Saturday, 19 September 2015

HP TRIM

Contents:
1) Abstract 
2) Objective
3) Problem definition
4) Features and advantages of document management system
5) Some Terminology
6) Requirements
7) Implementation Process
     a) How to make clusters?
     b) Figure of Solution Architecture


1)      Abstract

HP Trim (Tower Record Information Management) is an HP (Hewlett Picard’s) based solution of the EDRMS (Electronic Document Management System) system. It is developed by TOWER software (acquired by HP).
HP Trim is a highly configurable and easily deployable commercial off the shelf solution that is proven is large Government and regulated industry organizations and can meet the needs of any business. The implementation of a system that is simple and easy to use yet a powerful application for sharing, managing, and documents on intranet in a secure manner. Manage your document over the web. It enables to create a central repository of organizational documents indexed by key words and organized by category. Intranet based document management system provide a document library with secure access control, advanced search features and document – centric collaboration for document sharing and supporting project team.
The main facilities of this projects are:
Ø  Create and delete locations
Ø  Updating data
Ø  Restricted list of check-in and check-out documents
Ø  Introduced advanced technique for quick and easy retrieval of data
The user can search a particular file by just specifying its subject, keyword, descriptions etc. The user has the facility of viewing documents uploaded by a particular person or person falling in particular group.
This Document Management System is centralized.


2)      Objective

Electronic Document Management (EDM) manages any kind of information object, including word processing and spreadsheet files, presentation software, drawing packages, images, workflows, databases, emails, audio, video, CAD applications and more, throughout the entire document lifecycle.
Ø  Comply with industry standards
Ø  Capture from any source
Ø  Manage the full life cycle
Ø  Version control and security
Ø  Manage records, engineers drawings and more
Ø  Future-proof access to corporate content


3)      Problem definition

Despite the content push towards modernizing by digitizing the primary care paper record, there remains several undeniable advantages associated with ‘old fashioned’ paper.
Unsurprisingly, most of the perceived advantages that are associated that are associated with the physical presence of paper are also disadvantages in all but the most straightforward of scenario. The major problem with paper is, of course, the efforts expended on manual filling and retrieval plus the space required for storage. Most practices that have not digitized their records will seem to have acres of practice floor space dedicated to holding paper records.

4)      Features and advantage of Document Management System


Features of document management system
a) Set up and manage your storage facility as graphical hierarchy of arranged storage space.
b) Determine the location of contiguous storage space.
c) Move records into long term storage with notification of available space.
d) Define new storage space
e) Support bar code scanning for records
f) Specify that specific storage space is not available
g) Display and print the records within a storage space
h) Determine the amount of free storage space
i) Move records within your storage facility
j) Display storage space properties

Advantages of Document Management System
a) Reduced Physical storage
b) Save time, Instant access to documents
c) Advantage over other business
d) Robust indexing of documentation
e) Improve customer service
f) Simple updating process
g) Air-tight security
h) “Green” Business Practice

5)  Some terminologies

   a)      Microsoft SQL Server 2008 Active/Passive clusters
A 2 node cluster would be setup for SQL server 2008 database for high availability.
A server cluster is a group of independent servers running Windows Server 2008, Enterprise Edition, or Windows Server 2008, Datacenter Edition, and working together as a single system to provide high availability of services for clients. When a failure occurs on one computer in a cluster, resources are redirected and the workload is redistributed to another computer in the cluster. You can use server clusters to ensure that users have constant access to important server-based resources.
Requirement:
§  Server must have the same versions of Windows operating system and same software updates and service pack as well. Failover Clustering feature has to be installed on the servers.
§  It is recommended to use the same/similar server hardware.
§  Two network cards on each server
§  HBA cards on each server
§  Must use shared storage that is compatible with Windows Server 2008 R2.
§  The servers in the cluster must use Domain user account.
§  Use Domain Name System (DNS) for name resolution.
§  All clustered servers should be the member of the domain
§  Windows server 2008 or R2 enterprise
§  SQL server 2008 or R2 enterprise
   b)      Network Load Balancing in Windows Server
Network load balancing automatically detects the failure of a server, and then quickly reassigns client computer traffic among the remaining server. This safeguard can help you to provide uninterrupted, continuous service for your critical business programs.
§  Balance load requests across the NLB cluster for individual TCP/IP services.
§  Support up to 32 computers in a single cluster.
§  Balance multiple server load requests (from either the same client or from several clients) across multiple hosts in the cluster.
§  Support the ability to add hosts to the NLB cluster as the load goes up, without bringing the cluster down.
§  Support the ability to remove hosts from the cluster when the load goes down.
§  Enable high performance and low overhead through fully pipelined implementation. Pipelining allows requests to be sent to the NLB cluster without waiting for response to the previously sent one.

6)      Requirements

To make a cluster the following is the servers used for HP Trim applications:
§  Two servers for Trim Web Server
§  Two servers for Trim Workgroup Server
§  Two servers for Trim SQL Database
Role of servers
Roles
Server
Web Server on Windows Network Load Balancing
Trim Web Server 01
Trim Web Server 02
Workgroup on Windows Cluster
Trim Workgroup Server 01
Trim Workgroup Server 02
SQL database on failover cluster
Trim Database Server 01
Trim Database Server 02

Software requirements

1.       Microsoft Windows Server 2008 R2 latest pack
2.       Microsoft Windows SQL Server 2008 R2
3.       HP Trim 7.3

7)      Implement process

To implement HP Trim in the intranet we have to make the cluster of windows, database and web servers.

      a)      How to make clusters?

To make windows clusters the requirement is given.
1.       There are two connections between each server
(i) Production Network Connection
(ii) Heartbeat Network Connection
Heartbeat Network Connection is used to check the connection between two Windows server or web server or database server.

In the failover condition if any server goes down then all resources shift into another server by using Production Network Connection.

b) Figure of Solution Architecture:




Friday, 20 February 2015

Cyber Security

What is cyber security?
It seems that everything relies on computers and the internet now — communication (email, cellphones), entertainment (digital cable, mp3s), transportation (car engine systems, airplane navigation), shopping (online stores, credit cards), medicine (equipment, medical records), and the list goes on. How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system?

Cyber security involves protecting that information by preventing, detecting, and responding to attacks.
What are the risks?
There are many risks, some more serious than others. Among these dangers are viruses erasing your entire system, someone breaking into your system and altering files, someone using your computer to attack others, or someone stealing your credit card information and making unauthorized purchases. Unfortunately, there's no 100% guarantee that even with the best precautions some of these things won't happen to you, but there are steps you can take to minimize the chances.
What can you do?
The first step in protecting yourself is to recognize the risks and become familiar with some of the terminology associated with them.
Hacker, attacker, or intruder 
These terms are applied to the people who seek to exploit weaknesses in software and computer systems for their own gain. Although their intentions are sometimes fairly benign and motivated solely by curiosity, their actions are typically in violation of the intended use of the systems they are exploiting. The results can range from mere mischief (creating a virus with no intentionally negative impact) to malicious activity (stealing or altering information).
Malicious code 
Malicious code, sometimes called malware, is a broad category that includes any code that could be used to attack your computer. Malicious code can have the following characteristics:
    • It might require you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page.
    • Some forms propagate without user intervention and typically start by exploiting a software vulnerability. Once the victim computer has been infected, the malicious code will attempt to find and infect other computers. This code can also propagate via email, websites, or network-based software.
    • Some malicious code claims to be one thing while in fact doing something different behind the scenes. For example, a program that claims it will speed up your computer may actually be sending confidential information to a remote intruder.
Viruses and worms are examples of malicious code.
Vulnerability 
In most cases, vulnerabilities are caused by programming errors in software. Attackers might be able to take advantage of these errors to infect your computer, so it is important to apply updates or patches that address known vulnerabilities (see Understanding Patches for more information).
This series of cyber security tips will give you more information about how to recognize and protect yourself from attacks.

Thursday, 12 February 2015

atari

ATARI

Atari is an american multinational company, and at one time was the biggest video game company in the world. It was famous for its arcade games, home consoles and its all time hit games Pong, Pac-Man E.T., Space Race and Breakout. interestingly, all the founders of apple once worked at Atari before moving on to apple Inc.
Founded in 1972, and after being the market leader for several years, it faced problems and losses during the video game collapse of 1983. Prior to this, Atari was a subsidiary of Warner communications and contributed to almost one - third of warner's annual income.
In 1997 only 500000 out of 800000 Atari 2600 console ware sold which brought Atari into rain.
By 1996, Atari had a substantial line of labeled products since 1991 and ran into financial problems. Hance, Atari's name and assets were sold to Hasbro interactive, Atari games was renamed midway games west by its new parent company but disbanded in 2003 after a slump in game sales....

Wednesday, 11 February 2015

Some Computer Security Related Definitions

Shoulder Surfing

Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information. Shoulder surfing is an effective way to get information in crowded places because it's relatively easy to stand next to someone and watch as they fill out a form, enter a PIN number at an ATM machine, or use a calling card at a public pay phone. Shoulder surfing can also be done long distance with the aid of binoculars or other vision-enhancing devices. To prevent shoulder surfing, experts recommend that you shield paperwork or your keypad from view by using your body or cupping your hand.


Dumpster Diving
Dumpster diving is a technique used to retrieve information that could be used to carry out an attack on a computer network. Dumpster diving isn't limited to searching through the trash for obvious treasures like access codes or passwords written down on sticky notes. Seemingly innocent information like a phone list, calendar, or organizational chart can be used to assist an attacker using social engineering techniques to gain access to the network. To prevent dumpster divers from learning anything valuable from your trash, experts recommend that your company establish a disposal policy where all paper, including print-outs, is shredded in a cross-cut shredder before being recycled, all storage media is erased, and all staff is educated about the danger of untracked trash.


Sniffers
A sniffer is a program that monitors and analyzes network traffic, detecting bottlenecks and problems. Using this information, a network manager can keep traffic flowing efficiently.
A sniffer can also be used legitimately or illegitimately to capture data being transmitted on a network. A network router reads every packet of data passed to it, determining whether it is intended for a destination within the router's own network or whether it should be passed further along the Internet. A router with a sniffer, however, may be able to read the data in the packet as well as the source and destination addresses. Sniffers are often used on academic networks to prevent traffic bottlenecks caused by file-sharing applications.
The term "sniffer" is occasionally used for a program that analyzes data other than network traffic. For example, a database could be analyzed for certain kinds of duplication


Trojan
A trojan is malicious program that, when installed on a system, can be used for nefarious purposes by an attacker. Tools that allow remote administration or access to a vulnerable system (RATs) are called Trojans. With a Trojan an attacker can control rearly all hardware and software on the system by remote. Today trojans are very advanced and provide attackers with many different features for remote control. Once a trojan has been introduced into a system, not only does all the data become vulnerable to threat, but there is a good chance that the compromised system can be used to set up an attack on some third-party sytem.