Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Session Log

There are now no projects open. The text shown is from the Session Log. This log displays all informational notes and error messages for some of the activities you perform using Capture. [Pg.47]

With the Digital Age, instiuctor-led classes can now be delivered over the Web. This involves a Web hosting software service and a phone line. Students at one end of the session log onto the Web hosting software site, dial a phone number, and are connected to the instiuctor at the other end. Live, Web-based training sessions deliver the same impact as an on-site program, only the instiuctor does not have to travel to your facility. More important, if you have multiple facihties, your mployees do not have to travel, which eluninates high travel costs. [Pg.28]

The security and flexibihty of the program can be illustrated by the following account of the manner in which it is used by the analyst. On loading, the program asks the user to type his name and a password. The name is used to mark all entries for the current session in the event log, and the password estabhshes the user s access rights to the file. There are three levels of access ... [Pg.80]

Conducting the Audit A staff person should accompany the auditors at all times so that there can be immediate attention to their needs and so that immediate corrective action can be taken on items the auditors point out. It is important that all staff persons be courteous and cooperative at all times and that all documents be immediately available in the work area. Any other items the auditors request should be provided. A daily debriefing session should be held to assess the progress of the audit. It is important to maintain a log of the activities and to also maintain a file of duplicate copies of all documents given to the auditors. Any proprietary information should be protected. [Pg.76]

If you set the ProSa variable log to 1, all the instructions you type are recorded and stored in the file ProSa2003. log. This file can then be used as a template for similar analysis tasks. Simply make the necessary changes with a text editor and execute it as a batch job (see the manual for details). A special example of a command file is the pros a-startup file it is run automatically each time ProSa is started. By adapting this file you can customize your sessions and initialize ProSa with the parameters you found to be optimal for your tasks. [Pg.171]

To prepare for this lesson you should have a MOMEC session started with lel3-[Co(en)3]3+ as the input file in Setup/Files (note that the relevant file for Structure is the Input file thus, you should choose the. out file as Input for the following manipulations). Double click on the Structure option in the Execute window of MOMEC to open the Structure module. The window displayed in Fig. 17.7.1 will appear. Click on the Define button. The HyperChem window with the selected input file will open. Structure will ask you to select at least 3 atoms to define a plane. Choose the Select tool of HyperChem, and select the Co and 4 N atoms that lie in one of the three perpendicular coordination planes. Confirm your choice by clicking the OK button that appears on the Structure window. Your manipulations and results are stored in the log screen of the Structure window, and the plane function, rms shift and distances of the atoms of the plane are displayed. [Pg.226]

Consider an extension of the LKH scheme which we call the Clumped re-keying method here, r revocations are performed at a time. For a batch of r revocations, no label is changed more than once, i.e. only the latest value is transmitted and used. In this variant the number of encryptions is roughly the same as in the Complete Subtree method, but it requires log TV decryptions at the user, (as opposed to a single decryption in our framework). An additional advantage of the Complete Subtree method is the separation of the labels and the session key which has a consequence on the message length see discussion at Section 4.1. [Pg.9]

Data entry should include identification of individuals using a combination of user-lD and password at the start of the data entry session. Automatic log-off is appropriate for long absences of individuals during operator sessions. [Pg.546]

Session layer The fifth of seven layers of the International Standards Organization s Open Systems Interconnection (ISO/OSI) model for computer-to-computer communications. The Session layer coordinates communications and maintains the session for as long as it is needed, performing security, logging, and administrative functions. [Pg.860]

As a valid my server name user who is NOT listed as a S-Plus user (Section 7.2 ofOperation Qualification), open a Telnet session and log on to my server name (The password for the nmtest user may be obtained from the test coordinator). Verify the current directory is /home/ username by typing pwd. Successful login to my server name pwd command returns /home/ username where username is the tester s login name ... [Pg.80]

As a valid S-Plus user (Section 7.2 of Operation Qualification), open a Telnet session and log on to my server name. Successful login to my server name ... [Pg.80]

Authentication is usually performed by entering a unique user identification (ID) and password. If data are transferred automatically from external software, the source system either must provide a similar mechanism to identify a valid user or the external system has to log on to the record manager with a unique identifier. In any case, data that are entering a compliant-ready record manager require this identification. The authentication needs to be logged with a date and time stamp in an audit trail. The same requirement applies to the modification of data that already exist in the record, if the user is not already in an authenticated session. In fully regulated environments, a reason for the modification has to be supplied before changes can be made. [Pg.294]

To bring objectivity to what can at times seem like a subject evaluation, testers can be provided with a review checklist based on the product s user interface requirements or a set of suitable heuristics such as Neilsen s [6]. The evaluator should also be diligent in recording subjective feedback and it can be useful at the end of the session to make a point of gauging general opinion and consensus. Some studies make use of video recording or input logging systems to detect subtle errors in interaction, hesitation and recovered errors. [Pg.255]

Information Agent (lA). Each node hosts an lA that updates the GPS log by taking position samples periodically. On top of that, whenever two nodes establish Wi-Fi connection, their lAs start initiate a session in order to constantly exchange GPS logs. This method is similar as shown in SLS [12], but storing the whole GPS log instead of a single position. Collected GPS logs and all received... [Pg.132]

Node Management Agent (NA). In addition to an I A, every node hosts an NA. The NA keeps information about neighbor nodes such as IP address, GPS log and other data used for pheromone calculation. Each entry is created when the lA successfully initiates sessions with neighboring nodes, which are updated as mobile agents arrive and add new information. [Pg.133]


See other pages where Session Log is mentioned: [Pg.47]    [Pg.53]    [Pg.55]    [Pg.89]    [Pg.350]    [Pg.648]    [Pg.47]    [Pg.53]    [Pg.55]    [Pg.89]    [Pg.350]    [Pg.648]    [Pg.328]    [Pg.337]    [Pg.619]    [Pg.680]    [Pg.73]    [Pg.343]    [Pg.192]    [Pg.78]    [Pg.694]    [Pg.566]    [Pg.566]    [Pg.569]    [Pg.364]    [Pg.369]    [Pg.78]    [Pg.19]    [Pg.844]    [Pg.329]    [Pg.80]    [Pg.203]    [Pg.115]    [Pg.16]    [Pg.252]    [Pg.160]    [Pg.148]    [Pg.88]    [Pg.521]    [Pg.803]   
See also in sourсe #XX -- [ Pg.47 ]




SEARCH



Session

© 2024 chempedia.info