.M.Poston - Automated Testing from Object Models Communications of the ACM, Sept. 1994 J.D.McGregor T.D.Korson - Integrating Object-Oriented Testing and Development Processes Communications of the ACM, Sept. 1994 T.R.Arnold W.A.Fuson - Testing in a "Perfect World" Communications of the ACM, Sept. 1994 R.V.Binder - Design for Testability in Object Oriented Systems Communications of the ACM, Sept. 1994 Communications of the ACM Oct. 1995, Special issue on OO Experiences and future trends COMPUTER September 1996, Managing OO development B.Sadr P.J.Dousette - An OO Project Managemement Strategy COMPUTER, Oct. 1996 J.D.Williams - Managing Iteration in OO Projects COMPUTER, Oct. 1996 S.Moser O.Nierstrasz - The effect of Object-Oriented Frameworks on developer productivity COMPUTER, Oct. 1996 S.Sparks K.Benner C.Faris - Managing Object-Oriented Framework reuse COMPUTER, Oct. 1996 J.P.Corriveau - Traceability process for large OO projects COMPUTER, Oct. 1996 COMPUTER October 1996, Special Issue: 50 years of computing Communications of the ACM Oct. 1996, Special issue on Software Patterns A.Cockburn - The interaction of Social Issues and Software Architecture Communications of the ACM, Oct. 1996 M.P.Cline - Pros and cons of adopting and applying patterns in the real world Communications of the ACM, Oct. 1996 A.Aarsten D.Brugali G.Menga - Designing concurrent distributed control systems Communications of the ACM, Oct. 1996 M.Fayad M.P.Cline - Aspects of software adaptability Communications of the ACM, Oct. 1996 B.Goldfedder L.Rising - A training experience with patterns Communications of the ACM, Oct. 1996 Communications of the ACM Apr. 1997, The debugging scandal and what to do about it M.Eisenstand - My Hairiest Bug War Stories Communications of the ACM, Apr. 1997 D.Ungar H.Lieberman C.Fry - Debugging and the experience of immediacy Communications of the ACM, Apr. 1997 R.Baecker C.DiGiano A.Marcus - Software visualization for debugging Communications of the ACM, Apr. 1997 C.Fry - Programming on an already full brain Communications of the ACM, Apr. 1997 J.Dominique P.Mulholland - Fostering debugging communities on the Web Communications of the ACM, Apr. 1997 R.N.Smith M.Wolczko D.Ungar - From Kansas to Oz: collaborative debugging when a shared wolr breaks Communications of the ACM, Apr. 1997 Papers on Real-Time Systems Binder: OO2 -------------------------------------------------------------------------- E.D.Jensen - Distributed Real-Time Operating systems - Dr.Dobb's, Feb. 1995 M.J.Choonoles C.C.Gilliam - Real-time object-oriented system design using the object modeling technique (OMT) - JOOP, June 1995 L.Nigro - A real-time architecture based on Shlaer-Mellor object lifecycles - JOOP March-April 1995 T.B.Blakeslee J.Liband - Real time debugging techniques, Embedded Systems Programming, Vol.8 Num.4 B.Marick - A summary of subsystem testing M.Barabanov, V.Yodaiken - Introducing Real-Time Linux - Linux Journal, Feb. 1997 Rational Corp. - Unified Modeling Language For Real-Time Systems Design K.W.Smith - Real-Time Object-Oriented Modeling Dr.Dobb's Journal, Dec. 1997 D.V.Gadre S.Engineer - A Data Acquisition System for Linux Dr.Dobb's Journal, Beb. 1998 T.Ebert - CAP, Control Application Platform 4D-Engineering Real-Time Distributed Object Computing: An Emerging Field IEEE Computer Special Issue, June 2000 G.Bollella - The Real-Time Specification for Java D.C.Schmidt, F.Kuhns - An Overview of the Real-Time CORBA Spec. B.Selic - A Generic Framework for Modeling Resources with UML K.H.Kim - APIs for Real-Time Distributed Object Programming Papers on Software Quality Binder: OO3 -------------------------------------------------------------------------- Quality at Risk as Demand for Training Soars - JOOP Europe Winter 1995 E.Swanstrom - Beyond methodology transfer: OO mentoring meets project management - JOOP March-April 1995 P.Sparaco - Ariane Probe Seeks Cause Of Sudden Pitch and Yaw J.M.Jezequel B.Meyer - Design by Contract: The Lessons of Ariane Computer, Jan. 1997 J.L.Lions - Ariane 5, Flight 501 Failure. Report by the Inquiry Board Paris, Jul. 1996 A.Jock - How Software doesn't work - Byte, December 1995 R.L.Glass - The next date crisis and the ones after that Communications of the ACM, Jan 1997 C.Fox W.Frakes - The Quality Approach: is it delivering? Communications of the ACM, Jun 1997 J.Herbsleb D.Zubrov et al. - Software quality and the Capability Maturity Model Communications of the ACM, Jun 1997 C.Hollenbach R.Young A.Plugrad D.Smith - Combining quality and Software Improvement Communications of the ACM, Jun 1997 L.J.Arthur - Quantum improvements in software system quality Communications of the ACM, Jun 1997 M.A.Cusumano R.W.Selby - How Microsoft builds software Communications of the ACM, Jun 1997 K.Ewisi-Mensah - Critical Issues in Abandoned IS Development Projects Communications of the ACM, Sep 1997 D.Gillibrand K.Liu - Quality Metrics for Object-Oriented Design JOOP Jan. 1998 J.D.McGregor - Quality, Thy Name Is Not Testing JOOP Mar./Apr. 1998 A.K.Onoma W.T.Tsai M.H.Poonawala H.Suganuma - Regression Testing in an Industrial Environment Communications of the ACM, May 1998 R.Comerford T.S.Perry - Brooding on the Year 2000 IEEE Spectrum, June 1998 D.Lefkon B.Payne - Making embedded systems Year 2000 compliant IEEE Spectrum, June 1998 T.O'Reilly - Lessons from Open-Source Software Development Communications of the ACM, April 1999 R.L.Glass - Inspections - Some Surprising Findings Communications of the ACM, April 1999 F.Shull, I.Rus, V.Basili - How Perspective-Based Reading can Improve Requirements Inspection IEEE Computer, July 2000 Papers on Object-Oriented Training Binder: OO3 -------------------------------------------------------------------------- M.Dodani - Object-oriented shock therapy - JOOP, Jul/Aug 1996 M.E.Fayad W.Tsai M.L.Fulghum - Transition to Object Oriented Software Development, Communications of the ACM, Feb. 1996 The Fall 1996 JOOP guide to Education & Training JOOP Oct. 1996 The JOOP Listing of Mentoring and Training Providers JOOP Oct. 98 A.Jaaksi - A Method for Your First Object-Oriented Project JOOP Jan. 1998 M.L.Manns H.Sharp M.Prieto P.McLaughlin - Capturing Successful Practices in OT Education and Training JOOP Mar./Apr. 1998 B.Meyer - Software Engineering in Academy IEEE Computer, May 2001 Papers on Astronomy and Telescope's Control Binder: OO3 -------------------------------------------------------------------------- C.Barbieri F.Rampazzi - TNG e' realta' L'astronomia, Genuary 1996 C.Barbieri - Il Telescopio Nazionale Galileo Il Nuovo Saggiatore, Bollettino della Societa' Italiana di Fisica Vol. 13 Anno 1997 No.4 J.M.Filgueira - A Distributed Object-Oriented Telescope Control System based on RT-Corba and ATM ICALEPCS 1997, Baijing, China, Nov 1997 G.M.Heiligman et al. - The SOFIA Mission Control Subsystem Software 194th meeting of the American Astronomical Society, June 1999 SPIE Cenference - Astronomical Telescopes and Instruments for the 21st century, Kona, Hawaii, 15-16 March 1994 J.E.Nelson P.Gillingham - An Overview of the Performance of the W.M.Keck Observatory SPIE Proceedings vol. 2199, Mar. 1994 P.Wizinowich T.Mast J.Nelson M.DiVittorio - The Optical Quality of the W.M.Keck Telescope SPIE Proceedings vol. 2199, Mar. 1994 R.Cohen T.Mast J.Nelson - Performance of the W.M.Keck Telescope Active Mirror Control System SPIE Proceedings vol. 2199, Mar. 1994 H.Lewis W.Lupton M.Sirota T.Mast J.Nelson - Pointing and Tracking Performance of the W.M.Keck Telescope SPIE Proceedings vol. 2199, Mar. 1994 M.J.Sirota P.M.Thompson - Azimuth/Elevation servo performance of the W.M.Keck Telescope SPIE Proceedings vol. 2199, Mar. 1994 D.Enard - ESO VLT: Status of the main 8m telescopes SPIE Proceedings vol. 2199, Mar. 1994 P.Dierickx - Error budget and expected performance of the VLT main unit telescopes SPIE Proceedings vol. 2199, Mar. 1994 M.J.Cullum D.Enard M.Ravensbergen - Control of image position errors with the VLT SPIE Proceedings vol. 2199, Mar. 1994 M.Quattri et al. - VLT 8m Unit Telescope Main Structure: Design Solutions and Performance Calculation SPIE Proceedings vol. 2199, Mar. 1994 M.Ravensbergen - Main axes servo systems of the VLT SPIE Proceedings vol. 2199, Mar. 1994 B.Gilli - Workstation Environment for the VLT SPIE Proceedings vol. 2199, Mar. 1994 B.Gustafsson - VLT Local Control Unit Real Time Environment SPIE Proceedings vol. 2199, Mar. 1994 SPIE Cenference - Telescope Control Systems, Orlando, Florida 19-21 April 1995 J.W.Percival - Remote observing from the bottom up: the architecture of the WYNE telescope control system SPIE Proceedings vol. 2479, April 1995 D.Mills - WYIN telescope graphical user interfaces SPIE Proceedings vol. 2479, April 1995 K.Wirenstrand - VLT Telescope Control Software, an overview SPIE Proceedings vol. 2479, April 1995 W.Lupton - Software infrastructure for the Keck II telescope SPIE Proceedings vol. 2479, April 1995 C.Bonoli et al. - TNG Control System: computer architecture, interfacing and synchronization SPIE Proceedings vol. 2479, April 1995 M.Ravensberger K.Wirenstrand - Time reference system of the VLT SPIE Proceedings vol. 2479, April 1995 S.Wampler - Role of scenarios and walk-throughs in telescope design SPIE Proceedings vol. 2479, April 1995 D.Mancini E.Cascone - TNG Control System: hardware, software and methods adopted to improve the performance of the fully digital drive system SPIE Proceedings vol. 2479, April 1995 B.Gilli - VLT Tracking and Guiding Software SPIE Proceedings vol. 2479, April 1995 M.Ravensbergen R.Merino C.P.Wang - Encoders for the altitude and azimuth axes of the VLT SPIE Proceedings vol. 2479, April 1995 R.K.Bhatia - Telescope alignment: if the zero-coma condition sufficient? SPIE Proceedings vol. 2479, April 1995 N.Robbier D.R.Blanco C.A.Roddier - WIYN telescope active optics system SPIE Proceedings vol. 2479, April 1995 ICALEPCS 1995: R.Barillere et al. - CICERO: Control Information systems Concepts based on Encapsulated Real Time Objects Proceedings ICALEPCS 1995, Chicago L.R.Dalesio M.Kraimer W.Watson M.Clausen - Distributed Software Development in the EPICS Collaboration Proceedings ICALEPCS 1995, Chicago I.Ivanov K.Cahill B.Hendricks - Presentation of data from the Fermilab Datalogging System Proceedings ICALEPCS 1995, Chicago J.A.Carwardine - An introduction to Plant Monitoring through the EPICS Control System M.J.Knott - Communication in Support of Software Sharing and Collaboration Development Proceedings ICALEPCS 1995, Chicago J.D.Fox H.Hindi - Control Theory with Applications to Accelerators Proceedings ICALEPCS 1995, Chicago D.Bulfone et al. - Controls in the Past Year of ELETTRA Operation Proceedings ICALEPCS 1995, Chicago R.J.McGonegal S.B.Wampler - The Gemini Control System Proceedings ICALEPCS 1995, Chicago A.Balestra F.Pasian M.Pucillo P.Santin C.Vuerli - Controlling Telescope Observation from the Astronomer's own desk: the case of TNG Proceedings ICALEPCS 1995, Chicago D.J.Ciarlette R.Gerig - Operational experience from a large EPICS based accelerator facility Proceedings ICALEPCS 1995, Chicago W.McDowell - Panel Discussion on EPICS Proceedings ICALEPCS 1995, Chicago J.Chen G.Heyes et al. - CDEV: An Object Oriented Class Library for Developing Device Control Applications Proceedings ICALEPCS 1995, Chicago F.Momal C.Pinto-Pereira - Using World-Wide_Web for Control Systems Proceedings ICALEPCS 1995, Chicago H.Laeger S.Lechner - WWW for information on CERN energy consumption Proceedings ICALEPCS 1995, Chicago SPIE Cenference - Optical Telescopes of Today and Tomorrow, Landskrona, Sweden 29 May - 2 June 1996 G.M.Smith - Keck II Status Report SPIE Proceedings vol. 2871, June 1996 M.Mountain, F.Gillet, R.Kurz - The Gemini 8-M Telescopes Project SPIE Proceedings vol. 2871, June 1996 K.Norio - Status and Perspective of Subaru Telescope Project SPIE Proceedings vol. 2871, June 1996 J.M.Hill - The Large Binocular Telescope Project SPIE Proceedings vol. 2871, June 1996 E.Manil - End to end modeling of the VLT SPIE Proceedings vol. 2871, June 1996 M.Quattri et al. - VLT 8m Unit Telescope Main Structure SPIE Proceedings vol. 2871, June 1996 O. von der Luehe, F.Derie et al. - Interferometry with the ESO VLT SPIE Proceedings vol. 2871, June 1996 P.Salinari - The Large Binocular Telescope Interferometer SPIE Proceedings vol. 2871, June 1996 V.Baumer, P.Sacre' - Operational model for VLT temperature and flow control SPIE Proceedings vol. 2871, June 1996 P.Y.Bely - NGST: A feasibility study of the Next Generation Space Telescope SPIE Proceedings vol. 2871, June 1996 N.Hubin - VLT Adaptive optics at the European Southern Observatory SPIE Proceedings vol. 2871, June 1996 R.Ragazzoni, A.Baruffolo, F.Bortoletto, M.D'Alessandro - The adaptive optics module for TNG: a status report SPIE Proceedings vol. 2871, June 1996 W.Lupton - The Keck II Telescope Control System SPIE Proceedings vol. 2871, June 1996 M.J.Sirota et al. - Autoguider servo design and testing of the W.M.Keck Telescope SPIE Proceedings vol. 2871, June 1996 G.Raffi K.Wirenstrand - The VLT control software in its final test phase SPIE Proceedings vol. 2871, June 1996 A.Wallander - Uning NTT as prototype for VLT. The new NTT control system SPIE Proceedings vol. 2871, June 1996 S.Wampler - The Software Design of the Gemini 8m Telescopes SPIE Proceedings vol. 2871, June 1996 P.Wallace - Pointing and tracking software for the Gemini 8-metre telescopes SPIE Proceedings vol. 2871, June 1996 T.Erm - Analysis of tracking performance SPIE Proceedings vol. 2871, June 1996 SPIE Cenference 3112 - Telescopes Control Systems II San Diego CA, USA 27-28 July 1997 G.Chiozzi K.Wirenstrand M.Ravensbergen B.Gilli - Integration tests of the VLT Telescope Control Systam SPIE Proceedings vol. 3112, July 1997, pp.141-151 A.Wallander J.Spyromilio - NTT Project: a field test for the VLT software and hardware SPIE Proceedings vol. 3112, July 1997, pp.9-19 E.Allaert G.Raffi - Preparation for VLT software commisioning at Paranal SPIE Proceedings vol. 3112, July 1997, pp.20-27 J.Wilkes M.Fisher - Selection of tape encoding system for the main axis of the Gemini telescopes SPIE Proceedings vol. 3112, July 1997, pp.30-41 M.Peron et al. - VLT Data Flow System: the NTT prototype experience SPIE Proceedings vol. 3112, July 1997, pp.60-65 A.Conrad J.Gathright R.Kibrick - Remote observing with the Keck Telescopes SPIE Proceedings vol. 3112, July 1997, pp.99-110 J.Bailey R.Prestage - The portable telescope control system project SPIE Proceedings vol. 3112, July 1997, pp.124-131 L.Miglietta V.Bilioni C.Braccesi V.Pante - Large Binocular Telescope: the control system of the position actuator of the 8.4m borosilicate honeycomb primary mirrors SPIE Proceedings vol. 3112, July 1997, pp.132-140 S.S.Smith K.Gillies - User Interface for the Control of the Gemini Telescopes SPIE Proceedings vol. 3112, July 1997, pp.152-159 D.Gwo - A robust guide-star tracking algorithm proposed for Gravity Probe-B relativity mission SPIE Proceedings vol. 3112, July 1997, pp.320-327 D.Mancini E.Cascone P.Schipani - Galileo High-Resolution Encoder System SPIE Proceedings vol. 3112, July 1997, pp.328-334 D.Mancini M.Brescia E.Cascone P.Schipani - A Neural Variable Structure Controller for Telescope Pointing and Tracking Improvement SPIE Proceedings vol. 3112, July 1997, pp.335-342 E.Cascone D.Mancini P.Schipani - Galileo Telescope model dentification SPIE Proceedings vol. 3112, July 1997, pp.343-350 Papers on C/C++ programming Binder: OO2 -------------------------------------------------------------------------- P.Suel - Extending C++ for Distributed Applications - Dr'Bobb's, Feb. 1995 D.Ford - Associations in C++ - Dr.Dobb's Aug. 1994 J.Rogers - Locking Without Deadlocks - C/C++ Users Journal, Nov. 1995 J.Dugger - Multithreading in C++ - C/C++ Users Journal, Nov. 1995 N.Hunt - Automatically tracking test case execution - JOOP, Nov/Dec 1995 N.Hunt - Performance testing C++ code - JOOP, Jan 1996 J.J.P.Tsai Y.Bi S.J.Yang - Debugging for timing-constraint violations IEEE Software, March 1996 H.Lu - ELF: From the programmer's perspective T.Cargill - Managing Dynamic Objects in C++ - Dr.Dobb's, June 1996 D.Zigmond - STL Iterators - Dr.Dobb's, June 1996 T.Linenbach - Reusable Bynary Associations in C++ - Dr.Dobb's, June 1996 Allan - AnAsynchronous Design Pattern - Dr.Dobb's, June 1996 P.Arnaud - Dynamic Message Passing in C++ - Dr.Dobb's, Aug. 1996 D.Zigmond - STL algorithms - Dr.Dobb's, Aug. 1996 M.D.Carroll M.A.Ellis - Obstacles to Inheritability in C++ - C/C++ Users Journal, Aug. 1996 S.Blaha - Object-Oriented Interprocess Communication - Dr.Dobb's, Aug. 1996 G.Messer - A C++ Chronograph Class - C/C++ Users Journal, Sep. 1996 S.Hartmann - A reusable PID control class - C/C++ Users Journal, Feb. 1997 D.Wisehart - Software for Fail-safe Applications - C/C++ Users Journal, Feb. 1997 M.Remy - Portable Signal Handling Under UNIX - C/C++ Users Journal, Mar97 P.Anderson - C Multidimensional Arrays at Run Time - Dr.Dobb's, Aug '89 J.W.Ross - Calling C Functions with Variably Dimensioned Arrays - Dr.Dobb's, Aug 1993 A.Rahimi - A Muldimensional Array Class - C/C++ Users Journal, Jul. 1997 H.Schmidt - Me and my arrow (auto-pointer template) - C/C++ Users Journal, Aug. 1997 A.Stevens - The Proposed C++ Standard: Evolution, Revolution, Innovation, Invention, convolution - Dr.Dobb's Journal, Sep. 1997 B.D.Roseblum - Improve Your Programming with Asserts Dr.Dobb's, Dec. 1997 J.Bansija C.Davis - Automated Metrics and Object-Oriented Development Dr.Dobb's, Dec. 1997 J.Shankel - Implementing Abstract Factory as an STL Container Dr.Dobb's, Dec. 1997 M.Spertus - C++ and Garbage Collection Dr.Dobb's, Dec. 1997 J.Beveridge - Moving Templates out of Header Files C/C++ User Journal, Nov. 1997 D.Lea - A Memory Allocator web page F.Kaduch D.Jan P.Vidal - Object-Oriented Finite-State Machines C/C++ User Journal, Feb. 1998 B.Reck - Thread Synchronization with Reference-Counting Handles C/C++ User Journal, Feb. 1998 D.Pomerants - Testing Error Handlers by Simulating Errors C/C++ User Journal, June 1998 F.Wild - C++ Interfaces Dr. Dobb's Journal, Aug. 1998 C.Allison - What's New in Standard C++ C/C++ User Journal, Dec. 1998 S.Meyers - More Effective C++, 35 new ways to improve your programs and design, Selected Chapters from the book - 1996 C++/OO courses, tutorials specs Bind Title -------------------------------------------------------------------------- OO5 G.Chiozzi - C++ Introductory Tutorial, varius documentation, 1995 OO5 J.T.Baldwin - C++ Inspection Check List, 1991 OO6 G.Booch J.Rumbaugh - Unified Method for OO Development Documentation Set, Rational Corporation, 1996 OO6 A Rational Development Process (RUP), Rational Corporation, 1999 OO6 Introducing the Object Modelling Technique (ESO slides) OO6 Fundamentals of Software through Pictures for OMT Student Workbook S1 VLT On-line Data Flow Analysis Document VLT-SPE-ESO-10100-0790 C++ class libraries Bind Title -------------------------------------------------------------------------- OO7 Standard Template Library Reference OO7 M.J.Vilot - The C++ Standard Library - Dr.Dobb's, Aug. 1995 OO7 D.Zigmond - Generic Programming and the C++ STL - Dr.Dobb's, Aug. 1995 OO7 P.J.Plauger - The Header .... series of papers C/C++ User Journal OO7 Mumit's STL Newbie guide OO7 JThreads/C++, Java-like Threads for C++ OO8 Working Paper for Draft Proposal International Standard for Information Systems - Programming Language C++ X3J16/95-0087 April 1995 Papers on control theory Bind Title -------------------------------------------------------------------------- V1 S.Orlosky G.Avolio - Basic of rotary optical encoders Control Engineering, Nov. 1997 V1 V.J.VanDoren - How Software Tools Simplify Loop Tuning Control Engineering, Nov. 1997 V1 V.J.VanDoren - Advanced Control Software Goes Beyond PID Control Engineering, Jan. 1998 V1 J.Mandell B.Cook - SCADA Systems 'Dampen' Infrastructure Problems Control Engineering, Jan. 1998 V1 Windows CE movesfrom Pocket to Control G.A.Mintchell Control Engineering, May 1999 V1 Is a new Control Room in Your Future? D.Harrold, I.Nimmo Control Engineering, May 1999 V1 Digital Feedback Control of Telescopes Performance and Requirements F.Biancat Marchet, M.Dimmler, ESO Papers on generic IT arguments Bind Title -------------------------------------------------------------------------- V1 Interviews: J.Woehr - An Interview with Donald Knuth - Dr.Dobb's Apr. 1996 J.C.Dvorak - Buzz Off (Lou Gestner and IBM) - PC Computing B.Morris - Big Blue - Fortune Apr. 14, 1997 V1 J.Keaton - Employment 2005: Boom or Bust for Computer Professionals? IEEE Computer May 1996 V1 N.Terzi C.Rizzuto - Proposta di un codice di comportamento verso i giovani fisici - Il Nuovo Saggiatore, Maggio 1997 V1 P.J.Douglas G.M.Alliger R.Goldberg - Refining the curriculum: Client-Server and Object-Oriented Training Computer, June 1996 V1 B.H.Barnes - Assessing Computer Technology in Europe Communications of the ACM, May 1998 V1 A Career Management Model K.Sandholtz Dr.Dobb's Journal Fall 1998 V1 Surviving the Technical Interview J.Saturia Dr.Dobb's Journal Fall 1998 V1 Becoming a Computer Consultant J.Ruhl Dr.Dobb's Journal Fall 1998 V1 How to be a STAR engineer R.E.Kelley Spectrum October 1999 V1 L.Krumenaker - Roboscopes - Internet World, May 1996 V1 A.Peleg S.Wilkie U.Weiser - Intel MMX for Multimedia PCs - Communications of the ACM, Jan 1997 V1 R.Comerford - The battle for the desktop - IEEE Spectrum, May 1997 V1 IEEE Spectrum March 1997, Sharing virtual worlds, special report R.Braham R.Comerford - Sharing virtual worlds IEEE Spectrum, Mar. 1997 R.C.Waters J.W.Barrus - The rise of shared virtual environments IEEE Spectrum, Mar. 1997 R.Rockwell - An infrastructure for social software IEEE Spectrum, Mar. 1997 B.Roehle - Chaneling the data flood IEEE Spectrum, Mar. 1997 C.R.Karr D.Reece R.Franceschini - Synthetic soldiers IEEE Spectrum, Mar. 1997 D.B.Anderson M.A.Casey - The sound dimension IEEE Spectrum, Mar. 1997 V1 R.D.Beer R.D.Quinn H.J.Chiel R.E.Ritzmann - Biologically inspired approaches to robotics Communication of the ACM, Mar. 1997 V1 T.S.Perry - In search of the future of Air Traffic Control IEEE Spectrum, Aug. 1997 V1 D.R.Gentner J.Grudin - Design Models for Computer-Human Interfaces Computer, June 1996 V1 P.Morreale - Agents on the Move IEEE Spectrum, Apr. 1998 V1 N.F.Johnson S.Jajodia - Exploring Steganography: Seeing the Unseen IEEE Computer. Feb. 1998 Papers on non-IT arguments Bind Title -------------------------------------------------------------------------- V1 R.Braham - Ballistic missile defense: it's back IEEE Spectrum, Sep. 1997 V1 W.Sweet, F.Felix, J.Beard, - Nuclear Energy: Special Report IEEE Spectrum, Nov. 1997 V1 P.Creola - Space Visions for the 21st Century Europhysics News January/February 1998 V1 Special Issue on Fusion Research Europhysics News November/December 1998 V1 F.Romanelli - Le ricerche sulla fusione termonucleare controllata condotte sul tokamak FTU Il Nuovo Saggiatore, Bollettino della Societa' Italiana di Fisica Vol. 13 Anno 1997 No.5-6 V1 L.Geppert W.Sweet - Technology 1998: Analysis & Forecast Issue IEEE Spectrum, Jan. 1998 V1 J.Oberg - Shuttle-Mir's lessons for the International Space Station IEEE Spectrum, June 1998 S.J.Marcus - Woe is MIR IEEE Spectrum, June 1998 V1 Europe Report IEEE Spectrum, October 1998 V1 Missiles for all: the new global threat? J.Oberg IEEE Spectrum, March 1999 V1 The U.S.-Russian Space Relationship: symbolism at any cost? J.Oberg IEEE Spectrum, July 1999 V1 La Figura di Marie Curie a cento anni dalla scoperta del radio U.Amaldi Il Nuovo Saggiatore, vol.14, 1998, No. 6 V1A New Eye Opens (the Gemini first telescope) G.Stix Scientific American, April 1999 V1A Riccardo Giacconi Laureato Nobel R.Ruffini Il Nuovo Saggiatore VLT papers and presentations Bind Title -------------------------------------------------------------------------- V2 G.Chiozzi DBL Database Loader, Extended CCS, Event Handling Toolkit VLT Control Software tutorial, ESO 19/06/95 V2 G.Chiozzi T.J.Accardo The Very Large Telescope real time database. An Object Oriented Approach based over RTAP European RTAP User Group Conference 1995 Lyon, France 11-12 April 1995 V2 G.Chiozzi CCS Database Loader Tutorial Internal course, ESO 03/04/95 V2 G.Chiozzi An object-oriented event-driven architecture for the VLT Telescope Control Software ICALEPCS 1995, Chicago, USA, Oct 1995 V2 G.Chiozzi VLT Object Oriented Design VLT Software Review, ESO, Apr. 1996 V2 G.Chiozzi SW Technology for Next Generation ESO Control Software Trieste Meeting on Y2K Real-time Control in Physics Trieste, 14-15 of January 1999 V2 G.Chiozzi ESO Annual Review 1999 - TCS Activities & ATCS ESO internal presentation Garching bei Muenchen, February 1999 V2 G.Chiozzi Auxiliary Telescopes Control Software ESO internal presentation Garching bei Muenchen, 09 of June 1999 V2 G.Chiozzi Real-Time Control Systems: a "One Document" Object Oriented Development Process ICALEPCS 1999, Trieste, Italy, Oct 1999 V2 G.Filippi Software Engineering For ESO's VLT Project ICALEPCT 1993, Berlin, Oct. 1993 V2 G.Raffi Control Software for the ESO VLT ICALEPCS 1991, Tsukuba, Nov. 1991 V2 G.Raffi Trends in instrumentation software ASTRONET 1993 workshop V2 G.Raffi Status of ESO Very Large Telescope control software ICALEPCS 1995, Chicago, USA, Oct 1995 V2 G.Raffi The VLT control software development and installation ICALEPCS 1997, Baijing, China, Nov 1997 V2 G.Filippi Software Practices Used in the ESO Very Large Telescope Control Software ICALEPCS 1999, Trieste, Italy, Oct 1999 V2 European Southern Observatory VLT Customer Case History, Wind River, 1999 V3 G.Chiozzi P.Duhoux R.Karban VLTI Auxiliary Telescopes: a full Object Oriented approach Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4009-03 V3 K.Wirenstrand G.Chiozzi R.Karban VLT Telescope Control Software installation and commissioning Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4009-20 V3 G.Chiozzi R.Karban K.Wirenstrand Field Stabilisation on the ESO VLT Telescopes Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4009-11 V3 UT Commissioning Field Stabilization tests on Kueyen VLT-TRE-ESO-10200-XXXX V3 B.Koehler C.Flebus VLTI Auxiliary Telescopes Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4006-03 V3 A.Wallander J.Spyromilio K.Wirenstrand Commissioning VLT Unit Telescopes: methods and results Advanced Telescope and Instrumentation Control Software Munich Germany 27-31 Mar. 2000, Proc. SPIE 4004 © gchiozzi@eso.org

    Last modified: Mon Feb 19 11:45:08 CET 2007



    Direct Download of over 5500 Certification Exams

    3COM [8 Certification Exam(s) ]
    AccessData [1 Certification Exam(s) ]
    ACFE [1 Certification Exam(s) ]
    ACI [3 Certification Exam(s) ]
    Acme-Packet [1 Certification Exam(s) ]
    ACSM [4 Certification Exam(s) ]
    ACT [1 Certification Exam(s) ]
    Admission-Tests [13 Certification Exam(s) ]
    ADOBE [93 Certification Exam(s) ]
    AFP [1 Certification Exam(s) ]
    AICPA [2 Certification Exam(s) ]
    AIIM [1 Certification Exam(s) ]
    Alcatel-Lucent [13 Certification Exam(s) ]
    Alfresco [1 Certification Exam(s) ]
    Altiris [3 Certification Exam(s) ]
    Amazon [2 Certification Exam(s) ]
    American-College [2 Certification Exam(s) ]
    Android [4 Certification Exam(s) ]
    APA [1 Certification Exam(s) ]
    APC [2 Certification Exam(s) ]
    APICS [2 Certification Exam(s) ]
    Apple [69 Certification Exam(s) ]
    AppSense [1 Certification Exam(s) ]
    APTUSC [1 Certification Exam(s) ]
    Arizona-Education [1 Certification Exam(s) ]
    ARM [1 Certification Exam(s) ]
    Aruba [6 Certification Exam(s) ]
    ASIS [2 Certification Exam(s) ]
    ASQ [3 Certification Exam(s) ]
    ASTQB [8 Certification Exam(s) ]
    Autodesk [2 Certification Exam(s) ]
    Avaya [96 Certification Exam(s) ]
    AXELOS [1 Certification Exam(s) ]
    Axis [1 Certification Exam(s) ]
    Banking [1 Certification Exam(s) ]
    BEA [5 Certification Exam(s) ]
    BICSI [2 Certification Exam(s) ]
    BlackBerry [17 Certification Exam(s) ]
    BlueCoat [2 Certification Exam(s) ]
    Brocade [4 Certification Exam(s) ]
    Business-Objects [11 Certification Exam(s) ]
    Business-Tests [4 Certification Exam(s) ]
    CA-Technologies [21 Certification Exam(s) ]
    Certification-Board [10 Certification Exam(s) ]
    Certiport [3 Certification Exam(s) ]
    CheckPoint [41 Certification Exam(s) ]
    CIDQ [1 Certification Exam(s) ]
    CIPS [4 Certification Exam(s) ]
    Cisco [318 Certification Exam(s) ]
    Citrix [47 Certification Exam(s) ]
    CIW [18 Certification Exam(s) ]
    Cloudera [10 Certification Exam(s) ]
    Cognos [19 Certification Exam(s) ]
    College-Board [2 Certification Exam(s) ]
    CompTIA [76 Certification Exam(s) ]
    ComputerAssociates [6 Certification Exam(s) ]
    Consultant [2 Certification Exam(s) ]
    Counselor [4 Certification Exam(s) ]
    CPP-Institue [2 Certification Exam(s) ]
    CPP-Institute [1 Certification Exam(s) ]
    CSP [1 Certification Exam(s) ]
    CWNA [1 Certification Exam(s) ]
    CWNP [13 Certification Exam(s) ]
    Dassault [2 Certification Exam(s) ]
    DELL [9 Certification Exam(s) ]
    DMI [1 Certification Exam(s) ]
    DRI [1 Certification Exam(s) ]
    ECCouncil [21 Certification Exam(s) ]
    ECDL [1 Certification Exam(s) ]
    EMC [129 Certification Exam(s) ]
    Enterasys [13 Certification Exam(s) ]
    Ericsson [5 Certification Exam(s) ]
    ESPA [1 Certification Exam(s) ]
    Esri [2 Certification Exam(s) ]
    ExamExpress [15 Certification Exam(s) ]
    Exin [40 Certification Exam(s) ]
    ExtremeNetworks [3 Certification Exam(s) ]
    F5-Networks [20 Certification Exam(s) ]
    FCTC [2 Certification Exam(s) ]
    Filemaker [9 Certification Exam(s) ]
    Financial [36 Certification Exam(s) ]
    Food [4 Certification Exam(s) ]
    Fortinet [12 Certification Exam(s) ]
    Foundry [6 Certification Exam(s) ]
    FSMTB [1 Certification Exam(s) ]
    Fujitsu [2 Certification Exam(s) ]
    GAQM [9 Certification Exam(s) ]
    Genesys [4 Certification Exam(s) ]
    GIAC [15 Certification Exam(s) ]
    Google [4 Certification Exam(s) ]
    GuidanceSoftware [2 Certification Exam(s) ]
    H3C [1 Certification Exam(s) ]
    HDI [9 Certification Exam(s) ]
    Healthcare [3 Certification Exam(s) ]
    HIPAA [2 Certification Exam(s) ]
    Hitachi [30 Certification Exam(s) ]
    Hortonworks [4 Certification Exam(s) ]
    Hospitality [2 Certification Exam(s) ]
    HP [746 Certification Exam(s) ]
    HR [4 Certification Exam(s) ]
    HRCI [1 Certification Exam(s) ]
    Huawei [21 Certification Exam(s) ]
    Hyperion [10 Certification Exam(s) ]
    IAAP [1 Certification Exam(s) ]
    IAHCSMM [1 Certification Exam(s) ]
    IBM [1530 Certification Exam(s) ]
    IBQH [1 Certification Exam(s) ]
    ICAI [1 Certification Exam(s) ]
    ICDL [6 Certification Exam(s) ]
    IEEE [1 Certification Exam(s) ]
    IELTS [1 Certification Exam(s) ]
    IFPUG [1 Certification Exam(s) ]
    IIA [3 Certification Exam(s) ]
    IIBA [2 Certification Exam(s) ]
    IISFA [1 Certification Exam(s) ]
    Intel [2 Certification Exam(s) ]
    IQN [1 Certification Exam(s) ]
    IRS [1 Certification Exam(s) ]
    ISA [1 Certification Exam(s) ]
    ISACA [4 Certification Exam(s) ]
    ISC2 [6 Certification Exam(s) ]
    ISEB [24 Certification Exam(s) ]
    Isilon [4 Certification Exam(s) ]
    ISM [6 Certification Exam(s) ]
    iSQI [7 Certification Exam(s) ]
    ITEC [1 Certification Exam(s) ]
    Juniper [63 Certification Exam(s) ]
    LEED [1 Certification Exam(s) ]
    Legato [5 Certification Exam(s) ]
    Liferay [1 Certification Exam(s) ]
    Logical-Operations [1 Certification Exam(s) ]
    Lotus [66 Certification Exam(s) ]
    LPI [24 Certification Exam(s) ]
    LSI [3 Certification Exam(s) ]
    Magento [3 Certification Exam(s) ]
    Maintenance [2 Certification Exam(s) ]
    McAfee [8 Certification Exam(s) ]
    McData [3 Certification Exam(s) ]
    Medical [69 Certification Exam(s) ]
    Microsoft [368 Certification Exam(s) ]
    Mile2 [2 Certification Exam(s) ]
    Military [1 Certification Exam(s) ]
    Misc [1 Certification Exam(s) ]
    Motorola [7 Certification Exam(s) ]
    mySQL [4 Certification Exam(s) ]
    NBSTSA [1 Certification Exam(s) ]
    NCEES [2 Certification Exam(s) ]
    NCIDQ [1 Certification Exam(s) ]
    NCLEX [2 Certification Exam(s) ]
    Network-General [12 Certification Exam(s) ]
    NetworkAppliance [36 Certification Exam(s) ]
    NI [1 Certification Exam(s) ]
    NIELIT [1 Certification Exam(s) ]
    Nokia [6 Certification Exam(s) ]
    Nortel [130 Certification Exam(s) ]
    Novell [37 Certification Exam(s) ]
    OMG [10 Certification Exam(s) ]
    Oracle [269 Certification Exam(s) ]
    P&C [2 Certification Exam(s) ]
    Palo-Alto [4 Certification Exam(s) ]
    PARCC [1 Certification Exam(s) ]
    PayPal [1 Certification Exam(s) ]
    Pegasystems [11 Certification Exam(s) ]
    PEOPLECERT [4 Certification Exam(s) ]
    PMI [15 Certification Exam(s) ]
    Polycom [2 Certification Exam(s) ]
    PostgreSQL-CE [1 Certification Exam(s) ]
    Prince2 [6 Certification Exam(s) ]
    PRMIA [1 Certification Exam(s) ]
    PsychCorp [1 Certification Exam(s) ]
    PTCB [2 Certification Exam(s) ]
    QAI [1 Certification Exam(s) ]
    QlikView [1 Certification Exam(s) ]
    Quality-Assurance [7 Certification Exam(s) ]
    RACC [1 Certification Exam(s) ]
    Real-Estate [1 Certification Exam(s) ]
    RedHat [8 Certification Exam(s) ]
    RES [5 Certification Exam(s) ]
    Riverbed [8 Certification Exam(s) ]
    RSA [15 Certification Exam(s) ]
    Sair [8 Certification Exam(s) ]
    Salesforce [5 Certification Exam(s) ]
    SANS [1 Certification Exam(s) ]
    SAP [98 Certification Exam(s) ]
    SASInstitute [15 Certification Exam(s) ]
    SAT [1 Certification Exam(s) ]
    SCO [10 Certification Exam(s) ]
    SCP [6 Certification Exam(s) ]
    SDI [3 Certification Exam(s) ]
    See-Beyond [1 Certification Exam(s) ]
    Siemens [1 Certification Exam(s) ]
    Snia [7 Certification Exam(s) ]
    SOA [15 Certification Exam(s) ]
    Social-Work-Board [4 Certification Exam(s) ]
    SpringSource [1 Certification Exam(s) ]
    SUN [63 Certification Exam(s) ]
    SUSE [1 Certification Exam(s) ]
    Sybase [17 Certification Exam(s) ]
    Symantec [134 Certification Exam(s) ]
    Teacher-Certification [4 Certification Exam(s) ]
    The-Open-Group [8 Certification Exam(s) ]
    TIA [3 Certification Exam(s) ]
    Tibco [18 Certification Exam(s) ]
    Trainers [3 Certification Exam(s) ]
    Trend [1 Certification Exam(s) ]
    TruSecure [1 Certification Exam(s) ]
    USMLE [1 Certification Exam(s) ]
    VCE [6 Certification Exam(s) ]
    Veeam [2 Certification Exam(s) ]
    Veritas [33 Certification Exam(s) ]
    Vmware [58 Certification Exam(s) ]
    Wonderlic [2 Certification Exam(s) ]
    Worldatwork [2 Certification Exam(s) ]
    XML-Master [3 Certification Exam(s) ]
    Zend [6 Certification Exam(s) ]





    References :


    Dropmark : http://killexams.dropmark.com/367904/11740133
    Wordpress : http://wp.me/p7SJ6L-1pL
    Dropmark-Text : http://killexams.dropmark.com/367904/12306854
    Issu : https://issuu.com/trutrainers/docs/c9560-659
    Blogspot : http://killexamsbraindump.blogspot.com/2017/11/pass4sure-c9560-659-real-question-bank.html
    RSS Feed : http://killexams.com/datafiles/rss/C9560-659-rss.xml
    Box.net : https://app.box.com/s/04xpsn795bexqpwndfcmj3rr5uedsggu
    zoho.com : https://docs.zoho.com/file/62c50c96d93b9c9b54e51b7d3aa5285c0e579






    Back to Main Page

    IBM C9560-659 Exam (Fundamentals of Applying IBM SmartCloud Control Desk V1) Detailed Information



    References:


    Pass4sure Certification Exam Study Notes- Killexams.com
    Download Hottest Pass4sure Certification Exams - CSCPK
    Complete Pass4Sure Collection of Exams - BDlisting
    Latest Exam Questions and Answers - Ewerton.me
    Pass your exam at first attempt with Pass4Sure Questions and Answers - bolink.org
    Here you will find Real Exam Questions and Answers of every exam - dinhvihaiphong.net
    Hottest Pass4sure Exam at escueladenegociosbhdleon.com
    Download Hottest Pass4sure Exam at ada.esy
    Pass4sure Exam Download from aia.nu
    Pass4sure Exam Download from airesturismo
    Practice questions and Cheat Sheets for Certification Exams at linuselfberg
    Study Guides, Practice questions and Cheat Sheets for Certification Exams at brondby
    Study Guides, Study Tools and Cheat Sheets for Certification Exams at assilksel.com
    Study Guides, Study Tools and Cheat Sheets for Certification Exams at brainsandgames
    Study notes to cover complete exam syllabus - crazycatladies
    Study notes, boot camp and real exam Q&A to cover complete exam syllabus - brothelowner.com
    Study notes to cover complete exam syllabus - carspecwall
    Study Guides, Practice Exams, Questions and Answers - cederfeldt
    Study Guides, Practice Exams, Questions and Answers - chewtoysforpets
    Study Guides, Practice Exams, Questions and Answers - Cogo
    Study Guides, Practice Exams, Questions and Answers - cozashop
    Study Guides, Study Notes, Practice Test, Questions and Answers - cscentral
    Study Notes, Practice Test, Questions and Answers - diamondlabeling
    Syllabus, Study Notes, Practice Test, Questions and Answers - diamondfp
    Updated Syllabus, Study Notes, Practice Test, Questions and Answers - freshfilter.cl
    New Syllabus, Study Notes, Practice Test, Questions and Answers - ganeshdelvescovo.eu
    Syllabus, Study Notes, Practice Test, Questions and Answers - ganowebdesign.com
    Study Guides, Practice Exams, Questions and Answers - Gimlab
    Latest Study Guides, Practice Exams, Real Questions and Answers - GisPakistan
    Latest Study Guides, Practice Exams, Real Questions and Answers - Health.medicbob
    Killexams Certification Training, Q&A, Dumps - kamerainstallation.se
    Killexams Syllabus, Killexams Study Notes, Killexams Practice Test, Questions and Answers - komsilanbeagle.info
    Pass4sure Study Notes, Pass4sure Practice Test, Killexams Questions and Answers - kyrax.com
    Pass4sure Brain Dump, Study Notes, Pass4sure Practice Test, Killexams Questions and Answers - levantoupoeira
    Pass4sure Braindumps, Study Notes, Pass4sure Practice Test, Killexams Questions and Answers - mad-exploits.net
    Pass4sure Braindumps, Study Notes, Pass4sure Practice Test, Killexams Questions and Answers - manderije.nl
    Pass4sure study guides, Braindumps, Study Notes, Pass4sure Practice Test, Killexams Questions and Answers - manderije.nl


    killcerts.com (c) 2017