|Exam Name||:||Fundamentals of Applying IBM SmartCloud Control Desk V1|
|Questions and Answers||:||105 Q & A|
|Updated On||:||April 17, 2019|
|PDF Download Mirror||:||Pass4sure C9560-659 Dump|
|Get Full Version||:||Pass4sure C9560-659 Full Version|
Exam Questions Updated On :
C9560-659 exam Dumps Source : Fundamentals of Applying IBM SmartCloud Control Desk V1
Test Code : C9560-659
Test Name : Fundamentals of Applying IBM SmartCloud Control Desk V1
Vendor Name : IBM
Q&A : 105 Real Questions
What is needed to study for C9560-659 examination?
It was just 12 days to try for the C9560-659 exam and I was loaded with a few points. I was seeking a simple and powerful guide urgently. Finally, I got the Q&A of killexams. Its short answers were not difficult to finish in 15 days. In the true C9560-659 exam, I scored 88%, noting all the questions in due time and got 90% questions like the Sample papers that they provided. Much obliged to killexams.
worried for C9560-659 exam? Get this C9560-659 question bank.
I am penning this due to the fact I want yo say thanks to you. I even have effectively cleared C9560-659 exam with 96%. The test bank series made by means of your team is extraordinary. It now not best offers a actual experience of an online exam but every offers each question with detailed explananation in a easy language which is easy to understand. I am extra than satisfied that I made the right preference by using shopping for your test series.
Very comprehensive and authentic Q&A of C9560-659 exam.
Best C9560-659 exam training i have ever stumble upon. I passed C9560-659 exam hassle-loose. No stress, no issues, and no frustrations inside the direction of the exam. I knew the entirety I had to realise from this killexams.com C9560-659 Questions set. The questions are valid, and that i heard from my buddy that their coins again guarantee works, too. They do offer you with the cash again if you fail, however the element is, they make it very smooth to pass. Ill use them for my next certification test too.
Little effor required to prepare C9560-659 actual exam bank.
Have passed C9560-659 exam with killexams.com questions solutions. killexams.com is one hundred% reliable, maximum of the questions had been similar to what I were given at the exam. I neglected a few questions just due to the fact I went clean and didnt keep in brain the solution given in the set, but considering I got the relaxation right, I handed with accurate markss. So my advice is to analyze everything you get to your training p.C. From killexams.com, that is all you want to skip C9560-659.
I want actual test questions latest C9560-659 examination.
ive cleared the C9560-659 exam in the first attempt. I could reap this fulfillment because of killexams.com questions and answers. It helped me to use my work ebook know-how within the question & solution layout. I solved those query papers with exam simulator and got complete idea of the exam paper. So I would love to thank killexams.
these C9560-659 questions and answers provide proper expertise of subjects.
I desired to inform you that in beyond in idea that i would in no way be able to pass the C9560-659 test. but when I take the C9560-659 schooling then I got here to know that the net services and material is the pleasant bro! And when I gave the tests I handed it in first attempt. I told my pals about it, they also starting the C9560-659 schooling form here and locating it really outstanding. Its my great revel in ever. thank you
excellent opportunity to get certified C9560-659 exam.
Heres yet another vote for killexams.com as the best way to prepare for C9560-659 exam. I opted for this kit to prepare for my C9560-659 exam. I didnt set my hopes too high and kept an eye on the official syllabus to make sure I do not miss any topics, and it turned out that killexams.com had them all covered. The preparation was very solid and I felt confident on the exam day. And what really made killexams.com awesome was the moment when I realized their questions were exactly the same as what real exam had. Just as promised (which I didnt really expect to be true - you know how it works sometimes!). So, this is great. Dont hesitate, go for it.
Did you tried these C9560-659 actual query financial institution and study guide.
Passing the C9560-659 exam turned into quite hard for me until i was added with the query & solution through killexams. a number of the topics appeared very hard to me. tried plenty to study the books, however failed as time was quick. subsequently, the sell off helped me understand the topics and wrap up my instruction in 10 days time. amazing guide, killexams. My heartfelt way to you.
worked difficult on C9560-659 books, but the whole thing turned into on this study manual.
It is my pleasure to thank you very much for being here for me. I passed my C9560-659 certification with flying colors. Now I am C9560-659 certified.
updated and actual question bank state-of-the-art C9560-659.
Hello organization, i have completed C9560-659 in first attempt and thank you masses in your beneficial questions and answers.
Barminco, Hindustan Zinc, Petra Diamonds and Vedanta Zinc international faucet into the Sandvik and IBM relationship to increase operations and safeguard in underground challenging-rock mining
Award-successful OptiMine® Analytics with IBM Watson IoT for predictive renovation and optimization, analyzes, learns and communicates with gadget operating thousands of toes underground
TAMPERE, Finland and ARMONK, N.Y., April 1, 2019 /PRNewswire/ -- Joint consumers of IBM (NYSE: IBM) and Sandvik Mining and Rock know-how, one of the most world's largest top rate mining equipment producers, are tapping the powers of IoT, superior analytics and synthetic intelligence to recognise safety, upkeep, productiveness and operational efficiency.
The mining and rock excavation industry is under transforming into drive to raise the world give of minerals to meet the needs and expectations of a swiftly rising world inhabitants. This often requires extracting from expanding stronger depths, which could make it difficult to speak and act as critical when device fails or has to be serviced.
OptiMine® Analytics transforms information into system improvements by the use of predictive insights and actionable dashboards embedded into operation management systems. the usage of the analytics capabilities from IBM Watson IoT, this information management solution permits mining businesses to mix machine and application records from disparate sources in precise-time, analyzing patterns within the information to assist enrich availability, utilization and efficiency.
via a sequence of IBM Design considering workshops, IBM and Sandvik work with valued clientele to improve a framework to shape choices around records driven productivity and predictive maintenance. using the Watson IoT expertise, Sandvik and IBM have jointly created a platform able to agree to the stringent reliability and safety necessities of mining operations. Predictive upkeep know-how leveraging IoT sensor information has additionally been added as a part of this platform.
"Proactively identifying preservation wants earlier than some thing breaks is resulting in large charge and time rate reductions," noted Patrick Murphy, president, Rock Drills & applied sciences, Sandvik. "Our award-successful OptiMine® Analytics with IBM Watson IoT options offer our shoppers a extra finished view of their operations for smarter, safer and extra productive work."
Sandvik and IBM purchasers similar to Petra Diamonds and Barminco are using IoT to support in the reduction of miner exposure to antagonistic work environments and raise security.
"Our suitable precedence is the protection of our personnel and if a laptop fails underground, we need instant insight into what is occurring in that tunnel," talked about Luctor Roode, government operations at Petra Diamonds. "With the answer from Sandvik and IBM, we have real-time facts that allows for us to automatically determine the basis reason behind the difficulty and act as a consequence."
"Leveraging records is develop into more and more valuable across the mining sector. via analytics, computer researching and AI, we are seeing new percentages for improved operational efficiency," mentioned Paul Muller, chief executive officer, Barminco. "Our partnership with Sandvik's OptiMine® Analytics allows us to quick-track our efforts, leveraging Sandvik's complete-of-fleet statistics and innate computer potential."
OptiMine® Analytics will even be used by means of Vedanta Zinc international's Black Mountain Mining (BMM) operations in South Africa's Northern Cape Province, to accelerate statistics-driven operations for defense, effectivity and productivity for vans, loaders and drills. moreover, Hindustan Zinc, one of the world's largest built-in producers of zinc, lead and silver has tapped Sandvik to put in force an immense digital transformation at its Sindesar Khurd Mine, India, to ensure all required infrastructure and structures can achieve world-category mining protection, effectivity and productivity.
"Sensors and monitoring programs for asset management is simply the starting when it comes to how artificial intelligence will disrupt the mining business," observed Jay Bellissimo, frequent manager, Cognitive manner Transformation, IBM world company services. "growing a solution that turns the records into actionable insights is a fragile depend. It requires an interdisciplinary effort spanning throughout mining expertise, application engineering and information science. IBM and Sandvik at the moment are on course to aid radically change the mining price chain with the fusion of cognitive capabilities into miners enterprise and working processes."
Sandvik has been supplying solutions in the mining automation enterprise for decades, with independent operations in more than 60 mines on six continents. This footprint is an immense asset to the process optimization options in bigger and higher demand. For its half, IBM has been working with leading mining clients to infuse cognitive capabilities in their business and working methods, growing the Cognitive cost Chain for Mining. This multidisciplinary strategy leverages and expands on the ideas of the fourth industrial revolution by way of helping miners achieve new effectivity reductions, while not having to make giant-scale capital investments.
Sandvik group Sandvik is a high-tech and world engineering neighborhood offering products and features that boost customer productivity, profitability and safeguard. We hang world-leading positions in chosen areas – tools and tooling systems for metallic chopping; device and tools, carrier and technical options for the mining trade and rock excavation inside the building industry; products in superior stainless steels and special alloys as well as items for industrial heating. In 2018, the neighborhood had about 42,000 personnel and revenues of about a hundred billion SEK in additional than 160 countries inside carrying on with operations.
Sandvik Mining and Rock expertise Sandvik Mining and Rock expertise is a company area within the Sandvik community and a world main organization of machine and equipment, carrier and technical solutions for the mining and development industries. application areas include rock drilling, rock slicing, crushing and screening, loading and hauling, tunneling, quarrying and breaking and demolition. In 2018, sales have been about forty three billion SEK with about 15,000 personnel in continuing operations.
About IBM For more advice about IBM functions please consult with: https://www.ibm.com/functions
IBM employer logo. (PRNewsfoto/IBM)more
View fashioned content to download multimedia:http://www.prnewswire.com/news-releases/sandvik-and-ibm-usher-in-the-fourth-industrial-revolution-to-the-mining-business-with-ibm-watson-300821186.html
April 1, 2019 Timothy Prickett Morgan
It has been a very long time considering we've considered a brand new edition of the IBM i working device, but when historical past is any guide, we are on the cusp of yet yet another liberate of the platform. and thanks to the way large Blue handles updates to the application, through its technology Refresh incremental upgrade system, this usually are not as dramatic an adventure as updating the operating device, middleware, database, and application building tools within the stack has been right through lots of the heritage of the IBM midrange.
but there are a number of OS/four hundred, i5/OS, and IBM i stores which are smartly beyond the support dates for their operating programs. this is some thing that we have discussed repeatedly in the past, but in contemporary weeks we now have been making an attempt to get an improved experience of what americans suppose the working gadget distribution stage is obtainable within the base at giant. we now have executed some straw polling as well as gathering up survey information to get a better feel of it, and here is specially central as we've been listening to from some energy techniques resellers that they have purchasers with OS/400 V5R3 and i5/OS 5.4 programs that they want to improve – clients that these resellers have not ever heard of before notwithstanding they do enterprise inside their geographies.
We don’t recognize the precise numbers, and admittedly, we don’t consider that IBM does, both – any further than big Blue had a good idea many years into the AS/four hundred line what number of gadget/36 and gadget/38 machines were nonetheless on the earth. in fact, i know this to be the case as a result of IBM contacted me in 1994 when it launched the first superior/36, which ran the system/36’s SSP working equipment and which changed into really the first of IBM’s minicomputers to utilize the PowerPC processor. (The AS/400s in 1995 used the extra full-blown 64-bit PowerPC AS processor and ran a tweaked OS/four hundred V3R6 and at last a extra reliable V3R7.) at that time, IBM definitely asked me if I knew how huge the base was as a result of its facts have been incomplete and lots of clients of the system/36 that had been launched in 1983 had dropped off the map.
This sort of factor happens the entire time in the IT sector. Microsoft does not precisely recognize what number of home windows NT and home windows Server 2000 and windows Server 2008 customers are in fact obtainable on the planet or what number of machines are working this utility – there's a a good deal nearer alignment of these numbers in the system/3X and AS/four hundred bases when you consider that most customers had just one laptop, on occasion two, however windows retail outlets had many multiples of machines, which may or can also not nonetheless be even running.
My aspect is not to make enjoyable of IT carriers for losing track of past clients, however reasonably, to get a sense of what number of old shops are still accessible if you want to figure out a way to motivate them to eventually movement ahead. This become the theme of last week’s lead story on Monday, called Rebuilding The backside Of The Pyramid, which talked concerning the potential for keeping the Power8-based mostly energy S812 Mini alive past its November deadline (literally, a useless line) so it could be used as a platform to motivate companies to movement off antique iron and operating techniques into the contemporary IBM i and vigour programs world. this is a case in contrast to wine, where the age of the antique becomes a nasty thing after a long time.
I actually have talked about satisfactory instances that you're likely getting sick of it that probably one-fifth to one-quarter of the IBM midrange base is lively, preserving on notably new iron and operating gadget releases, preserving their systems on IBM or third-birthday party preservation, purchasing utility applications, and subscribing to newsletters. The rest of the shoppers and their machines simply disappear off the radar over time. I consider the information that HelpSystems has gathered through its annual IBM i industry Survey are representative of that lively a part of the consumer base with a smattering of the old structures in there as a result of existence is all the time a combination. right here is the statistics that HelpSystems gathered up on IBM i working gadget releases in the consumer base ultimate October:
As I spoke of all over the webcasts going over these consequences, this distribution is no different than what I expect from the energetic portions of the windows Server or Linux bases. If the rest, IBM i 7.1 changed into a little extra established and fairly somewhat sooner than many might have expected, and that is because of the advent of the know-how Refresh formulation for tweaking operating programs for brand spanking new capabilities without breaking any software compatibility or certifications. As you can see from this survey, 10 percent of respondents who took the HelpSystems survey said they had been on IBM i 6.1 or previous, with half of them being on i5/OS 5.four and older.
here's per the survey carried out late remaining yr via Profound good judgment application for its 2019 State of IBM i Modernization Survey, which showed 4 percent of the bottom turned into on IBM i 6.1 and 5 % of the base became on i5/OS 5.4 or prior releases. The Profound good judgment survey suggests a tons bigger percent of purchasers on IBM i 7.3, at fifty nine percent of respondents, with 34 percent at IBM i 7.2 and 16 percent at IBM i 7.1.
figuring out we have been looking for such counsel, one reseller we recognize talked to a company of third celebration preservation for the AS/four hundred and its progeny and in a single quadrant of the us by myself, they estimate somewhere round 90 percent of its 500 shoppers run on i5/OS 5.four and previous releases. (i was flabbergasted by this number, too.) For the USA as a whole, that could indicate something round 1,800 consumers on those antique releases, and if the united states represents someplace around 35 percent of the market, then there is somewhere north of 5,000 shoppers international who are on i5/OS 5.4 and earlier releases. And remember the critical aspect right here: here's for the consumers who're procuring preservation, and never IBM renovation, but third party maintenance. Understandably, this maintainer has carved a gap assisting old releases, which doesn't imply making use of patches (IBM doesn't make any new ones for these old releases) so a great deal as helping purchasers hold them going despite the fact that they don’t exchange.
We understand that someplace round 30,000 customers out of one hundred fifty,000 valued clientele in the global IBM midrange base running AS/400 and later machines (which means no longer system/3X iron) pay for application renovation. And once once again, we recognize that we don’t comprehend tons about these purchasers who are not procuring preservation. There are probably a different 5,500 valued clientele worldwide on IBM i 6.1 who've this certain third party maintenance, if the entire relaxation of its company is on IBM i 6.1. So about 10 percent of the IBM application upkeep base seems to be on a antique liberate, or about 3,000 valued clientele, and a different 5,500 consumers who're on protection are the usage of this third celebration is on a vintage release. We don’t have any math on the other element of the bottom that isn't on renovation from IBM and this third birthday celebration business enterprise, however this establishes a ground that will probably be better.
One thing is bound: the propensity of old operating systems among this one third celebration protection organization is tons higher than what we're seeing in these surveys. it is a hallmark that there is perhaps a lot more vintage iron out there than we feel. and that is each an excellent factor, in terms of the chance to movement ahead, and a nasty element, in that it has taken so long. however, as an optimist, there isn't such as good time as the current to get relocating.related stories
Rebuilding The backside Of The Pyramid
Entry power S812 gets a brand new – but still brief – hire On lifestyles
large Blue eventually Brings IBM i To Its personal Public Cloud
Counting The charge Of IBM i On Power9 Entry programs
The Bang For The Buck Of Entry IBM i Servers
MSPs Get monthly IBM i Pricing; Why now not everybody?
IBM mentioned it is launching a Watson certification for developers.
The circulate comes as IBM is increasingly relationship builders and broadening the ecosystem for Watson and cognitive computing.
Enter the IBM Watson utility Developer Certification, so as to examine the following by way of an examination:
The examine turned into created by way of a panel of 20 cognitive computing consultants in various industries the place Watson performs -- healthcare, banking, commerce, and so forth., in response to a blog publish.
should still a developer circulate the exam they will be cited an IBM certified utility Developer and get a digital badge.
The examination is delivered by way of Pearson VUE and can be taken at its check facilities. IBM will additionally present the exam at its conferences.
Unquestionably it is hard assignment to pick dependable certification questions/answers assets regarding review, reputation and validity since individuals get sham because of picking incorrectly benefit. Killexams.com ensure to serve its customers best to its assets concerning exam dumps update and validity. The vast majority of other's sham report dissension customers come to us for the brain dumps and pass their exams joyfully and effortlessly. We never trade off on our review, reputation and quality on the grounds that killexams review, killexams reputation and killexams customer certainty is imperative to us. Uniquely we deal with killexams.com review, killexams.com reputation, killexams.com sham report objection, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. On the off chance that you see any false report posted by our rivals with the name killexams sham report grievance web, killexams.com sham report, killexams.com scam, killexams.com protest or something like this, simply remember there are constantly awful individuals harming reputation of good administrations because of their advantages. There are a huge number of fulfilled clients that pass their exams utilizing killexams.com brain dumps, killexams PDF questions, killexams hone questions, killexams exam simulator. Visit Killexams.com, our specimen questions and test brain dumps, our exam simulator and you will realize that killexams.com is the best brain dumps site.
650-175 free pdf | HPE2-T27 practice test | 000-232 practice questions | 70-741 questions and answers | 000-084 sample test | HP0-M43 cram | HP2-K24 VCE | 310-879 dumps questions | PEGACSA72V1 exam questions | HP3-C17 real questions | BH0-012 cheat sheets | 6202-1 examcollection | HP0-678 practice test | LOT-981 dump | C2020-645 study guide | 000-732 braindumps | 117-199 exam prep | HP3-X09 dumps | HP0-262 mock exam | LOT-912 test questions |
Exactly same C9560-659 questions as in real test, WTF!
killexams.com brilliant C9560-659 exam simulator is to a great degree empowering for our customers for the exam prep. Tremendously crucial questions, focuses and definitions are highlighted in brain dumps pdf. Social event the data in a single place is an authentic help and causes you prepare for the IT confirmation exam inside a short time span navigate. The C9560-659 exam offers key core interests. The killexams.com pass4sure dumps holds the fundamental questions or thoughts of the C9560-659 exam.
We have Tested and Approved C9560-659 Exam dumps. killexams.com provides the foremost distinctive and latest C9560-659 braindumps that much comprise all Q&As you need. With the guide of our C9560-659 exam dumps, you ought to not squander your risk on spending time on reference books and nearly have to be compelled to spend 10-20 hours to ace our C9560-659 real Questions and Answers. Whats larger, we have an approach to offer you with PDF Version and Exam Simulator Version test Questions and Answers. For Exam Simulator Version dumps, the candidates mimic the IBM C9560-659 exam in an exceedingly real test atmosphere. killexams.com Discount Coupons and Promo Codes are as under; WC2017 : 60% Discount Coupon for all exam on website PROF17 : 10% Discount Coupon for Orders additional than $69 DEAL17 : 15% Discount Coupon for Orders additional than $99 SEPSPECIAL : 10% Special Discount Coupon for All Orders Click http://killexams.com/pass4sure/exam-detail/C9560-659
It is essential to assemble to the guide material on the off chance that one needs toward spare time. As you require bunches of time to search for updated and true investigation material for taking the IT certification exam. In the event that you find that at one place, what could be superior to this? Its just killexams.com that has what you require. You can spare time and avoid bother on the off chance that you purchase Adobe IT certification from our site.
You ought to get the most updated IBM C9560-659 Braindumps with the right answers, which are set up by killexams.com experts, enabling the possibility to get a handle on learning about their C9560-659 exam course in the greatest, you will not discover C9560-659 results of such quality anyplace in the market. Our IBM C9560-659 Practice Dumps are given to applicants at performing 100% in their exam. Our IBM C9560-659 exam dumps are most recent in the market, allowing you to get ready for your C9560-659 exam in the correct way.
In the event that you are occupied with effectively Passing the IBM C9560-659 exam to begin procuring? killexams.com has driving edge created IBM exam addresses that will guarantee you pass this C9560-659 exam! killexams.com conveys you the exact, present and most recent updated C9560-659 exam questions and accessible with a 100% unconditional guarantee. There are many organizations that give C9560-659 brain dumps yet those are not actual and most recent ones. Arrangement with killexams.com C9560-659 new questions is a most ideal approach to pass this certification exam in simple way.
We are for the most part very much aware that a noteworthy issue in the IT business is that there is an absence of value study materials. Our exam prep material gives you all that you should take a certification exam. Our IBM C9560-659 Exam will give you exam questions with confirmed answers that reflect the real exam. These questions and answers give you the experience of taking the genuine test. High caliber and incentive for the C9560-659 Exam. 100% assurance to pass your IBM C9560-659 exam and get your IBM affirmation. We at killexams.com are resolved to enable you to pass your C9560-659 exam with high scores. The odds of you neglecting to pass your C9560-659 test, in the wake of experiencing our far reaching exam dumps are practically nothing.
killexams.com high quality C9560-659 exam simulator is extremely encouraging for our clients for the exam prep. Immensely vital questions, points and definitions are featured in brain dumps pdf. Social occasion the information in one place is a genuine help and causes you get ready for the IT certification exam inside a brief timeframe traverse. The C9560-659 exam offers key focuses. The killexams.com pass4sure dumps retains the essential questions or ideas of the C9560-659 exam
At killexams.com, we give completely surveyed IBM C9560-659 preparing assets which are the best to pass C9560-659 exam, and to get certified by IBM. It is a best decision to speed up your position as an expert in the Information Technology industry. We are pleased with our notoriety of helping individuals pass the C9560-659 test in their first attempt. Our prosperity rates in the previous two years have been completely great, because of our upbeat clients who are currently ready to impel their positions in the fast track. killexams.com is the main decision among IT experts, particularly the ones who are hoping to move up the progression levels quicker in their individual associations. IBM is the business pioneer in data innovation, and getting certified by them is an ensured approach to prevail with IT positions. We enable you to do actually that with our superb IBM C9560-659 preparing materials.
killexams.com Huge Discount Coupons and Promo Codes are as under;
WC2017 : 60% Discount Coupon for all exams on website
PROF17 : 10% Discount Coupon for Orders greater than $69
DEAL17 : 15% Discount Coupon for Orders greater than $99
DECSPECIAL : 10% Special Discount Coupon for All Orders
IBM C9560-659 is rare all around the globe, and the business and programming arrangements gave by them are being grasped by every one of the organizations. They have helped in driving a large number of organizations on the beyond any doubt shot way of achievement. Far reaching learning of IBM items are viewed as a critical capability, and the experts certified by them are exceptionally esteemed in all associations.
Killexams HP0-761 sample test | Killexams P2170-015 study guide | Killexams AZ-300 real questions | Killexams HP0-M31 questions and answers | Killexams 050-890 brain dumps | Killexams NCEES-FE test questions | Killexams 000-643 practice test | Killexams HP0-621 real questions | Killexams JN0-341 exam questions | Killexams BCP-710 Practice test | Killexams CHHE free pdf | Killexams 000-M601 bootcamp | Killexams 000-093 test prep | Killexams FN0-103 practice questions | Killexams 000-257 mock exam | Killexams HP5-B04D free pdf download | Killexams 310-400 study guide | Killexams 156-515 cram | Killexams 70-333 exam prep | Killexams 1Z0-226 exam prep |
Killexams SCNS-EN braindumps | Killexams C9010-260 exam prep | Killexams TB0-115 questions and answers | Killexams 310-610 practice questions | Killexams ICDL-IT questions answers | Killexams HP2-N32 study guide | Killexams PW0-105 real questions | Killexams 630-005 practice test | Killexams 9L0-504 braindumps | Killexams 9L0-510 test prep | Killexams FCNSP.V5 pdf download | Killexams CGFNS bootcamp | Killexams 190-828 Practice Test | Killexams 642-188 mock exam | Killexams 000-M08 sample test | Killexams LOT-911 real questions | Killexams M2150-756 cheat sheets | Killexams HP2-E45 examcollection | Killexams EC1-349 test prep | Killexams HP0-Y28 exam questions |
Also see: Ask HN: Freelancer? Seeking freelancer? (April 2014) http://news.ycombinator.com/item?id=7507753
There probably hasn't been a time in the modern era of computing where there was more widespread concern for security. Only a few years ago, security was one of those dark corners of the industry for hard-core types, but largely ignored by most of us. Today, securing computing resources ripples from the largest corporation to the most computer-illiterate home consumer, trying to prevent sophisticated hackers not only from infecting their computers with destructive viruses, but also from stealing information or using their computer as an ad hoc server.
Jan de Clercq of HP's Security Office provided much of the technical information and technical review of this section. Jan is one of HP's leading security experts. I highly recommend his new book, Windows Server 2003 Security Infrastructures, Digital Press, 2004.
Windows 2000 made some huge strides in securing the computing environment with features such as Kerberos for authentication and authorization, IP Security (IPSec) for remote access security, and the Encrypted File System (EFS) for protecting sensitive data. Windows NT and 2000 provided Certificate Services, which gave Administrators the ability to install their own CA and secure the certificates in their enterprise inexpensively, enticing smaller companies to implement Public Key Infrastructures (PKI).
Security issues always provide room for improvement, and Windows Server 2003 and Windows XP have taken a step forward in a number of areas. Think of XP as a Windows 2003 client—they both have very similar and compatible features. Significant security feature improvements in Windows XP and Windows Server 2003 include
The following sections provide a brief description of each issue. Refer to Jan de Clercq's books listed in the "References" section at the end of the chapter for more information.
Also known as SAFER, these policies are Microsoft's first attempt to provide stronger cryptographic compliance with Federal Information Processing Standards (FIPS) 140-1. FIPS determines whether products meet the standard and evaluates overall security provided by a cryptosystem. The kernel mode driver, FIPS.SYS, supports EFS (efs.sys), IPSec (ipsec.sys), and other crypto functions. Although this is only a level 1 compliance intended for general PC use, it is nonetheless a start. The idea with SAFER policies is to provide the Administrator the ability to grant granular client-level security policies to restrict the access to read, write, or execute software on computers.
Because the "How To" basics of configuring these policies are reasonably well documented in the Microsoft KB 324036 article "How to use Software Restriction Policies in Windows Server 2003," I'll use the space here to describe some important concepts and implementation recommendations.
Software Restriction Policies is implemented through GPO settings located in the GPO tree Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies, and in User Configuration\Windows Settings\Security Settings\Software Restriction Policies. When you drill down to this location on a new policy, a warning appears in the right pane of the GPO Editor, "No Software Restriction Policies Defined," as shown in Figure 1.23. Right-click on the Software Restriction Policies in the left pane and click New Software Restriction Policies. You will then see two folders titled Security Levels and Additional Rules. Security Levels defines a high-level access policy, whereas Additional Rules allows you to define specific rules, including the following:
Think of Security Levels as the locked condition on the front door to a building. There are two options (look in the Security Levels folder in the GPO): Disallowed and Unrestricted. The Disallowed option locks the front door and requires all who enter to provide proper credentials. No public access. Employees with ID badges only. The Unrestricted option leaves the front door unlocked, allowing anyone to enter the building. Inside the building are special rooms (programs and files on the PC) that also have locks on the door. These locks are the four classes of rules described in the previous section. If the front door is Disallowed, then you don't get access unless you can prove you have access to a room in the building. The guard escorts you to that room (or rooms), but you can't go anywhere else. This obviously is a high-security condition. If the front door is set to Unrestricted, anyone can walk in and roam through the building and enter any room that is not locked. However, if a room is locked (that is, a rule has been created to restrict access to a program), you have to be granted specific access to get in. I recommend, as does Microsoft's KB 310791 article "Description of the Software Restriction Policies in Windows XP," you use the Unrestricted option because it simply locks out certain files and programs. Unrestricted is the default. Setting the Disallowed mode, unless it is in a very controlled environment, will generate a lot of help desk calls if it's not well planned and tested.
These are the keys to the rooms—the exceptions to the lockout. Note that four Registry path policies are created by default in the Additional Rules folder. Figure 1.24 shows the default Registry path rules, as viewed in the GPMC. They are all defined as Unrestricted and are applied to
The purpose of these policies is to permit access to critical directory space when you've set the Security Level to Disallowed. These policies allow access to areas like c:\> Program files.
Figure 1.24 The additional rules defined by default in Software Restriction Policies are shown using the GPMC snap-in.
So far these rules seem fairly straightforward. If you want to put the admin pack on every PC, but restrict users from running it, you set the SAFER policy to Unrestricted, and then create a path policy to restrict domain users from executing it. Pretty simple until you get multiple rules defined in multiple policies and perhaps in a combination of User and Computer Configuration settings.
The description of functionality described here is based on my experience and testing and asking questions of Microsoft PSS. I have not seen any Microsoft documentation to confirm or deny these assertions. Your mileage may vary, so be sure you test these policies before implementing.
If multiple Software Restriction Policies are defined, things get complicated. Several design rules apply to the application of these policies. Understanding them is critical to obtaining the desired results.
Closest match applies the rule. That is, if Rule 1 allows access to c:\*.exe and Rule 2 denies access to C:\payrollapp.exe, then the user would be unable to run payrollapp.exe because Rule 2 is a closer match to the program being run.
Most restrictive rules apply. Apply most-restrictive path rules further down in the directory tree than less-restrictive ones.
Rules are processed in the following order:
Security Level (highest priority)
Internet Zone rule
Software Restriction Policies accumulate from multiple GPOs and are evaluated together. They do not obey normal SDOU (Site Domain Organizational Unit) processing of GPOs, and they can be applied at the Computer and User Configuration sections of each GPO.
Security Levels determine how the Additional Rules are defined. If the Security Level is Unrestricted, the Additional Rules should be designed to restrict access. If the Security Level is Disallowed, the Additional Rules should be designed to allow access.
Software restriction policies—especially when setting general categories (such as entire directories) to be disallowed—can have unexpected results. For instance, disallowing access to *.vbs to prevent virus deposited files from running can also restrict access to logon scripts and other valid scripts.
Always thoroughly test these policies.
Define the policies in individual GPOs. This makes them easier to manage and troubleshoot.
Avoid applying Software Restriction Policies from multiple locations (domains and OUs) if possible. Applying them from fewer locations makes the results easier to predict and troubleshoot.
To restrict Administrators from a Software Restriction Policy defined in User Configuration, restrict the appropriate Administrators' accounts and/or groups by removing the Apply Group Policy directly on the GPO.
To restrict Administrators from a Software Restriction Policy defined in Computer Configuration, you can remove the Apply Group Policy directly from the appropriate user or group, or you can go to Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies\Enforcement. In the Enforcement Properties page, under the Apply Software Restriction policies to the following users, select All Users Except Local Administrators.
Make certain you have not inadvertently restricted access to valid files such as logon scripts and directories and files that should be scanned by antivirus programs. Testing should expose these types of flaws.
Evaluation of these policies at this time seems like a bit of black magic. As of this writing, Microsoft had not seen a lot of customers using these policies, but in the work I've done with the policies, I've found they are difficult to design and it's difficult to get the desired results if you have a lot of them. Again, adding complexity to these policies results in a high probability of failure, so you must test them thoroughly. You can apply them to User Config and Computer Config on multiple levels (domain and OU), and then have them all sorted by rule precedence, closest match, and most restrictive. Keep these GPOs in as few domains and OUs as possible, keep the rules simple and well planned, and avoid applying them to both User Config and Computer Config in the GPO.Sample Rules
Let's look at a couple of examples of rules. Suppose we have six policies defined in a Domain SAFER Policy defined at the domain:
Security Level: Unrestricted
Hash Rule 1: hash of Payroll.exe (v4.2) set to Unrestricted
Hash Rule 2: hash of Payroll.exe (v4.1) set to Disallowed
Certificate Rule 1: Applications Certificate set to Unrestricted
Path Rule 1: C:\RestrictedApps set to Disallowed
Path Rule 2: C:\RestrictedApps\*.exe set to Unrestricted
Using these rules, a user attempting to run the following programs would have these results:
User runs the program: C:\restrictedApps\Payroll.exe (v4.1).
Security Level set to Unrestricted allows access.
Path Rule 1 allows access.
Hash Rule 1 disallows access.
Certificate Rule 1 applies because this app was digitally signed by the certificate owned by the Applications group and is set to Unrestricted.
Result: Hash Rule 2 applies because it is most specific (denies access to the exact file name, whereas the others refer to directories or groups of files). Access is granted.
User runs the program: C:\restrictedApps\backupfiles.exe.
Security Level set to Unrestricted allows access.
Path Rule 1 disallows access to C:\restrictedApps.
Path Rule 2 allows access to C:\restrictedApps\*.exe.
Result: Because Path Rule 1 denies access to the directory, Path Rule 2 never applies. Access is denied. Remember that the most-restrictive path rules should be applied deeper in the tree than the least-restrictive ones.
Suppose the same rules are defined, but the Security Level is set to Disallowed. Path Rule 1 and Hash Rule 2 are not needed because the Security Level is set to Disallowed. With that setting, all you need to do is define rules to allow access to programs that you want the user to access.
Microsoft has attempted to help with some exceptions to these rules. In the Software Restriction Policies folder in the GPO, you'll see three policies besides the two folders. These policies are
Enforcement: Allows you to exclude .dlls from restricted programs, and to exclude local admins.
Designated File Types: By default, policies only apply to normal executable types, such as .exe, .dll, and .vbs. This option allows you to add other types to it, such as .bat, .cmd, .msi, and others, including a blank so you can add one that isn't in the list.
Trusted Publishers: Defines users who can choose trusted publishers (for certificates).
In summary of Software Restriction Policies, I'd say to use them very carefully and only after extensive testing so you understand what the ramifications are. They have some value in the security configuration of the enterprise, but they are complex and can create a lot of problems if you aren't careful.
Some good resources for SAFER policies include the Microsoft whitepaper, and Jeremy Moskowitz's Group Policy, Profiles and IntelliMirror for Windows 2003, Windows XP, and Windows 2000, Sybex, March 2004.Internet Connection (Personal) Firewall
Also referred to as the Personal Firewall, this feature is provided with Windows XP as built-in protection for each computer. It isn't the most secure firewall, but it's probably sufficient for casual home users. If firewalls are implemented elsewhere, the personal firewall in XP is usually required to not be enabled. To enable the Internet Connection Firewall, open a network connection's Properties page, go to the Advanced tab, and select the Protect My Computer and Network by Limiting or Preventing Access to this Computer from the Internet check box. Click the Settings button to access the Advanced Settings pane, shown in Figure 1.25 to configure advanced settings, including
Services: Allows you to select services such as FTP, Telnet, HTTP, and Remote Desktop that the users of this computer are allowed to access. Default is no access. So if you turn this firewall on and can't get to a Web site, the reason is probably wasn't enabled.
Security Logging: Allows configuring options to log dropped packets and successful connections (or not), to specify a log file name and location (default is %systemroot%\pfirewall.log), and to set a log file size limit.
ICMP: Permits configuring of ICMP traffic, such as Allow Incoming Echo Request, Allow Outgoing Search Request, Allow Incoming Router Request, and other options. By default, all are disabled.
Windows XP Service Pack 2 enables the Internet Connection Firewall by default.EFS (Encrypting File System) Enhancements
Although Windows 2000 EFS brought a level of security to local files, it had a number of deficiencies:
Stealing a local account password is easy using common hacker tools in standalone mode.
Encrypted files stored on file servers are decrypted on the server and then transported in clear text across the network to the user's workstation. Because EFS needs access to the user's private key, which is held in the profile, the server must be "trusted for delegation" and have access to the user's local profile.
Inability to share EFS encrypted files.
Figure 1.25 Internet Connection Firewall Advanced Settings enable you to define what the user is allowed to do.
EFS has been enhanced in Windows XP and Windows Server 2003 to support sharing of encrypted files. Windows 2000, Windows Server 2003, and Windows XP all store the EFS metadata in the NTFS. Thus, encrypted files on NTFS volumes in Windows 2000 and Windows Server 2003. Sharing an encrypted file is enabled by opening the file's Properties page, clicking the Advanced button, and selecting the Details button in the Advanced Attributes area. You can add users who you want to share the file with to the list.
Note that EFS file sharing is set at the file level—not the folder level——and inheritance of EFS file-sharing metadata is not supported.
Another option for sharing encrypted files in Windows Server 2003 is to use Web folders. Windows Server 2003's support for the transport of EFS metadata using the WebDAV protocol, an extension of HTTP 1.1, makes Web folders an excellent alternative to sharing files on file servers, and is recommended by Microsoft. WebDAV is supported on IE v5.0 on the client and IIS v5.0 and later on the server. For more information about WebDAV, see the WebDAV Resources FAQs at http://www.webdav.org/other/faq.html.
To configure a Web folder on the server running IIS, go to the properties sheet of the encrypted file (or any file), go to the Web Sharing tab, and select the Share this Folder option. Table 1.5 provides a side-by-side comparison of features between the Web folders and File Shares.Table 1.5 Comparison of EFS Features Between File Shares and Web Folders
Remote EFS Operations On . . .
. . . File Shares
. . . Web Folders
Where does EFS encryption/decryption occur?
Files are encrypted and decrypted on the file server.
Files are encrypted and decrypted on the user machine.
Are the files secured during transmission over the network?
Files are sent in the clear over the network connection.
Files remain encrypted while being sent over the network connection.
What technology is or can be used to secure the transmission of the files over the network?
Requires IPSec to secure the file transfer between file server and user machine.
Does not require IPSec to secure the file transfer; relies on the WebDAV EFS extensions to securely transmit the file.
Must the file server be "trusted for delegation?"
Requires file server to be "trusted for delegation."
Does not require file server to be "trusted for delegation."
Does the solution require a copy of the user profile on the file server?
Requires availability of user profile on the file server (local or roaming profile).
Does not require availability of user profile on the file server.
Where does the EFS file-sharing authorization process take place for users?
EFS checks for other user certificates on the file server and/or in the AD
EFS checks for other user certificates on the local machine and/or in the AD.
(Table reprinted by permission from Jan de Clercq, Hewlett-Packard Company.)Credential Manager
Single Sign On (SSO) capability has been a frequent request from users and Administrators who find it challenging to keep track of all the credentials needed to log on to the domain, or use Microsoft Passport credentials and Smart Card credentials. Managers who must keep getting validated to perform administrative tasks on various computers also have requested this capability. Windows Server 2003 introduces Credential Manager, a client-based SSO solution that uses an intelligent credential-caching mechanism that keeps credentials in a store on the client, requiring the user to provide a single username/password to open the store. Credentials in the store can consist of a user account and password; a user account, certificate, and private key (which can be stored on a smart card); or Microsoft Passport credentials.
The credential store is part of the user profile and supports roaming and can optionally be disabled by the Administrator via the GPO. This is done by opening a GPO and going to Windows Settings\Security Settings\Local Policies\Security Options and enabling the option Network Access: do not allow storage of credentials or .NET Passports for network authentication.
This feature is available in Windows Server 2003, Windows XP Pro, and Windows XP Home operating systems.Public Key Infrastructure (PKI) Improvements
Microsoft provided an out-of-the-box, user-defined and administered CA in the Windows NT 4.0 Option pack. This might not have been the most effective and robust product on the market, but it was cheap (and was included at no extra cost with Windows 2000). This allowed small- and medium-size companies, who couldn't afford the high cost of third-party companies such as VeriSign and Entrust, to fortify their security systems. However, according to one of HP's security experts, consultant Jan de Clercq, "ease of use and security don't easily coexist." But considering the improvements made in Windows Server 2003 security features, especially in the PKI arena, Jan stated that "Given the low cost and the advanced PKI features of Windows.NET, it may be a product that will bring PKI to the masses." Let's see what features are now available to make this possible.Cross Certification Trust Model
Windows 2000 used a hierarchical CA trust model, shown in Figure 1.26, whereby the parent (root) CA was linked to the child (subordinate) CA by trusts. Only one root CA can be in the forest, and the only way to configure it to trust certificates issued by other CAs in other forests was to reconfigure the entire CA structure using Certificate Trust Lists. This might be desirable in multiforest enterprises or to link extranets.
Note that the CA hierarchy is not specifically tied to the domain hierarchy. Rather, it might more appropriately be associated with geographies of the enterprise to provide accessible CAs to users and computers in each geography.
Windows Server 2003 introduces the Cross Certification trust model, which allows CAs in different organizations (forests) to trust each other and is in addition to the subordinate trust model. The Cross Certification model permits the Administrator some freedom in configuring the trust relationships with the extranet partners, by specifying whether it is a one-way or two-way trust, and by controlling the issuance and usage scope of the CA agreement via naming constraint, application, and issuance policy rules.
Cross certification provides the ability to create transitive cross forest trusts, as described in the "Creating a Cross Forest Trust" section in this chapter.
Figure 1.26 Hierarchical CA structure with the root (enterprise) CA at the top and subordinate (issuing) CAs below.Editable Certificate Templates (v2)
Windows 2000 provided v1 certificate templates that were not editable. Windows 2003 provides v2 templates that are editable and include a mechanism to modify v1 templates and convert them to v2. The v2 templates facilitate cross certification and policy enforcement, which allows configuration of certificate trust relationships across forest boundaries. This could be trusts to CAs in other forests within the company or to a CA in a business partner's extranet. This also allows a CA to issue certificates to a CA in another forest and can link a policy to this cross certification. The policy can limit the issuance and usage scope of the CA cross- certification agreement.
A new Certificate Templates snap-in is included in Certificate Services for Windows Server 2003, as shown in Figure 1.27. Note that the icons for v1 and v2 templates are a different color, the Minimum Supported column identifies v2 templates as Windows 2003 and Auto Enrollment functionality is listed. This snap-in is used to modify Version 2 templates to perform the following functions:
Create a new template, modify an existing template, or duplicate an existing template.
Modify template properties such as certificate lifetime, renewal period, whether it is published in AD, Issuance Requirements such as re-enrollment, extensions, and other properties.
Define accounts that can enroll and autoenroll a certificate template.
Enable a template for Autoenrollment.
Set which accounts can enroll and auto-enroll for a particular certificate template. This is done by right-clicking on a template, selecting its properties and modifying the template's Access Control List (ACL) in the "security" tab. Windows.NET ACLs contain an Access Control Entry (ACE) for "Enroll" and "AutoEnroll."
Figure 1.27 Certificate Template snap-in.
You can copy and save a v1 template as a v2 template and then configure it as desired. You also can select the Duplicate Template option when you right-click on the template in the Certificate Templates snap-in, which will make a duplicate and give you a head start on creating a similar one.Private Key Recovery
Windows Server 2003 PKI made significant changes to the key recovery process, providing centralized key recovery services. An important component to this process is the Key Recovery Agent—usually one or more Administrators who have the ability to recover encrypted files, by means of a special public key stored in an EFS Recovery Agent certificate. The key recovery data is stored in the CA database. A user's archived private key is encrypted using a symmetric key, which is encrypted using a Key Recovery Agent's public key. These keys are stored in the CA database in the RawArchivedKey and KeyRecoveryHashes columns, respectively.
To recover a user's private key, an Administrator must be added to the Recovery Agent list. The preparation for the Key Recovery process includes the following steps:
Issue the EFS Recovery Agent certificate to an Administrator.
Create a GPO called EFS Recovery, for example.
In the GPO, go to Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Encrypting File System. Define an EFS Policy. Select the Add a Recovery Agent option and add a user account that has the EFS recovery certificate (from step 2).
In the Certificate Authority snap-in, in the RootCA properties, select the Recovery Agents tab. Select the Archive the Key option and select the Add button. Select the Key Recovery Agent certificate in the next dialog box.
Multiple Administrators can be designated as Recovery Agents so that both public keys are required to recover private keys for an added measure of security.
This four-step process will recover a private key in Windows Server 2003:
The Administrator who has the Recovery Agent rights (key) must know the User Principal Name (UPN) or serial number of the certificate whose private key he wants to recover.
certutil –getkey <serial number or UPN> <outputfile>
This exports the recovery data from the CA database.
From a command prompt, run the command:
certutil –recoverkey <outputfile> <pkcs12file>
This will convert the output file in a PKCS12 format and could store it on a floppy disk.
From a command prompt, run the command:
The PKCS12 file is provided to the appropriate user, who can then import it in his certificate store.
The Effective Permissions tab displays the cumulative permissions calculated from group membership and any inherited permissions, and displays the result applied to a given user. This is part of the Advanced Settings on the ACL properties page. For instance, right-click on an NTFS folder, go to Properties, select the Security tab, and then select the Advanced button. In the Effective Permissions tab, shown in Figure 1.28, you see a cumulative summary of all permissions applied to that user on that object.User Autoenrollment
Windows 2000 Certificate Services provided a valuable feature in the autoenrollment and renewal of machine certificates. This allowed DCs to obtain and renew certificates. Windows Server 2003 now provides autoenrollment of users. You can do this in a Certificate Template by going to the Properties of the template, and then on the Security tab, giving Autoenroll the READ privilege. You also can enable it via Group Policy, as shown in Figure 1.29. In Computer Configuration\Windows Settings\Security Settings\Public Key Policies, check the Enroll Certificates Automatically option.Kerberos and Forest Trusts
Windows 2000 was unable to create a transitive trust between forests, allowing only a one-way NTLM type trust that had to be created between individual domains in different forests—much like what we had to do in Windows NT to build trusts between all domains. Interestingly enough, this actually has a side benefit—because this type of trust can't be used by Kerberos, it solves a migration problem known as the "Pile On" issue, described in Chapter 3. Other than that, an NTLM trust isn't a good thing because it requires the Administrator to manage a lot of trusts between forests.
Windows Server 2003 includes schema modifications made to the trusted domain object (TDO), which allows Kerberos to authenticate across the domain. This provides transitive trusts to be built across forests. That is, we create a trust between two forests, (one way or two way) and no other trust is needed. The Administrator does have some control over the trust, in making it a one-way trust or a two-way trust, and determining the default level of authentication that is allowed between forests (described in more detail in the next section).
Figure 1.28 Effective Permissions tab.
Figure 1.29 Using Group Policy to enable autoenrollment of users.Creating a Cross Forest Trust
The preparatory steps to creating a cross forest trust include establishing DNS name resolution between the two forests, synchronizing system time between all computers in both forests (easier than it sounds), and setting the forest functional level to Windows 2003 (native). Windows Server 2003 provides three different ways to establish DNS name resolution between the two forests:
Create a stub zone in the forest root of each forest, for the other forest.
Create a secondary zone in the forest root of each forest, for the other forest.
Set up a conditional forwarder on the DNS server that is authoritative for each root zone for the other forest.
Test name resolution by pinging the root domain name of each forest from the other forest. In addition, you must ensure that the system time of all computers in both forests is within the allowable Kerberos time skew (default is five minutes). If the time skew between the two DCs contacted to build the trust is more than the allowable time skew, the trust might be created successfully, but authentication will fail.
There is no default time synchronization between two forests. Because Kerberos authentication, by default, requires the system time of all computers to be within five minutes of each other, ensure the time between forests is synchronized. It is recommended that you configure the PDC emulator of the root domain in each forest to synchronize with the same external time source. Time synchronization is configured by default for a forest, but not between forests. More information is available in the "Time Services" section of Chapter 6.
Setting the forest functional level is described in Chapter 3. To do this, all DCs in every domain must be Windows 2003 servers, and the domain functionality must be set to Windows Server 2003 (referred to as native, though the word "native" is not used in the UI). After the domains are all raised to Windows 2003, the forest must be raised to Windows 2003 native—similar to the way Windows 2000 domains were raised to native mode, but Windows 2000 didn't have a forest native mode.
After the forest is at Windows 2003 level, Time Services are synchronized, and DNS name resolution is established between the two forests, the trust can be created. You create the trust just as you did in Windows 2000 by going to the Active Directory Domains and Trusts snap-in, choosing Domain Properties, selecting the Trusts tab, and clicking New Trust. This engages the New Trust Wizard. Some of the options specified in the wizard are described here, along with screen shots of the dialog boxes used in the wizard.
Trust Type: Can create an External Trust (downlevel, nontransitive trust) between domains, or a Forest Trust (transitive, Kerberos) between forests. The dialog box is shown in Figure 1.30.
Figure 1.30 The New Trust Wizard allows you to create an External (NTLM type) Trust or a Forest Trust (Kerberos transitive trust).
Trust Direction—Incoming: Users in the source domain can be authenticated in the target domain or forest (source domain is the trusted domain). The dialog box is shown in Figure 1.31.
Trust Direction—Outgoing: Users in the target domain or forest can be authenticated in the source domain or forest (source domain is the trusting domain).
Trust Direction—Two Way: Outgoing and incoming trust. Users in source and target domains or forests can be authenticated in each domain.
Authentication Level—Forest-wide Authentication: Users from the other forest are automatically authenticated in the local forest. Essentially this makes the authenticated users in the other forest included in the authenticated users in the local forest. This is appropriate for a company with a multiple forest deployment, and users from both forests are equally trusted for resources in each forest. They can be denied access by changing permissions just like a single forest implementation. This is defined for the ingoing and the outgoing trust separately. The dialog box is shown in Figure 1.32.
Figure 1.31 The Trust Direction dialog box lets you specify whether the trust is incoming (trusted), outgoing (trusting), or two–way.
Authentication Level—Selective Authentication: This scope requires users to be specifically trusted to access any resource. This is appropriate for enterprises that have business partner extranets as separate forests and want to grant limited and specific access. This is defined for the incoming and the outgoing trust separately.
The wizard also gives you the ability to choose to verify the trust. I recommend that you do so. After the trust is created, you will be able to see users and groups of the other forest in the object picker to assign permissions to resources. For instance, in Figure 1.33, we have a share on a server in forest CorpB.Net, and in assigning permissions, the users and groups of forest CorpA.Net are available. Note that all you see in the locations option of the object picker is the remote forest with a triangle-like icon. Child domains in that forest, if any, are not exposed. However, entering user or group names (including the use of wild cards) in the object picker will find objects in any domain in the remote forest. For instance, if you entered Admin as the name in the object picker, it would return the Administrator account for all domains in the remote forest.
Figure 1.32 Authentication scope options allow you to specify the default authentication between two forests.
Figure 1.33 The object picker displays the trusted forest for assigning rights.
The cross forest trust will be a valuable benefit to enterprises with multiple forest deployments. Where Windows 2000's NTLM trusts have made multiple forests prohibitive to manage, Windows Server 2003's cross forest trusts could easily make the multiple forest configuration feasible.Conclusion
This is by no means a comprehensive dissertation on security or even Windows 2003 security, but it does give a good overview of the many improvements provided in Windows Server 2003. Hopefully, after reading these issues, you will have some area you want more information on that might affect your Windows infrastructure and should be included in the migration plan. I have the good fortune of getting much of this information from HP's Jan de Clercq, a recognized security expert and author of two books regarding PKI and other security issues in the Windows environment. I highly recommend Jan's latest book, Windows Server 2003 Security Infrastructures, Digital Press, 2004.
The SpectrumTM drive, designed for bipolar, can-stack, sub-fractional-horsepower stepper motors, delivers 30% more torque than constant current drives, and produces only 10% of the EMI and RFI of constant current drives. Spectrum drives feature an onboard or external step pulse clock, full step/half step control, onboard or external direction control, and output enable/disable control. The board is optimized for a regulated 15V dc linear power supply and 5V motor coils, with an output current of up to 1A per phase.
Haydon Switch & Instrument, 1500 Meriden Rd., Waterbury, CT 06705; www.his-inc.com.
FutureFLEX Air-Blown Fiber Optic (ABF) cabling systems are fully compliant with all applicable industry standards for structured cabling systems, and can be designed to meet the specific needs of various user topologies (ring, bus, star, or hierarchical star). The system is currently used in a variety of campus networks, including government and military installa-tions, hospitals, and research centers. Each system includes an infrastructure of tube cable, used in place of traditional innerducts to form LAN topology, with up to 19 small, individual tubes within a tough outer jacket.
Sumitomo Electric Lightwave Co., 78 Alexander Dr., Research Triangle Park, NC 27709; www.sumitomoelectric.com.
Flowvent software is aimed at the building services industry. The software helps designers in assessing the performance of a proposed ventilation (HVAC) system by calculating the airflow, heat transfer, and contamination distribution in or around a building entered into the program.
Flowmerics Inc., 2 Mount Royal Ave., Marlborough, MA 01752; FAX (508) 624-0559; www.flowvent.com.
The medical adhesive 1000 Series MD(R) cures upon exposure to visible UV light, resulting in cure time reductions of up to 50%. These single component, solvent-free adhesives possess unlimited pot life, and are capable of curing in seconds. The adhesive also brightly fluoresces, which will enable incorporation of automated vision systems for instant in-line inspection of the bond area.
Dymax Corp., 51 Greenwoods Rd., Torrington, CT 06790; FAX (860) 496-0608.
Protecto expandable sleeving bundles and protects cables, hoses, and tubing from abrasion, while permitting water drainage. The sleeving comes in 1/4-, 1/2-, 11/2-, and 3-inch sizes that expand up to three times the original volume. Applications include those unaffected by sunlight and saltwater.
Venmark International, 148 Linden St. Wellsley, MA; FAX (781) 237-5862; www.intl-light.com.
CE development kit
The PC/104-based Windows CE development kit combines ELAN-104 processing boards, 16 mbytes DRAM, and 8 mbytes Flash with Windows CE 2.11 in a multi-function PC/104-compatible embedded PC for real-time applications. The kit includes a 5V power supply, ELAN-104 single board computer, sample code, demo applications, and documentation.
Arcom Control Systems Inc., 13510 South Oak St., Kansas City, MO 64145; FAX (816) 941-7807; www.arcomcontrols.com.
Norseal V710 foam sealant tape will not twist or move when mechanical fasteners are inserted through the foam. The pressure-sensitive adhesive on one side holds the sealant in place for speedy installantion. The sealant's compression properties target it for use in sealing light, moisture, and dust. Used in conjunction with mechanical fastening, the swirl-free foam maintains its seal.
Norton Performance Plastics Corp., 150 Dey Rd., Wayne, NJ 07470; FAX (973) 696-4056; www.dymax.com
Conduit split system
Murrflex split-system of split conduit and fittings consists of type EWT split conduit, which features two overlapping halves that snap together to enclose any wires and cables. The split-type SVT end fittings, KFW bulkhead fittings, and UH universal holders make up the complete system.
Murrplastik Systems, 4030-B Skyron Dr., Doylestown, PA 18901; FAX (215) 340-9586.
The IQ-1600 high-speed power meter is available with one, two, or four InGaAs or high-power Ge photodetectors. The meter features a short stabilization time, high sampling rate, external and internal power level triggers, analog input, and user interface by means of the IQ-200 optical test system. Applications include R&D, qualification or production testing of fiber-optic components, characterization or optical switches, and multi channel optical power monitoring.
EXFO E.O. Engineering Inc., Vanier, Quebec, Canada; FAX (418) 683-2170.
T7 Series sealed toggle switches are for use under severe conditions found in heavy equipment, industrial control, and marine and appliance applications. The front panel seal is accomplished with an O-ring under the bat handle. The switches are offered in single- and double-pole configurations. A choice of models is available to handle power levels to 16A, 1/2 hp, and low-level electronic switching applications.
OTTO Controls, 2 E. Main St., Carpentersville, IL 60110; FAX (847) 428-1956.
Milacron MeltStar barrier screws replace the compression section of a conventional feedscrew with two channels that separate solid and melted material. The screw's geometry ensures that solids are held together and remain more fully in contact with the barrel surface instead of being intermixed with melted material.
Milacron Inc., Plastics Technology Group, 4165 Halfacre Rd., Batavia, OH 45103; FAX (513) 536-2441.
Alcryn(R) melt-processible rubberTM features durability in harsh environments, stands up to heat and cleaning agents, and withstands corrosion and UV deterioration. Applications include use in appliances, hand and garden tools, automobiles, marine, and boat and pool accessories.
Advanced Polymer Alloys, 3521 Silverside Rd., Quillen Building 2E, Wilmington, DE 19810; FAX (302) 478-8166.
Data acquisition recorder
The portable Dash 16u 16-channel data acquisition field recorder is equipped with universal inputs that accept isolated, single-ended and differential voltages, thermo-couples, pressure transducers, and load cells. The unit eliminates the need for any signal conditioning or additional front-end filtering. With a data sample rate of 0.2 to 200 kHz per channel, the system is targeted for use in applications ranging from process trending to transient capture.
Astro-Med Inc., Astro-Med Industrial Park, West Warwick, RI 02893; FAX (401) 822-2430.
SP28P-D high-speed screen printer uses a printing technique called "Thomas," which conducts a detailed analysis of the printing mechanisms involved in solder filling and pc-board snap-off. The machine offers a tact time of 8 sec plus print time, with a printing accuracy of 50.025 mm printing accuracy and a position repeatability of 50.0075 mm.
Panasonic Factory Automation Co., Create Group, 9377 Grand Ave., Franklin Park, IL 60131; FAX (847) 288-4592.
Knowledge management software
FirstSTEP Charter Version 3.0 brings process modeling framework and knowledge management into the Visio diagramming environment. Process maps created in FirstSTEP Charter 3.0 now use the complete spectrum of the FirstSTEP modeling schema including dynamic, multi-level hierarchical-mapping linkages to key performance indicators and model objects such as resources, materials, entities, and organizational units. This release also enables visualization of all linked documents enhancing knowledge sharing around process models. Charter 3.0 also offers additional process views such as multi-level function flow, as well as the flattened maps, permitting users to visualize and print large models with maximum clarity. All models in Charter 3.0 are fully web-enabled, allowing for model distribution, including all linked documents.
Interfacing Technologies Corp., 3333 Graham Blvd., Suite 101, Montreal H3R 1K1; FAX (781) 290-4810.
OPA353 Series CMOS operational amplifiers feature rail-to-rail input and output and ac characteristics. All versions, including single, dual, and quad, are available in micropackages. This feature combination targets the amplifiers for use in driving sampling analog-to-digital converters. The amplifiers are also targeted for cell phone power-amplifier control loops and video processing, as well as audio and general-purpose applications.
Burr-Brown Corp., Box 11400, Tucson, AZ 85734; FAX (520) 746-7401.
The CU-SCOPE(R) CMP1A instrument uses the eddy current test method to accurately measure the thickness of the copper coating to within 50.03 mm. In a few seconds, this handheld unit lets the user know if the copper coating thickness inside the pc-board's through-holes meets required specifications. Results are read on the unit's LCD display.
Fischer Technology Inc., 750 Marshall Phelps Rd., Windsor, CT 06095; FAX (860) 688-8496.
Game controllers with G-Force Tilt are for the PC, Sony PlayStation, and Nintendo 64. G-Force enables game controllers to sense body motion in all directions and relay those movements on screen in real time.
Analog Devices Inc., Micromachined Products Div., 21 Osborn St., Cambridge, MA 02139; FAX (617) 761-7607
Network interface card
The P100-FX network interface card (NIC) for use with Apple PowerPCs enables users in video production, pre-press, graphic design studios, and other bandwidth-intensive, Macintosh-oriented industries. The NIC uses VF-45 interconnect technology to interface a fiber-optic network. The interconnect design is a standards-compliant, small form-factor fiber interface used in the Volition brand cabling system.
Phobos Corp., 2060 East 2100 S., Salt Lake City, UT 84109; FAX (801) 474-9201.
Polyurethane (PUR)-based cable jacketing products feature mechanical resistance, twisting and bending strengths, and chemical durability. The outer jackets are rated to perform under continuous operating temperatures ranging from -50 to 90C. Polyurethane's durability against hydraulic fluids, fuels, and mineral oils target it for use in jacketing in machinery and robotics technology.
elocab, 258 McBrine Dr., Kitchener, Ontario N2R 1H8, Canada; FAX (519) 893-2766.Karen Auguston Field on Adhesives Karen Auguston Field, Executive Editor For comments on adhesives, contact Karen at [email protected] Pick of the Issue
Locking cotter pin
The Bow-TieTM locking cotter pin differs from hair-pin cotters in that it is not under constant tension. This zero-tension reduces wire fatigue and service life, says the manufacturer. A curved leg provides three contact points with the hole, keeping the cotter snug. Available in sizes to fit 3/16- to 1-inch shafts, the cotter pin is made from MB spring wire with a zinc plate finish.
Pivot Point, Box 488, Hutisford, WI 53034; FAX (920) 349-3253; www.pivotpins.com.
Bulb seat has a conical shape with recesses at both ends and through holes. A precision radius inside the part forms a rounded cup for precise component placement. The part measures 0.280 inch diameter by 0.156 inch high. Tolerances are plus or minus 0.003 inch typical with some dimensions held to plus or minus 0.0015 inch. Applications include use in a fire sprinkler system head component.
Dejay Industries, 1701 Greenville Ave., Suite 1106, Richardson, TX 75081; FAX (972) 234-2490; www.dejayind.com.
Standard, preload-indicating washers offer an accurate method of measuring the preload (clamp force) in a bolted Designed for use under locknuts, the washers induce an average preload of 80% of the yield strength in bolts ranging from 80 to 260 ksi minimum ultimate tensile strength. Sizes range from #10 to 11/2 inch diameters in alloy steel, cadmium-plated to QQ-P-416, and corrosion-resistant A286 material, passivated to ASTM A967 specifications.
SPS Technologies, 301 Highland Ave., Jenkintown, PA 19046; FAX 215-572-3193; www.spstech.com.
Master Bond FL901S silver conductive epoxy adhesive film and preform system can be stored at ambient temperatures and fully cured at 250F (125C) in one hour or at 300F (150C) in only 30 minutes. Volume resistivity is less than 0.0002 ohm-cm and thermal conductivity is 10 BTU/hr/F/inch. Bond strength measures more than 2,000 psi (aluminum/aluminum). Industrial uses include substrate attachments, heat sink bonding, and lid sealing.
Master Bond, 154 Hobart St., Hackensack, NJ 07601; FAX 201-343-8983.
Stainless-steel and silicon bronze standard industrial and specialty fasteners are available in a variety of sizes, diameters, and styles, and include lock, hex, jam, wing, coupling, cap, tee, castle, finish, and barrel nuts. Applications include machine screw uses.
Jamestown Distributors, Box 348, Jamestown, RI 02835; FAX (800) 423-0542.
The PROFORMTM line of structural hot-melt adhesives attaches even difficult to bond substrates such as polypropylene and polyethylene. The adhesives are formulated to fill large gaps, curing rapidly as they cool with no post-reaction cure required, says the manufacturer, and offer high tensile and impact strength. The adhesives are available in metal cartridges and as pellets or sticks for use with manual and pneumatic dispensing equipment.
Loctite, 1001 Trout Brook Crossing, Rocky Hill, CT 06067; www.loctite.com.
EMI/RF shield assembly
The Mini-Shield ClipTM measures just 0.04 @ 0.20 inches long, requiring only half the PCB space of the standard SMiT Shield Clip. The clip is packaged in EIA standard, 12-mm tape format and can be placed on either the top or bottom of the PCB without requiring holes. During a standard reflow process, the clip automatically self-aligns to the pad and wicks the molten solder into fillets. Applications include small mobile devices such as cellular phones and pagers.
Autosplice, 10121 Barnes Canyon Rd, San Diego, CA 92121; FAX (619) 535-0275; www.autosplice.com.
Screw thread inserts
Heli-TronicTM Inserts prevent seizing of fasteners in threaded assemblies and are manufactured from a special 18-8 stainless steel and work-hardened to Rockwell C 43-50. The inserts reduce friction force an average of 35% when compared with standard tapped threads, says the manufacturer.
Emhart Fastening Technologies, 510 River Rd., Box 859, Shelton, CT 06484
Compact benchtop dispenser uses compressed air to apply stopoffs and similar materials in controlled amounts to holes, grooves, and other recessed areas in a single step. Features include an adjustable air regulator and precision timer. Typical uses include plating, anodizing, and refurbishing operations.
EFD, 977 Waterman Ave., East Providence, RI 2914; FAX (401) 431-0237; www.efd-inc.com.
Custom-engineered stainless steel core pins can be produced in various lengths up to 8 inches with tolerances to 0.0005 inch and a variety of head types. Features include precision ground ends with radii, flats, and odd shapes and intricate, multidiameter details ranging from 0.02 to 1 inch with tolerances to plus or minus 0.0001 inch. The core pins can be precision machined from 300 series to heat treatable 400 series stainless steels.
Ross Tool Corp., 1000 Chestnut St., Warren, RI 02885; FAX (401) 245-2250.
Cam Runner idler rollers are manufactured with a composite synthetic tread and stainless steel threaded mounting stud. The proprietary composite materials provide a 40% weight reduction over conventional cam followers and exhibit low electrical conductivity, says the manufacturer. Dimensionally, the assembly is a direct replacement for steel cam followers in applications involving ambient temperatures up to 250F that are nonabrasive.
Osborn International, 5401 Hamilton Ave., Cleveland, OH 44114; FAX (216) 361-1606; www.osborn.com.Laurie Toupin on ManagementSoftware Laurie Toupin, Associate Editor For comments on computer software, contact Laurie at [email protected]
TracTrix 2000 provides AutoCAD and CAD Overlay users with a set of raster processing and conversion tools. The software provides scanner drivers, format converters, raster editing, text recognition, automatic raster-to-vector conversion, and high-resolution raster creation from DWG/DXF. The one-install-fits-all package can be used as an ObjectARX plug-in in any recent AutoCAD or AutoCAD LT application. A stand-alone version is included free of charge for use outside AutoCAD. TracTrix runs on Windows 95, 98, 2000, and NT4.x.
Trix Systems Inc., 68 Smith St., Chelmsford, MA; FAX (978) 256-9593; www.trixsystems.comPick of the Issue
KnowHow! is a knowledge management system that serves as a framework for creating, managing, and publishing engineering data related to plastics part design and manufacturing via a company's intranet. The program has volumes of built-in molding knowledge including information about design, materials, processing, and trouble shooting. In addition, users can add their own expertise by dragging and dropping documents or simulations directly onto the KnowHow! icon. Molding expertise can be captured and shared throughout a company using a PC, a network server, and a web browser. This is not a PDM or an ERP program. Although KnowHow! also serves as a front-end to all C-MOLD simulation products, one does not need any of these products to use it.
C-Mold, 9625 Ormsby Station Rd., Louisville, KY 40223; FAX (502) 423-4369; www.cmold.com.
Printing CAD documents
Plot Station for DesignGroup enables users to print technical documents without having to launch CAD programs such as AutoCAD or Mechanical Desktop. Users can set plotting priorities, re-direct jobs to different printers or plotters, store and submit plots in ordered sets, and run batches at night. Also, the software allows users to capture, track, and report project and accounting data. Plot Station supports multiple file formats, printers, plotters, and networks, and mixed CAD environments.
Motiva, 12651 High Bluff Dr., Ste. 100, San Diego, CA 92130; FAX (619) 481-8482; www.motiva.com.
STEP database management
ST-Repository server application manages the growing number of STEP product databases inside mid-sized to large corporations who have ISO 10303 standardization. Anyone from engineers to market managers can view STEP models via the ST-VisualizerTM, an interactive 3D visualization tool that displays STEP solid and wireframe models. With the STEP Tools On-line Data Translator, clients can utilize World Wide Web services for sharing product data with internal and external customers and suppliers. End users can translate and observe CAD models in any file format such as VRML, STL, and ST. An open server allows a company to add and customize their own tools and services. The data management toolset operates in concert with popular PDM systems. The product runs on SUN SOLARIS and Windows NT/9x platforms. UNIX platform versions will be supplied upon request.
STEP Tools Inc., 1223 Peoples Ave., Troy, NY 12180; FAX (518) 276-8471; www.steptools.com.
VMEbus Pentium processor-based single-board computers now support an open source Linux OS. This operating system is available as a free download at www.linuxhq.com. Although the Linux kernel doesn't natively support VME access, drivers are available that provide this capability at no charge. A driver that supports the following VMIC SBCs: VMIVME-7587, -7588, -7589A, and the -7686, and all functions necessary for VMEbus access including both interrupts and DMA, is available at www.vmic.com as a free download.
VMIC, 12090 South Memorial Pkwy., Huntsville, AL 35803; FAX (256) 882-0859; www.vmic.com.
CAD for 2000
Visio 2000 delivers new drawing and navigational enhancements. The Visio 2000 Standard Edition targets general business diagramming needs, while the Technical Edition provides drawing solutions for process engineering, facilities management, AEC, and electrical engineering. Visio 2000 gives users the power to integrate Visio technology into their existing IT informa-tion infrastructures, reducing the cost of ownership when Visio 2000 is deployed enterprisewide.
Visio, 2211 Elliott Ave., Seattle, WA 98121; FAX (206) 956-6001; www.visio.com.
Product management software
WTC PortfolioCenter offers both the framework for analyzing the data gathered and a methodology for making qualified decisions that optimize product development. The software uses InfoHarvest's DecisionHarvest(R) engine to generate decision-model templates for technology assessment, risk management, and strategic planning, and to extract product development metrics from WTC OpCenter, a deliverables-based program man-agement solution. WTC ExecutiveCenter for executives harnesses the collective engineering, financial, marketing, and manufacturing knowledge from a variety of enterprise systems and compiles these into a product portfolio.
Workgroup Technology Corp., 91 Hartwell Ave., Lexington, MA 02421; FAX (781) 674-0034; www.workgroup.com.
Chip for Internet
The HPCC high-performance chip carrier supports chip speeds in the gigahertz range, increasing the reliability for servers and networking gear that make up the backbone of the Internet. Developed for manufacturers of servers and networking gear, the HPCC doubles the field life of similar existing chip packages, and allows the internal chips in equipment such as routers, hubs, and switches to transfer more data to the rest of the system. The packaging features a fluoropolymer dielectric material, which optimizes chip performance by speeding the flow of electrical current from the chip to the rest of the system. A flexible foundation compensates for the expansion and contraction that takes place as the chip heats and cools during use, preventing cracks and failures.
IBM Microelectronics Division, Internal Zip 92B, 1580 Rt. 52, Hopewell Junction, NY 12533; FAX (914) 892-5334; www.chips.ibm.com.
Point to NURBS
Geomagic ShapeTM v1.0 and Geomagic WrapTM v.3.0 automatically create NURBS models from scan data or polygonal models. Shape v1.0 features automatic line detection, automatic creation of watertight NURBS patches from polygonal models, UV parameterization with global connectivity, automatic preservation of shape topology, interactive accuracy verification, and seamless integration with an installed CAD system. Wrap v3.0 features automatic creation of polygonal models from point cloud data, universal input for scan data, extensive point editing operations, flexible model editing tools, interactive accuracy verification, 3D format translation options, decimation feature, and other performance improvements. Shape and Wrap run on Windows NT/95/98.
Raindrop Geomagic Inc., Box 12216, Research Triangle Park, NC 27709; FAX (919) 474-0216; www.geomagic.com.
WiT, a CAD-like Windows-based software package aids users designing image processing and image analysis algorithms. Users create applications by using the mouse to link icons. No text-based programming is required. WiT-based icons represent an operation, such as reading an image, performing a convolution, or generating a look-up table. The software contains more than 150 built-in operators and is user-extendible, allowing developers to add their own C functions, data types, and even control hardware on a network.
Logical Vision, 6969 Trans-Canada Hwy., Ste. 142, St. Laurent, Quebec H4T 1V8; FAX (514) 333-1388; www.logicalvision.com.
Vellum Solids 99 introduces photorealistic rendering, deformable faces, assembly modeling and the ACIS 5.1 kernel. In all, Vellum Solids offers more than 225 new features and enhancements. Some of the more significant include C2 continuous splines; enhanced lighting tools; integrated drawing compositions to automatically generate production drawings, create auxiliary, section and detail views; optimized file storage; crosshatching annotation; new dimension tools such as base line, chain, ordinate, center mark, and balloons, and updated DWG, DXF, and Vellum 3D translators.
Ashlar, 100 Saratoga Ave., 2nd Floor, Santa Clara, CA 95051.
Sparse direct solver
NE/Nastran V6.0 offers its fastest sparse direct solver yet with advanced hybrid FE formulations with give results regardless of shape, mesh density or irregularity, and initial distortion. For each error message, NE/Nastran offers an associate cause, action, and remark. The program is compatible with most finite element modelers and has linear and non-linear steady state heat transfer analysis capability. V6.0 is also bundled with FEMAP. A free demonstration copy of downloadable from www.noraneng.com.
Noran Engineering Inc., 12132 Emerald St., Suite B, Garden Grove, CA 92845.
Cost analysis software
Analysis software is going the way of CAD. COSMOS/WorksTM 5.0 design analysis, optimization, and simulation software embedded in SolidWorks 99 offers quite a few new features typically found in higher priced packages. AccuStressTM, a new transitional mesher, automatically detects small areas of geometry of potentially higher stress and places a tighter mesh or smaller elements at these positions, transitioning the mesh smoothly to the global size. Users have a complete low-cost simulation and optimization tool consisting of SolidWorks, COSMOS/Works, and Dynamic Designer/Motion. Motion loads, from simulations performed within Dynamic Design/Motion, can be automatically transferred to COSMOS/Works for analysis. In addition, V5.0 software analyzes assemblies with contact, friction, and gaps.
Structural Research & Analysis Corp. (SRAC), 12121 Wilshire Blvd., 7th Floor, Los Angeles, CA 90025; FAX (310) 207-7805; www.cosmosm.com.
ICEM Surf 2000i, CDRS 2000i, and 3DPAINT 2000i are the newest surfacing elements in the PTC i-Series. ICEM Surf 2000i introduces ICEM Surf Clay, a modeler for scan data. Taking advantage of ICEM Surf's global modeling feature, the software can be used for feasibility studies, to provide new reference handles, and automatic local refinement during modeling. NURBS curvers, edges, and trimmed surface edges can be used as spline and profile curves. CDRS 2000i has a tight integration with Pro/ENGINEER so curves can be transferred between applications while maintaining their specifications. A new conceptual design tool, Warp, allows the engineer to manipulate a model early in the design phase by twisting, bending, stretching, and tapering.
ICEM Technologies, 1210 County Rd. E West, Arden Hills, MN 55112; FAX (651) 415-0919; www.icem.com.
Universal processor card
The CPN5360, a CompactPCI universal processor card, can be configured for either peripheral or system CPU slots and will support Intel's Pentium II processor-Low Power. The CPN5360 also supports two PCI mezzanine card (PMC) sites, which can be used to expand on-board I/O such as industrial fieldbus and high-end communication networks. The card features 512 Mbyte maximum memory, 2D accelerated graphics performance on a peripheral slot board, and an on-board hard drive in place of one of the PMC sites, which can run both the operating system and application.
Motorola, 2900 South Diablo Way, Tempe, AZ 85282; FAX (602) 438-3059.
Process modeling for Visio
FirstSTEP Charter for Visio version 3.0, part of a process modeling, simulation, and management toolset, offers additional process views such as multilevel function flow and flattened maps. Process maps created in Charter 3.0 now use dynamic, multilevel hierarchical mapping, linkages to key performance indicators, and model objects such as resources, materials, entities, and organization units. This release enables visualization of all linked documents. Model validation checks ensure accuracy and fewer modeling and data input errors. Models created in FirstSTEP Charter for Visio are fully exportable in FirstSTEP Designer for process modeling simulation and analysis.
Interfacing Technologies Corp., 3333 Graham Blvd., Suite 101, Montreal H3R 1K1, Canada; FAX (978) 589-2064; www.interfacing.com.
MSC-1500V, a single-board computer, supports a wide choice of CPUs including Intel's Pentium P54C/P55C (MMX), and K5/K6/K6-2, Cyrix M1/M2, and IDT C6/Winchip 2, with clock speeds from 75 to 450 MHz. This half-size ISA Bus card supports bus speeds from 66 to 100 MHz, has an on-board VGA/LCD controller (up to 1024 x 768), two serial ports, EIDE mode 4 controller with up to 4 drives, and two floppy drives. Engineered for rugged environments, the MSC-1500V is geared for harsh industrial applications requiring desktop processing power.
Mitac Industrial, 42001 Christy St., Fremont, CA 94538; FAX (510) 656-2669.
Quick release CAD
Just four short months after the release of CATIA Version 5, comes Release 2 of CATIA Version 5, expanded into two different platforms. Platform 1 targets small- and medium-sized companies who want to grow towards large-scale digital product definition and position themselves for e-business. This platform allows existing customers to incorporate 3D modeling in many supporting areas where hardware or training overhead were a concern. Platform 2 targets traditional solid model designers. P2 offers several new products including Interactive Drafting, Sheetmetal Design, Wireframe and Surface and Generative Shape Design, Circuit Board Design, Generative Assembly Structural Analysis, and CATIA Team PDM.
Dassault Systemes, 9, quai Marcel Dassault, Suresnes 92150, France.
DesignSpace Version 5.0 adds assembly analysis functionally to the program. The software provides setup of an assembly analysis using new automatic contact surface detection and automatic surface-to-surface contact element creation. Users can specify one part in the assembly to be non-critical while dialing in the adjacent part to be critical. This ability to automatically generate completely dissimilar mesh densities on adjacent parts allows for more efficient analysis and more design iteration in less time. Also included is Design-Space Report II, an automatic report generator, delivering an HTML formatted document.
ANSYS, Southpointe 375 Technology Dr., Canonsburg, PA 15317.
Geometry detection software
GeometryQA detects and assesses geometry problems in CAD models. Aerospace, automotive, electronic, and other discrete manufacturing industries can, at the source, eliminate issues such as gaps and slivers, ensure smooth model surfaces, reduce model size and data exchange time, and decrease the computational hardware requirements and analysis duration time, says the company. GeometryQA standards are consistent with the VDA Recommendations established by the German automotive industry to address difficulties in manufacturing and translating CAD/CAM data from one system to another. GeometryQA is completely integrated with DesignQA(R). GeometryQA is shipping for IBM AIX, Sun Solaris, HP-UX, and SGI-IRIX platforms.
Prescient Technologies, 245 Summer St., Boston, MA 02210; www.prescienttech.com.
ViewPort+ V7, a PC-based electronic document management (EDM) system, focuses on the needs of small and mid-sized companies. ViewPort+ supports all popular 2D and 3D formats and includes built-in database for more than 300,000 files. Network versions are available for Windows NT and Novell that allow remote offices access to documents over a WAN or via the Internet. It is Y2K compliant. Prices start at $595 for a single user. Demo disks are available.
Cadman Corp., 1413 Montgomery Rd., Thousand Oaks, CA 91360; FAX (805) 496-2866; www.cadmancorp.com.
2D and 3D markup software
The 1-ViewTM, integrated 2D and 3D markup software for drawing and model data generated in CAD applications, combines the 2D capabilities of the company's Drafting ApprenticeTM with the 3D capabilites of OnScreen into a single unified environment. Users can examine both models and drawings simultaneously. The software supports 3D data from SDRC I-DEAS, Computervision CADDS, STL, and VRML. Users also have the option of working in an assembly mode. Drafting Apprentice view-and-markup software is now an integrated component of SDRC's I-DEAS Web Access. The software provides native access to drawing data generated in CAD/CAM applications for distribution to engineering and non-engineering users.
CAD Centric Systems Inc., 840 Old Mill Dr., Loveland, OH 45140; FAX (513) 697-0958; www.cadcentric.com.
CIMBridge 3.6 process optimization software for electronics manufacturer allows users to program and optimize heterogeneous surface mount assembly equipment. A new scripting feature allows users to add or modify data througout the line programming process to customize the software. CIMBridge 3.6 offers optimizers for Universal's GSM 1 and GSM 2 SMT equipment. The panel feature now supports mirrored panels that use identical machine programs and setups to build both the top side and bottom side of a panel. There is an optional Fuji CCIMF Machine Program Generator (MPG) for Fuji IP, CP, NP and QP series of modular SMT equipment.
GenRad, 7 Technology Park Dr., Westford, MA 01886; FAX (978) 589-2064; www.genrad.com.
VIA(R)-S200 Windows-based archiving and transmittal software lets a user store images, transmit them over the Internet or LAN, measure samples, annotate details, create comparison templates, or record a series of measurements for use in other applications to make reports, charts, spreadsheets, and presentations. The software also allows users to share images during discussion, consult with colleagues over long distances, document images and build an audit trail, and measure images used in industry and telemedicine.
Boeckeler Instruments Inc., 4650 S. Butterfield Dr., Tucson, AZ 85714; FAX (520) 745-0004.
ARCHIBUS/FM Version features a completely new architecture. Autodesk tech-nology embedded in the software enables users to seamlessly "round trip" between ARCHIBUS/FM 11 and AutoCAD R14, since any drawing saved in AutoCAD R14 format opens in ARCHIBUS/FM 11 and vice versa, eliminating the need to save drawings in R12 format.
ARCHIBUS Inc., 100 Franklin St., Boston, MA 02110; FAX (617) 338-1012.Rick DeMeis on Electrical/Electronics products Rick DeMeis Senior Editor For comments on electrical/electronics, contact Rick at [email protected] Pick of the Issue
The 739 Series terminal strips are available in pitch sizes from 3.5 to 7.62 mm (0.138 to 0.3 inch). These strips are for applications where conductor introduction must occur parallel to the other conductors and perpendicular to a PCB. Press-in-Technique circuit board terminals cover all pitches and require low insertion force. Series 739 strips are oriented perpendicular to the board, and are available in a variety of European and North American pitches. The terminal strips are also available in standard PCB pin style and are available from stock in 2- to 12-pole configurations with others attainable.
Wago, 9085 N. Deerbrook Trail, Brown Deer, WI 53223.
Mini load cells
MDB load cells come with a mini gold-pin connector system with a 10-ft, four-conductor cable. The series is a high-accuracy load cell for use in space limited applications. The MDBs are compliant in tension and compression, as well as single direction tension or compression. Combined accuracy of non-linearity and hysteresis is 0.1% of full scale, and non-repeatability is .05% of full scale. Output is 2 mV/V nominal via full wheatstone strain gauge bridge. Load cells are supplied with calibration certificate traceable to National Institute of Standards and Technology.
Transducer Techniques, 43178 Business Park Dr., Temecula, CA 92590; FAX (909) 676-1200; www.transducertechniques.com.
The X-com 759 system allows pre-assembled modules to be plugged into DIN 35 rail-mounted receptacle terminals, and has base receptacle terminal blocks with two connections for either two plugs or one plug/one cage clamp and two-way jumping. The X-com system has expanded with a variety of pc-board headers and chassis-mount connectors. This allows greater use of pre-assembled modules while being able to branch with single conductors and female plugs.
Wago, 9085 N. Deerbrook Trail, Brown Deer, WI 53223; FAX 414-354-1268.
Version 3.0 of Icepak CFD-based thermal analysis software adds parametric design capabilities, so a user can automate the software to consider several design options. The new version includes multiple units, local and global coordinate systems, and a user-editable spreadsheet summary tabl
3COM [8 Certification Exam(s) ]
AccessData [1 Certification Exam(s) ]
ACFE [1 Certification Exam(s) ]
ACI [3 Certification Exam(s) ]
Acme-Packet [1 Certification Exam(s) ]
ACSM [4 Certification Exam(s) ]
ACT [1 Certification Exam(s) ]
Admission-Tests [13 Certification Exam(s) ]
ADOBE [93 Certification Exam(s) ]
AFP [1 Certification Exam(s) ]
AICPA [2 Certification Exam(s) ]
AIIM [1 Certification Exam(s) ]
Alcatel-Lucent [13 Certification Exam(s) ]
Alfresco [1 Certification Exam(s) ]
Altiris [3 Certification Exam(s) ]
Amazon [2 Certification Exam(s) ]
American-College [2 Certification Exam(s) ]
Android [4 Certification Exam(s) ]
APA [1 Certification Exam(s) ]
APC [2 Certification Exam(s) ]
APICS [2 Certification Exam(s) ]
Apple [69 Certification Exam(s) ]
AppSense [1 Certification Exam(s) ]
APTUSC [1 Certification Exam(s) ]
Arizona-Education [1 Certification Exam(s) ]
ARM [1 Certification Exam(s) ]
Aruba [6 Certification Exam(s) ]
ASIS [2 Certification Exam(s) ]
ASQ [3 Certification Exam(s) ]
ASTQB [8 Certification Exam(s) ]
Autodesk [2 Certification Exam(s) ]
Avaya [101 Certification Exam(s) ]
AXELOS [1 Certification Exam(s) ]
Axis [1 Certification Exam(s) ]
Banking [1 Certification Exam(s) ]
BEA [5 Certification Exam(s) ]
BICSI [2 Certification Exam(s) ]
BlackBerry [17 Certification Exam(s) ]
BlueCoat [2 Certification Exam(s) ]
Brocade [4 Certification Exam(s) ]
Business-Objects [11 Certification Exam(s) ]
Business-Tests [4 Certification Exam(s) ]
CA-Technologies [21 Certification Exam(s) ]
Certification-Board [10 Certification Exam(s) ]
Certiport [3 Certification Exam(s) ]
CheckPoint [43 Certification Exam(s) ]
CIDQ [1 Certification Exam(s) ]
CIPS [4 Certification Exam(s) ]
Cisco [318 Certification Exam(s) ]
Citrix [48 Certification Exam(s) ]
CIW [18 Certification Exam(s) ]
Cloudera [10 Certification Exam(s) ]
Cognos [19 Certification Exam(s) ]
College-Board [2 Certification Exam(s) ]
CompTIA [76 Certification Exam(s) ]
ComputerAssociates [6 Certification Exam(s) ]
Consultant [2 Certification Exam(s) ]
Counselor [4 Certification Exam(s) ]
CPP-Institue [2 Certification Exam(s) ]
CPP-Institute [2 Certification Exam(s) ]
CSP [1 Certification Exam(s) ]
CWNA [1 Certification Exam(s) ]
CWNP [13 Certification Exam(s) ]
CyberArk [1 Certification Exam(s) ]
Dassault [2 Certification Exam(s) ]
DELL [11 Certification Exam(s) ]
DMI [1 Certification Exam(s) ]
DRI [1 Certification Exam(s) ]
ECCouncil [21 Certification Exam(s) ]
ECDL [1 Certification Exam(s) ]
EMC [129 Certification Exam(s) ]
Enterasys [13 Certification Exam(s) ]
Ericsson [5 Certification Exam(s) ]
ESPA [1 Certification Exam(s) ]
Esri [2 Certification Exam(s) ]
ExamExpress [15 Certification Exam(s) ]
Exin [40 Certification Exam(s) ]
ExtremeNetworks [3 Certification Exam(s) ]
F5-Networks [20 Certification Exam(s) ]
FCTC [2 Certification Exam(s) ]
Filemaker [9 Certification Exam(s) ]
Financial [36 Certification Exam(s) ]
Food [4 Certification Exam(s) ]
Fortinet [14 Certification Exam(s) ]
Foundry [6 Certification Exam(s) ]
FSMTB [1 Certification Exam(s) ]
Fujitsu [2 Certification Exam(s) ]
GAQM [9 Certification Exam(s) ]
Genesys [4 Certification Exam(s) ]
GIAC [15 Certification Exam(s) ]
Google [4 Certification Exam(s) ]
GuidanceSoftware [2 Certification Exam(s) ]
H3C [1 Certification Exam(s) ]
HDI [9 Certification Exam(s) ]
Healthcare [3 Certification Exam(s) ]
HIPAA [2 Certification Exam(s) ]
Hitachi [30 Certification Exam(s) ]
Hortonworks [4 Certification Exam(s) ]
Hospitality [2 Certification Exam(s) ]
HP [752 Certification Exam(s) ]
HR [4 Certification Exam(s) ]
HRCI [1 Certification Exam(s) ]
Huawei [21 Certification Exam(s) ]
Hyperion [10 Certification Exam(s) ]
IAAP [1 Certification Exam(s) ]
IAHCSMM [1 Certification Exam(s) ]
IBM [1533 Certification Exam(s) ]
IBQH [1 Certification Exam(s) ]
ICAI [1 Certification Exam(s) ]
ICDL [6 Certification Exam(s) ]
IEEE [1 Certification Exam(s) ]
IELTS [1 Certification Exam(s) ]
IFPUG [1 Certification Exam(s) ]
IIA [3 Certification Exam(s) ]
IIBA [2 Certification Exam(s) ]
IISFA [1 Certification Exam(s) ]
Intel [2 Certification Exam(s) ]
IQN [1 Certification Exam(s) ]
IRS [1 Certification Exam(s) ]
ISA [1 Certification Exam(s) ]
ISACA [4 Certification Exam(s) ]
ISC2 [6 Certification Exam(s) ]
ISEB [24 Certification Exam(s) ]
Isilon [4 Certification Exam(s) ]
ISM [6 Certification Exam(s) ]
iSQI [7 Certification Exam(s) ]
ITEC [1 Certification Exam(s) ]
Juniper [65 Certification Exam(s) ]
LEED [1 Certification Exam(s) ]
Legato [5 Certification Exam(s) ]
Liferay [1 Certification Exam(s) ]
Logical-Operations [1 Certification Exam(s) ]
Lotus [66 Certification Exam(s) ]
LPI [24 Certification Exam(s) ]
LSI [3 Certification Exam(s) ]
Magento [3 Certification Exam(s) ]
Maintenance [2 Certification Exam(s) ]
McAfee [8 Certification Exam(s) ]
McData [3 Certification Exam(s) ]
Medical [69 Certification Exam(s) ]
Microsoft [375 Certification Exam(s) ]
Mile2 [3 Certification Exam(s) ]
Military [1 Certification Exam(s) ]
Misc [1 Certification Exam(s) ]
Motorola [7 Certification Exam(s) ]
mySQL [4 Certification Exam(s) ]
NBSTSA [1 Certification Exam(s) ]
NCEES [2 Certification Exam(s) ]
NCIDQ [1 Certification Exam(s) ]
NCLEX [2 Certification Exam(s) ]
Network-General [12 Certification Exam(s) ]
NetworkAppliance [39 Certification Exam(s) ]
NI [1 Certification Exam(s) ]
NIELIT [1 Certification Exam(s) ]
Nokia [6 Certification Exam(s) ]
Nortel [130 Certification Exam(s) ]
Novell [37 Certification Exam(s) ]
OMG [10 Certification Exam(s) ]
Oracle [282 Certification Exam(s) ]
P&C [2 Certification Exam(s) ]
Palo-Alto [4 Certification Exam(s) ]
PARCC [1 Certification Exam(s) ]
PayPal [1 Certification Exam(s) ]
Pegasystems [12 Certification Exam(s) ]
PEOPLECERT [4 Certification Exam(s) ]
PMI [15 Certification Exam(s) ]
Polycom [2 Certification Exam(s) ]
PostgreSQL-CE [1 Certification Exam(s) ]
Prince2 [6 Certification Exam(s) ]
PRMIA [1 Certification Exam(s) ]
PsychCorp [1 Certification Exam(s) ]
PTCB [2 Certification Exam(s) ]
QAI [1 Certification Exam(s) ]
QlikView [1 Certification Exam(s) ]
Quality-Assurance [7 Certification Exam(s) ]
RACC [1 Certification Exam(s) ]
Real-Estate [1 Certification Exam(s) ]
RedHat [8 Certification Exam(s) ]
RES [5 Certification Exam(s) ]
Riverbed [8 Certification Exam(s) ]
RSA [15 Certification Exam(s) ]
Sair [8 Certification Exam(s) ]
Salesforce [5 Certification Exam(s) ]
SANS [1 Certification Exam(s) ]
SAP [98 Certification Exam(s) ]
SASInstitute [15 Certification Exam(s) ]
SAT [1 Certification Exam(s) ]
SCO [10 Certification Exam(s) ]
SCP [6 Certification Exam(s) ]
SDI [3 Certification Exam(s) ]
See-Beyond [1 Certification Exam(s) ]
Siemens [1 Certification Exam(s) ]
Snia [7 Certification Exam(s) ]
SOA [15 Certification Exam(s) ]
Social-Work-Board [4 Certification Exam(s) ]
SpringSource [1 Certification Exam(s) ]
SUN [63 Certification Exam(s) ]
SUSE [1 Certification Exam(s) ]
Sybase [17 Certification Exam(s) ]
Symantec [135 Certification Exam(s) ]
Teacher-Certification [4 Certification Exam(s) ]
The-Open-Group [8 Certification Exam(s) ]
TIA [3 Certification Exam(s) ]
Tibco [18 Certification Exam(s) ]
Trainers [3 Certification Exam(s) ]
Trend [1 Certification Exam(s) ]
TruSecure [1 Certification Exam(s) ]
USMLE [1 Certification Exam(s) ]
VCE [6 Certification Exam(s) ]
Veeam [2 Certification Exam(s) ]
Veritas [33 Certification Exam(s) ]
Vmware [58 Certification Exam(s) ]
Wonderlic [2 Certification Exam(s) ]
Worldatwork [2 Certification Exam(s) ]
XML-Master [3 Certification Exam(s) ]
Zend [6 Certification Exam(s) ]
Dropmark : http://killexams.dropmark.com/367904/11740133
Wordpress : http://wp.me/p7SJ6L-1pL
Dropmark-Text : http://killexams.dropmark.com/367904/12306854
Issu : https://issuu.com/trutrainers/docs/c9560-659
Blogspot : http://killexamsbraindump.blogspot.com/2017/11/pass4sure-c9560-659-real-question-bank.html
RSS Feed : http://killexams.com/datafiles/rss/C9560-659-rss.xml
Box.net : https://app.box.com/s/04xpsn795bexqpwndfcmj3rr5uedsggu
zoho.com : https://docs.zoho.com/file/62c50c96d93b9c9b54e51b7d3aa5285c0e579