Scan Science and Technology
Contact Leading Edge Experts & Companies
Application Administrator
The Experts below are selected from a list of 10869 Experts worldwide ranked by ideXlab platform
Kelly C. Bourne – One of the best experts on this subject based on the ideXlab platform.
-
Chapter 29 – Things to Do or Know How to Do in Advance
Application Administrators Handbook, 2014Co-Authors: Kelly C. BourneAbstract:There are some things that an Application Administrator should do or know before they are needed. This chapter lists many things you should do or know about the Application before you need them. Some things that should be known includes who is logged in, how to terminate a user session, lock out users, understand Application log files, unlocking the Administrator account, modify the Administrator password, and restore the database from backup files.
-
Chapter 1 – What Does an Application Administrator Do?
Application Administrators Handbook, 2014Co-Authors: Kelly C. BourneAbstract:This chapter describes tasks performed by an Application Administrator. Their job functions include installing software licensed from a vendor, updating software, tuning the Application from a performance viewpoint, troubleshooting problems, and training users.
-
chapter 1 what does an Application Administrator do
Application Administrators Handbook#R##N#Installing Updating and Troubleshooting Software, 2014Co-Authors: Kelly C. BourneAbstract:This chapter describes tasks performed by an Application Administrator. Their job functions include installing software licensed from a vendor, updating software, tuning the Application from a performance viewpoint, troubleshooting problems, and training users.
M.v. Joyce – One of the best experts on this subject based on the ideXlab platform.
-
ACSAC – The effects of trusted technology on distributed Applications
Tenth Annual Computer Security Applications Conference, 1994Co-Authors: M.v. JoyceAbstract:The paper examines the effect of trusted technology on a distributed Application being transitioned to a trusted system. Two styles of operation are examined: restricting the operation of all components of the Application to a single sensitivity level and allowing the user interface components of the Application to operate across a range of sensitivity levels. Within these operational styles, the effects of the trusted technology on the end user, the Application Administrator, and the developer are examined. The paper also offers suggestions for taking advantage of the enhanced security control features on trusted systems to address typical security weaknesses in distributed Applications. >
Michel Riveill – One of the best experts on this subject based on the ideXlab platform.
-
Distributed Application Configuration
, 1997Co-Authors: Luc Bellissard, Slim Ben Atallah, Fabienne Boyer, Michel RiveillAbstract:This paper presents Olan, a language and a run time support intended to facilitate the design, configuration and evolution of distributed Applications made up of heterogeneous software components. Configuration covers two phases: for the Application builder, the identification of the software components and the description of their interconnections and communications; for the Application Administrator, the accurate use of system resources provided by the target environment; for the deployment of the Application on the target environment. The main benefit of Olan is to provide a single unified description of distributed Applications, adequate for construction, management, and evolution. The overall description is independent from the components’ implementation, so that the configuration process, e.g. the production of different versions of an implementation, is decoupled from the programming process.
-
ICDCS – Distributed Application configuration
Proceedings of 16th International Conference on Distributed Computing Systems, 1Co-Authors: Luc Bellissard, Fabienne Boyer, Slim Ben Atallah, Michel RiveillAbstract:This paper presents Olan, a language and a run time support intended to facilitate the design, configuration and evolution of distributed Applications made up of heterogeneous software components. Configuration covers two phases: for the Application builder the identification of the software components and the description of their interconnections and communications; for the Application Administrator and maintainer the accurate use of system resources provided by the target environment, such as the placement of components on nodes. The main benefit of Olan is to provide a single unified description of distributed Applications, adequate for construction, management, and evolution. The overall description is independent from the components’ implementation, so that the configuration process, e.g. the production of different versions of an implementation, is decoupled from the programming process. The features of the configuration language and the functions of the runtime support system are illustrated through the example of a distributed teleconferencing Application.