Cisco Unified CME 8.6 Supported Firmware, Platforms, Memory, and Voice Products. · When configuring the load command: - In Cisco Unified CME 7.0 and earlier versions, do not include the .sbin or .loads file suffix except for the Cisco ATA and Cisco Unified IP Phone 7905 and 7912. - In Cisco Unified CME 7.0(1) and later versions, use the complete filename, including the file suffix, when you configure the load command for phone firmware versions later than version 8-2-2 for all phone types. · When configuring the load command for IP phones such as the Cisco Unified IP Phone 7906G, 7911G, 7941G, 7941GE, 7961G, 7961GE, 7970G, and 7971G, configure only the filenames that are marked with an asterisk (*) in the table below. · Only SCCP phones can be configured as agent phones for Unified CCX 5.0 in Cisco Unified CME 4.2 and later versions.
The Cisco VG224 Analog Phone Gateway and analog and SIP phones are supported as usual in Cisco Unified CME, however, not as Unified CCX agent phones.
MySQL database on Linux Tutorial. The MySQL Database Installation and configuration: Red Hat / Fedora Core RPM Packages: mysql-version.rpm (Required) mysql-server-version.rpm (Required) mysqlclient9-version.rpm (Shared object libraries) mysql-devel-version.rpm (C include files and libraries for developers) php-mysql-version.rpm (For accessing MySQL database from php) Install: rpm -ivh mysql-version.rpm mysql-server-version.rpm mysqlclient9-version.rpm Check if installed: rpm -q mysql mysql-server mysqlclient9 The examples on this page used mySQL 3.23.58 which is used in Red Hat 7, 8, 9 and Fedora Core 1, 2, 3.
Also see YoLinux.com systems administration - using RPM to set GPG signatures and install RPM packages. Installing MySQL.com RPM packages: If instaling newer versions of MySQL from RPM packages obtained from MySQL.com, you must first import and register their public GPG key: ERROR: 1062 Duplicate entry 'localhost-root' for key 1ERROR: 1062 Duplicate entry 'localhost-' for key 1 Start the database: Notes: Examples: LAMP (Linux, Apache, MySQL, PHP) HOWTO: Installing MySQL and Apache with PHP support on Linux. Browning PLE Access.docx. Tryit Editor v2.3.
You also develop basic application functionality and test it against the data you entered in the sample database in lesson 1. The PHP code you write in this lesson performs the following functions: 1. Gets the name of a person that the user types in. 2. Checks whether that person is really in the database. Exits with an error message if the person is not in the database. 3. The current document is a part of the Creating a Database-Driven Application in the NetBeans IDE for PHP tutorial. Creating a PHP Project Select File > New Project (Ctrl-Shift-N on Windows and Linux, ⌘-Shift-N on MacOS).
Defining a Page Flow Diagram The scope of your application covers the following use cases: The user views the wish list of a person. Adding a Form To index.php The index.php file is used for two purposes: To add a form to index.php: Next Step. Webform. Webform is the module for making surveys in Drupal. After a submission, users may be sent an e-mail "receipt" as well as sending a notification to administrators. Results can be exported into Excel or other spreadsheet applications. Webform also provides some basic statistical review and has and extensive API for expanding its features. Some good examples could be contests, personalized contact forms, or petitions.
Each of these could have a customized form for end-users to fill out. If you need to build a lot of customized, one-off forms, Webform is a more suitable solution than creating content types and using CCK or Field module. Explanation of Webform vs. Versions 7.x-4.x: This is the most highly maintained branch. Requires PHP 5.3, CTools, and Views 3.Upgrading to Webform 7.x-4.2+. 6.x: Critical bug fixes only. Webform related projects Maintainers of Webform-related modules. Webform and you Webform is second most popular non-utility contrib module (after Views). Generatedata.com.
Download MySQL Workbench. How to set up MySQL on Amazon EC2 micro spot instance. Notes for setting up a cheap, low-cost MySQL database server on an Amazon EC2 t1.micro spot instance. This can be useful for situations where your MySQL instance does not need 100% availability, e.g. for a cheap, test MySQL server. Cheap MySQL Server Pricing At this time, the price for a spot instance is $0.006/hour, which works out to $4.32/month. Add another dollar or so for some Gigabytes of EBS storage. On the free tier, you won't even pay for the EBS storage initially. Amazon now supports Micro Instances on Amazon RDS for about $19/month. Cheap MySQL Server setup instructions # Update all packages sudo yum update # Install mysql client sudo yum install mysql # Create a data directory for MySQL (this step may not be needed, # or you may need to modify the /etc/my.cnf datadir setting # if you want to store the data somewhere else.
Now you'll be logged into MySQL as root using HeidiSQL, and you can create your databases and users from a user-friendly GUI. MySQL SSH Tunnel Notes. How to set up MySQL on Amazon EC2 micro spot instance. Step 1: Create an Application Server - Getting Started with AWS. You can use Amazon EC2 to create a virtual server to run your web app. These virtual servers are called EC2 instances. Typically, you start from a base image called an Amazon Machine Image (AMI).
To create a virtual server using Amazon EC2, complete the following tasks. Create a Security Group for Your Amazon EC2 Instance A security group acts as a firewall that controls the traffic allowed to reach one or more EC2 instances. When you launch an instance, you can assign it one or more security groups. For this tutorial, we'll create a security group and add the following rules: Allow inbound HTTP access from anywhereAllow inbound SSH traffic from your computer's public IP address so that you can connect to your instance To create and configure your security group Decide who requires access to your instance; for example, a single computer or all the computers on a network that you trust. For more information, see Security Groups in the Amazon EC2 User Guide for Linux Instances. Important. Hosting a Web App on Amazon Web Services - Getting Started with AWS. A web app is any software that users access through a web browser or specialized web client.
Web apps are typically structured into logical tiers. For example, a common structure uses three tiers. The first tier is the web browser, which is responsible for presenting the user interface. The middle tier is an application server, which is responsible for the application's functionality. This tutorial walks you through the process of hosting a scalable, robust web app on AWS infrastructure. Create a virtual server, called an EC2 instance, and use it as an application server in the cloud.Create a database server, called a DB instance.Deploy a sample web app to the application server.Set up scaling and load balancing to distribute traffic across a minimum number of application servers.Associate a domain name with your web app. Web App Hosting Architecture Before you create and deploy a web app, you must design your architecture to ensure that it meets your requirements.
Tutorial: Installing a LAMP Web Server. The following procedures help you install the Apache web server with PHP and MySQL support on your Amazon Linux instance (sometimes called a LAMP web server or LAMP stack). You can use this server to host a static website or deploy a dynamic PHP application that reads and writes information to a database. Prerequisites This tutorial assumes that you have already launched an instance with a public DNS name that is reachable from the Internet. For more information, see Step 1: Launch an Instance. You must also have configured your security group to allow SSH (port 22), HTTP (port 80), and HTTPS (port 443) connections. For more information about these prerequisites, see Setting Up with Amazon EC2. Important If you are trying to set up a LAMP web server on an Ubuntu instance, this tutorial will not work for you. To install and start the LAMP web server on Amazon Linux Apache httpd serves files that are kept in a directory called the Apache document root.
To set file permissions. SDN Hub | Software-defined Networking forum. How to set up a safe and secure Web server. Fifteen years ago, you weren't a participant in the digital age unless you had your own homepage. Even in the late 1990s, services abounded to make personal pages easy to build and deploy—the most famous is the now-defunct GeoCities, but there were many others (remember Angelfire and Tripod?). These were the days before the "social" Web, before MySpace and Facebook. Instant messaging was in its infancy and creating an online presence required no small familiarity with HTML (though automated Web design programs did exist). Things are certainly different now, but there's still a tremendous amount of value in controlling an actual honest-to-God website rather than relying solely on the social Web to provide your online presence. The flexibility of being able to set up and run anything at all, be it a wiki or a blog with a tipjar or a photo hosting site, is awesome.
The hardware You'll need some hardware, and fortunately, a personal Web server doesn't require a lot of juice. Amazon EC2 Key Pairs. Amazon EC2 uses public–key cryptography to encrypt and decrypt login information. Public–key cryptography uses a public key to encrypt a piece of data, such as a password, then the recipient uses the private key to decrypt the data. The public and private keys are known as a key pair.
To log in to your instance, you must create a key pair, specify the name of the key pair when you launch the instance, and provide the private key when you connect to the instance. Linux instances have no password, and you use a key pair to log in using SSH. Creating a Key Pair You can use Amazon EC2 to create your key pair. Alternatively, you could use a third-party tool and then import the public key to Amazon EC2. Each key pair requires a name. Amazon EC2 stores the public key only, and you store the private key. The keys that Amazon EC2 uses are 1024-bit SSH-2 RSA keys. Launching and Connecting to Your Instance Creating Your Key Pair Using Amazon EC2 To create your key pair using the console $ ssh-keygen -y.
Building Your Cloud Infrastructure: Non-Converged Data Center Configuration. Published: February 29, 2012 Updated: September 19, 2012 Applies To: Windows Server 2012 This document contains the instructions that you need to follow to create a private or public cloud configuration that uses: Separate network adapters for live migration, cluster, management, and tenant traffic Traditional SAN storage Optionally use Single Root I/O Virtualization (SR-IOV) The design pattern discussed in this document is one of three design patterns we suggest for building the core cloud compute and storage infrastructure.
The Non-Converged Data Center Configuration cloud infrastructure design pattern focuses on the following key requirements in the areas of networking, compute and storage: You have an existing investment in separate networks based on the recommended configuration of Hyper-V in Windows Server® 2008 R2 and you require that this physical network traffic segmentation be kept in place to avoid re-architecting your network. This cloud configuration consists of the following:
What's New in Failover Clustering in Windows Server. Published: June 24, 2013 Updated: July 3, 2014 Applies To: Windows Server 2012, Windows Server 2012 R2 This topic describes the Failover Clustering functionality that is new or changed in Windows Server 2012 R2. Failover clusters provide high availability and scalability to many server workloads.
These include server applications such as Microsoft Exchange Server, Hyper-V, Microsoft SQL Server, and file servers. In this topic: In Windows Server 2012 R2, Failover Clustering offers enhanced support in the following areas. The following section provides a summary of new high availability functionality for virtual machines in Windows Server 2012 R2. You can now share a virtual hard disk file (in the .vhdx file format) between multiple virtual machines. What value does this change add? In Windows Server 2012, you could deploy guest clusters using shared storage that was provided by virtual Fibre Channel or iSCSI to the guest operating system. What works differently? (Get-Cluster).DrainOnShutdown. Step-by-Step: Configure DHCP Using Policy-based Assignment.
Published: February 29, 2012 Updated: December 13, 2013 Applies To: Windows Server 2012 The Dynamic Host Configuration Protocol (DHCP) server role in Windows Server 2012 introduces a new policy based IP address assignment feature. Policy based assignment (PBA) allows an administrator to group DHCP clients by specific attributes based on fields contained in the DHCP client request packet. This feature allows for targeted administration and greater control of configuration parameters delivered to network devices. This guide provides step-by-step instructions for deploying DHCP policy based assignment in a test lab using one server computer and two client computers.
Software and hardware requirements are provided, as well as an overview of DHCP policy based assignment. With a DHCP server running Windows Server 2012, administrators can define an address assignment policy at the server level or scope level. The following fields in the DHCP client request are available when defining policies. Quality of Service (QoS) Overview. In previous versions of QoS, as with QoS in Windows Server 2012, Maximum Bandwidth is a feature that sets an absolute ceiling - a throttling rate - for a workload.
Windows Server 2012 introduces Minimum Bandwidth. Minimum Bandwidth provides a specified level of service to a workload when network congestion occurs while still permitting higher bandwidth utilization by this workload in circumstances where there is no network congestion. Network congestion occurs on a computer system when multiple workloads compete for access to an external network through one network adapter. Because the capacity of any network adapter is limited, when the sum of the workloads exceeds that capacity, the network throughput of each workload becomes nondeterministic. With Minimum Bandwidth, you can define how bandwidth is shared by competing applications. For example, you might have Storage, Live Migration, and Cluster sharing a 10 GB NIC on a computer that is running the Hyper-V server role.
InfiniBand Roadmap: IBTA - InfiniBand Trade Association. The IBTA‘s InfiniBand™ roadmap is continuously developed as a collaborative effort from the various IBTA working groups. Members of the IBTA working groups include leading enterprise IT vendors who are actively contributing to the advancement of InfiniBand. The roadmap details 1x, 4x, and 12x port widths with bandwidths reaching 300Gb/s data rate EDR this year and 600Gb/s data rate HDR in 2017. The roadmap was developed to keep the rate of performance increase in line with systems-level performance increases. For with a stake in the interconnect business, the roadmap provides a vendor-neutral outline for the progression of InfiniBand so that they may plan their product development accordingly. For enterprise and high-performance computing end users, the roadmap provides specific milestones around expected improvements to ensure their InfiniBand investment is protected. How to Enable CSV Cache - Clustering and High-Availability.
Private Cloud Principles, Concepts, and Patterns. Private Cloud Reference Model. Virtualization and private cloud | Microsoft. SP800-145.pdf. Gartner: Best practices for Amazon AWS security. Vpc-ug.pdf. Diagram your network with these tools.