The Case for Service Provider Deployment of Super-Peers In Peer-To-Peer Networks
人力资源管理专业词汇(中英文对照)

人力资源管理专业词汇( 中英文对照) 人力资源管理:(Human Resource Management ,HRM)人力资源经理:( human resource manager)高级管理人员:(executive)职业:(profession)道德标准:(ethics)操作工:(operative employees)专家:(specialist)人力资源认证协会:(the Human Resource Certification Institute ,HRCI)外部环境:(external environment)内部环境:(internal environment)政策:(policy)企业文化:(corporate culture)目标/使命:(mission)股东:(shareholders/stakeholder)非正式组织:(informal organization)跨国公司:(multinational corporation ,MNC)管理多样性:(managing diversity)、工作:(job)职位:(posting)工作分析:(job analysis)工作说明:(job description)工作规范:(job specification)工作分析计划表:(job analysis schedule ,JAS)职位分析问卷调查法:(Management Position Description Questionnaire ,MPDQ) 行政秘书:(executive secretary)地区服务经理助理:(assistant district service manager)、人力资源计划:(Human Resource Planning ,HRP)战略规划:(strategic planning)长期趋势:(long term trend)要求预测:(requirement forecast)供给预测:(availability forecast)管理人力储备:(management inventory)裁减:(downsizing)人力资源信息系统:(Human Resource Information System ,HRIS)四、招聘:(recruitment)员工申请表:(employee requisition)招聘方法:(recruitment methods)内部提升:(Promotion From Within ,PFW)工作公告:(job posting)广告:(advertising)职业介绍所:(employment agency)特殊事件:(special events)实习:(internship)五、选择:(selection)选择率:(selection rate)简历:(resume)标准化:(standardization)有效性:(validity)客观性:(objectivity)规范:(norm)录用分数线:(cutoff SCORe)准确度:(aiming)业务知识测试:(job knowledge tests) 求职面试:(employme nt in terview) 非结构化面试:(un structured in terview) 结构化面试:(structured in terview) 小组面试:(group in terview) 职业兴趣测试:(vocational interest tests) 会议型面试:(board in terview)六、组织变化与人力资源开发人力资源开发:(Human Resource Development ,HRD) 培训:(training) 开发:(development) 定位:(orientation) 训练:(coaching) 辅导:(mentoring)经营管理策略:(business games)案例研究:(case study)会议方法:(conference method)角色扮演:(role playing)工作轮换:(job rotating)在职培训:(on-the-job training ,OJT)媒介:(media)七、企业文化与组织发展企业文化:(corporate culture)组织发展:(organization development ,OD)调查反馈:(survey feedback)质量圈:(quality circles)目标管理:(management by objective ,MBO) 全面质量管理:(Total Quality Management ,TQM) 团队建设:(team building)八、职业计划与发展职业:(career)职业计戈U :(career planning)职业道路:(career path)职业发展:(career development)自我评价:(self-assessment)职业动机:(career anchors)九、绩效评价绩效评价:(Performanee Appraisal , PA)小组评价:(group appraisal)业绩评定表:(rating scales method)关键事件法:(critical incident method)排歹U法:(ranking method)平行比较法:(paired comparison)硬性分布法:(forced distribution method)晕轮效应:(halo effect)宽松:(leniency)严格:(strictness)360 反馈:(360-degree feedback)叙述法:(essay method)集中趋势:(central tendency)十、报酬与福利报酬:(compensation)直接经济报酬:(direct financial compensation)间接经济报酬:(indirect financial compensation)非经济报酬:(no financial compensation)公平:(equity)外部公平:(external equity)内部公平:(internal equity)员工公平:(employee equity)小组公平:(team equity)工资水平领先者:(pay leaders)现行工资率:(going rate)工资水平居后者:(pay followers)劳动力市场:(labor market)工作评价:(job evaluation)排歹U法:(ranking method)分类法:(classification method)因素比较法:(factor comparison method)评分法:(point method)海氏指示图表个人能力分析法:(Hay Guide Chart-profile Method) 工作定价:(job pricing)工资等级:(pay grade)工资曲线:(wage curve)工资幅度:(pay range)十一、福利和其它报酬问题福利(间接经济补偿"welfare)额外福利(fringe ben efit)员工股权计划:(employee stock ownership plan , ESOP)值班津贴:(shift differential)奖金:(incentive compensation)分红制:(profit sharing)十二、安全与健康的工作环境安全:(safety)健康:(health)频率:(frequency rate)紧张:(stress)角色冲突:(role conflict)催眠法:(hyp no sis)酗酒:(alcoholism)十三、员工和劳动关系工会:(union)地方工会:(local union)行业工会:(craft union)产业工会:(industrial union)全国工会:(national union)谈判组:(bargaining union)劳资谈判:(collective bargaining)仲裁:(arbitration)罢工:(strike)内部员工关系:(internal employee relations)纪律:(discipline)纪律处分:(disciplinary action)申诉:(grievanee)降职:(demotion)调动:(transfer)晋升:(promotion)十四、人力资源管理常用短语英汉对照表Actio n lear ning :行动学习Alternati on ran ki ng method :交替排序法Annual bonus :年终分红Applicati on forms :工作申请表Appraisal in terview :评价面试Aptitudes :资质Arbitration :仲裁Atte ndance incen tive pla n 参与式激励计戈UAuthority 职权Behavior modeli ng :行为模拟Behaviorally an chored rati ng scale (bars) : 行为锚定等级评价法Ben chmark job :基准职位Ben efits :福利Bias :个人偏见Boycott :联合抵制Bumping/layoff procedures :工作替换/临时解雇程序Burnout :耗竭Ca ndidate-order error :候选人次序错误Capital accumulati on program : 资本积累方案Career an chors :职业锚Career cycle :职业周期Career pla nning and developme nt 职业规划与职业发展Case study method :案例研究方法Central ten de ncy :居中趋势Citations :传讯Civil Rights Act :民权法Classes :类Classificati on (or gradi ng) method 归类(或分级)法Collective barga ining :集体谈判Comparable worth :可比价值Compe nsable factor :报酬因素Computerized forecast :计算机化预测Co nte nt validity :内容效度Criterion validity :效标效度Critical in cide nt method :关键事件法Davis-Bacon Act (DBA):戴维斯一佩根法案Day-to-day-collective barga ining :日常集体谈判Decline stage :下降阶段Deferred profit-shari ng pla n :延期利润分享计划Defined ben efit :固定福利Defined con tribution :固定缴款Departme nt of Labor job an alysis 劳工部工作分析法Discipline :纪律Dismissal :解雇;开除Downsizing :精简卜五、其他考评assessment试用期probatio nary period考核appraisal绩效改进考核performa nee improveme nt appraisal期终评议annual appraisal反馈feedback沟通communication干部部(处) HR subdivisi on综合评定overall appraisal转正probation passed定级grading辞退dismissal价值导向value-orie ntati on劳动合同labour contract任职状况compete ncy 劳动态度worki ng attitude 工作绩效performa nee 考察期probatio n 月度考核mon thly appraisal 思想导师me ntor 关键事件critical events 关键行为critical behavior 责任结果respon sibility and result orie ntati on 业务变革bus in ess reform 双向沟通two-way com muni cati on 目标承诺objectives commitme nt 绩效承诺performa nee commitme nt 绩效评价者first-level appraiser 考核责任者sec on d-level appraiser 考核复核者final appraiser 功能部门functional dept.个人绩效承诺personal bus in ess commitme nt绩效辅导coach ing 绩效考核performa nee appraisal 多主管、多角色、矩阵式"multi-ma nagers, multi-roles, matrix"季度绩效考核quarterly performa nee appraisal年度综合评定ann ual overall appraisal跨部门团队cross-fu ncti onal team 结果目标承诺objective and result commitme nt 执行措施承诺executive commitme nt团队合作承诺team commitme nt在职on job 自评self-appraisal 职业等professional grade 普通等normal grade 基础等basic grade 预备等prelimi nary grade 述职performanee report 业务部门line departme nt 支持部门support departme nt 核心竞争力core compete ncy 年度财务报告ann ual finan cial report业务规戈U bus in ess pla nning 中期财务报告mid-term finan cial report预算budget 愿景与战略visio n & strategy 客户满意度customer satisfacti on 挑战目标challe nging objectives宏观管理macro-ma nageme nt预测forecast/predict社会医疗保险social medical insurance商业医疗保险commercial medical in sura nee缴费与门诊补助medical expenses and outpatient subsidies住院治疗与预防保健基金fund for hospitalizati on and preve ntive health华为最高补助线Huawei maximum subsidies line社保最高支付线maximum line of social security payme nt社保起付线minimum line of social security payme nt 高额医药费补助large amount of subsidies on medical fees基本和非基本医药费basic and other medical fees(非)定点医疗机构(non-) desig nated medical organi zatio n报销时限reimbursement time limit钟点制员工temporary employee 合同制员工contract employee 社会保险social in sura nee 商业保险commercial in sura nee 附加补助additio nal subsidy 保额标准compe nsati on sta ndard 工龄补助subsidy on service len gth 招聘调配咅 B recruitme nt and allocati on departme nt 考核薪酬处appraisal and salary section 任职资格管理咅 B compete ncy and qualificati on man ageme nt departme nt人事处pers onnel departme nt 任职资格compete ncy and qualificati on任职资格管理compete ncy and qualificati on man ageme nt认证competency and qualification assessment任职资格标准compete ncy and qualificati on sta ndard级别level 等级grade 资格类另U types of qualificati on技能skill素质competency必备知识kno wledge招聘recruitment考核assessment择优录用en roll the excelle nt people有限授权limited empower保密、回避"Confidential, alienation"人才库huma n resources bank资格审查HR in terview专业面试tech nical/professi onal in terview综合面试overall in terview审批approve面试资格人qualified in terviewer招聘质量控制小组recruitme nt quality con trol team形象image 谈吐speech 求职动机motivati on 素质特征compete ncies 工作适应性job adaptati on录用人员与拟聘岗位要求的吻合度suitability招聘成本recruitme nt cost 招聘周期recruitme nt cycle 用人需求requisiti on 职位说明书job descripti on 人力规戈U /用人计戈U man power pla nning 效果评估recruitme nt evaluati on 竞争对手competitor 平面广告advertiseme nt 网络广告n etwork advertiseme nt 猎头、猎头公司headhu nter人才交流会job fair 技术交流会tech ni cal conferences展览会exhibition(专场)招聘会career day推荐recommend 内部推荐in ternal referral 投入产出比In put and output ratio发布渠道publicati on cha nnel 急缺人才tale nt in urgent n eed 稀缺人才scarce tale nt 特殊人才tale nt with special skills 现场招聘on-site recruit ing 考核流程assessme nt procedure 组长负责制team leader respon sible system 出差报告bus in ess trip report 应聘材料docume ntati on 筛选scanning电话面试telepho ne in terview 复试sec ond time in terview 权签人final approval 实习人员in tern 聘书offer letter 劳动关系labor relati on 劳动合同labor con tract 预支工资prepaid salary 甄选selection素质测评compete ncy test 试题库in terview questi ons 案例case内部劳动力市场internal huma n resources pool 人力资源配置huma n resources deployme nt职类position type职位position组织效益orga ni zati onal effect iven ess人均效率average personal efficie ncy测评指标assessme nt in dicator监控体系mon itori ng system组织结构orga ni zati onal structure组织结构调整organi zati onal structure adjustme nt 工作移交hand over离任审计resig n audit上岗report to duty岗位适应性培训post adjustability training任命nomination辞职resignation辞退dismissal劝退special condition dismissal自动离职auto-resig nati on除名dismissal业务量(工作量)bus in ess volume转岗internal transfer岗位轮换job rotation周边锻炼lateral practice 轮训rotation training 借调temporarily transfer 富余人员redundant staff。
汤姆,和汤姆的父母的出行方式作文英语

汤姆,和汤姆的父母的出行方式作文英语全文共3篇示例,供读者参考篇1Tom's Travel AdventuresHey guys, it's me again coming at you with another one of my classic stories about my buddy Tom and his crazy family. This one is all about how they like to get around and travel to different places. You already know Tom is kind of an odd dude, but just wait until you hear about his parents and their wacky ways of transportation!So let's start with Tom himself. My man Tom is all about efficiency when it comes to travel. He's got this beat-up old bicycle that looks like it should have been taken to the junkyard ages ago. But to Tom, that rusty old thing is his prized possession. He loves riding that bike everywhere he can. Even when we make plans to just hang out at the mall a few miles away, you can bet your bottom dollar Tom will insist on riding his janky bicycle to get there. We all rag on him for it, but he doesn't care. He's Mr. Environmental and is determined to keep his carbon footprint as tiny as possible.Now, Tom's dad is a different story altogether. That man lives by the saying "go big or go home"...or should I say "go big AND go home" because his preferred method of transportation is absolutely bonkers. Tom's dad is OBSESSED with RVs. And I'm not talking about any normal, everyday RVs either. Nope, Tom's dad has this souped-up, monster truck edition RV that's jacked up about 10 feet off the ground with these larger-than-life tires that probably cost more than my parents' entire house.Whenever the fam is heading out on a road trip, you can hear that behemoth of an RV coming from about 5 miles away. The thunderous roar of the engine is enough to rattle the windows of every house on the block. Tom's dad doesn't even take the highway when they travel cause his RV is too massive. He just cruises straight through the middle of town, undisturbed by things like traffic laws or the concept of reasonable size vehicles for public roads. I'm tellin' ya, it's a sight to behold.While his dad is all about making a raucous entrance, Tom's mom prefers a more...unique way of getting around. Are you ready for this one? Tom's mom's favorite mode of transportation is by HOT AIR BALLOON! Yeah, you read that right. This woman legitimately owns her own personal hot air balloon, fully equipped with one of those big woven baskets to ride in.Whenever the family goes somewhere together, they have to make accommodations to bring the hot air balloon with them so Tom's mom can use it.I'll never forget the time they invited me along on their yearly trip to the beach down in Florida. We're doing the normal road trip thing, cruising along in Tom's dad's insane RV, when suddenly we have to pull over cause we're approaching the beach town. That's when Tom's mom hops out with her little portable tank of propane to inflate this giant hot air balloon emblazoned with stars and rainbows and all sorts of trippy designs. Within about 20 minutes, the thing was all inflated and filling up with hot air, ready for take off.While Tom's mom was drifting lazily above us in her balloon, the rest of us piled back into the RV and somehow managed to drive that monstrous thing about two blocks at a time through these tiny neighborhood streets to follow her path from the air. Every time we'd start to lag behind, we'd just look up and see her waving to us from her balloon to get our attention. I'm telling you, it was the wildest way to show up to a vacation spot I've ever experienced!Finally, no tale about the travel habits of Tom's fam would be complete without discussing their absolute favorite spot: thefarm. Well, it's not just any ordinary farm either. Nope, it's some huge ranch property that Tom's parents rent out a few times a year in the middle of freaking nowhere. And they don't take the RV, the bicycle, or the hot air balloon to get there. Instead, they have their own personal helicopter!Yup, you heard me right. A freaking helicopter. Tom's dad has had his private pilot's license for years and has been saving up his pennies to buy this slick new chopper that he likes to call "Betty." It's decked out with all sorts of luxurious amenities and has a golden bright paint job that makes it shine like a disco ball in the sun. Whenever they head to the farm, they just hop in that big ol' whirly bird and fly on over in style.Maybe I'm just a city boy at heart, but I still can't wrap my head around why a family would want to own so many unnecessarily extravagant modes of transportation. Last I checked, cars and trucks still exist and get you where you need to go without attracting a bunch of stares and unwanted attention. But I guess when you're Tom's parents, doing things the normal way just isn't an option.So there you have it, my friends - the travel tales of my main man Tom and his parents who march to the beat of their own drum...or bike wheels, RV tires, hot air balloons, and helicopterblades as the case may be. At the end of the day, I wouldn't want them any other way. Their wacky adventures and outrageous transportation methods always keep me on my toes and give me something to laugh about. Who knows, maybe one day if I hang around them enough, they'll finally let me take Betty the helicopter out for a spin!篇2Tom's Dad and His Awesome RidesYou know how some kids get all excited talking about their dad's fancy sports car or their mom's sweet minivan? Well, my parents take things to a whole other level when it comes to transportation. Instead of boring old cars, my dad is totally obsessed with collecting and riding all kinds of crazy cool vehicles. I'm talking everything from vintage motorcycles to gigantic tractors and everything in between. My friends are always so jealous when I tell them about my dad's insane collection of rides.It all started when I was really little. Dad worked as a mechanic and was always tinkering on old cars and motorcycles in our garage. He'd let me hang out and "help" by handing him tools and stuff. I remember being totally mesmerized watchinghim take these rundown buckets of rust and restoring them into gorgeous classic vehicles that looked like they just rolled off the assembly line.As I got older, Dad's hobby kind of turned into an obsession. He started buying up any interesting vehicle he could get his hands on - didn't matter if it was broken down and non-running. He'd spend months, even years, meticulously rebuilding and restoring these things until they were in mint condition. Mind you, we're not a rich family by any means. Dad just has this crazy talent and passion for it.Now I should probably give you guys some examples of the wild rides my dad has accumulated over the years. I still remember the day he brought home a freaking Vietnam-era Army Jeep that was used in actual combat. It was beat to hell with bullet holes and everything. He spent over a year working on that thing, repairing the body, repainting it in perfect military colors, you name it. When he was finally done, that Jeep looked like it had just come off the battlefield and was ready to deploy again.Next up was this ancient tractor from like the 1930s or 40s that he rescued from a local farm that was going out of business. This beast was absolutely massive, with rusted metal andwooden wheels that were practically decomposing. Mom thought he was nuts for dragging this huge hunk of junk home. But you know Dad - he disassembled that entire tractor piece by piece, sand-blasted every part to remove decades of built-up crud, replaced the wooden wheels with new ones he crafted himself, and fully restored the engine and all the components. When it was finally road-ready, he drove that monster tractor in the town's篇3Tom and His Parents' Travel ModesWhew, the teacher just assigned us a massive essay on how we and our families get around town. 2000 words?! That's like 8 pages double-spaced! I better start brainstorming ideas and get this thing outlined if I want to have any chance of getting it done by next week's deadline.I guess I'll start by introducing my family situation. My name is Tom and I'm a high school junior living at home with my mom, dad, and younger sister Sarah. We live in a regular suburban neighborhood about 15 miles outside of downtown in a decent-sized city. Nothing too fancy, just a normal middle-class family trying to get by.When it comes to how we all get around, it's a bit of a mixed bag between us. I'll start with my parents since they're the breadwinners and all. My dad has about a 20 mile commute each way to his office job downtown. For years, he drove himself alone in one of our family's two cars - a 2010 Toyota Corolla that's seen better days. Needless to say, the stop-and-go traffic combined with the mileage put a ton of wear and tear on that poor thing.A couple years ago though, my dad's job started this really cool transportation benefits program. Basically, they pay for his transit pass that lets him take the city bus or the regional rail line for free. After doing the math on fuel costs, maintenance, and parking fees, he decided to start taking the train. Now he just drives a couple miles to the park-and-ride, hops on the rail line downtown, and his job covers the whole cost! Such a sweet deal.My mom's commute is way different. Her office is only about 5 miles away in a neighboring city, so she doesn't have some crazy long haul. Plus, her workplace has a super flexible schedule, so she can avoid sitting in miserable rush hour traffic pretty easily. For her short trip, she generally drives herself in our other car - a 2016 Honda Civic that's holding up nicely.Once or twice a week though, she'll actually walk or bike to work if the weather cooperates. We've got some decent trailsystems and bike lanes around here, so it's not a bad option when it's nice out. I think she mainly does it for exercise though, since it probably only saves her like 15 minutes compared to driving. Hey, every little bit counts for staying fit!What about me and my sister? Well, we're still kids so we don't have quite as much responsibility for our own transportation. For getting to and from school, we've got a couple options. Most days during the school year, we take the good ol' mustard-stained, funky-smelling yellow school bus. I have to admit, I'm not a huge fan - having to wake up at the crack of dawn, getting crammed into a tiny seat, dealing with ornery bus drivers. But it gets the job done I suppose.When we have after-school activities, sports practices, or other happenings, my parents try to be there for pick-up and drop-off as much as possible. If they can't though, my sister and I will sometimes bike, walk, or even take public transit buses depending on the timing and distance. We're actually becoming pretty pro transit riders!In the summer and on weekends, we do lots of family activities and outings around town. Every Sunday after church, we always go out for a big breakfast at thisreally yummy pancake place. We take turns driving the two family cars depending onwho's feeling most up for battling Sunday morning traffic (it ain't me!).For running errands around town, going to movies, or doing other casual things, we've been trying to walk, bike, or take transit more often when the weather's nice. Parking can be such a hassle, and my parents are increasingly concerned about the environment and our carbon footprint as a family. I remember learning about the greenhouse gas emissions from vehicles and theirhuge impact on climate change, so I'm actually all for using alternative transportation modes when possible.We've even done the occasional bike outing as an entire family unit! It's a great way to spend quality time together, get some exercise, and be eco-friendly all at once. I have to admit though, it's pretty comical trying to navigate busy city streets with my dad yelling directions, my mom struggling with her sense of direction, and my sister endlesslyomplaining about being tired. Ah, family bonding at its finest!One thing's for sure though - we definitely rely way too heavily on our cars as a household. It's just so easy and convenient compared to mapping bus routes, remembering transit schedules, or figuring out bike paths. With my parents' jobs, my sister's activities, and my social life, we're alwayson-the-go it seems. Hoping in the car is usually the simplest option.But lately, we've been trying to be more conscious of it and change our habits. Taking transit, walking, or biking even just a few times a week instead of driving can make a tangible positive impact on the environment and our community. We've been setting monthly goals of "car-free" days to keep us accountable. It's a work in progress for sure, but we're heading in amore sustainable direction as a family.My parents have even been talking about potentially going car-free or becoming a single-car household once my sister and I are out of the house. With just the two of them, they could potentially rely more on public transit, walking, biking, or using ride-shares for their transportation needs without hauling us kids around everywhere. It would definitely be an adjustment, but could save them a ton of money and unwanted environmental impact.At the end of the day, there's no one-size-fits-all solution. Different transportation modes work better for different people depending on their lifestyles, locations, needs, and preferences. But I think we could all afford to put a little more thought into how we get around and be more conscious of the impacts. As myfamily is slowly realizing, documenting how and why we make our transportation choices is the first step towards meaningful change.Well, there you have it! I'd say that's a pretty comprehensive overview of how me, my parents, and my family navigate getting around town using various transportation methods. Hopefully I hit the 2000 word target and touched on all the key points the teacher wanted. Better get this thing proofread and submit it soon before that deadline hits!。
Plantronics Hub 企业版安装说明书

Date: 12/12/2021Rev: 3.25 Install Notes for Enterprise Installations of Plantronics Hub™for Windows and Mac v3.25Table of ContentsOverview of Plantronics Enterprise software (3)Plantronics Hub for Windows/Mac (3)Plantronics Manager Pro (3)Plantronics Manager (3)System Requirements –Plantronics Hub (3)Permissions (3)Windows Hardware Requirements (4)CPU (4)Memory (4)Hard drive (4)Mac OS Supported Platforms (4)Bandwidth Requirements (4)Software Prerequisites (4)Operating Systems (4)Supported (4)Plantronics Hub for Android and iOS Support (5)Virtualized Environments (VDI) (5)Browser (5)Network Requirements (5)Ports & Protocols (5)Softphone and Media Player Compatibility (5)Media Players (6)Supported devices (6)Supported Languages (8)Upgrading from Previous Releases (8)New Installations of Plantronics Hub for Windows (9)New Installations of Plantronics Hub for Mac (10)Uninstalling Plantronics Hub for Windows (10)Possible Files Remaining on System When Using the Plantronics Hub exe (10)Possible Files Remaining on System When Using the Plantronics Hub MSI’s (10)Plantronics Created Registry Entry (11)Uninstalling Plantronics Hub for Mac (11)Possible Files Remaining on System Following an Uninstall (11)Possible Files Remaining on System When Plantronics Hub for Mac I s Cancelled (12)Overview of Plantronics Enterprise softwarePlantronics Hub for Windows/MacPlantronics Hub is a stand-alone application providing call control, settings management, device firmware update capabilities as well as battery level and mute alerts notifications. Plantronics Hub connects to the cloud-based Plantronics Manager Pro or to a local network share for its IT-directed settings. On an IT-defined schedule, Plantronics Hub will connect to Plantronics Manager, Plantronics Manager Pro or the local network share and download any changes since the last poll. Users have the ability to change non-IT locked settings even when offline.Plantronics Manager ProPlantronics Manager Pro is a multi-tenant application hosted by Amazon Web Services. IT uses Plantronics Manager Pro to configure device and software settings, manage/deploy updates, and gain insights into their environment via available report suites. The enterprise does not have to use Plantronics Manager Pro for users to have all the benefits of Plantronics Hub. If Plantronics Manager Pro is not used by the enterprise, Plantronics Hub will connect to the Plantronics consumer tenant for updates. In this case, Plantronics will notify the end user of software and firmware updates directly and the end user will manage their own configuration.Plantronics ManagerPlantronics Manager is a multi-tenant application hosted by Amazon Web Services. IT uses Plantronics Manager to configure device and software settings and manage/deploy updates. Configuration changes and updates created in Plantronics Manager are saved to an IT defined network shar e within the company’s network. Plantronics Hub connects to this network share on an IT defined schedule to retrieve updates. Plantronics Hub does not traverse the company’s firewall and does not connect to the cloud.System Requirements –Plantronics HubPermissionsAdministrative rights are required for the initial installation of this application. Updates to Plantronics Hub leverage the “Plantronics Update Service” process allowing subsequent in-place updates to complete even if the logged in user does not have administrative rights.Windows Hardware RequirementsCPUCore 2 Duo or Athlon X2 at 2.4 GHzMemoryAbout 160 Mb of Private Working SetHard driveRequires approximately 200 MbMac OS Supported PlatformsMacBook ProMacBook Air iMacMac Mini MacProBandwidth RequirementsThe bandwidth requirements vary based upon the type of update that is being downloaded from Plantronics Manager/Pro. Settings updates and softphone plugin updates are extremely small in file size. A Plantronics Hub update is larger and consumes more bandwidth than settings updates. Plantronics Hub updates do not have to be deployed from Plantronics Manager/Pro. They can be deployed from a local network server or through typical deployment tools such as Tivoli, SCCM etc. Depending on the entitlements purchased, Plantronics Hub for Windows/Mac may additionally send data for report population in Plantronics Manager Pro.Software PrerequisitesUninstall all previous versions of Plantronics Hub as they may be connecting to the Plantronics consumer tenant.Plantronics Hub for Windows requires Microsoft .net 4.0 and Windows Installer 4.5. Information on Windows Installer 4.5 can be found here.Plantronics Hub for Mac does not have any prerequisites.Operating SystemsSupportedWindows 7, Windows 8.x (Desktop Mode), Windows 10 (Desktop Mode)Mac OS versions Catalina (10.15), Big Sur (11.1) and Monterey (12.5.1)Plantronics Hub for Android and iOS SupportClick here for Plantronics Hub for Android and iOS requirements .Virtualized Environments (VDI)Plantronics Hub now supports certain VDI configurations. For example:•Microsoft Skype for Business running Windows operating system and in Citrix XenDesktop and XenApp environments•Certain versions of Cisco Jabber VXME running on Windows operating system and in Citrix XenDesktop environment•Certain models of HP and Dell Wyse thin terminals as well as normal PCs/laptops re- purposed for VDI•Support is available regardless of Plantronics Hub being installed or n otFor further information on VDI support please contact Plantronics by visitinghttps:///content/dam/www/products/services/cloud/plantronics-manager-pro/doc/support-for-vdi-en.pdf .BrowserPlantronics Hub does not have any dependencies on the browser and therefore has no browserrequirements.Network RequirementsPorts & ProtocolsPlease review Plantronics Manager or Plantronics Manager Pro User Guide for networkrequirements. User guides are available on https:///us/en/support/enterprise-software .Softphone and Media Player CompatibilityPlantronics Hub for Windows•Avaya Aura Agent Desktop v7.0 31.1.13.69•Avaya Communicator V.2.1.4.84•Avaya Communicator for Microsoft Lync v6.4.0.9•Avaya Equinox v3.5.5.113.24•Avaya one-X Communicator R6.2 SP13 (6.2.13.2)•Avaya one-X Agent v2.5.12.0•Avaya IX Workplace•BroadSoft Communicator v22.3.1.193•Cisco Webex v41.11•Cisco IP Communicator V.8.6.6•Cisco Jabber 11.9.3, 12.5 (32-bit and 64-bit)•Cisco Unified Personal Communicator (CUPC) V8.6.4•Genesys PureCloud 8.41.1•Genesys Workspace Desktop Edition v8.5.126.07•Genesys Workspace Web Edition v8.5.401.05•Microsoft Office Communicator R2 3.5 (3.5.6907.268)•Microsoft Lync 2015 –v15.0.5127.1000•Microsoft Skype for Business 2016 v16.4834.1000•Microsoft Teams•NEC Univerge SP350 v6.11.0.0 and V6.10.0.0•Shoretel Communicator v14.2 (Additional configuration required for the Shoretel TAPI Driver.Contact your system a dministrator)•SwyxIt! v10.40.2694 and v11.10.1.0•Zoom Meetings v4.4.6Plantronics Hub for Mac•Avaya one-X Communicator v2.0.2.3•Avaya Equinox v3.5.5.112.18•Cisco Jabber v11.9.3 and 12.5•Zoom Meetings v4.4.6Media PlayersWindows MediaiTunesSupported DevicesAPU-75APU-75DAPU-76BackBeat PROBackBeat PRO 2BackBeat SENSEBlackwire 200 SeriesBlackwire 300 SeriesBlackwire 400 SeriesBlackwire 500 SeriesBlackwire 600 seriesBlackwire 700 SeriesBlackwire 3210 SeriesBlackwire 3215 SeriesBlackwire 3220 SeriesBlackwire 3225 SeriesBlackwire 3300 SeriesBlackwire 5210 SeriesBlackwire 5220 SeriesBlackwire 7225 SeriesBlackwire 8225Calisto 600 SeriesCalisto 800 SeriesCalisto 3200 SeriesCalisto 5200 SeriesCalisto 5300 SeriesCalisto 7200Calisto 240Clarity 340 CS50/60-USB D200DA45 DA70 DA70-UC DA80 DA90 EagleEye Mini USB Camera EncorePro 500 USB Series EncorePro 700 USB Series Entera USBMDA200 Audio Switcher MDA220 USB MDA400 QD SeriesPoly Sync 20Poly Sync 40Poly Sync 60BT700Savi 400 SeriesSavi 700 SeriesSavi 7300 SeriesSavi 8200 SeriesVoyager 3200 SeriesVoyager 4200 SeriesVoyager 5200 SeriesVoyager 6200 SeriesVoyager 8200 SeriesVoyager Edge SeriesVoyager Focus UCVoyager Focus 2Voyager 4300Voyager Legend UCVoyager Pro UCSupported LanguagesEnglish – USEnglish – UK (en-GB)Finnish (fi)French – Canada (fr-CA)French (fr)German (de)Italian (it)Japanese (ja)Korean (ko)Norwegian (no)Portuguese – Brazil (pt-BR) Portuguese – Portugal (pt-PT) Spanish – Mexico (es-MX)Spanish – Spain (es-ES)Swedish (sv)Turkish (tr)Chinese – Simplified (zh-CN)Chinese – Traditional (zh-TW)Danish (da)Dutch (nl)Russian (ru)Upgrading from Previous ReleasesIf you are upgrading from Spokes 2.x, you must uninstall Spokes 2.x before installing Plantronics Hub 3.x.Upgrading from Plantronics Hub 3.x to the latest version of Plantronics Hub can be done in place. No uninstall is required.New Installations of Plantronics Hub for WindowsPlantronics Hub for Windows can be installed manually using the Plantronics Hub install file or through any deployment tools such SCCM, KACE, Tivoli etc. If you plan to make Plantronics Hub part of your system image, please be sure to read the Plantronics Manager/Pro user guide for the proper way to build your image. Updates to Plantronics Hub will be available from Plantronics Manager/Pro. IT can choose to use Plantronics Manager/Pro as the deployment mechanism for these updates or can deploy using in-house deployment tools. Please see the Plantronics Manager/Pro user guide for information on installing Plantronics Hub for Windows in an enterprise environment. In order for Plantronics Hub for Windows to connect to your enterprise tenant, you must download Plantronics Hub for Windows from within your tenant. The version found within your tenant is customized for your tenant. The generic MSI found on will cause Plantronics Hub to connect to the Plantronics consumer tenant.The Plantronics Hub application installs a Plantronics icon that is typically available in the bottom right notification area of Windows. By default, this icon will install in the overflow area. To get the full benefit of this icon (battery status, update notifications, mute alerts, etc), the default behavior will need to be modified using the steps below:--Select Start > Control Panel--In the Search dialog type Notification--Select the Customize Notification Icons link--Locate the Plantronics Software/Plantronics Hub entry and use the dropdown to select “Show icon and notifications” and select OK.Plantronics Hub also installs a desktop icon by default. To install the Plantronics Hub on a Microsoft Windows operating system without creating a desktop shortcut, use the normal method of deploying via Microsoft Installer (*.msi) with command-line p arameters.HIDEDESKTOPSHORTCUT=1Following is an example command line for installation without creating a desktop shortcut:msiexec /i PlantronicsHubInstaller_x32.msi HIDEDESKTOPSHORTCUT=1When upgrading Hub from an older version, use of this parameter in the command line installation will remove the existing shortcut from the desktop.New Installations of Plantronics Hub for MacPlantronics Hub for Mac can be installed manually using the Hub dmg file. Please see thePlantronics Manager/Pro user guide for information on installing Plantronics Hub for Mac in an enterprise environment.Uninstalling Plantronics Hub for WindowsUninstalling Plantronics Hub for Windows can be done manually from the Windows Control Panel or through group policy or any deployment tools. Device settings that were customized will remain intact as those settings are saved to the device. The uninstall of Plantronics Hub will remove the files that direct Plantronics Hub to the proper tenant. To ensure that Plantronics Hub connects to the proper tenant during a re-install, ensure the MSI was downloaded from within the tenant.Possible Files Remaining on System When Using the Plantronics Hub exeAfter cancelling an install or uninstalling Plantronics Hub for Windows using.exe, some files may remain and require manual removal. Use the following search parameters to locate the Plantronics files that can safely be removed:•OldMHUUninstaller_*.log•Plantronics_Hub_Software_*.logBelow are examples of the files that you may find on your system.EXE RemnantsPossible Files Remaining on System When Using the Plantronics Hub MSI’sAfter cancelling an install or uninstalling Plantronics Hub for Windows with 32/64 bit MSI, some files may remain and require manual removal. Below are examples of the files that you may find on your system.MSI RemnantsPlantronics Created Registry EntryPlantronics also creates a key called System ID in:HKEY_LOCAL_MACHINE\SOFTWARE\PLANTRONICSThis key is used to uniquely identify the Plantronics Hub user and is not deleted when Plantronics Hub for Windows is uninstalled. This key prevents a user from being duplicated in the Plantronics Manager Pro database if there is an uninstall and then re-install of Plantronics Hub. Removing this registry key and reinstalling Hub will cause this user to be created a second time in the Plantronics Manager Pro database and it is therefore recommended that the registry key NOT be removed by Hub users who are part of an enterprise tenant using Plantronics Manager Pro. This key in not collected for consumer tenants.For more details, please see the Plantronics Privacy Policy.https:///us/en/legal/privacy/privacy-policyUninstalling Plantronics Hub for MacDrag the Plantronics Hub icon from the Applications folder to the trash.Possible Files Remaining on System Following an UninstallAdditional folders, sub-folders and files may require manual removal. Navigate to thefollowing location to remove them:Possible Files Remaining on System When Plantronics Hub for Mac Is Cancelled Cancelling during an installation of Plantronics Hub for Mac may leave the “Plantronics Software” disk image still mounted.Manually eject the Plantronics Software disk image by dragging it to the trash.。
华为SecoManager安全控制器产品介绍说明书

Huawei SecoManager Security ControllerIn the face of differentiated tenant services and frequent service changes, how to implementautomatic analysis, visualization, and management of security services, security policy optimization,and compliance analysis are issues that require immediate attention. Conventional O&M relies onmanual management and configuration of security services and is therefore inefficient. Securitypolicy compliance check requires dedicated personnel for analysis. Therefore, the approval is usuallynot timely enough, and risky policies may be omitted. The impact of security policy delivery onservices is unpredictable. That is, the impact of policies on user services cannot be evaluated beforepolicy deployment. In addition, as the number of security policies continuously increases, it becomesdifficult for security O&M personnel to focus on key risky policies. The industry is in urgent needof intelligent and automated security policy management across the entire lifecycle of securitypolicies to help users quickly and efficiently complete policy changes and ensure policy deliverysecurity and accuracy, thereby effectively improving O&M efficiency and reducing O&M costs.The SecoManager Security Controller is a unified security controller provided by Huawei for differentscenarios such as DCs, campus networks, Branch. It provides security service orchestration andunified policy management, supports service-based and visualized security functions, and forms aproactive network-wide security protection system together with network devices, security devices,and Big Data intelligent analysis system for comprehensive threat detection, analysis, and response.Product AppearancesProduct HighlightsMulti-dimensional and automatic policy orchestration, security service deployment within minutes• Application mutual access mapping and application-based policy management: Policymanagement transitions from the IP address-based perspective to the application mutual access relationship-based perspective. Mutual-access relationships of applications on the network are abstracted with applications at the core to visualize your application services so that you can gain full visibility into the services, effectively reducing the number of security policies. The model-based application policy model aims to reduce your configuration workload and simplify network-wide policy management.• Policy management based on service partitions: Policy management transitions from thesecurity zone-based perspective to the service partition-based perspective. Conventional network zones are divided into security zones, such as the Trust, Untrust, DMZ, and Local zones. In a scenario with a large number of security devices and a large network scale, factors of security zone, device, policy, service rollout, and service change are intertwined, making it difficult to visualize services and to effectively guide the design of security policies. However, if security policies are managed, controlled, and maintained from the perspective of service partitions, users need to pay attention only to service partitions and security services but not the mapping among security zones, devices, and services, which effectively reduces the complexity of security policy design.Service partition-based FW1untrusttrustDMZ XXX FW2untrust trustDMZ XXX FW3untrust trust DMZ XXX InternetGuest partition R&D partition Data storage partitionExternal service partition Internal service partition• Management scope of devices and policies defined by protected network segments to facilitate policy orchestration: A protected network segment is a basic model of security service orchestration and can be considered as a range of user network segments protected by a firewall.It can be configured manually or through network topology learning. The SecoManager Security Controller detects the mapping between a user service IP address and a firewall. During automatic policy orchestration, the SecoManager Security Controller automatically finds the firewall that carries a policy based on the source and destination addresses of the policy.• Automatic security service deployment: Diversified security services bring security assurance for data center operations. Technologies such as protected network segment, automatic policy orchestration, and automatic traffic diversion based on service function chains (SFCs) enable differentiated tenant security policies. Policies can be automatically tiered, split, and combined so that you can gain visibility into policies.Intelligent policy O&M to reduce O&M costs by 80%• Policy compliance check: Security policy compliance check needs to be confirmed by the security approval owner. The average number of policies to be approved per day ranges from several to hundreds. Because the tool does not support all rules, the policies need to be manually analyzed one by one, resulting in a heavy approval workload and requiring a dedicated owner to spend hours in doing so. The SecoManager Security Controller supports defining whitelists, risk rules, and hybrid rules for compliance check. After a policy is submitted to the SecoManager Security Controller, the SecoManager Security Controller checks the policy based on the defined check rules and reports the check result and security level to the security approval owner in a timely manner.In this way, low-risk policies can be automatically approved, and the security approval owner needs to pay attention only to non-compliant policy items, improving the approval efficiency and avoiding the issues that the approval is not timely and that a risky policy is omitted.• Policy simulation: Based on the learning result of service mutual access relationships, the policies to be deployed are compared, and their deployment is simulated to assess the impact of the deployment, effectively reducing the risks brought by policy deployment to services.• Redundant policy deletion: After a policy is deployed, redundancy analysis and hit analysis are performed for policies on the entire network, and the policy tuning algorithm is used, deleting redundant policies and helping you focus on policies closely relevant to services.Network collaboration and security association for closed-loop threat handling within minutes • Collaboration with network for threat handling: In a conventional data center, application deployment often takes a long time. The application service team relies on the network team to deploy the network; the network team needs to understand the requirements of the application service team to deploy a network that is suitable for the application service team. The SecoManager Security Controller learns mappings between service policies and security policies based on the network topology, and collaborates with the data center SDN management and control system (IMaster NCE-Fabric) or campus SDN management and control system to divert tenant traffic to corresponding security devices based on SFCs on demand. The SecoManager Security Controller automatically synchronizes information about the tenants, VPCs, network topology (including logical routers, logical switches, logical firewalls, and subnets), EPGs, and SFCs from the SDN management and control system and combines the learned application service mutual access relationships to automatically orchestrate and deliver security policies, implementing security-network synergy.• Collaboration with security: Advanced persistent threats (APTs) threaten national infrastructure of the finance, energy, government, and other sectors. Attackers exploit 0-day vulnerabilities, use advanced evasion techniques, combine multiple attack means such as worm and ransomware, and may remain latent for a long period of time before they actually initiate attacks. The Big Data security product HiSec Insight can effectively identify unknown threats based on network behavior analysis and correlation analysis technologies. The threat handling method, namely isolation or blocking, is determined based on the threat severity. For north-south threats, the SecoManager Security Controller delivers quintuple blocking policies to security devices. For east-west threats, isolation requests are delivered to the network SDN management and control system to control switches or routers to isolate threatened hosts.Product Deployment• Independent deployment: The SecoManager Security Controller is deployed on a server or VM as independent software.• Integrated deployment: The SecoManager Security Controller and SDN management and control system are deployed on the same physical server and same VM.Database• Collaboration with the SDN management and control system to detect network topology changes and implement tenant-based automatic security service deployment.• North-south threat blocking, east-west threat isolation, and refined SDN network security control through SFC-based traffic diversion.• Interworking with the cloud platform to automatically convert service policies to security policies. Product SpecificationsOrdering InformationNote: This product ordering list is for reference only. For product subscription, please consult Huawei representatives. GENERAL DISCLAIMERThe information in this document may contain predictive statement including, without limitation, statements regarding the future financial and operating results, future product portfolios, new technologies, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.Copyright © 2020 HUAWEI TECHNOLOGIES CO., LTD. All Rights Reserved.。
Autodesk Navisworks 2013 Service Pack 1 用户手册说明书

ReadmeAutodesk Navisworks 2013 Service Pack 1June 2012©2012 Autodesk, Inc. All Rights Reserved. Except as otherwise permitted by Autodesk, Inc., this publication, or parts thereof, may not be reproduced in any form, by any method, for any purpose.Certain materials included in this publication are reprinted with the permission of the copyright holder.TrademarksThe following are registered trademarks or trademarks of Autodesk, Inc., and/or its subsidiaries and/or affiliates in the USA and other countries: 123D, 3ds Max, Algor, Alias, Alias (swirl design/logo), AliasStudio, ATC, AUGI, AutoCAD, AutoCAD Learning Assistance, AutoCAD LT, AutoCAD Simulator, AutoCAD SQL Extension, AutoCAD SQL Interface, Autodesk, Autodesk Homestyler, Autodesk Intent, Autodesk Inventor, Autodesk MapGuide, Autodesk Streamline, AutoLISP, AutoSketch, AutoSnap, AutoTrack, Backburner, Backdraft, Beast, Beast (design/logo) Built with O bjectARX (design/logo), Burn, Buzzsaw, CAiCE, CFdesign, Civil 3D, Cleaner, Cleaner Central, ClearScale, Colour Warper, Combustion, Communication Specification, Constructware, Content Explorer, Creative Bridge, Dancing Baby (image), DesignCenter, Design Doctor, Designer's Toolkit, DesignKids, DesignProf, DesignServer, DesignStudio, Design Web Format, Discreet, DWF, DWG, DWG (design/logo), DWG Extreme, DWG TrueConvert, DWG TrueView, DWFX, DXF, Ecotect, Evolver, Exposure, Extending the Design Team, Face Robot, FBX, Fempro, Fire, Flame, Flare, Flint, FMDesktop, Freewheel, GDX Driver, Green Building Studio, Heads-up Design, Heidi, Homestyler, HumanIK, IDEA Server, i-drop, Illuminate Labs AB (design/logo), ImageModeler, iMOUT, Incinerator, Inferno, Instructables, Instructables (stylized robot design/logo),Inventor, Inventor LT, Kynapse, Kynogon, LandXplorer, LiquidLight, LiquidLight (design/logo), Lustre, MatchMover, Maya, Mechanical Desktop, Moldflow, Moldflow Plastics Advisers, Moldflow Plastics Insight, Moldflow Plastics Xpert, Moondust, MotionBuilder, Movimento, MPA, MPA (design/logo), MPI, MPI (design/logo), MPX, MPX (design/logo), Mudbox, Multi-Master Editing, Navisworks, ObjectARX, ObjectDBX, Opticore, Pipeplus, Pixlr, Pixlr-o-matic, PolarSnap, PortfolioWall, Powered with Autodesk Technology, Productstream, ProMaterials, RasterDWG, RealDWG, Real-time Roto, Recognize, Render Queue, Retimer, Reveal, Revit, RiverCAD, Robot, Scaleform, Scaleform GFx, Showcase, Show Me, ShowMotion, SketchBook, Smoke, Softimage, Softimage|XSI (design/logo), Sparks, SteeringWheels, Stitcher, Stone, StormNET, Tinkerbox, ToolClip, Topobase, Toxik, TrustedDWG, U-Vis, ViewCube, Visual, Visual LISP, Voice Reality, Volo, Vtour, WaterNetworks, Wire, Wiretap, WiretapCentral, XSI. Lightworks, the Lightworks logo, LWA and LWA-Enabled are registered trademarks of Lightwork Design Ltd. The LWA-Enabled logo, Interactive Image Regeneration, IIR, A-Cubed, Feature-Following Anti-Aliasing and FFAA are all trademarks of Lightwork Design Ltd. All other trademarks, images and logos remain the property of their respective owners. Copyright of Lightwork Design Ltd. 1990-2007, 2008-2012.This software is based in part on the work of the Independent JPEG Group.DisclaimerTHIS PUBLICATION AND THE INFORMATION CONTAINED HEREIN IS MADE AVAILABLE BY AUTODESK, INC. "AS IS." AUTODESK, INC. DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE REGARDING THESE MATERIALS.This Help file was last updated on 15 June 2012.ContentsChapter 1Autodesk Navisworks 2013 Service Pack 1 . . . . . . . . . . . . . 1 Installation Information . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Installation Information . . . . . . . . . . . . . . . . . . . . . . . 2Installation Information . . . . . . . . . . . . . . . . . . . . . . . 3Installation Information . . . . . . . . . . . . . . . . . . . . . . . 3Installation Information . . . . . . . . . . . . . . . . . . . . . . . 4 Service Pack Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4Exporter Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6iii1 Autodesk Navisworks2013 Service Pack 1Thank you for downloading Autodesk Navisworks 2013 Service Pack 1. This readme contains the latest information regarding the installation and use of this service pack. It is strongly recommended that you read this entire document before you apply this service pack to your product. For reference, you should save this document to your hard drive or print a copy.NOTE Autodesk Navisworks 2013 Service Pack 1 is comprised of two parts, the service pack and the exporters update. These two parts are installed independently of each other. Install the exporters update to implement Autodesk Navisworks 2013 Service Pack 1 exporters functionality.Installation InformationWho Should Install This Service PackYou can apply the appropriate service pack to the following Autodesk productsrunning on all supported operating systems and languages.■Autodesk Navisworks Freedom 2013■Autodesk Navisworks Manage 2013■Autodesk Navisworks Simulate 2013NOTE Standard Windows Installer command line switches can be used to configurehow the service patch is installed.1Supported Operating SystemsYou can use this service pack with the following operating systems.■32-bit:Microsoft® Windows® 7 Ultimate, Microsoft® Windows® 7 Professional,Microsoft® Windows® 7 Home Premium, Microsoft® Windows® 7 HomeBasic, Microsoft® Windows Vista® Enterprise service pack 2 (SP2) or later,Microsoft® Windows Vista® Ultimate service pack 2 (SP2) or later,Microsoft® Windows Vista® Home Premium service pack 2 (SP2) or later,Microsoft® Windows Vista® Home Basic service pack 2 (SP2) or later,Microsoft® Windows® XP Professional service pack 3 (SP3) or later,Microsoft® Windows® XP Home service pack 3 (SP3) or later.■64-bit:Microsoft® Windows® 7 Ultimate, Microsoft® Windows® 7 Professional,Microsoft® Windows® 7 Home Premium, Microsoft® Windows® 7 HomeBasic, Microsoft® Windows Vista® Enterprise service pack 2 (SP2) or later,Microsoft® Windows Vista® Ultimate service pack 2 (SP2) or later,Microsoft® Windows Vista® Home Premium service pack 2 (SP2) or later,Microsoft® Windows Vista® Home Basic service pack 2 (SP2) or later,Microsoft® Windows® XP Professional service pack 2 (SP2) or later.Installation InformationTo install this service pack on an individual computer with AutodeskNavisworks2013 products installed1Download the service pack for the appropriate product and save it to any folder.2Find the folder where you saved it and double-click the appropriate file:■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Freedom_32bit.msp■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Freedom_64bit.msp■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Simulate_32bit.msp■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Simulate_64bit.msp■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Manage_32bit.msp■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Manage_64bit.msp 2 | Chapter 1 Autodesk Navisworks 2013 Service Pack 1Installation InformationTo install this service pack on an individual computer when installing an Autodesk Navisworks2013 product1Download the service pack for the appropriate product and save it to any folder.2Install the product as detailed in the Autodesk Navisworks Installation Guide.3On the Configure Installation page, select the products to install. 4Click the product name to open the configuration panel.5Select Include Service Pack(s) from local drive of network.6Click Add.7Find the folder where you saved the service pack and double-click the appropriate file:■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Freedom_32bit.msp ■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Freedom_64bit.msp ■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Simulate_32bit.msp ■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Simulate_64bit.msp ■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Manage_32bit.msp ■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Manage_64bit.msp 8Click the product name to close the configuration panel and continue with the standard product installation procedure.NOTE You can include service packs for as many products as required on the Configure Installation page.Installation InformationTo install this service pack when creating an Autodesk Navisworks2013 deployment1Download the service pack for the appropriate product and save it to any folder.2Create a deployment as detailed in the Autodesk Navisworks Installation Guide.Installation Information | 33On the Configure Installation page, select the products to deploy.4Click the product name to open the configuration panel.5Select Include Service Pack(s) from local drive of network.6Click Add.7Find the folder where you saved the service pack and double-click the appropriate file:■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Freedom_32bit.msp■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Freedom_64bit.msp■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Simulate_32bit.msp■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Simulate_64bit.msp■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Manage_32bit.msp■Autodesk_Navisworks_2013_Service_Pack_1_Multilingual_Manage_64bit.msp8Select to Append or Merge the service pack(s).■Append - the service pack can be uninstalled if required(recommended)■Merge - the service pack cannot be uninstalled9Click the product name to close the configuration panel and continue with the standard product installation procedure.NOTE You can include service packs for as many products as required onthe Configure Installation page.Installation InformationTo install the exporters update on an individual computer1Download the exporters update and save it to any folder.2Find the folder where you saved it and double-click the executable file Autodesk_Navisworks_Exporters_2013_Multilingual_Win.exe.Service Pack UpdatesThis service pack fixes the defects in the following sections:4 | Chapter 1 Autodesk Navisworks 2013 Service Pack 1Core Functionality■Multiple issues around refreshing files inside the scene.■An issue where saving a file can sometimes cause Navisworks to run out of memory.Search and Selection Sets■Multi-selection of search sets now updates the current search in the Find Items window if the search sets are compatible, for example if they have the same selection to search, same search options.■ A product crash on newly selecting a set after deleting a set without the focus being in the Sets window.■An intermittent product crash on exit after dragging shift-selected sets.■Right-clicking on a set whilst renaming it now displays the Cut/Copy/Paste context menu.■Visual feedback for drag and drop in the Sets window has been improved around dragging into empty canvas space in the window.■After a set has been created by drag and drop then renamed, the set now remains selected.■It is now possible to select part of a set's name whilst renaming it and is not misconstrued as dragging the set.■It is now possible to rename a set after several renames have taken place.■Selecting an empty folder in the Selection TreeSets tab will now also select the folder in the Sets window.Clash Detective■Various application crashes that occurred when manipulating results with filters applied.■Merging clash tests created duplicate tests that weren't identified as duplicates.■Re-running a clash test with a clash selected in the Results tab and Hide Other selected in Display Settings panel caused results to be marked as resolved.■Application crash when opening a 2012 NWD file containing clash tests with no geometry selected.Service Pack Updates | 5■In the Results tab, clash groups no longer expand erroneously when unrelated actions are performed.■If the value in the Tolerance field in the Select tab was edited, it would return to the previous value when the focus moved to change the selectionin the Selection A or Selection B panes.■Application crash if AutoSave ran while the machine was locked, on screen-saver, or entering hibernation.Interoperability■Faro files can now be loaded in the same orientation as AutoCAD based application files.■CADWorx 2013 display properties are now consistent with CADWorx 2012 and previous versions.TimeLiner■Application crash when trying to open an MS Project data source using characters other than '.' (Period) for decimal points.■Application crash when moving from the Task or Simulate tabs in to any of the other tabs, due to issues with some character sets and DPIsettings.■In the Tasks tab, selecting Unattached / Uncontained Items from the Find Items dropdown menu was not returning results.Interface■Zoom All now shows the full extent of model.Exporter UpdatesThis exporter update fixes the defects in the following sections:File Output■In the Revit page of the Options Editor, when Convert Construction Parts was selected, parts were exported but no parent node was created.■Exported models in KMZ format were not visible in Google Earth.6 | Chapter 1 Autodesk Navisworks 2013 Service Pack 1。
现在我在写我的英语作文

现在我在写我的英语作文Now I am Writing My English EssayAs I sit down to write this essay, I can't help but feel a sense of anticipation and excitement. The task of composing a lengthy piece of writing in a language that is not my native tongue can be daunting, but it also presents an opportunity for growth and self-discovery. After all, the process of crafting an essay in English forces me to delve deeper into my own thoughts and experiences, and to find the right words to convey them effectively.In many ways, this essay represents a journey – a journey of self-expression, of exploration, and of pushing the boundaries of my linguistic abilities. It's a chance for me to not only demonstrate my proficiency in English, but also to explore the nuances and complexities of the language, to experiment with different styles and structures, and to ultimately, to share a piece of myself with the reader.As I begin to write, I find myself reflecting on the reasons why Ichose to undertake this task in the first place. Perhaps it's a desire to challenge myself, to prove that I can rise to the occasion and produce a well-crafted, engaging piece of writing. Or maybe it's a yearning to connect with a wider audience, to share my unique perspective and experiences with those who may not share my native language or cultural background.Whatever the motivation, I know that the process of writing this essay will be a transformative one. With each word, each sentence, each paragraph, I will be pushing the boundaries of my own comfort zone, stretching my linguistic muscles, and honing my ability to communicate effectively in a language that, at times, can feel foreign and unfamiliar.As I delve into the actual writing process, I find myself grappling with a range of emotions. There's a sense of trepidation, as I worry about whether I will be able to convey my ideas clearly and coherently. There's also a feeling of excitement, as I discover new ways to express myself and experiment with different rhetorical techniques.One of the most challenging aspects of writing this essay, I've found, is the need to constantly monitor and refine my use of English grammar, vocabulary, and syntax. It's not enough to simply have a general understanding of the language – I must also be able to deploy it with precision and nuance, to ensure that my writing is notonly grammatically correct, but also engaging, eloquent, and true to my own unique voice and style.To this end, I've found myself constantly referring to dictionaries, thesauruses, and other language resources, as I strive to find the perfect word or phrase to convey my thoughts and feelings. It's a meticulous and time-consuming process, but one that I find deeply rewarding, as I gradually build up my vocabulary and hone my command of the English language.As I continue to write, I'm also keenly aware of the need to structure my essay in a way that is both logical and engaging. I must carefully organize my ideas, ensuring that they flow seamlessly from one to the next, and that the overall narrative arc of the essay is clear and compelling.This, too, is a challenge that I relish, as I experiment with different organizational strategies and rhetorical techniques. Perhaps I'll choose to structure my essay around a series of personal anecdotes, weaving them together to create a cohesive and compelling narrative. Or maybe I'll opt for a more analytical approach, using a combination of research, critical analysis, and personal reflection to explore a particular theme or idea.Whatever approach I ultimately decide to take, I know that theprocess of writing this essay will be a transformative one – not just for the reader, but for myself as well. With each word I write, I'll be pushing the boundaries of my own linguistic abilities, and discovering new ways to express the depth and complexity of my thoughts and experiences.And as I near the end of this writing journey, I can't help but feel a sense of pride and accomplishment. After all, the act of composing a lengthy, well-crafted essay in a language that is not my native tongue is no small feat. It's a testament to my dedication, my perseverance, and my unwavering commitment to continuous learning and self-improvement.But beyond that, I also feel a deep sense of connection – not just to the language itself, but to the broader community of English speakers and writers around the world. By engaging with this language, by grappling with its nuances and complexities, I am forging new connections, opening up new avenues of communication and understanding.And who knows what the future may hold? Perhaps this essay will be the first of many, as I continue to explore the rich and vibrant world of English writing. Perhaps it will open up new doors, new opportunities, and new ways of seeing the world. Whatever the casemay be, I know that the journey of writing this essay has been a truly transformative one – and I can't wait to see where it leads me next.。
les AS gR学生手册英文

Deploying with Oracle JDeveloper
To deploy an application with JDeveloper, perform the following steps: 1. Create the deployment profile. 2. Configure the deployment profile. 3. Create an application server connection to the target
第十六页,共33页,
Planning the Deployment Process
The deployment process includes:
1. Packaging code as J2EE applications or modules
2. Selecting a parent application
including those in a cluster
第十页,共33页,
Deploying with admin_client.jar
The admin_client.jar tool: • Is a command-line utility • Is executed by using the following basic command:
– defaultDataSource to select the data source used by the application for management of data by EJB entities
– dataSourcesPath to specify a application-specific data sources
Customer-Relationship-Manageme

e-Business Application Architecture
Supply Chain Mgmt
Selling Chain Mgmt
Customer Database
Data Mining
Cross-selling Better Target Marketing Market Research
Increased ARPU Cost reductions More targeted communications New customer insights Early warning system
Source: Dowling (2002)
The Eight Building Blocks of CRM
8. CRM Metrics
3. Valued Customer
Experience
4. Organizational
Collaboration
1. CRM Vision
2. CRM Strategy
5. CRM Processes
7. CRM Technology
6. CRM Information
Consistency across channels Employee empowerment and compensation Employee skills/training Cross-functional roles Involvement of partners Minimal transfers Link to value proposition
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1 The Case for Service Provider Deployment of Super-Peers in Peer-to-Peer NetworksSumeet Singh,Sriram Ramabhadran,Florin Baboescu,and Alex C.SnoerenUniversity of California,San Diego{susingh,sriram,baboescu,snoeren}@Abstract—Peer-to-peer systems have recently intro-duced the notion of super-peers to improve search per-formance.While the benefit to end users is clear,it is not immediately evident who,if anyone,would be motivated to act as a super-peer.On the face of it,super-peers bear a much larger traffic burden than normal peers and receive negligible improvement in search performance when compared to any of the nodes they serve.In this paper we present incentives for several actors to deploy super-peers and propose a novel technical mechanism,topic-based search optimization,to increase the effectiveness of super-peers.By caching meta data—as opposed to content—at super-peers,topic-based search optimization has the potential to significantly improve the perceived search performance of a super-peer’s clients with very modest storage and communication overhead at the super-peer itself.I.I NTRODUCTIONUnstructured peer-to-peer networks like Gnutella and KaZaA are characterized by the absence of specific mechanisms for enforcing a particular network topology orfile placement.As a result,search proceeds byflood-ing queries to all nodes within a certain search horizon. Researchers have recently proposed extensions to the flooding mechanism,such as expanding ring search and random walks,that can improve search performance[1]. Unfortunately,these extensions require modifications to both the software and the protocols used at every node in the network.In contrast,systems like KaZaA and more recent versions of Gnutella improve both the efficiency and effectiveness of the search process by introducing a notion of network structure,elevating certain well-provisioned nodes to the role of super-peers.Super-peers serve as network hubs that indexfiles belonging to other nodes.While super-peers have proven effective in improving search performance,serving as a super-peer can incur significant communication costs for an individual node. Further,these communication costs grow with the num-ber of client nodes a super-peer supports.Sadly,the ef-fectiveness of super-peer-based searching is also directly tied to the out-degree of the super-peer.Hence,a tension exists:the more neighbors a super-peer has,the more effective it is in improving search performance for itself and its adjacent nodes but the greater the communication costs for the node serving as the super-peer.Since an individual peer-to-peer node can get similar performance by joining an existing,well-connected super-peer,rather than becoming a super-peer itself,it has no incentive to become a super-peer.We observe,however,that several entities external to the peer-to-peer network,such as Internet Service Providers(ISPs)and content distributors or publishers, can leverage the unique capabilities of super-peers to affect their business goals.By enforcing policy at super-peers,service providers can transparently influence in-dividual node behavior without the explicit knowledge or consent of the user.Unfortunately for the service providers,users(and their client software)are free to connect to the super-peer(s)of their choice.Hence,it is in the service providers’interest to provide an enhanced user experience to keep clients connected to their super-peer(s).If harnessed effectively,this confluence of in-centives might result in externally sponsored super-peers that simultaneously improve users’perceived quality of peer-to-peer networks and service providers’ability to affect their business goals.In this paper,we address two separate issues.First, we present incentives for several classes of service providers to deploy super-peers in unstructured peer-to-peer networks.Second,we address the technical issue of implementing a super-peer that simultaneously provides high-quality search results,admits a low-cost implemen-tation(both in terms of communication and storage cost), and introduces a value-added service:topic-based search. Our key observation is that by caching meta data—as opposed to content—super-peers can often route queries locally(withoutflooding)but off-load content delivery to individual nodes.Further,by intelligently structuring the meta-data cache,super-peers can respond to topic-based queries,a service not currently available in most peer-to-peer networks.2II.I NCENTIVIZING SERVICE PROVIDERSWe envision that at least two broad groups of service providers,ISP’s and content distributors,could profit from deploying super-peers as an infrastructure service. This section discusses possible benefits to each group and commensurate economic incentives for them to maintain a super-peer infrastructure.A.Peer-to-peer traffic engineeringGiven the popularity of peer-to-peer applications and the large amounts of multimedia data downloaded through these applications,peer-to-peer traffic is growing to form a significant fraction of the traffic on ISP networks.Published analysis of the impact of peer-to-peer traffic on a particular ISP network concludes that “the high volume and good stability properties of peer-to-peer traffic indicates that the peer-to-peer workload is a good candidate for application-specific layer three traffic engineering in an ISP network.”[2]Further studies show that peer-to-peer traffic engineer-ing could reap significant benefits for ISPs.In particular, Gerber et.al.analyze the current trends followed by cable-modem users of a Tier-1ISP[3]and observe that ”Peer-to-peer traffic does not show strong signs of ge-ographic locality”and that the peer-to-peer applications do not exploit topological locality.Additionally Sen and Wang observe that80%of the ASes communicate with multiple ASes,and the top1%of the ASes communicate with at least476other ASes[2].This inter-AS traffic is especially important to ISPs,as it typically affects their bottom line.Unfortunately,there are several technical issues that make it difficult to traffic engineer peer-to-peerflows at present.The high penetration of the new generation offile sharing applications that use any available port on the host as opposed to utilizing a well-known port make it quite difficult to perform any kind offlow control or policy-based forwarding forfile-sharing applications based upon staticfiltering routes[3].Given the diffi-culties in applying conventional traffic engineering ap-proaches to peer-to-peer systems,we observe that super-peers represent an ideal mechanism for application-level traffic engineering.We envisage a peer-to-peer architecture in which ISPs deploy and maintain super-peers in their network that participate1in many of the peer-to-peerfile-sharing net-works.These super-peers act as an explicit point of entry 1By participate we mean only that the super-peers implement the application-level protocol and route packets for other peers as stipulated by the protocol;our super-peers explicitly do not store or share any content.to the peer-to-peer system for individual nodes.Follow-ing existing super-peer-based protocols,all queries from these nodes are routed through the super-peer(s)they are connected to.Thus enhanced connectivity to the peer-to-peer system is provided as a service by the ISP to its users(either with or without monetary compensation, perhaps depending on the level of service provided). Since all queries are routed through its super-peers,an ISP can control which nodes these queries are forwarded to.This measure of control provides the ISP with a policy-driven framework that can maximize the eco-nomic value for the ISP with respect to neighboring ISPs. For example,one such policy could be to,whenever possible,forward a query to peers within the ISP in pref-erence to peers outside.(This policy could be considered analogous to”inverse hot potato”routing but applied to peer-to-peer traffic.)Such a policy ensures that an ISP forwards as little peer-to-peer traffic as possible to peer ASes or upstream providers.Since inter-ISP settlements are often based on traffic volumes,such a policy might minimize the economic impact of peer-to-peer traffic that isflowing upstream.Another policy could determine, given a choice of upstream ISPs,which one to forward to.If both ISPs contain peers that can satisfy the query, it might make economic sense to forward the query only to the cheaper upstream provider.Policies could also govern which peers to forward to within a single ISP’s network.A super-peer could exploit detailed knowledge of the network topology to implement some form of load balancing or quality of service(QoS).If there are multiple peers within the network that can satisfy a query,the query could be forwarded depending on factors such as congestion and latency.Not only does this result in better utilization of the ISP network,it also translates into better performance for the end user in the form of faster downloads,possibly driving customers’selection of an ISP.B.Selective content distributionThe current contentflow model in peer-to-peer sys-tems is pull-based,i.e.,users only receive content that they explicitly search for and request.We believe that a push-based model for content distribution is also desirable for peer-to-peer networks for a number of reasons.Current systems lack sophisticated meta-data-based search capabilities,which implies that users can onlyfind content of which they have a priori knowledge. It is difficult for users tofind content that is potentially interesting but of which they are not aware.When combined with user profiling techniques,the super-peer architecture enables content publishers to push content to potentially interested users.3To illustrate this,consider the following hypothetical scenario.A relatively small software publisher wishes to release a new computer game.The publisher has made demo versions of the complete game available on its website but does not have the adequatefinances to either market the game(i.e.,the publisher does not have access to popular advertising mediums),or to concurrently distribute the game to a large user base.In such a situation,the super-peer architecture could come to the aid of the publisher by providing a platform to selectively target users who search for games or a similar set of applications.The same scenario could be extended to a musician wishing to release excerpts of an upcoming album through a peer-to-peer network.The key aspect of the push-based super-peer model is that content is not pushed blindly.Instead,super-peers can provide links to the push content as part of a response to queries made for similar items.As this information is introduced transparently in the network,the clients do not need to upgrade their software or subscribe to an additional service.This type of a service is analogous to the colorful“sponsored links”section present in many search result pages returned by Google and other Web search engines.It is also reminiscent of the recommen-dation feature found on many popular web sites such as Amazon.Of course,in order to effectively target push content,super-nodes need to efficiently determine the nature of the query made by the requester;we present such a mechanism in Section III.C.End-user perspectiveAfter describing how service providers can use super-peers to manipulate the service received by client nodes in a peer-to-peer system,it is natural to ask why an end user would subscribe to the model in which a service provider provides and potentially monitors,con-trols,modifies,or even sells connectivity to a peer-to-peer network.We identify four potential reasons why a user would preferentially connect through a super-peer sponsored by a specialized service provider.•A super-peer architecture can provide improved search capabilities when compared to existing un-structured peer-to-peer networks.Flooding-based systems suffer from the fundamental drawback that it is relatively difficult tofind rare items in the system.•Service providers may attract clients by providing an enhanced level of download performance by routing queries to peers that are likely to have the best connectivity to the client.•Super-peers can provide users with novel aggre-gated views of the content available in the network,like the most popular downloaded objects,or the list of available70s music objects.•Super-peers can act as application-level bridges between different peer-to-peer protocols.By search-ing multiple peer-to-peer networks,the efficacy of individual searches could be increased.We believe that thefirst of these reasons is the most important from an end user’s perspective.The success of a peer-to-peerfile-sharing application is historically dependent on how well the search mechanism works. Hence,we believe that service providers with incentives to deploy super-peers will be motivated to provide an enhanced search service,both in terms of efficiency and functionality.III.T OPIC-BASED SEARCH OPTIMIZATION Mere participation in a peer-to-peer protocol by de-ploying a super-peer infrastructure is likely not sufficient to exert any control over client behavior.To fully realize the benefits of being able to control and manipulate the peer-to-peer protocol,it is essential for the super-peers to ensure that a large fraction of the queries are routed through the super-peer infrastructure.It follows that some incentive mechanism is required to encourage individual peers to preferentially connect through these super-peers.The previous section enumerated several benefits to the end user of using a service-provider-sponsored super-peer infrastructure.The remainder of the paper focuses on what we believe is the key incentive:improved search results.By giving end users a superior search experience,both in terms of the ability tofind what is being searched for as well as faster downloads,super-peers provide a strong incentive for end users to remain connected to them.Newer versions of some peer-to-peer applications give the end user the ability to choose to which super-peer its client software connects[3]. Alternatively,the application logic itself may make this decision by choosing peers that return better results. In either case,the superior quality and performance of searches increases the likelihood that individual peers will connect to a provider’s super-peer infrastructure in preference to other peers in the system.Super-peers therefore require specific mechanisms to improve search performance for end-user queries.Ac-cordingly,we introduce a new paradigm for query rout-ing in our super-peers,which we call topic-based search optimization.Our strategy tries to exploit the following observations:•There is likely to be significant locality in the type of content requested by individual peers,i.e.,peers4 "OBJECT TYPE"="VD""Title"="[tmd]signs.(twciso).tc.(1of2)" "Author"="TMD""Performers"="Mel Gibson""Description"="A Movie’bout some aliens" "Language"="-68EN""Category"="-76SF""Release Year"="2002""OBJECT TYPE"="AU""Title"="Call It What You Want" "Artist"="Tesla""Album"="Psychotic Supper" "Description"="""Category"="9RO""Release Year"="1991""Bitrate"="182""Length"="4:30"Fig.1.Meta information gathered from real Query Hit responses are likely to be able to respond to queries similarto queries they themselves have made in the past.•Super-peers are in a unique position to generateaggregated views of the content in the network byobserving the queries that are routed through them.Topic-based search optimization involves generating aprofile of the content currently available in the networkby categorizing it into distinct topics.The topics are cre-ated dynamically by analyzing the meta data containedin Query Response messages routed via the super-peer.Since most queries are routed through a super-peer,itis in a unique position to be able to generate this topic-based view of the content and its location in the network.Meta data associated with an object typically containsa set of key-value pairs pertinent to the type of the object.For example,in the case of an audiofile the metadata may contain one or more values in the followingfields:title,artist,album,category,release year,bit rate, length,description,and keywords.In addition to metadata the Query Response message also provides a unique signature for every item returned in the form of a SHA digest.Figure1shows meta-data information gathered fromreal Query Hit responses,and Figure2shows a viewof this information in a multi-dimensional name space.Topics can be created by considering the type of objects,the category,the artist,or any representative combinationof thefields that can be gathered from the meta data. Associated with each topic is a list of peers who arelikely to be interested in that particular topic based ontheir past query history.This list provides the super-peer with a wide selection of candidate peers whoVD AU-76FPO(pop)9RO(rock)PsychoticSupper..source1source2sourceN MelGibsonUnknownSigns Starwars Episode2UnknownType OfObjectCategoryArtistAlbumSongSHA->nameCategoryPerformer TitleUnknown TeslaFig.2.A multi-dimensional name space search structure.are likely to have related content.Topic-based search optimization improves upon two simpler potential strate-gies for improving search performance:The content itself could be cached at the super-peer,requiring large amounts of space and possibly incurring legal liability. Alternatively,the super-peer could maintain an index for each individual piece of content,rather than aggregating based on topics.We believe that,given the huge amounts of content available as well as the large number of peers we expect to connect to a single super-peer(a few thousand in our traces),these strategies are inefficient. Furthermore,we believe they might not even be neces-sary given sufficient effectiveness of topic-based search optimization.Also,unlike several previous schemes that exploit the locality of client interests,topic-based search optimization operates transparently to the end user.IV.E VALUATIONWe evaluate our proposal through trace-based simu-lation.For the purposes of data collection we imple-mented a Gnutella client based on the publicly avail-able Mutella[4]source code.When running,the client actively participates in the public Gnutella network as a super-peer.Our data-collection super-peers do not introduce any traffic into the network;they only gather the data that is being routed through them.Each super-peer allows between20and200leaf-nodes to connect to it.We have not yet compared the results of our study—which uses version0.6of the Gnutella protocol[5]—to those of a previous study using an earlier version[6]. We are interested in comparing the effectiveness of our scheme against a naive caching approach that simply stores a copy of all requested data.Figure3presents the query activity of a randomly selected two-hour period from our tracefiles.The absolute number of queries per minute is labeled QR.As a base line,we simulate the optimal caching strategy by checking the signatures50.020.040.060.080.0100.0120.0time (minutes )10100100010000100000l o g s c a l eQuery Hit RatesQR SC TCFig.3.The curve QR represents the number of queries,the curve SC represents the cache hit rate for objects matching exactly,and the curve TC represents the hit rate for the queries matching a topic of interest.contained in all Query Responses against all previously received response signatures (recall that this is a two-hour section from the middle of our trace,so the cache is already warm).Hence,the line SC represents an optimistic upper bound for the performance of proposed caching based schemes [1],[7].It is problematic to compare the performance of our scheme,as we return related search results that might not have been returned in the original network.Instead,we attempt to provide a rough estimate of the likelihood that topic-based search would return useful responses.The curve labeled TC represents the number of queries which had overlapping interest with at least one cached topic group.Although the number of queries that match this criteria is much higher than the number of queries that match the cached objects,we cannot directly com-pare the two.Recall the topic-based cache is built by aggregating the client’s query requests and responses—thus we have no way to know what they actually store.Therefore there are no guarantees that clients will find the data they are looking for in any of the peers querying for content related to the topic.The likelihood of success is tied directly to the locality of clients’interest;that is,the chance that clients actually share data related to the topics of their queries.We quantify the locality of client interest using a separate study.We wrote a second crawler based on the Gnutella protocol that connects to a large number of peers.Upon receiving a query from a neighboring peer,it extracts the first two words from the query,and creates a new query from these words and sends them to the neighbor the query had originated at.Even though this does not precisely capture the users interest topic,0.020.040.060.080.0100.0120.0time (minutes)101001000l o g s c a l eTopic Query Response RatesHosts RHostsFig.4.This graphs compares the number of neighboring hosts making queries (Hosts),to the number of these hosts (RHosts)responding with useful results when sent a query with a topic extracted from their original query.as many times the first two words signify nothing in particular,we believe they represent a crude notion of a search topic.The results of the crawler represented in Figure 4seem promising:It is clear from the figure that approximately 15%of the peers do indeed respond to the queries that we are sending to them.Combing the results of the previous two studies,we can deduce a very rough approximation of the effective-ness of topic-based search optimization.If we consider the 15%hit rate from above as representative of the response rate for peers in a given topic then we can infer from Figure 3that topic-based search optimization is likely to out perform an infinitely large cache,since 15%of the TC curve is still substantially above the SC line.Furthermore,the storage requirements are substantially less.Figure 5shows the number cached objects in our simulated cache as compared to the number of groups.Keeping in mind that the average size of each object is over 5Megabytes,it’s clear that topic-based search optimization is far more practical to implement.A major concern with our approach,and,indeed any approach that only caches pointers to peers storing data as opposed to the data itself,is that the peers will not be available when subsequent queries arrive.Figure 6attempts to quell that fear by plotting the uptime of all peers that connected to our super-peers during the duration of the trace.Note that a large number of peers remain connected for a substantial period of time.Finally,we close by observing that topic-based content organization enables super-peers to provide clients with lists of popular content in each topic.Therefore,rather than the user searching for something specific,she can browse through the content currently available in the6time100100010000100000e n t r i e sCache SizeFig.5.This graph shows a comparison between the number of active groups in the topic-groups cache (GIGC),and the expected number of files in the file cache (FIFC).time (minutes)110100100010000n u m b e r o f p e e r ssuper−peer to peer connection uptimeFig.6.The duration of peer relationships.network,categorized by topics.For example,Figure 7shows the simulated results of a query for 70s music produced by returning the results from a topic defined by an audio object type and a release year between 1970and 1979.This type of search might prove popular with end users and is not currently supported by existing peer-to-peer protocols.V.C ONCLUSIONAND RELATED WORKIn this paper,we argued that there are incentives for service providers to deploy a super-peer infrastructure.We are not alone in this observation,however.For exam-ple,Sandvine Inc.[8]is attempting to build a turn-key solution to perform tasks similar to traffic engineering for peer-to-peer networks.Unfortunately,they have not released any technical details of their system or provided case-studies that show the effectiveness of their product.In order to attract users to their super-peers,we believe service providers will need to provide an enhanced levelFig.7.A list of objects that match the filter for 70s music.of service,including an improved search mechanism.To that end,we described a novel mechanism called topic-based search that improves search performance for client nodes by caching meta data at super-peers.Exploiting locality in user interests to improve search is a promising approach that has been pursued previously [9],[10].Our approach is unique,however,in that information is collated at the super-nodes transparently to the end users.Therefore all the participating peers in the network can benefit from the optimizations without the need to upgrade the software at the client side.R EFERENCES[1]Q.Lv,P.Cao,E.Cohen,K.Li,and S.Shenker,“Search andreplication in unstructured peer-to-peer networks,”in Proc.16th Annual ACM Int’l Conference on Supercomputing ,2002.[2]S.Sen and J.Wang,“Analyzing peer-to-peer traffic across largenetworks,”in Proc.Second Annual ACM Internet Measurement Workshop ,Nov.2002,pp.137–150.[3] A.Gerber,J.Houle,H.Nguyen,M.Roughan,and S.Sen,“P2P:the gorilla in the cable,”in Proc.National Cable &Telecom-munications Association (NCTA),June 2003,(to appear).[4]“Mutella,”2003.[Online].Available: [5]“Gnutella v0.6,”2002.[Online].Available:/groups/files/Development/GnutellaProtocol-v0.6-200206draft.txt[6]M.Ripeanu,I.Foster,and A.Iamnitchi,“Mapping the Gnutellanetwork:Properties of large-scale peer-to-peer systems and implications for system design,”IEEE Internet Computing Journal ,vol.6,no.1,2002.[7] E.Cohen and S.Shenker,“Replication strategies in unstructuredpeer-to-peer networks,”in Proc.ACM SIGCOMM ,Oct.2002,pp.177–190.[8]“Sandvine.”[Online].Available:/[9] E.Cohen,A.Fiat,and H.Kaplan,“Associative search in peer-to-peer networks:Harnessing latent semantics,”in Proc.IEEE INFOCOM ,Apr.2003.[10]K.Sripanidkulchai,B.Maggs,and H.Zhang,“Enabling effi-cient content location and retrieval in peer-to-peer systems by exploiting locality in interests,”ACM Computer Communication Review ,vol.32,Jan.2002.。