Professional Documents
Culture Documents
Empower 3 Software Enterprise e PDF
Empower 3 Software Enterprise e PDF
The information in this document is subject to change without notice and should not
be construed as a commitment by Waters Corporation. Waters Corporation assumes
no responsibility for any errors that may appear in this document. This document is
believed to be complete and accurate at the time of publication. In no event shall
Waters Corporation be liable for incidental or consequential damages in connection
with, or arising from, its use.
Additional trademarks
*GPEC - registered in foreign countries ONLY
CombiChrom, CombiPrep, and CombiScreen are trademarks of YMC, Co. Ltd.
YMC is a trademark of YMC Co. Ltd.
Chapter 1: Page 10 of 37
Waters Confidential and Proprietary Information
Enterprise Architecture
A virtual machine is a tightly isolated software container that can run its own operating systems and
applications as if it were a physical computer. A virtual machine behaves exactly like a physical computer and
contains it own virtual (i.e., software-based) CPU, RAM hard disk and network interface card (NIC).
Virtualization lets you run multiple virtual machines on a single physical server, sharing the resources of
that single computer across multiple environments. (consolidation)
An operating system cant tell the difference between a virtual machine and a physical machine, nor can
applications or other computers on a network. Even the virtual machine thinks it is a real computer.
Nevertheless, a virtual machine is composed entirely of software and contains no hardware components
whatsoever. As a result, virtual machines offer a number of distinct advantages over physical hardware.
Each virtual machine contains a complete system, eliminating potential conflicts
Run Empower2, Empower build 1154 and Breeze 2 on the same computer
All have different OS versions, Oracle versions, etc.
virtual machines are incredibly portable and easy to manage
You can move and copy a virtual machine from one location to another just like any other software file,
using any standard data storage medium from a USB flash memory card to an enterprise storage area
networks (SANs).
Benefits
Reduce capitol because: Increased energy efficiency
requires less hardware - Run multiple, conflicting operating systems and applications on a single
computer
Rapid deployment and disaster recovery
Virtual images are similar to computer images but are hardware independent and can be deployed on
dis-similar computers
Require less time to deploy than a conventional installation
Validation benefits
Changes to other environments on same computer do not affect the validation of the Empower
environment
High Availability, server consolidation, scalability and reduction in capital costs
Running a single OS and single application on a server leaves that server or client underutilized
A virtual machine lets you share the resources of a single physical computer across multiple virtual
machines for maximum efficiency.
requires less hardware reduces your physical infrastructure footprint by consolidating excess server
and desktop hardware
Clusters - you dont need to assign servers, storage, or network bandwidth permanently to each
application. Instead, your hardware resources are dynamically allocated when and where theyre needed.
Auto mode (running => config icons grey): Scan lines have
individual parameters (Empower project, import filter, field
mapping, sample set policy). Directories are scanned consecutively,
New data are added to the import table and
imported according to parameters (like in manual mode).
It is possible to log out and leave the auto mode running.
Besides one common viewer for all different printed reports the
EDM technology has another key advantage. Printed data remain
live which means text, grapics and table content can be reused in a
select and send process. Tables even keep their structure which is
the first step of facilitating a data transfer process to other
systems.
SQT Productivity Kit for SDMS provides a global solution for all
instruments in the lab Empower and non Empower CDS controlled
systems.
Electronically capturing and cataloguing qualification
documentation from Empower CDS and other instruments into
SDMS, a secure compliant-ready repository
Extracts results of qualification tests, generates automatically
Qualification Summary. Review and Signoff through a web browser
The option to install Empower and Oracle Software only is not given as the
correct Oracle version is already present.
Note: If the user has Oracle present but wants to install Oracle using the Empower
installer, they need to manually delete the existing Oracle install and then launch
the Empower installer again.
Note: You must restart your system for the configuration changes
made to the Empower server to take effect.
The files in the Script and Bin folders are very critical files. They
are tested during the Verify File process to verify if their checksum
was not modified during the installation.
The result is written in the Checksum.txt file stored in the Script
directory.
1. SQLNET.AUTHENTICATION_SERVICES = (NTS)
2. SQLNET.EXPIRE_TIME = X
In Windows 7
1. Open the Network and Sharing Center > select change
adapter setting
2. Select the network card to setup > configure
3. The tab may be different base on the network card brand .
In Windows 7
1. Open the Network and Sharing Center > select change
adapter setting
2. Select the network card to setup > configure.
3. The tab may be different base on the network card brand .
Same path as for accessing the network speed, and select the
power management tab.
WARNING : The host and lmhost must not have extension. (the default
lmhosts file is lmhosts.sam is a sample file provide as example.)
Hosts file
The hosts file is one of several system facilities to assist in addressing
network nodes in a computer network. It is a common part in an operating
system's Internet Protocol (IP) implementation, and serves the function of
translating human-friendly hostnames into numeric protocol addresses,
called IP addresses, that identify and locate a host in an IP network.
In some operating systems, the hosts file content is used preferentially over
other methods, such as the Domain Name System (DNS), but many
systems implement name service switches (e.g., nsswitch.conf) to provide
customization. Unlike the DNS, the hosts file is under the direct control of
the local computer's administrator.
LMHosts file
The LMHOSTS (LAN Manager Hosts) file is used to enable domain name
resolution under Windows when other methods, e.g. WINS, fail. It is used in
conjunction with workgroups and domains. If you are looking for a simple,
general mechanism for the local specification of IP addresses for specific
hostnames (server names), use the HOSTS file, not the LMHOSTS file.
The file, if it exists, is read as the LMHOSTS setting file. A sample file
(lmhosts.sam) is provided. It contains documentation for manually
configuring the file.
After the first login in windows you may receive the following
popup.
1. Press Allow access
Automated QA is an external application use for the AVT software
(Automatic Validation Tool).
Register Printer
Register printer - allows the printer to be registered so that it
can be used by the WatersService during process and printing
automation (batch processing/printing, run and report & run
and process, AQT & SQT process)
You can enclose applications that have spaces in their name with
quotation marks e.g. psexec \\marklap "c:\long name app.exe".
Input is only passed to the remote system when you press the enter
key, and typing Ctrl-C terminates the remote process.
If you omit a user name the process will run in the context of your
account on the remote system, but will not have access to network
resources (because it is impersonating). Specify a valid user name
in the Domain\User syntax if the remote process requires access
to network resources or to run in a different account. Note that
the password is transmitted in clear text to the remote system.
Chapter 5
Administrative and
Management Tools
Overview of Empower Pro Window
Configuration Manager Administration Tools
Empower System Policies
Empower System Audit Trail
Login to Empower
Message Center
Help Menu
Configuration Manager
System policies
System monitor
Default Strings
Audit Trail
Login to:
Empower
Software
Double click
the Icon
Type in User
Name and
Password
Select
Advanced>>
button
Note: The first time that you login to Empower the password
is the same as the user name, unless the system
administrator has assigned a different password.
Type new
password (if
prompted)
Choose OK, and In the Select User Type and Interface Dialog box:
OK again and 1. Select the appropriate User Type from the drop down
the main Pro menu
window will 2. Select the appropriate interface from the Allowed
open. User Interfaces radio buttons.
You can assign individual users to more than one user type,
as some users often perform more than one job function. If,
for example, the Empower administrator is also a chemist,
you can assign them two user types: Administrator and
Chemist.
Users assigned to more than one user type can sign into the
system only as one user type at a time and perform only
those functions associated with that user type.
A users user type appears in the audit trail, message center
and in the title bar (at the top of the window).
Set the number Message Center Properties is comprised of 3 tabs that allow
of messages to configuration of global settings for Message Center.
display in the
Message Center The General tab provides the ability to set the number of
table by setting messages displayed in the Message Center table. The
Number of messages can be scrolled through by using the Next Group
Messages to and Previous Group to Display buttons.
display.
Click Next
Group or
Previous
Group to
Display buttons
to scroll through
messages.
Manually purge
a category by The Purge tab allows purging of selected Message Center
selecting and categories by selecting the appropriate category and using
clicking Purge the Purge Selected Message Logs NOW button. The Auto-
Selected Purge feature allows the ability to automatically purge any
Message Logs message older than the number of days specified.
NOW.
To automatically
purge all
categories,
select Auto-
Purge
Messages
Older Than and
specify the
number of
Days.
Six Application
buttons
Run samples
Browse Project
and Configure
system most
used
Login and
Logout buttons
are in the main
Pro window
About Empower
Select About to
view database
information
About Pro
displays your
Total
Assurance
Plan ID#
Installed
Service Packs,
and the
Installed
Options
Click Help
Help: Home
Help: Searching
When
searching for a
topic, put it in
double quotation
marks.
example:
valley to
valley
Select List
Topics to find
all related items.
Help: Glossary
Select the
Glossary tab,
choose the
Term to view its
corresponding
Definition.
Configuration Manager
Click Configure
System
Configuration
Manager
Window
System Monitor
Click OK.
Database Properties
Click to view
Change
Database
Password
Recommend:
DO NOT
CHANGE
Password
System Policies
User accounts
tab
Click F1 for Note: The help menu has extensive details for each policy
details of each
policy
Enter Domain
information in
the
Authentication
policies window
To edit domain
information,
Select LDAP
Domain
Manager and
click Edit.
To view domain
information,
select in LDAP
Domain Manager Tip: For information on domains, click Help on the
and click View. Authentication Policies page of the System Policies dialog
box.
Click F1 for
details of each
policy
New Projects
tab
Define global
Project
Policies
The New Project Policies tab defines the global setting for
new project creation. Settings can be required for all new
projects or allowed to be changed by the project creator.
System Audit
Trail Policies tab
defines audit
trail comment
configuration for
the listed
categories
Data
Processing tab
Other Policies
Other tab
Click F1 for
details of each See the help menu for details of each policy.
policy
Email Policies
Set up Email
Policies to
determine which
message
center entries
to forward to
one or more
email account(s)
Email Policies
Requirements:
Restriction: For each row in the Email Policies table, you can
only choose one message type for each category (such as
Security and Error), but you can specify multiple email
addresses for each type and category. To specify multiple
message types for a category, you must use multiple rows.
Example: John_Smith@waters.com;
Mark_Jones@waters.com
Tip: This is the server that sends outgoing email for your
company. If you are not sure, check with your IT
department. If you change one of the mail server information
settings, such as the outgoing mail server or the default
email name, you must stop and restart Waters Email
Service.
Default Strings
Add custom
Default Strings A default string is text, up to 249 alphanumeric characters,
that can be created in advance, and then selected when
prompted to provide a reason for modifying Empower
objects, such as, methods, projects, users, and so on. A set
of predefined comments can be created for each category to
describe why a change was made to an object in Empower.
Comments are often required for audit trail purposes.
Select
Category.
Click Add
String,
Modify String
or Delete
String.
Click OK.
Select System
Audit Trail in
Tree Pane.
Select Records
> System
Audit Trail >
Archive >
Binary or Text.
Note: Binary files are more secure than text files. Text files
can be easily modified and resaved with no record that the
file was altered. Be sure to save any System Audit Trail
backup in a secure location.
Select Records
> System
Audit Trail >
Archive and
Remove
Enter
Administrator
1 and
Password 1
and
Administrator
2 and
Password 2.
Click OK.
Select Binary
File or Text
File.
Enter date in
Remove all
records dated
before box.
Click OK.
Select location
to save
archived
messages.
Archived
messages saved
with
System Audit
with Date and
Time as file All System Audit Trail messages before the date listed will be
name. archived to the file type selected and all corresponding
messages will be purged from the System Audit Trail.
Click Save.
Note: Only messages archived as binary files can be
imported back into the Empower system via the Offline
System Audit Trail.
Select Offline
System Audit
Trail in Tree
Pane.
Select Records
> Offline
System Audit
Trail >
Restore
Select location
of Archive and
click Open.
View archived
messages in
Offline System
Audit Trail
table.
Select Records
> Offline
System Audit
Trail > Clear
All messages
cleared from
Offline System
Audit Trail table.
Summary
The System Audit Trail tracks information about system level changes
to the Empower system.
Review Questions
3. Where do you select the user type and interface you want to use?
A Chromatographic System
This example shows a typical LC chromatographic system. An LC
chromatographic system generally consists of a pump, an
autosampler and a detector.
If you are using Waters instrumentation, these components may
be connected to the acquisition server by IEEE cables or thru
Ethernet.
When using IEEE, the instruments are daisy-chained together
and connected to the IEEE port on the busLAC/E card in order
to allow communication between the computer and the
instrumentation.
When using Ethernet, instruments are connected to an
Ethernet switch using the RJ45 connection. This allows
communication from the computer to the switch then to the
instrumentation.
IEEE Rules
The maximum total IEEE cable length is 20 meters (refer to table).
The maximum number of IEEE devices is 15 (fourteen instruments plus
the busLAC/E card).
The maximum length between IEEE devices is 4 meters (minimum is 1
meter).
Identify all attached IEEE devices with unique addresses (from 2
through 29). This is configured either through the front keypad of most
equipment or through a series of DIP switches on the back of the
instrument depending on the instrument model.
Make sure that the devices firmware meets the minimum firmware
required.
Keep data rates for devices within the specified data rates allowed
depending on the type of systems connected.
Power up all of the instruments and verify that they have completed
and passed their calibration and diagnostic routines.
Note: Refer to the Empower 3 Software System Installation and
Configuration Guide and the Empower 3 System Release Notes for the
system configurations supported.
General tab
In this tab you can change the system comments
On line or off line can also be changed from this window, to
take the system off line, uncheck the Online box
Note: this can also be done from the right click menu when the
system was highlighted in configuration manager
Configuration tab
In this tab you can change the components assigned to this
system
Note: ONLY change this when the system is not in use. This will
affect all instrument methods created for this system.
Access tab
As described during the system creation, this tab allows changes
to who has access to this system.
Choose OK to save any changes
Chapter 7
User Management
Overview of Empower User management
Create and modify Empower User Types
Create and manage Empower Users
Create and manage Empower User Groups
How are Empower users are managed in three separate areas within
Empower users Empower: User Types, Users and User Groups.
managed in the
system? Empower User Types define the privilege level for all users
assigned to that User Type. Examples of User Types are
Administrator and Chemist.
Click Configure
System to open
Configuration
Manager
window.
Select User
Types in the
Tree Pane.
New User Types can be created from the User Types table in
Configuration Manager.
Click OK.
Select
Management
tab
Select
appropriate
Privileges
Note: The help menu has extensive details for each privilege
Select Methods
tab
Select
appropriate
Privileges
Click F1 for Note: The help menu has extensive details for each privilege
details of each
privilege
Select Data
Acquisition tab
Select
appropriate
Privileges.
Click OK.
Click F1 for Note: Refer to the Empower Help system for each individual
details of each User Type Properties tab for more information on the specific
privilege privileges for each tab.
Select
Management
tab
Modify
Privileges.
Click OK.
Empower Users
Select Users in
Tree Pane.
Right click in
Users table and
select New
Enter User
Name, Full
Name, Allowed
User Types,
Default User
Type,
Default User
Interface and
Allowed
Interfaces.
Click OK.
(details next
page)
Note: The first time a user opens their user account, the
password is the same as the user name unless an
administrator changes the password.
Users assigned to more than one user type can sign onto the
system only as one user type at a time and perform only
those functions associated with that user type.
When logging on, a user can select the user type (privilege
role) for that account depending on what function the user
will be performing in the software.
Only configured user types will be available in Allowed User
Types and Default User Type.
Managing Users
User Properties
Account
Status: Active,
Disabled,
Removed.
Enter New
Password and
Confirm
Password.
Select User
Must Change
Password at
Next Login (if
required).
There are three options available in Account Status:
Active: Specifies that the selected user account
is operating normally.
Disabled: Specifies that the selected user
account has been deactivated by the software
and cannot be used to login to Empower
software.
Removed: Specifies that the selected user
account has been deleted from the current
database and the account cannot be used to log
into Empower software. Removed user accounts
no longer use a named user license.
Select Allowed
User Types
Select Allowed
Interfaces.
Click OK.
Select User
Groups in Tree
Pane
New User Groups can be created from the User Groups table
in Configuration Manager.
Enter Group
Name, assign
Group Admin
(if needed), and
assign Users to
User Group
Select Group
Properties tab
Modify Group
Admin or Users
in Group.
Select Admin
Properties tab
Select Add
User, Delete
User, Modify
User or Copy
Preferences
Click OK.
Export to Text
The Export to Text file can be generated from the right click
menu of the Empower Nodes, Systems, Users, User Types,
User Groups, and Plate Types.
Summary
Empower User Types define the privilege level for all users assigned
to that User Type.
Empower Users are individual user accounts created for each user of
the system.
Review Questions
1. Which Empower window allows User Types, Users and User Groups to be
created, modified and managed?
2. What are the 3 types of Account Status available for User accounts?
Chapter 8
Project Management
Overview of Empower project management
Structure of Empower projects
Project organization and hierarchy
Create, clone and manage projects
Project data management, backup and restore
Organizing projects
Tips:
Each selected
tab, or category,
displays the
information in
the Project View
table. The Project Window includes the following components:
Oracle ID
Raw data flat files are encrypted and protected with a CRC.
The raw data flat files are stored in the Projects folder of the
Raw Data drive on the Empower Database server (if using a
single server configuration) or in a network location where
the Raw Data files are configured to be stored (i.e. a SAN).
The raw data files can range in size from a few KB (i.e.
single wavelength UV data) to 100 MB or more (i.e. PDA
spectrum or MS).
Click Configure
System to open
Configuration
Manager
Select Projects
in the Tree
Pane.
Project Table
Right click
Project and
select Update
Statistics.
Project
Statistics are
displayed in
Projects table.
Right click
Projects table
and select New.
Or select New
Project button
Select the
amount of
Project
Tablespace.
Select to enable
or disable
ApexTrack
Integration
and set Default
Algorithm.
Note: The ability to set Full Audit Trail Support and Full
Click Next >. Audit Trail Policies depends on how the New Project Policies
are set in System Policies. Refer to the chapter that covers
System Policies for more information. Once a project has
been created as a Full Audit Trail project, it cannot be
undone.
Select which
Options to
enable in the
project.
Allowed access
Select items to
copy from other
project.
Select a Project
from the list to
assign an
existing project
to copy items
from.
Enter Project
Name and
Project
Comments.
Enter Audit
Trail Comment
(if applicable).
Click Finish to
create project.
New project
appears in the
Projects table
of Configuration
Manager.
Project Cloning
Enter New
project name
seed.
Enter # of
copies to create
and Prefix or
Suffix with
Increment to
add to seed
name.
Select Perform
Shallow Copy
of Methods (if
required).
Select Set
Project
Comment and
enter Project
Comments (if
applicable).
Enter Audit
Trail Comment
(if applicable).
Click OK.
Cloned
project(s)
created with
seed name and
incrementing
prefix or suffix.
Enter Prefix
and/or Suffix.
Select Perform
Shallow Copy
of Methods (if
applicable)
Set Project
Comments and
enter Project
Comments (if
applicable).
Enter Comment
(if applicable).
Click OK.
Cloned projects
created with
names of base
projects and
incrementing
prefix or suffix.
Project Properties
Select project,
right click and
select
Properties
Select Owner.
Designate
Project Parent.
Select Enabled
Options.
Set project
Database
Tablespace.
Select Allowed
Access, Allow
Access to
Groups (if
applicable), and
Group/World
User Type (if
applicable)
Select Integrity
file and click
Details.
Project Integrity
file verifies raw
data files
associated with
the project.
Select Enable
ApexTrack
Integration
and select
Default
Algorithm (if
applicable).
Set Number of
Digits of
Precision
Displayed for
Area and
Height.
Click OK.
Locking Projects
Right click
project and
select Lock
Project >
Read Only
Lock, Process
Only Lock, or
Full Project
Lock.
Unlocking Projects
Right click
project and
select Lock
Project >
Unlock Project.
Database Management
No space on
the backup
system
Backup
Time
With proper database management, the size of the database
remains constant over time.
Project Backup
Right click
project(s) and
select Backup
Project.
Confirm
project(s) to
backup.
Enter Backup
Comments (if
applicable).
Click Browse.
Select the
backup location.
Click OK.
Verify backup
location.
Allow backup to
complete and
click Next >.
Verify project
backup
destination
directories.
Click Finish.
Backup of
project(s) can
be viewed
through the
operating
system file
directory.
Project Deletion
Right click on
the project(s)
and select
Delete.
Project(s) are
deleted from the
system.
Project Restoration
Project Restoration
Right click
Projects table
and select
Restore
Project(s).
Enter Restore
location or click
Browse and
select Restore
location.
Click Yes to
restore entire
project hierarchy
or No to restore
selected project
only.
If entire project
hierarchy
selected, select
the new parent
project for
project(s).
Click OK.
If single project
selected for
restore, enter a
Project Name
and select
Project Parent.
If entire project
hierarchy
selected, select
project(s) to
restore.
Allow project(s)
to restore and
click Finish.
Restored
project(s)
available in
Configuration
Manager
Projects table
Summary
Review Questions
1. Where are existing projects configured within Empower once they have
been created (i.e. increase project tablespace)?
3. Can more than one project be cloned at the same time? If yes, can those
projects all be renamed with a name different from the original
project(s)?
4. How many types of project locks are available in Empower and what do
they do?
5. What file can be used to verify the status of a project after backup or
restore?
The Listener
When an instance starts, the listener opens and establishes a
communication pathway through which users connect to
Oracle.
The listener merely connects users to the database, it does
not check to see if the database is fully functional or not.
The command lsnrctl status can only be run on the Database
server.
Be sure you are in the right oracle home. The listener is
ready when the instance is ready. After stopping and
restarting the listener wait almost 1 min to see the
discovered instance.
User Login
User enters User Name and password. Oracle Net passes
the information to the Server for validation.
If the user name and password are validated, the
authentication is sent back via Oracle Net and the Login
window is enabled.
Optionally If LDAP authentication have been selected a
Domain Controller is contacted using the LDAP protocol.
Project Query
User double clicks a Sample Set in the Sample Sets tab of
the Project window. Oracle Net sends the query to the
server.
The server finds the information and sends it back via Oracle
Net. The Injections are displayed in the Injections tab of the
Project window.
Reviewing Data
From the Project window, the user selects a Channel to bring
into the Review window. A SQL query is sent to the server.
The Review window opens via COM.
The server sends the Channel information back via Oracle
Net.
The server sends the raw data information via TCP/IP.
Processing
InstrumentServer communicates with the Processing Server
via COM.
A request is made to the server database for method and
raw data.
The Method is sent via Oracle Net and the raw data is sent
via TCP/IP.
The Processing Server processes the data and sends the
results to the server database.
The built in database manages all raw data, methods and results
by permanently linking all aspects of the electronic record together.
Even if methods or sequences are subsequently updated, the
Empower database will always retrieve the actual version used for
any reported result.
Oracle Architecture
Oracle is a relational database management system that provides a
comprehensive, integrated approach to data management. The Oracle
database consists of a physical structure (the database files) and a logical
structure (the instance).
Primary components of Oracle:
The database - the physical files accessed by the instance. The three file
types are:
data files: physical files that contain the actual data in the database
redo logs: physical files that contain a record of changes made to the
database to enable recovery of data in case of failure
control files: physical files that contain the information necessary to
maintain and verify database integrity. Contains a list of all other files
that make up database such as data files and redo logs.
The instance - the combination of background processes and memory
structures necessary for users to be able to access information in the
physical database. The part which provides access to information on the
database. Every time an instance is started, a shared memory area called
the System Global Area (SGA) is allocated and the background processes
are started.
When you open or shut down the database, you are really opening or
shutting down the instance.
When people refer to the Oracle database, they are referring to the
combination of the instance and the database physical files.
Control Files
Before the database starts, it checks the control file to find out if
recovery is necessary. If there are any missing files or if anything was
changed while the database was not in use, the control file will then be
able to tell that recovery is required before the database can be started.
If the control file is not accessible for some reason, the database will not
start. To provide additional fault tolerance, the Empower Enterprise
server is set up with two mirrored control files on different physical
drives.
By default, one control file is written to the database drive and the
other to the raw data drive.
Control file contents include:
database name and identifier
data file and redo log locations
log history (recorded during log switches)
location and status of archive logs
current log sequence number
checkpoint information such as the current system change number
(transaction number)
Oracle updates the control files continuously during database use, so
these must be available for writing whenever the database is open.
sqlNet.ora
The oracle SQLNET.ORA is present on all the oracle home directory
(Client, Lace or Server).
Only the Database Server must be set to
SQLNET.AUTHENTICATION_SERVICES = (NTS)
Lace, Client must be set as per default to
SQLNET.AUTHENTICATION_SERVICES = (None)
User: sys
Password (default): oracle
Connect as: sysdba
Or
User: system
Password (default): empower
Connect as: normal
Tablespace Status
Check that all the tablespace status is Online
Memory allocation
When you add memory on your server you should also change the
memory allocation in Oracle.
Oracle only uses the memory it is assigned.
Memory allocation
The SGA and PGA memory size has to be increased.
Backups
To protect Empower data, Waters recommends that you perform:
A cold backup of the database and Empower raw data files at
least once a week.
A hot backup of the database and the Empower raw data files at
least once a day.
The frequency of your backups should be based on the relative
importance of your data. If your users are working with critical
data, you may want to back up your files more than once a day, or
back up individual projects using the Empower software backup
tools.
Oracle provides various methods for backing up and restoring a
database, or for running scripts to back up and restore files (such
as incremental backups). You may want to use your own backup
variation.
When lot of rawdata are present on the server the time to copy
them mat increase significantly the backup process time.
The copy of the rawdata as to be perform twice. One for the
temporary location then one on the external storage.
To save time we can only copy them to the final storage.
Important:
1. Copy the database to external storage
2. Copy the Rawdata to external storage
Note: You will have more rawdata than Channel entries in DB. In
case of restore additional rawdata have to be eliminated.
What to Backup
It is good to backup all Empower Files.
The System Files and Registry backup is optional.
As we know, however, the more backups we have, the better
prepared we are for any kind of disaster.
This is a balance that must be struck given the business
needs of your organization.
Installation
The Oracle components of the WLIS Applications must be installed and
configured as an integrated component by the WLIS Applications installation
routine. The customer is not permitted to configure the Oracle components
outside the WLIS Applications installation process. This includes but is not
limited to Patch Sets, Critical Patch Utilities or Security Alerts
The WLIS Application program is required to and does provide preconfigured
instance size configurations via Oracle template technology and the database
creation assistant. This is to minimize the initial program configuration and
ongoing program management.
Access
The customer is not permitted to access the Oracle components directly but rather
only through the WLIS Applications program. External access through
SQLPLUS or the connect statement is prohibited by this license.
The WLIS Applications have been designed and developed by Waters to
eliminate program administration tasks by the customer. This is done by enabling
centralized and remote administration through the Oracle Enterprise Management
utility (Grid Control) and by including built in program administration functions.
All administration scripts including startup, shutdown, and backup must be and
are provided by Waters and reside within the application program.
The customer has not been granted the right to navigate the underlying data
schema as Waters provides predefined data views within the application that
buffer the customer from the underlying data schema and SQL statements.
Accessing of information on an ad hoc basis is not permitted under this license.
If the WLIS Applications must interface with another application or external
database, the customer is not permitted to access any of the WLIS databases to
establish the transfer of data. One of the Waters WLIS Applications Tool Kit
which is a predefined APIs (Tool Kit) must be used to transfer data via the
application package. Management of the data transfer must be done through the
WLIS Applications and Tool Kit interface.
The customer may not use Oracle or third party tools or utilities that are not
supplied by Waters Corporation as part of the WLIS Application package to
access the Oracle programs or component structures. This includes third party
backup programs that have Oracle Agents. No license is granted for access to the
Oracle engine by WLIS Applications license; only tools supplied with the WLIS
Applications distribution may access the database or Oracle components.
Support / Services
Program updates (Oracle Patch Sets, Critical Patch Updates or Security Alerts)
must be certified and distributed as a component of the WLIS Applications
package. Media containing updates obtained from other sources including Oracle
may not be deployed under this license
The customer is not licensed to upgrade the database or other Oracle program
technology versions separately from the WLIS Applications media distribution set
or Waters WLIS Applications updates.
Waters is required to provide all customer service and education for all program
operations to the end user. There is no option for the customer to obtain Oracle
support (CSI Numbers) for the programs supplied by the WLIS Applications.
Only Waters Employees can access the Oracle programs directly for purposes of
technical assistance to the customer or end user and such access is limited to
providing technical assistance, including troubleshooting, problem resolution, and
support assistance. Waters is prohibited from providing remote or onsite program
administration tasks on behalf of the end user that are otherwise prohibited under
the terms of this agreement.
If the customer currently has a supported full use license that they would like to apply to
this applications operating environment, this would also address any business practices
compliance issues. This option allows the customer to apply almost any business rule or
to include any additional Oracle or third party maintenance / monitoring application that
they may wish to employ. This includes any additional Oracle product, application, tool
or feature that they may wish to license and deploy.
When employing this alternative licensing schema, the Waters Embedded Oracle License
becomes invalid and the ESL listed business rules no longer apply. Instead the Oracle
Standard License Agreement (OSLA) rules and Oracle licensing practices apply
Contact your Waters Network Data Sales specialist to get information on this option. It
should be noted that:
WLIS Application named user license are Application entitlements and the Oracle
named user licenses will have to be obtained separately.
A WLIS Applications Named User license is a license for access to the
application not to the database.
The Oracle license which is an embedded component of the WLIS Applications
Product offering is only valid when used in conjunction with the WLIS
Application Embedded Oracle license.
The possibility exists that in installing a custom Oracle operating environment,
additional qualification testing may be required. Consult Waters or your
corporate validation group for details.
Appendix A Push Directories Files Structures
\\MyServer\Empower3DVD
\\MyServer\PUSHFOLDER
Run_ME_PushInstallEmpower3.bat
Oracle11g_Client_x32 Path
Log Path
Run_ME_PushInstallICOP.bat
ICS_List_EN.txt
WORKING_DIRECTORY Path
Log Path
The service has to be created on only one machine (you can use
a LAC/E if you want)
a. From the command prompt type type:
i. X:\Empower\Bin\WatersEmailService.exe service
Where x is the drive where you install Empower.
You can setup the database you want to scan for messages to
send by email, how often to check for email, and optionally you
can protect the windows to avoid change.
Lace01
Lace02
Lace03
Client01
Client02
Client03
Client04
<!--C/S OR LACE32-->
<INSTALL_TYPE>LACE32</INSTALL_TYPE>
<!--false ignore, true use the location and set tns-admin property-->
<USE_TNS>false</USE_TNS>
<!--Path to tnsnames.ora-->
<TNS_ADMIN_PROPERTY></TNS_ADMIN_PROPERTY>
<CommandLine>
<!--Install/Remove-->
<ACTION>Install</ACTION>
<!--true/false-->
<SkipRequirements>TRUE</SkipRequirements>
</CommandLine>
<Product>
</Product>
</Configuration>
<LOG_FILE_NETWORK_LOCATION>\\MYSHARE\Push\log</LOG_FILE_N
ETWORK_LOCATION>
<!--true/false-->
<RESTART>TRUE</RESTART>
Rem_____________________________________________________________________
Rem
Rem Name:Run_ME_PushTnsname.bat
Rem Version: 1.0.001
Rem Last modified: 01/06/2011
Rem Author: Gilles BASSARD Waters
Rem
Rem Script Requirement:
Rem PSexec.exe http://technet.microsoft.com/en-us/sysinternals/bb897553
Rem Node_List.txt
Rem Tnsname.ora
Rem_____________________________________________________________________
Rem
Rem - the user that execute the script with available credential
Rem - must have admin rights on target machine
Set UserName=vdom\Training
Set UserPWD=password
Rem - location of the Node_List.txt file that contain the machine list to install
Set ComputerListpath=\\Myshare\Push
Rem ___________________________________________________________________________________
Rem
Rem Name: Run_ME_PushInstallEmpower3.bat
Rem Version: 1.0.001
Rem Last modified: 01/06/2011
Rem Author: Gilles BASSARD Waters
Rem
Rem Script Requirement:
Rem PSexec.exe http://technet.microsoft.com/en-us/sysinternals/bb897553
Rem E3_Response.config
Rem Node_List.txt
Rem InstallEmpower3.bat
Rem ___________________________________________________________________________________
Rem
Rem - the user that execute the script with available credential
Rem - must have admin rights on target machine
Set UserName=VDOM\training
Set UserPWD=password
Rem - location of the Node_List.txt file that contain the machine list to install
Set ComputerListpath=\\Myshare\Push
Rem Remove the Rem in next line to help you for troubleshooting
Rem Pause
Rem
________________________________________________________________________________________
Rem
Rem Name:InstallEmpower3.Bat
Rem Version: 1.0.002
Rem Last modified: 01/06/2011
Rem Author: Gilles BASSARD Waters
Rem
Rem Script Requirement:
Rem E3_Response.config
Rem Setup.exe from empower3dvd
Rem
Rem
________________________________________________________________________________________
Rem
rem - location of the Node_List.txt file that contain the machine list to install
rem remove the rem in next line to help you for troubleshooting
rem Pause
Rem
_______________________________________________________________
Rem
Rem Name:Run_ME_PushInstallICOP.bat
Rem Version: 1.0.001
Rem Last modified: 01/06/2011
Rem Author: Gilles BASSARD Waters
Rem
Rem Script RequiRement:
Rem PSexec.exe http://technet.microsoft.com/en-
us/sysinternals/bb897553
Rem ICS_Reponse_EN.RSP Template located in Empower3
DVD in the push folder
Rem Node_List.txt
Rem InstallICOP.bat script to execute the installation
Rem
Rem
_______________________________________________________________
Rem
Rem - the user that execute the script with available credential
Rem - must have admin rights on target machine
Set UserName=VDOM\training
Set UserPWD=password
Rem - location of the Node_List.txt file that contain the machine list to install
Set ComputerListpath=\\Myshare\Push
Rem Remove the Rem in next line to help you for troubleshooting
Rem Pause
Rem
_________________________________________________________________________
Rem
Rem Name:InstallICOP.bat
Rem Version: 1.0.002
Rem Last modified: 01/06/2011
Rem Author: Gilles BASSARD Waters
Rem
Rem Script RequiRement:
Rem ICS_Response_EN.rsp
Rem Setup.exe from ICOP media
Rem
_________________________________________________________________________
Rem
Rem
Rem The variable are pass to the batch
Rem
Rem %1 ICOPpath
Rem %2 ICOPRespfilepath
Rem - location of the Node_List.txt file that contain the machine list to install
Rem Remove the Rem in next line to help you for troubleshooting
Rem Pause
1. To install Empower on the client, you will use a shared folder containing the Empower 3 DVD.
2. Map a drive or connect to the share: Training2\Empower3DVD
3. Find the correct directory for Empower Software installation.
4. Select the set-up file and the software installation will begin.
5. Select English in the Choose Setup Language page and select OK.
6. Click on the button Install Empower software.
7. Under the which product do you want to install? choose Enterprise. Then choose NEXT
8. Unser which installation do you want to perform? Choose Client. Then choose NEXT
3. In the Customer Information page, enter ClientX as the User name where X is your Client
Number. Enter Waters as the organization. Enter xxxxxxxxxx as the Serial Number.
4. In the License Agreement page, read the agreement, select I accept the license agreement,
then, click NEXT.
5. In the installation options page, select No to use TNS_ADMIN environmental variable, then,
click NEXT.
6. In the Setup Type page, select Typical as the installation type.
7. Click Install in the ready to install the Program page.
8. Click Finish once the installation is complete. Select Yes to restart the computer.
1. The TNSnames.ora file is located on the same share as the Empower DVD
2. Locate the file and chose copy.
3. In the client, explore to the directory c:\Empower\Oracle\Oracle11client\network\Admin
4. Copy the tnsnames.ora file to this location.
1. From the same Shared Empower DVD folder, locate the set-up file for Service Release 1.
2. Double click on the file to start the installation.
3. Follow the directions to install.
Rev. 03509 Page 1 12/21/2011
4. When complete, you are ready to install the ICOPs. (drivers for instrument control)
1. From the same Shared Empower DVD folder, locate the set-up file for ICOP installation.
2. Double click on the file to start the installation.
3. Follow the directions to install.
4. For this exercise select all the instruments. For a real installation, select any instruments you
want to control. In typical environment, all clients on the network need to have the same ICOPs
installed.
1. From the Windows START menu, under programs\Empower, locate verify files.
2. Click on verify files and the script will run.
3. When complete, a file should appear on the screen. If not, go to Programs\Empower, View
Verify Files.
1. Log in to Empower 3.
2. Identify the corresponding Time Zone.
3. Open a project (use Default_FAT)
4. Select a channel, right-click and select Review.
5. Make sure the channel has 2D Channel table information and a chromatogram in the view.
Exercise 1 Setting up system policies, users, user types, user groups, projects and
systems.
In this exercise you will learn how to plan on how to set-up system policies, users, user types, user
groups, projects and systems. You will perform this exercise on the client. The alternative is to have a
discussion on your company set-up.
QC Department:
Manufacture generic drugs for regional market, but preparing for meeting US regulatory
compliance requirements. Need to meet GXP compliance.
Currently manufacturing 3 major products: Cabbage, Carrot, and Celery
Customers want to manage results from each drug separately
Customers want to keep each months analysis separately, so they can lock and review as needed
by auditors
QC Department has a total of 4 people:
o Linda QC Department Manager
o Karen Senior Chemist
o Duffy Chemist
o Micky Analyst
Linda wants only the chemists create projects, but only senior chemist can backup projects
She also does not want anyone to be able to delete any data, except herself
Linda wants to manage all administrative work for her group
Instead of paper signature, Linda wants to use Empowers electronic signature capabilities
o Karen as the first level review
o Linda as the second level review
Customer has 2 HPLCs. Customer want the HPLCs to be used only by each group. (set systems
offline)
o 2695/2487
o 2695/2996
R&D Department:
Responsible for method transfer and method development
Compliance not important
Currently studying 2 products: Orange and Apple
Customers want to manage results from each drug separately
Responsible for method transfer and method development
R& D department is managed by Kenneth
He has two staff: George and Amanda
He wants them to able to change methods and delete data since they dont need to meet any
regulatory compliance
Customer has 2 HPLCs. Customer want the HPLCs to be used only by each group. (set systems
offline)
Rev. 03509 Page 3 12/21/2011
o 2695/2996
o Non Waters Instrument using the SAT/IN A to D converter
QA Department:
Policies are based on QC Department
Robert is the QA manager
He does not perform any laboratory work, but wants to be able to access any results from both
R&D and QC lab
1. Based on the customer feedback, set system policies based on their products and requirements.
2. Based on the customer feedback, create user types, users, and user groups to meet their
requirements.
1. Based on the customer feedback, create projects based on their products and requirements.
2. Based on the customer feedback, create dummy instruments with appropriate security. If no
dummy instruments are available, use Create new system wizard. Select No to the first question
(creating serial instruments) and select Yes on the second question (if no instruments are
available, do you want to create demo instruments?). Proceed with the wizard by selecting
appropriate instruments as part of the system being created.
1.. Open Internet Explorer and use the following URL to access the web console.
https://app1:1158/em
2. Log on as system account with the normal role using the password Empower
3. Navigate to the Home page.
What is your instance name? _________________________________________
What is your listener name? __________________________________________
What is your host name? ____________________________________________
4. Navigate to the appropriate page. Select Datafiles under Storage.
5. Select each datafile and select view to view its properties.
6. Fill the following table.
7. Identify the sequence number of the last archive log either through the console window or through
windows explorer.
________________________________________________________________________________
______________ ____________
______________ ____________
______________ ____________
______________ ____________
______________ ____________
______________ ____________
______________ ____________