Install and Deploy Windows Server 2012 R2 and Windows Server
Install and Deploy Windows Server 2012 R2 and Windows Server
This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without
notice. This document does not provide you with any legal rights to any intellectual property in any Microsoft product or product name. You may copy and use
this document for your internal, reference purposes. You may modify this document for your internal, reference purposes. 2013 Microsoft. All rights reserved.
Terms of Use (http://technet.microsoft.com/cc300389.aspx) | Trademarks (http://www.microsoft.com/library/toolbar/3.0/trademarks/en-us.mspx)
Table Of Contents
Chapter 1
Install and Deploy Windows Server
Chapter 1
Use the articles in this section to learn how to install and deploy Windows Server 2012 R2 and Windows Server 2012.
This topic summarizes the features included in the Windows Server 2012 R2 Update. Related updates have also been released for Windows 8.1 and Windows 8.1 RT. For
more details about the updates for Windows 8.1 and Windows 8.1 RT, see What's new in Windows 8.1 Update and Windows RT 8.1 Update.
Internet Explorer 11 now includes an Enterprise Mode. This mode is available if you disable Enhanced Security Configuration and provides better compatibility
for sites designed for Internet Explorer 8, along with tools to manage which web apps use it. You can specify a list of web apps to render dynamically in
Enterprise Mode, avoiding compatibility problems with web apps written for older versions of Internet Explorer. For more information, see the Internet Explorer
11 FAQ for IT Pros or TechNet documentation.
The user interface includes buttons for Search and Power on the Start page. If you install the Desktop Experience feature, other changes introduced with Windows
8.1 Update will also be visible. For details, see What's new in Windows 8.1 Update and Windows RT 8.1 Update. The specific Windows 8.1 features installed when
you install Desktop Experience have not changed from those in Windows Server 2012 R2 (see Desktop Experience Overview).
Active Directory Federation Services (AD FS) has added the capability for an administrator to enable signing in with an alternate login ID that is an attribute of the
user object in Active Directory Domain Services (AD DS). This enables customers to adopt Azure Active Directory without modifying on-premises User Principal
Names (UPNs). It also allows users to log in to Office 365 services by using an email address instead of a UPN. This change does not affect the Active Directory
schema. For more information, see Configuring Alternate Login ID.
The update includes all other updates released since Windows Server 2012 R2 was released.
See also
What's new in Windows 8.1 Update and Windows RT 8.1 Update
Install and Deploy Windows Server 2012 R2 and Windows Server 2012
Desktop Experience Overview
This topic addresses the information you need to install Windows Server 2012 R2. The process of moving to Windows Server 2012 R2 might vary greatly depending on
which operating system you are starting with and the pathway you take. We use the following terms to distinguish among different actions, any of which could be involved
in a new Windows Server 2012 R2 deployment.
Installation is the basic concept of getting the new operating system on your hardware. Specifically, a clean installation requires deleting the previous operating
system.
Upgrade means moving from your existing operating system to Windows Server 2012 R2, while staying on the same hardware. You can upgrade from an evaluation
version of Windows Server 2012 R2, a current retail version of certain editions of Windows Server 2012 R2 an action known as license conversion, a previous
retail version of certain editions of Windows Server, or from a volume-licensed edition of Windows Server 2012 R2. Even while staying on the same hardware, some
server roles might require specific steps to ensure a smooth upgrade. For detailed information about upgrading by any of these methods to Windows Server 2012
R2, see upgrade options
Migration means moving from your existing operating system to Windows Server 2012 R2 by transferring to a different set of hardware. Migration, which might
vary considerably depending on the server roles you have installed, is discussed in detail at http://technet.microsoft.com/en-us/windowsserver/dn458795.
Clean installation
Before you start a clean installation of Windows Server 2012 R2, you should perform the following steps.
Important
The highly diverse scope of potential deployments makes it unrealistic to state recommended system requirements that would be generally applicable. Consult
documentation for each of the server roles you intend to deploy for more details about the resource needs of particular server roles. For the best results, conduct
test deployments to determine appropriate system requirements for your particular deployment scenarios.
Processor
Processor performance depends not only on the clock frequency of the processor, but also on the number of processor cores and the size of the processor cache. The
following are the processor requirements for this product:
RAM
The following are the estimated RAM requirements for this product:
Minimum: 512 MB
Important
If you create a virtual machine with the minimum supported hardware parameters (1 processor core and 512 MB RAM) and then attempt to install this release on the
Allocate more than 800 MB RAM to the virtual machine you intend to install this release on. Once Setup has completed, you can change the allocation to as
little as 512 MB RAM, depending on the actual server configuration.
Interrupt the boot process of this release on the virtual machine with SHIFT+F10. In the command prompt that opens, use Diskpart.exe to create and format an
installation partition. Run Wpeutil createpagefile /path=C:\pf.sys (assuming the installation partition you created was C:). Close the command prompt and
proceed with Setup.
Minimum: 32 GB
Note
Be aware that 32 GB should be considered an absolute minimum value for successful installation. This minimum should allow you to install Windows Server
2012 R2 in Server Core mode, with the Web Services (IIS) server role. A server in Server Core mode is about 4 GB smaller than the same server in Server with a
GUI mode. For the smallest possible installation footprint, start with a Server Core installation and then completely remove any server roles or features you do
not need by using Features on Demand. For more information about Server Core and Minimal Server Interface modes, see Windows Server Installation
Options.
The system partition will need extra space for any of the following circumstances:
If you install the system over a network.
Computers with more than 16 GB of RAM will require more disk space for paging, hibernation, and dump files.
Other requirements
You also must have the following:
The following items are not strictly required, but are necessary for certain features:
Disconnect UPS devices. If you have an uninterruptible power supply (UPS) connected to your destination computer, disconnect the serial cable before running
Setup. Setup automatically attempts to detect devices that are connected to serial ports, and UPS equipment can cause issues with the detection process.
Back up your servers. Your backup should include all data and configuration information that is necessary for the computer to function. It is important to
perform a backup of configuration information for servers, especially those that provide network infrastructure, such as Dynamic Host Configuration Protocol
(DHCP) servers. When you perform the backup, be sure to include the boot and system partitions and the system state data. Another way to back up
configuration information is to create a backup set for Automated System Recovery.
Disable your virus protection software. Virus protection software can interfere with installation. For example, it can make installation much slower by scanning
every file that is copied locally to your computer.
Provide mass storage drivers. If your manufacturer has supplied a separate driver file, save the file to a floppy disk, CD, DVD, or Universal Serial Bus (USB) flash
drive in either the root directory of the media or the amd64 folder. To provide the driver during Setup, on the disk selection page, click Load Driver (or press
F6). You can browse to locate the driver or have Setup search the media.
Be aware that Windows Firewall is on by default. Server applications that must receive unsolicited inbound connections will fail until you create inbound firewall
rules to allow them. Check with your application vendor to determine which ports and protocols are necessary for the application to run correctly.
For more information about Windows Firewall, see http://go.microsoft.com/fwlink/?LinkID=84639.
Windows Server 2012 Essentials: you receive warnings on the Desktop and on the dashboard, but the server does not shut down.
English only
2 GB RAM
1 CPU
80 GB hard drive
To use the VHD distribution, you must have a computer running Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2. The Hyper-V server role
must be installed.
Copyright
This document is provided asis. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal,
reference purposes.
2013 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Hyper-V, MS-DOS, Windows, Windows NT, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
This product contains graphics filter software; this software is based in part on the work of the Independent JPEG Group.
All other trademarks are property of their respective owners.
1.0
This topic includes information about upgrading to Windows Server 2012 R2 from a variety of previous operating systems using a variety of methods.
The process of moving to Windows Server 2012 R2 might vary greatly depending on which operating system you are starting with and the pathway you take. We use the
following terms to distinguish among different actions, any of which could be involved in a new Windows Server 2012 R2 deployment.
Installation is the basic concept of getting the new operating system on your hardware. Specifically, a clean installation requires deleting the previous operating
system. For information about installing Windows Server 2012 R2, see System Requirements and Installation Information for Windows Server 2012 R2. For
information about installing other versions of Windows Server, see Windows Server Installation and Upgrade.
Upgrade means moving from your existing operating system release to a more recent release, while staying on the same hardware. For example, if your server is
running Windows Server 2012, you can upgrade it to Windows Server 2012 R2. You can upgrade from an evaluation version of the operating system to a retail
version, from an older retail version to a newer version, or, in some cases, from a volume-licensed edition of the operating system to an ordinary retail edition.
License conversion in some operating system releases, you can convert a particular edition of the release to another edition of the same release in a single step
with a simple command and the appropriate license key. We call this license conversion. For example, if you are running Windows Server 2012 R2 Standard, you
can convert it to Windows Server 2012 R2 Datacenter.
Migration means moving from your existing operating system to Windows Server 2012 R2 by transferring to a different set of hardware. Migration, which might
vary considerably depending on the server roles you have installed, is discussed in detail at http://technet.microsoft.com/en-us/windowsserver/dn458795.
Depending on your scenario, you might encounter a variety of different upgrade pathways.
In-place upgrades from 32-bit to 64-bit architectures are not supported. All editions of Windows Server 2012 R2 are 64-bit only.
In-place upgrades from one language to another are not supported.
In-place upgrades from one build type (fre to chk, for example) are not supported.
If the server is a domain controller, see http://technet.microsoft.com/library/hh994618.aspx for important information.
Upgrades from pre-release versions of Windows Server 2012 R2 are not supported. Perform a clean installation to Windows Server 2012 R2.
Upgrades that switch from a Server Core installation to the Server with a GUI mode of Windows Server 2012 R2 in one step (and vice versa) are not supported.
However, after upgrade is complete, Windows Server 2012 R2 allows you to switch freely between Server Core and Server with a GUI modes. For more
information about these installation options, how to convert between them, and how to use the new Minimal Server Interface and Features on Demand, see
http://technet.microsoft.com/en-us/library/hh831786.
If you do not see your current version in the left column, upgrading to this release of Windows Server 2012 R2 is not supported.
If you see more than one edition in the right column, upgrade to either edition from the same starting version is supported.
From an elevated command prompt, run slmgr.vbs /dlv; evaluation versions will include EVAL in the output.
From the Start screen, open Control Panel. Open System and Security, and then System. View Windows activation status in the Windows activation area of
the System page. Click View details in Windows activation for more information about your Windows activation status.
If you have already activated Windows, the Desktop shows the time remaining in the evaluation period.
If the server is running a retail version instead of an evaluation version, see the Upgrading previous retail versions of Windows Server to Windows Server 2012 R2
section of this topic for instructions to upgrade to Windows Server 2012.
For Windows Server 2012 Essentials: You can convert to the full retail version by entering a retail, volume license, or OEM key in the command slmgr.vbs.
If the server is running an evaluation version of Windows Server 2012 Standard or Windows Server 2012 Datacenter, you can convert it to a retail version as follows:
1. If the server is a domain controller, you cannot convert it to a retail version. In this case, install an additional domain controller on a server that runs a retail
version and remove AD DS from the domain controller that runs on the evaluation version. For more information, see http://technet.microsoft.com/enus/library/hh994618.aspx.
2. Read the license terms.
3. From an elevated command prompt, determine the current edition name with the command DISM /online /Get-CurrentEdition. Make note of the edition ID,
an abbreviated form of the edition name. Then run DISM /online /Set-Edition:<edition ID> /ProductKey:XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
/AcceptEula, providing the edition ID and a retail product key. The server will restart twice.
For the evaluation version of Windows Server 2012 Standard, you can also convert to the retail version of Windows Server 2012 Datacenter in one step using this
same command and the appropriate product key.
Tip
For more information about Dism.exe, see http://go.microsoft.com/fwlink/?LinkId=192466.
These release notes address the most critical issues and information about the Windows Server 2012 R2 operating system. For information about by-design changes, new
features, and fixes in this release, see documentation and announcements from the specific feature teams. For information about important steps to take before installing
this release, including issues that you may need to work around, see System Requirements and Installation Options for Windows Server 2012 R2. Unless otherwise
specified, these notes apply to all editions and installation options of Windows Server 2012 R2.
This document is continuously updated; as critical issues requiring a workaround are discovered, they are added.
Allocate more than 800 MB RAM to the virtual machine you intend to install this release on. Once Setup has completed, you can change the allocation to as little
as 512 MB RAM, depending on the actual server configuration.
Interrupt the boot process of this release on the virtual machine with SHIFT+F10. In the command prompt that opens, use Diskpart.exe to create and format an
installation partition. Run Wpeutil createpagefile /path=C:\pf.sys (assuming the installation partition you created was C:). Close the command prompt and
proceed with Setup.
Internet Explorer 11
Input Method Editor (IME) input does not accept non-Latin characters with Adobe Flash in Internet Explorer. Only Latin characters can be inserted with an IME. To
avoid this, use Internet Explorer for desktop.
If you visit a website that contains Adobe Flash Player-based content, no PlayTo endpoints are listed in the Devices charm. There is no workaround at this time.
When you pause Adobe Flash Player-based content in Internet Explorer and switch to Internet Explorer for desktop, the content might not be visible when you
return. To avoid this, do not pause content when switching to the desktop. If this has already occurred, try refreshing the web page.
Storage Spaces
If you host a shared VHDX resource on Storage Spaces and then enable deduplication, virtual machines will not boot while the shared VHDX is attached. Do not enable
deduplication on volumes that host shared VHDX resources.
The Windows Server Essentials Experience only works in a single-domain environment that does not include a read-only domain controller. There is no
workaround at this time.
If you install Windows Server Essentials as a virtual machine, and if your server is not connected to the network (or the DHCP service is not available) while running
the Configure Windows Server Essentials wizard, Anywhere Access functionalities (such as Remote Web Access, virtual private networking, and DirectAccess) are
blocked.
To avoid this, ensure that your server has a network connection when you install Windows Server Essentials as a virtual machine and run the Configure Windows
Server Essentials Wizard. If this has already occurred, manually configure the DNS forwarder settings.
If you enable NIC teaming and then run the Anywhere Access setup wizard, autoconfiguration of the router is skipped and you will receive a false No internet
connection warning on the dashboard.
To correct this, manually configure the router to forward traffic on port 80/443 to the address of the teamed network interface adapter. If the server is a domain
controller and had the DNS server role installed, you should also ensure that DNS on the teamed NiC is set to 127.0.0.1,::1 and that DNS forwarders are
properly configured.
Work Folders
The client and server must be running the same milestone release for Work Folders to function properly. For example, if the server is running this milestone release of
Windows Server 2012 R2, the client must be running the same milestone release of Windows 8.1.
Copyright
This document is provided asis. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal,
reference purposes.
2013 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Hyper-V, MS-DOS, Windows, Windows NT, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
This product contains graphics filter software; this software is based in part on the work of the Independent JPEG Group.
All other trademarks are property of their respective owners.
3.0
The following is a list of features and functionalities in Windows Server 2012 R2 that have either been removed from the product in the current release or are planned for
potential removal in subsequent releases deprecated. It is intended for IT professionals who are updating operating systems in a commercial environment. This list is
subject to change in subsequent releases and may not include every deprecated feature or functionality. For more details about a particular feature or functionality and its
replacement, see the documentation for that feature.
For your quick reference, following table briefly summarizes the status of features that have been removed or deprecated in either Windows Server 2012 or Windows
Server 2012 R2.
Note
This table is necessarily abbreviated; if you see a feature marked for deprecation or removal, please consult the detailed information in this topic or in Features
Removed or Deprecated in Windows Server 2012.
Feature
Removed
Removed
Deprecated
AD FS v1 Web Agent
Deprecated
AD RMS SDK
x (made optional)
x (optional)
x (made optional)
x (optional)
x
x
Dfscmd.exe
Drivers for Jet Red RDBMS and ODBC
x
x
LPR/LPD protocol
x
x
Nfsshare.exe
NFSv2 support
Oclist.exe
ODBC/OLEDB support for SQL beyond SQL Server 7 and SQL 2000
Providers for SNMP, Win32_ServerFeature API, Active Directory, MSClus WMI1.0 (in WMI)
Servermanagercmd.exe
Slmgr.vbs options
SMB 1.0
SMB.sys
x
x
SQLXMLX
Support for native VGA via the PC/AT BIOS or UEFI CSM
Support for Visual Studio Analyzer 2003 over ODBC, OLEDB, and ADO
Telnet server
VM Chimney (also called TCP Offload) (in Hyper-V)
x
x
x
x
Winsock Direct
Drivers
Drivers for tape drives have been removed from the operating system. Instead, use the drivers provided by the manufacturer of your tape drive.
Slmgr.vbs options
The /stao (sets token activation only) and /ctao (clears activation tokens only) options of Slmgr.vbs have been removed. These options have been replaced by more
flexible activation command options.
Active Directory
The Active Directory Rights Management Services (AD RMS) SDK has been deprecated. To build applications for AD RMS, migrate to AD RMS SDK 2.0, which
leverages functionality exposed by the client in Msipc.dll.
The license revocation functionality in AD RMS is deprecated. Use the protection policy to control the document lifecycle. To remove access to a particular
document, set the validity time to 0 in the template, or select Require a connection to verify a users permission in Microsoft Office. Be aware that both of
these options require a connection to a Rights Management Server in order to open the files.
The File Replication Service (FRS; part of the Active Directory Domain Services role) is deprecated. You should migrate any FRS-based SYSVOLs to use
Distributed File System Replication.
The Windows Server 2003 domain functional level is deprecated. When you create a new domain on a server that runs Windows Server 2012 R2, the domain
functional level must be Windows Server 2008 or newer. For more details about supported domain functional levels in Windows Server 2012 R2, see <LINK>.
Application Server
The Application Server role is deprecated and will eventually no longer be available as an installable server role. Instead, install individual features and roles
separately.
DNS
The GAA_FLAG_INCLUDE_TUNNEL_BINDINGORDER flag in GetAdaptersAddresses is deprecated. There is no specific replacement.
Networking
Network Access Protection (NAP) is deprecated. Other options for keeping client computers up to date and secure for remote access include DirectAccess, Windows
Web Application Proxy, and various non-Microsoft solutions.
SMB
SMB 1.0 is deprecated. Once this is removed, systems running Windows XP or Windows Server 2003 (or older) operating systems will not be able to access file
shares. SMB 1.0 has been replaced by SMB 2.0 and newer versions.
Telnet server
Telnet server is deprecated. Instead, use Remote Desktop.
SQL Lite
SQL Lite is deprecated. Migrate to alternatives such as SQL LocalDb.
Copyright
This document is provided asis. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal,
reference purposes.
2013 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Hyper-V, MS-DOS, Windows, Windows NT, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
This product contains graphics filter software; this software is based in part on the work of the Independent JPEG Group.
All other trademarks are property of their respective owners.
4.2
Windows Server 2012 R2, Windows 8.1, Windows Server 2012, and Windows 8 feature the new Modern user interface. This topic helps you find and open common
management tools, create shortcuts to frequently-used programs, run programs with elevated privileges, and perform common tasks like signing in and out, restarting,
and shutting down computers that are running Windows Server 2012 R2, Windows 8.1, Windows Server 2012, or Windows 8.
You can install Windows Server 2012 R2 or Windows Server 2012 with a minimal user interface that is well-suited to remote management. For more information, see
Windows Server Installation Options.
In this topic:
Press the Windows logo key. In a virtual machine, you can press Ctrl+Esc.
Hover the mouse cursor in the upper right corner of the screen, and then click Start.
On the desktop, hover the mouse cursor in the lower left corner of the screen, and click when the thumbnail of the Start screen appears.
sysdm.cpl to open the System Properties dialog box that is available at Control Panel\System and Security\System\Advanced System Settings.
appwiz.cpl to open Control Panel\Programs\Programs and Features\Uninstall or change a program.
inetcpl.cpl to open the Internet Properties dialog box that is available at Control Panel\Network and Internet\Internet Options.
Tip
For more Control Panel tool commands that you can type directly on the Start screen, see How to run Control Panel tools by typing a command.
Tip
If the Show Administrative tools setting is turned off, the Administrative Tools folder and its contents will not appear in the Settings results. The Show
Administrative tools setting is available when you hover the mouse cursor over the upper or lower right edge of the Start screen, click Settings, and then click
Tiles.
Create shortcuts
To create a shortcut on the desktop
1. In File Explorer, navigate to the location of the program for which you want to create a shortcut.
2. Right-click the executable file in the program folder, and then click Create shortcut. Because of restricted user access rights, Windows does not allow shortcuts
to be created in some folders, including the Program Files folder.
3. Drag the shortcut to a folder of your choice, to the desktop, or to the desktop taskbar. If the shortcut cannot be created in the location of the executable file
(typically because the access rights for the Program Files folder are restricted), and you are prompted to select a location for the shortcut, browse to the
Desktop folder.
By default, Server Manager starts when a member of the Administrators group signs in to a computer that is running Windows Server 2012 R2 or Windows Server
2012. If Server Manager is not already open, if you are a standard (non-Administrator) user on the server, or if administrators have changed Server Manager default
settings so that it does not open automatically at sign-in, open Server Manager by using procedures in this section.
Note
If the Show Administrative tools setting is disabled, the Server Manager tile does not appear on the Start screen.
Tip
Alternatively, you can open a technology-specific snap-in from the Administrative Tools folder. For information about how to access the Administrative Tools
folder, see Access Administrative Tools in this topic.
Keyboard shortcuts
This section provides keyboard shortcuts that are unchanged from Windows 7 and Windows Server 2008 R2, and a table of shortcuts that are new for the Modern user
interface in Windows 8 and Windows Server 2012.
Note
Keyboard shortcuts require certain settings and environments to work in a Remote Desktop or virtual machine session. For more information, see Use keyboard
shortcuts in a Remote Desktop session and Use keyboard shortcuts in Hyper-V virtual machines in this topic.
Keyboard shortcuts that are unchanged from Windows 7 or Windows Server 2008 R2
Key
Dock active window of a desktop app to left half of screen (no effect on Windows Store apps)
Dock active window of a desktop app to right half of screen (no effect on Windows Store apps)
Maximize active desktop app window (no effect on Windows Store apps)
Restore or minimize active desktop app window (no effect on Windows Store apps)
Maximize active desktop app window vertically, maintaining width (no effect on Windows Store apps)
Restore or minimize active desktop app window vertically (no effect on Windows Store apps)
Move active desktop app window to monitor on the left (no effect on Windows Store apps)
Move active desktop app window to monitor on the right (no effect on Windows Store apps)
Minimize all non-active windows, restore on second keystroke (no effect on Windows apps)
Open or switch to the program located at the specified position on the taskbar (Example: Windows logo key+1 to open first
program.)
Open a new or additional session in the program located at the specified position on the taskbar
Windows logo
key+Ctrl+Shift+<number>
Open a new or additional session of the program located at the specified position on the taskbar, running as Administrator
Show the desktop, restore on second keystroke (no effect on Windows apps)
Lock your computer (if you are connected to a network domain), or switch users (if you are not connected to a network
domain)
Zoom in (Magnifer)
Close Magnifier
Keyboard shortcuts that are new for Windows Server 2012 R2, Windows 8.1, Windows Server 2012, and Windows 8
Key
Windows Server 2012 R2, Windows 8.1, Windows 8, or Windows Server 2012 Functionality
Opens Narrator
Cycles through Windows apps and snaps them as they are cycled
To apply keyboard shortcuts to a Remote Desktop session that is contained within a window, select On the remote computer.
4. When you are finished configuring other settings for your Remote Desktop session, click Connect to connect to the session and start working, or click Save
on the General tab to save your connection settings as an RDP file that you can use for future connections.
This document provides information about installing the Windows Server 2012 operating system, including any known issues that you may need to work around before
starting an installation. It also provides information that you can use to troubleshoot problems that may occur during the installation. For information about serious known
issues that you may need to work around after installation is complete, see the release notes, available at the same location as this document.
Setup works in several stages. You will be prompted for some basic information, and then Setup will copy files and restart the computer. Setup concludes by presenting a
menu for Initial Configuration Tasks, which you can use to configure your server for your specific needs.
Preinstallation information
System requirements
The following are estimated system requirements for the Windows Server 2012. If your computer has less than the "minimum" requirements, you will not be able to
install this product correctly. Actual requirements will vary based on your system configuration and the applications and features you install.
Processor
Processor performance depends not only on the clock frequency of the processor, but also on the number of processor cores and the size of the processor cache.
The following are the processor requirements for this product:
RAM
The following are the estimated RAM requirements for this product:
Minimum: 512 MB
Minimum: 32 GB
Note
Be aware that 32 GB should be considered an absolute minimum value for successful installation. The system partition will need extra space for any of the
following circumstances:
If you install the system over a network.
Computers with more than 16 GB of RAM will require more disk space for paging, hibernation, and dump files.
Other requirements
You also need to have the following:
DVD drive
Super VGA (800 x 600) or higher-resolution monitor
Keyboard and Microsoft mouse or other compatible pointing device
Internet access (fees may apply)
Disconnect UPS devices. If you have an uninterruptible power supply (UPS) connected to your destination computer, disconnect the serial cable before running
Setup. Setup automatically attempts to detect devices that are connected to serial ports, and UPS equipment can cause issues with the detection process.
Back up your servers. Your backup should include all data and configuration information that is necessary for the computer to function. It is important to
perform a backup of configuration information for servers, especially those that provide network infrastructure, such as Dynamic Host Configuration Protocol
(DHCP) servers. When you perform the backup, be sure to include the boot and system partitions and the system state data. Another way to back up
configuration information is to create a backup set for Automated System Recovery.
Disable your virus protection software. Virus protection software can interfere with installation. For example, it can make installation much slower by scanning
every file that is copied locally to your computer.
Provide mass storage drivers. If your manufacturer has supplied a separate driver file, save the file to a floppy disk, CD, DVD, or Universal Serial Bus (USB) flash
drive in either the root directory of the media or the amd64 folder. To provide the driver during Setup, on the disk selection page, click Load Driver (or press
F6). You can browse to locate the driver or have Setup search the media.
Be aware that Windows Firewall is on by default. Server applications that must receive unsolicited inbound connections will fail until you create inbound firewall
rules to allow them. Check with your application vendor to determine which ports and protocols are necessary for the application to run correctly.
For more information about Windows Firewall, see http://go.microsoft.com/fwlink/?LinkID=84639.
Windows Server 2008 Standard with SP2 or Windows Server 2008 Enterprise with SP2
Windows Server 2008 R2 Standard with SP1 or Windows Server 2008 R2 Enterprise with SP1
Copyright
This document is provided asis. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal,
reference purposes.
2012 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Hyper-V, MS-DOS, Windows, Windows NT, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
This product contains graphics filter software; this software is based in part on the work of the Independent JPEG Group.
All other trademarks are property of their respective owners.
2.0
These release notes address the most critical issues and information about the Windows Server 2012 operating system. For information about bydesign changes, new
features, and fixes in this release, see documentation and announcements from the specific feature teams. For information about important steps to take before installing
this release, including issues that you may need to work around, see Installing Windows Server 2012, a document available at the same location as this document. Unless
otherwise specified, these notes apply to all editions and installation options of the Windows Server 2012.
This document is continuously updated; as critical issues requiring a workaround are discovered, they are added.
Upgrade
If you upgrade from a Full installation of Windows Server 2008 or Windows Server 2008 R2 to Windows Server 2012 in Server with a GUI mode, and then switch
Windows Server 2012 to Server Core mode, conversion back to Server with a GUI mode will fail.
To avoid this, delete these registry keys with the following commands:
reg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{bc2eeeec-b77a-4a52-b6a4-dffb1b1370cb}
reg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{57e0b31d-de8c-4181-bcd1-f70e880b49fc}
reg delete HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Publishers\{8c9dd1ad-e6e5-4b07-b455-684a9d879900}
After running these commands, restart the upgrade.
Copyright
This document is provided asis. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal,
reference purposes.
2012 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Hyper-V, MS-DOS, Windows, Windows NT, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
This product contains graphics filter software; this software is based in part on the work of the Independent JPEG Group.
All other trademarks are property of their respective owners.
1.0
This document summarizes key information about evaluation versions of Windows Server 2012, including where to obtain them, the limits on their use, and how to
convert them to full retail versions. It also summarizes the supported upgrade paths from previously licensed retail versions of Windows Server to Windows Server 2012.
These evaluation versions are 64-bit only and can be installed with the Server Core option or the Server with a GUI option. For more information about these installation
options, how to convert between them, and how to use the new Minimal Server Interface and Features on Demand, see http://technet.microsoft.com//library/hh831786.
For all editions, you have 10 days to complete online activation, at which point the evaluation period begins and runs for 180 days. During the evaluation period, a
notification on the Desktop displays the days remaining the evaluation period (except in Windows Server 2012 Essentials). You can also run slmgr.vbs /dlv from an
elevated command prompt to see the time remaining.
Windows Server 2012 Standard; Windows Server 2012 Datacenter: from the TechNet Evaluation Center (http://technet.microsoft.com/enUS/evalcenter/hh670538.aspx). These editions are also available as pre-created VHDs for use in virtualized environments.
Windows Server 2012 Essentials: from http://go.microsoft.com/fwlink/p/?LinkId=266340
Windows Server 2012 Essentials: you receive warnings on the Desktop and on the dashboard, but the server does not shut down.
1. From an elevated command prompt, run slmgr.vbs /dlv; evaluation versions will include EVAL in the output.
2. From the Start screen, open Control Panel. Open System and Security, and then System. View Windows activation status in the Windows activation area of
the System page. Click View details in Windows activation for more information about your Windows activation status.
If you have already activated Windows, the Desktop shows the time remaining in the evaluation period.
If the server is running a retail version instead of an evaluation version, see the Upgrading previous licensed versions section of this document for instructions to
upgrade to Windows Server 2012.
For Windows Server 2012 Essentials: You can convert to the full retail version by entering a retail, volume license, or OEM key in the command slmgr.vbs.
If the server is running an evaluation version of Windows Server 2012 Standard or Windows Server 2012 Datacenter, you can convert it to a retail version as follows:
1. If the server is a domain controller, you cannot convert it to a retail version. In this case, install an additional domain controller on a server that runs a retail
version and remove AD DS from the domain controller that runs on the evaluation version. For more information, see http://technet.microsoft.com/enus/library/hh994618.aspx.
2. Read the license terms.
3. From an elevated command prompt, determine the current edition name with the command DISM /online /Get-CurrentEdition. Make note of the edition ID,
an abbreviated form of the edition name. Then run DISM /online /Set-Edition:<edition ID> /ProductKey:XXXXX-XXXXX-XXXXX-XXXXX-XXXXX
/AcceptEula, providing the edition ID and a retail product key. The server will restart twice.
For the evaluation version of Windows Server 2012 Standard, you can also convert to the retail version of Windows Server 2012 Datacenter in one step using this
same command and the appropriate product key.
Tip
For more information about Dism.exe, see http://go.microsoft.com/fwlink/?LinkId=192466.
In-place upgrades from 32-bit to 64-bit architectures are not supported. All editions of Windows Server 2012 are 64-bit only.
In-place upgrades from one language to another are not supported.
In-place upgrades from one build type (fre to chk, for example) are not supported.
If the server is a domain controller, see http://technet.microsoft.com/library/hh994618.aspx for important information.
Upgrades from pre-release versions of Windows Server 2012 (such as the Release Candidate) are not supported. Perform a clean installation to Windows Server
2012.
Upgrades that switch from a Server Core installation to the Server with a GUI mode of Windows Server 2012 in one step (and vice versa) are not supported.
However, after upgrade is complete, Windows Server 2012 allows you to switch freely between Server Core and Server with a GUI modes. For more information
about these installation options, how to convert between them, and how to use the new Minimal Server Interface and Features on Demand, see
http://technet.microsoft.com/en-us/library/hh831786.
If you do not see your current version in the left column, upgrading to this release of Windows Server 2012 is not supported.
If you see more than one edition in the right column, upgrade to either edition from the same starting version is supported.
Windows Server 2008 Standard with SP2 or Windows Server 2008 Enterprise with SP2
Windows Server 2008 R2 Standard with SP1 or Windows Server 2008 R2 Enterprise with SP1
Even in supported upgrade paths from previous retail versions to Windows Server 2012, certain server roles that are already installed might require additional
preparation or actions for the role to continue functioning after the upgrade. The following table summarizes these considerations.
Server role
Active
Directory
Upgrade information
Active Directory Domain Services (AD DS): Active Directory domains can be upgraded by upgrading the operating system of existing
domain controllers or by replacing existing domain controllers with domain controllers that run Windows Server 2012. For more
information, see Deploy Active Directory Domain Services (AD DS) in Your Enterprise (http://go.microsoft.com/fwlink/?LinkId=262195).
Active Directory Lightweight Directory Services (AD LDS): For more information, see Upgrading from ADAM to AD LDS
(http://go.microsoft.com/fwlink/?LinkId=186351).
Active
Directory
Federation
Services (AD
FS)
For more information about upgrading AD FS from Windows Server 2008 R2 to Windows Server 2012, see
http://technet.microsoft.com/library/jj647765.aspx
Active
Directory
Rights
Management
Services (AD
RMS)
You can perform an in-place upgrade from either Windows Server 2008 or Windows Server 2008 R2 to Windows Server 2012. After completing
upgrade of your operating system for any servers running the AD RMS server role, you will need to run the AD RMS Upgrade wizard to upgrade
your AD RMS cluster and ensure consistency. Otherwise, your AD RMS cluster might not be in a consistent state. The only other consideration when
upgrading that you should be aware of when upgrading from these versions of the Windows Server operating system is that if the Windows
Internal Database (WID) was previously selected for use to support your AD RMS database needs, that configuration will block your upgrade to
Windows Server 2012 and require you to take additional steps. To unblock your upgrade to Windows Server 2012 you must first uninstall the AD
RMS server role and migrate the existing WID instance to a SQL Server instance. For more information, see http://go.microsoft.com/fwlink/?
LinkId=229299.
Fax Server
See http://technet.microsoft.com/library/jj134193.aspx.
File and
Storage
Services
After you upgrade a Windows Server 2008 R2-based server that has DFS Management installed, you must reinstall the DFS Management Tools on
the server. To install the DFS Management Tools, run the following Windows PowerShell cmdlet as an administrator: Install-WindowsFeature
RSAT-DFS-Mgmt-Con
You can also use the Add Roles and Features Wizard in Server Manager. On the Features page of the wizard, expand Remote Server
Administration Tools, expand Role Administration Tools, expand File Services Tools, and then select the DFS Management Tools check box.
Hyper-V
Shut down and save all virtual machines prior to starting upgrade. For additional information, see http://technet.microsoft.com /library/hh831531
Print and
Document
Services
See http://technet.microsoft.com/library/jj134150.
Remote
Access
Routing and Remote Access Service (RRAS) was a role service in Windows Server operating systems prior to Windows Server 2012 that enabled
you to use a computer as an IPv4 or IPv6 router, as an IPv4 network address translation (NAT) router, or as a remote access server that hosted
dial-up or virtual private network (VPN) connections from remote clients. Now, that feature has been combined with DirectAccess to make up the
Remote Access server role in Windows Server 2012. For information about migration from Windows Server 2008 R2 and other versions prior to
Windows Server 2012, see http://technet.microsoft.com/library/hh831423.aspx
Remote
Desktop
Services
Windows Server 2008 R2 Remote Desktop Services role services cannot be migrated to Windows Server 2012, however an existing Windows
Server 2008 R2 RD Session Host server deployment can be integrated into a Windows Server 2012 RDS deployment. The Windows Server 2012 RD
Web Access can be configured to point to an existing Windows Server 2008 R2 RD Session Host server farm. Desktops and RemoteApp programs
published on the Windows Server 2008 R2 RD Session Host server farm can be accessed from a Windows Server 2012 RD Web Access
server.The Following steps need to be completed in order to add an existing Windows Server 2008 R2 RD Session Host server farm to a
Windows Server 2012 Remote Desktop Services deployment:
Volume
Activation
Services
With Active Directory-based Activation, you do not need an additional host server; your existing domain controllers can support activation clients,
with the following limitations:
Web Server
No functionality has been removed or changed. Web applications that work in IIS 7.0 run normally in IIS 8.0.
(IIS)
This document summarizes the differences between the installation options available for Windows Server 2012, including the features that are installed with each option,
the management options available after installation, and how to switch between the installation options during use. It also explains the differences between the Server
Graphical Shell and the Minimal Server Interface and how to switch between them. In addition, it discusses how to use Features on Demand to further reduce the disk
footprint by including the binary files for only the server roles you actually use.
Note
For RSAT, you must use the Windows 8 version.
Note
All cmdlets must be run from an elevated Windows PowerShell prompt.
To use Windows PowerShell to convert from a Server Core installation to a Server with a GUI
installation
1. Determine the index number for a Server with a GUI image (for example, SERVERDATACENTER, not SERVERDATACENTERCORE) with Get-WindowsImage
-ImagePath <path to wim>\install.wim.
2. Run InstallWindowsFeatureServerGuiMgmtInfra,ServerGuiShellRestartSourcec:\mountdir\windows\winsxs
3. Alternatively, if you want to use Windows Update as the source instead of a WIM file, use this Windows PowerShell cmdlet:
InstallWindowsFeatureServerGuiMgmtInfra,ServerGuiShellRestart
User interface: standard graphical user interface Server Graphical Shell. The Server Graphical Shell includes the new Windows 8 shell, but does not include
the Windows Store or support for Windows Store apps. To enable support for the Windows Store and Windows Store apps, install the Desktop Experience
feature.
Install, configure, uninstall server roles locally: with Server Manager or with Windows PowerShell
Install, configure, uninstall server roles remotely: with Server Manager, Remote Server, RSAT, or Windows PowerShell
Microsoft Management Console: installed
Desktop Experience: installable with Server Manager or Windows PowerShell
To convert to a Server Core installation with Windows PowerShell: run the following cmdlet:
Uninstall-WindowsFeature Server-Gui-Mgmt-Infra -Restart
If you initially install with the Server with a GUI option and then use the above command to convert to a Server Core installation, you can later revert to a Server with a
GUI installation without specifying a source. This is because the necessary files remain stored on the disk, even though they are no longer installed. For more
information, and for instructions to completely remove the Server with a GUI files from disk, see the Features on Demand section of this document.
If you convert to a Server Core installation, Windows features, server roles, and GUI management tools that require a Server with a GUI installation will be uninstalled
automatically. You can specify the -WhatIf option in Windows PowerShell to see exactly which features will be affected by the conversion.
See the table below for a summary of which selections to make in Server Manager (or cmdlets to use in Windows PowerShell) in order to get a given installation state:
Server Core
installation
option
Minimal Server
Interface
none
Graphical
Management Tools
and Infrastructure
none
Server-Gui-
Server-Gui-Mgmt-Infra,
Server-Gui-Mgmt-Infra, Server-
Mgmt-Infra
Server-Gui-Shell
Gui-Shell, Desktop-Experience
Features on Demand
In previous versions of Windows, even if a server role or feature was disabled, the binary files for it were still present on the disk, consuming space. In Windows Server
2012, not only can you disable a role or feature, but you can also completely remove its files, a state shown as removed in Server Manager or disabled with payload
removed in Dism.exe. To reinstall a role or feature that been completely removed, you must have access to an installation source.
To completely remove a role or feature, use Remove with the Uninstall-WindowsFeature cmdlet of Windows PowerShell. For example, to completely remove
Windows Explorer, Internet Explorer, and dependent components, run the following Windows PowerShell command:
Uninstall-WindowsFeature Server-Gui-Shell -Remove
To install a role or feature that has been completely removed, use the Windows PowerShell Source option of the Install-WindowsFeature Server Manager
cmdlet. The Source option specifies a path to a WIM image and the index number of the image. If you do not specify a Source option, Windows will use Windows
Update by default. Offline VHDs cannot be used as a source for installing roles or features which have been completely removed.
Only component sources from the exact same version of Windows are supported. For example, a component source derived from the Windows Server Developer
Preview is not a valid installation source for a server running Windows Server 2012.
To install a removed role or feature using a WIM image, use the steps and Windows PowerShell cmdlets:
1. Run Getwindowsimageimagepath<pathtowim>\install.wim, and make note of the index of the Windows Server 2012 image.
2. Install-WindowsFeature <featurename> -Source wim:<path>:<index>, where:
Featurename is the name of the role or feature from Get-WindowsFeature
Path is the path to the WIM mount point
Index is the index of the server image from Step 1.
Practical applications
These examples give you an idea of how you can choose the installation option that might be most appropriate for your deployment needs:
Server Core installations require approximately 4 GB less space than a Server with a GUI installation. By using Server Core installations on virtual machines, you
can achieve a significant space savings by not having to store the GUI files on the virtual machines disk.
Servers often have comparatively large amounts of memory and complex disk arrays, both of which can take a significant amount of time to initialize at startup.
Because Server Core installations minimize the number of restarts required for updates, the frequency at which disk arrays and memory must be re-initialized is
reduced.
Certain server applications have dependencies on certain Windows services, libraries, applications, and files that are not available in Server Core installations, but
the administrator wants to take advantage of the reduced need for updating typical of Server Core installations. The Minimal Server Interface offers additional
compatibility while still maintaining a reduced system footprint (though to a lesser extent than a Server Core installation).
Features on Demand can be used to reduce the footprint for your virtual machine deployments by removing roles and features that will never be deployed in
your virtual machines. Depending on the roles and features used in your virtual machines, it is possible to reduce the size by over 1 GB.
Reference table
This table summarizes which features are available locally depending on which installation option you choose.
Minimal Server
Interface
Command prompt
available
available
available
available
available
available
available
available
Server Manager
not available
available
available
available
not available
available
available
available
Control Panel
not available
not available
available
available
not available
some available
available
available
Windows Explorer
not available
not available
available
available
Taskbar
not available
not available
available
available
Notification area
not available
not available
available
available
Internet Explorer
not available
not available
available
available
not available
not available
available
available
Themes
not available
not available
not available
available
Windows 8 Shell
not available
not available
not available
available
not available
not available
not available
available
not available
not available
not available
available
See also
For detailed information about working with a server in Server Core mode, see Configure and Manage Server Core Installations.
1.4
In Windows Server 2012, the Server Core installation option is no longer an irrevocable selection that is made during setup. In Windows Server 2008 R2 and Windows
Server 2008, if your requirements changed, there was no way to convert to a full installation or a Server Core installation without completely reinstalling the operating
system. An administrator now has the ability to convert between a Server Core installation and a full installation as needed.
There are several scenarios in which this capability is especially useful:
An administrator installed and is running a full installation option of Windows Server 2012, but exclusively using the roles that run on a Server Core installation. The
administrator can convert the servers to Server Core installations to reduce the image size and increase servicing advantages without having to reprovision all of
their servers.
An administrator installs a Server Core installation and now needs to make a change or troubleshoot something that is not possible with the remote GUI. The
administrator may not know how to make the change from the command line or cannot find a command-line equivalent. The administrator can convert the server to
a full installation, perform the changes, and then convert it back to a Server Core installation to reduce the image size and maintain servicing advantages.
An administrator wants to use the GUI for all of the initial configuration steps to make the initial configuration experience as easy as possible, yet wants to reduce
the image size and maintain the servicing advantages that a Server Core installation provides. The administrator can install a full installation, configure the server as
needed, and then convert it to a Server Core installation.
An enterprise mandates a single server operating system image, so it cannot use a Server Core installation because it requires two images. Windows Server 2012
integrates the Server Core installation and the full server installation options. Now the enterprise can use a single server operating system image to deploy full
installations of Windows Server 2012 and then convert them to Server Core installations to reduce the image size and provide the servicing advantages that it offers.
Requirements
You need a Server Core installation or a full installation of Windows Server 2012. No special hardware is required.
Technical overview
In Windows Server 2008 R2 and Windows Server 2008, the Server Core installation and the full installation options were selections that an administrator made at the time
of installation.
Because when Windows Server 2012 is in Server Core mode, the help system and browser are not available, this collection of topics provides the information needed to
install and deploy Server Core servers; install, manage, and uninstall server roles and features; configure settings such as server activation and naming, domain
membership, and Windows Firewall; installing updates; and managing the server locally or remotely. It also includes a quick reference table of common tasks and the
commands for accomplishing them locally on a Server Core server.
If you choose the Server Core option, the standard user interface the Server Graphical Shell is not installed; you manage the server using remote user interface tools,
Windows PowerShell, or, if necessary, locally using the command line (or Windows PowerShell). For more information about the differences between Server Core and
Server with a GUI, the features included in each mode, switching between the modes, the Minimal Server Interface mode, and Features on Demand, see
http://technet.microsoft.com/library/hh831786.
This topic addresses basic information concerning installation and deployment of Windows Server 2012 in Server Core mode.
When you install Windows Server 2012, you can choose between Server Core Installation and Server with a GUI. The Server with a GUI option is the Windows Server
2012 equivalent of the Full installation option available in Windows Server 2008 R2. The Server Core Installation option reduces the space required on disk, the potential
attack surface, and especially the requirements for servicing and restarting the server, so we recommend that you choose the Server Core installation unless you have a
particular need for the additional user interface elements and graphical management tools that are included in the Server with a GUI option. For this reason, the Server
Core installation is now the default. Because you can freely switch between these options at any time later, one approach might be to initially install the Server with a GUI
option, use the graphical tools to configure the server, and then later switch to the Server Core Installation option.
If you choose the Server Core option, the standard user interface the Server Graphical Shell is not installed; you manage the server using remote user interface tools,
Windows PowerShell, or, if necessary, locally using the command line (or Windows PowerShell). For more information about the differences between Server Core and
Server with a GUI, the features included in each mode, switching between the modes, the Minimal Server Interface mode, and Features on Demand, see
http://technet.microsoft.com/library/hh831786.
Initial installation
At the time you run Setup, you have the option to install the server in Server Core mode or Server with a GUI mode.
Using an unattend file to install the server directly in Server Core mode
Using an unattend file to install directly in Server Core mode enables you to perform most of the initial configuration tasks during Setup.
See also
Configure a Server Core Server
Configure and Manage Server Core Installations
Windows Server Installation Options
Evaluation Versions and Upgrade Options for Windows Server 2012
This topic explains how to accomplish common server configuration tasks, such as setting passwords, configuring Windows Firewall, joining a domain, and activating the
server, all while the server is in Server Core mode.
This topic assumes that you have installed the server in Server Core mode initially and are proceeding directly to these configuration tasks. If you have installed the server
in Server with a GUI mode and have since switched to Server Core mode, these steps still apply.
Note
If you close all command prompts, you will have no way to manage the server in Server Core mode. To recover, you can press CTRL+ALT+DELETE, click Start Task
Manager, click File, click Start New Task, and then type cmd.exe. Alternatively, you can log off and log back on again.
Note
Because there is no Web browser in Server Core mode, you cannot access the Internet or activate the product through a proxy server that requires users to log on. If
you have a proxy server that requires users to log on, you can switch the server to Server with a GUI mode, activate the server, and then switch back to Server Core
mode.
Task
Description
Join a domain
Note
This topic includes sample Windows PowerShell cmdlets that you can use to automate some of the procedures described. For more information, see Using Cmdlets.
You can later change the administrative password. To do this, log in and press CTRL+ALT+DELETE, and then choose Change Password from the Windows Security
menu.
To view your current network configuration use the Get-NetIPConfiguration Windows PowerShell cmdlet.
To view the IP addresses you are already using, use the Get-NetIPAddress Windows PowerShell cmdlet.
For a complete reference on Windows PowerShell cmdlets for Net TCP/IP, see http://technet.microsoft.com/en-us/library/hh826150.aspx.
If you need to switch to using DHCP, use the Windows PowerShell command SetDnsClientServerAddressInterfaceIndex12
ResetServerAddresses.
Note
You can also activate the server by phone, using a Key Management Service (KMS) server, or remotely. To activate remotely, from a computer that is running
Windows Vista, Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows 8, or Windows Server 2012, use Windows PowerShell to run cscript
windows\system32\slmgr.vbs <ServerName> <UserName> <password>:-ato.
See also
Install Server Roles and Features on a Server Core Server
Deploy a Server Core Server
Configure and Manage Server Core Installations
Windows Server Installation Options
Evaluation Versions and Upgrade Options for Windows Server 2012
In Windows Server 2012, you can use the Server Configuration tool (Sconfig.cmd) to configure and manage several common aspects of Server Core installations. You must
be a member of the Administrators group to use the tool.
Sconfig.cmd is available in the Minimal Server Interface and in Server with a GUI mode.
Domain/Workgroup settings
The current Domain/Workgroup settings are displayed in the default Server Configuration tool screen. You can join a domain or a workgroup by accessing the
Domain/Workgroup settings page from the main menu and following the instructions on the following pages, supplying any required information.
If a domain user has not been added to the local administrators group, you will not be able to make system changes, such as changing the computer name, by using the
domain user. To add a domain user to the local administrators group, allow the computer to restart. Next, log on to the computer as the local administrator and follow
the steps in the Local administrator settings section later in this document.
Note
You are required to restart the server to apply any changes to domain or workgroup membership. However, you can make additional changes and restart the server
after all of the changes to avoid the need to restart the server multiple times. By default, running virtual machines are automatically saved prior to restarting the
Hyper-V Server.
To add additional users to the local administrators group, use the Add Local Administrator option on the main menu. On a domain joined machine, enter the user in
the following format: domain\username. On a non-domain joined machine (workgroup machine), enter only the user name. The changes take effect immediately.
Network settings
You can configure the IP address to be assigned automatically by a DHCP Server or you can assign a static IP address manually. This option allows you to configure DNS
Server settings for the server as well.
Note
These options and many more are now available using the Networking Windows PowerShell cmdlets. For more information, see Network Adapter Cmdlets in the
Windows Server Library.
enable Remote Desktop for Clients running Remote Desktop with Network Level Authentication
enable Remote Desktop for clients running any version of Remote Desktop
disable Remote
When Windows Server 2012 is in Server Core mode, the following server roles are supported:
When Windows Server 2012 is in Server Core mode, the following server features are supported:
Telnet client
Telnet server
TFTP client
Windows Internal Database
Windows PowerShell Web Access
Windows Process Activation Service
Windows Standards-based Storage Management
WinRM IIS extension
WINS server
WoW64 support
Note
This topic includes sample Windows PowerShell cmdlets that you can use to automate some of the procedures described. For more information, see Using Cmdlets.
Note
When you uninstall a role or feature with this command, the binary files for it remain on the disk. This allows you to add the role or feature later without having to
access an installation source (such as an installation DVD or WIM image). To completely remove the files for the role or feature from the disk or to reinstall a role or
feature that has been completely removed, see Working with Features on Demand in this topic.
1. Run Getwindowsimageimagepath<pathtowim>\install.wim, and make note of the index of the image for the Server with a GUI version of
Windows Server 2012.
2. Install-WindowsFeature <featurename> -Source wim:<path>:<index>, where:
Featurename is the name of the role or feature from Get-WindowsFeature
Path is the path to the WIM mount point
Index is the index of the server image from Step 1.
For example, if the Server with a GUI image is in D:\sources: Install-WindowsFeature <featurename> -Source wim:d:\sources\install.wim:4
You can also specify a source for servers that are domain members using Group Policy. Navigate to Computer Configuration > Administrative Templates >
System > Specify settings for optional component installation and component repair
Note
Permissions might affect the systems ability to access Windows features for installation over a network. The Trusted Installer process runs within the machine
account. If you encounter network access issues, try issuing a net use command (for example, net use * \\path\to\network) to connect to the network source and
then copy the source locally. Then use the local copy as the installation source.
See also
Manage a Server Core Server
Configure a Server Core Server
Configure and Manage Server Core Installations
Windows Server Installation Options
Evaluation Versions and Upgrade Options for Windows Server 2012
This topic explains the various methods available for managing a Windows Server 2012 server in Server Core mode, as well as how to add hardware and manage drivers.
You can manage the server in the following ways:
Task
Description
You can manage servers in Server Core mode using Windows PowerShell either locally or remotely.
By running Server Manager on a remote computer, you can connect to a server that is in Server Core mode.
By using a Microsoft Management Console (MMC) snap-in, you can connect to a server that is in Server Core mode.
By using another computer running Windows, you can use Remote Desktop Services to run scripts and tools on a server that is
in Server Core mode.
You can switch the computer to Server with a GUI mode, use the usual user interface tools to accomplish your tasks, and then
switch back to Server Core mode.
You can add hardware and manage drivers locally while in Server Core mode.
There are some important limitations and tips to keep in mind when you work with a server in Server Core mode:
If you close all command prompt windows and want to open a new Command Prompt window, press CTRL+ALT+DELETE, click Start Task Manager, click More
Details, click File, click Run, and then type cmd.exe. Alternatively, you can log off and log back on.
If you close all Windows PowerShell windows and want to open a new one, press CTRL+ALT+DELETE, open Task Manager, click More Details. The File menu opens.
In the File menu, click Run new task, and then start either Cmd.exe or Powershell.exe.
Any command or tool that attempts to start Windows Explorer will not work. For example, start . used from a command prompt will not work.
There is no support for HTML rendering or HTML help in Server Core mode.
When in Server Core mode, there are no notifications for activation, new updates, or password expiration because these notifications require the Windows Explorer
shell, which is not present in Server Core mode.
If you need to write a script for managing a server in Server Core mode that requires the secure inclusion of an administrative password, see the scripting column
on Microsoft TechNet (http://go.microsoft.com/fwlink/?LinkID=56421).
Server Core mode supports Windows Installer in quiet mode so that you can install tools and utilities from Windows Installer files.
When installing Windows Installer packages on a server in Server Core mode, use the /qb option to display the basic user interface.
To change the time zone while in Server Core mode, run Set-Date.
To change international settings while in Server Core mode, run control intl.cpl.
Control.exe will not run on its own. You must run it with either Timedate.cpl or Intl.cpl.
Winver.exe is not available in Server Core mode. To obtain version information use Systeminfo.exe.
Note
This topic includes sample Windows PowerShell cmdlets that you can use to automate some of the procedures described. For more information, see Using Cmdlets.
To enable your local server to be managed by Server Manager running on a remote server, run the Windows PowerShell cmdlet ConfigureSMRemoting.exe
Enable.
To manage a server in Server Core mode that is a domain member with an MMC snap-in
1. Start an MMC snap-in, such as Computer Management.
2. In the left pane, right-click the top of the tree and click Connect to another computer. (In the Computer Management example, you would right-click
Computer Management (Local).)
3. In Another computer, type the computer name of the server that is in Server Core mode and click OK. You can now use the MMC snap-in to manage the
Server Core server as you would any other computer running a Windows Server operating system.
To manage a server in Server Core mode that is not a domain member with an MMC snap-in
1. If the Server Core server is not a member of a domain, establish alternate credentials to use to connect to the Server Core computer by typing the following
command at a command prompt on the remote computer:
cmdkey /add:<ServerName> /user:<UserName> /pass:<password>
Where:
ServerName is the name of the Server Core server
UserName is the name of an administrator account
To be prompted for a password, omit the /pass option.
2. When prompted, type the password for the user name that is specified in the previous step.
3. If the firewall on the Server Core server is not already configured to allow MMC snap-ins to connect, follow the steps in "To configure Windows Firewall to
allow MMC snap-in(s) to connect." Then return to this procedure.
4. On a different computer, start an MMC snap-in, such as Computer Management.
5. In the left pane, right-click the top of the tree and click Connect to another computer. (In the Computer Management example, you would right-click
Computer Management (Local).)
6. In Another computer, type the computer name of the server that is in Server Core mode and click OK. You can now use the MMC snap-in to manage the
Server Core server as you would any other computer running a Windows Server operating system.
MMC snap-in
Rule group
Event Viewer
Services
Shared Folders
Task Scheduler
Disk Management
Note
Some MMC snap-ins do not have a corresponding rule group that allows them to connect through the firewall. However, enabling the rule groups for Event Viewer,
Services, or Shared Folders will allow most other snap-ins to connect. Additionally, certain snap-ins require further configuration before they can connect through
Windows Firewall:
Disk Management. You must first start the Virtual Disk Service (VDS) on the Server Core computer. You must also configure the Disk Management rules
appropriately on the computer that is running the MMC snap-in.
IP Security Monitor. You must first enable remote management of this snap-in. To do this, at a command prompt, type:
Cscript \windows\system32\scregedit.wsf /im 1
Reliability and Performance. The snap-in does not require any further configuration, but when you use it to monitor a Server Core computer, you can only
monitor performance data. Reliability data is not available.
Note
If you are running the Remote Desktop Services client on a previous version of Windows, you must turn off the higher security level that is set by default in Windows
Server 2012. To do this, after step 1, type the following command at the command prompt:cscript C:\Windows\System32\Scregedit.wsf /cs 0
To convert from Server Core mode to Server with a GUI mode when the server was initially installed
in Server with a GUI mode
Run InstallWindowsFeatureServerGuiMgmtInfra,ServerGuiShellRestart
To convert from Server Core mode to Server with a GUI mode when the server was initially installed
in Server Core mode
1. Determine the index number for a Server with a GUI image (for example, SERVERDATACENTER, not SERVERDATACENTERCORE) using this cmdlet: GetWindowsImage -ImagePath <path to wim>\install.wim
2. Run InstallWindowsFeatureServerGuiMgmtInfra,ServerGuiShellRestartSourcewim:<pathto
wim>\install.wim:<Index # from step 1>
3. Alternatively, if you want to use Windows Update as the source instead of a WIM file, use this Windows PowerShell cmdlet:
InstallWindowsFeatureServerGuiMgmtInfra,ServerGuiShellRestart
After you have accomplished the management tasks, you can switch the server back to Server Core mode whenever it is convenient (a restart is required) with the
Windows PowerShell cmdlet Uninstall-WindowsFeature Server-Gui-Mgmt-Infra -restart
Note
You must include the space after the equal sign for the command to complete successfully.
Where:
service_name is the name of the service that you obtain by running sc query type= driver
See also
Service Updates on a Server Core Server
Install Server Roles and Features on a Server Core Server
Configure and Manage Server Core Installations
Windows Server Installation Options
Evaluation Versions and Upgrade Options for Windows Server 2012
This topic discusses the various ways you can keep a Server Core server up to date with updates. You can service updates in the following ways:
Using Windows Update automatically or with WSUS. By using Windows Update, either automatically or with command-line tools, or Windows Server Update
Services (WSUS), you can service servers running a Server Core installation.
Manually. Even in organizations that do not use Windows update or WSUS, you can apply updates manually.
Task
Description
Note
This topic includes sample Windows PowerShell cmdlets that you can use to automate some of the procedures described. For more information, see Using Cmdlets.
If the server is a member of a domain, you can also configure Windows Update using Group Policy. For more information, see http://go.microsoft.com/fwlink/?
LinkId=192470. However, when you use this method, only option 4 Auto download and schedule the install is relevant to Server Core installations because of the lack
of a graphical interface. For more control over which updates are installed and when, you can use a script which provides a command-line equivalent of most of the
Windows Update graphical interface. For information about the script, see http://go.microsoft.com/fwlink/?LinkId=192471.
To force Windows Update to immediately detect and install any available updates, run the following command:
wuauclt /detectnow
Depending on the updates that are installed, you might need to restart the computer, although the system will not notify you of this. To determine if the installation
process has completed, use Task Manager to verify that the Wuauclt or Trusted Installer processes are not actively running. You can also use the methods in the
Viewing installed updates section to check the list of installed updates.
If the server is not a member of a domain, edit the Registry to configure it to use a WSUS server. For more information, see http://go.microsoft.com/fwlink/?
LinkId=192473.
Whenever you configure WSUS settings, be sure to select options that are valid for Server Core installations. For example, since there is no graphical interface, there is
no way to receive WSUS notifications. For more control over which updates are installed and when, you can use a script which provides a command-line equivalent of
most of the Windows Update graphical interface. For information about the script, see http://go.microsoft.com/fwlink/?LinkId=192471.
To uninstall an update manually, download the update and make it available to the Server Core computer, and then run the following command:
Wusa /uninstall <update>.msu /quiet
Note
Depending on the updates that are installed, you may need to restart the computer, although the system will not notify you of this.
See also
Quick Reference for Server Core Tasks
Manage a Server Core Server
Configure and Manage Server Core Installations
Windows Server Installation Options
Evaluation Versions and Upgrade Options for Windows Server 2012
This topic is a collection of common administrative tasks for Server Core servers that you can perform locally or remotely from a command prompt.
Whenever possible, Windows PowerShell commands are used and are styled thus: Get-NetIPConfiguration. When no Windows PowerShell equivalent is available, run
the indicated command at an ordinary command prompt or a Windows PowerShell prompt. These command are styled thus: Netdom remove
Task
Description
Event logs
1.7. Hardware
Hardware
Note
This topic includes sample Windows PowerShell cmdlets that you can use to automate some of the procedures described. For more information, see Using Cmdlets.
Task
Steps
Run:
Net user administrator *
Run Add-Computer
For more information see Configure a Server Core Server
Run:
set
Run:
Remove-Computer
Run:
net localgroup Administrators /add <domain>\<username>
Run:
net localgroup Administrators /delete <domain\username>
Run:
net user <domain\user name> /add *
Run:
Run Rename-Computer
Run:
set c
Run:
Rename-Computer
Run:
wmic computersystem where name="<computername>" set AutomaticManagedPagefile=False
Run:
wmic pagefileset where name=<path/filename> set InitialSize=<initialsize>,MaximumSize=<maxsize>
Where:
path/filename is the path to and name of the paging file
initialsize is the starting size of the paging file in bytes
maxsize is the maximum size of the paging file in bytes
See http://technet.microsoft.com/library/hh826123.
See http://technet.microsoft.com/library/hh826123.
See http://technet.microsoft.com/library/hh826123.
Run slmgr.vbsipk<productkey>, and then run slmgr.vbsato. For more information, see
Configure a Server Core Server.
Note
If Slmgr.vbs fails to activate the computer, the resulting error message advises you to run Slui.exe, along with the error code for more information. Slui.exe is not
included in Server Core installationsit is available in <versions>.
Task
Steps
Run arp
Run route
Run nslookup
Run netstat
Run nbtstat
Run pathping
Run tracert
Run mrinfo
Run netsh advfirewall firewall set rule group=Windows Firewall Remote Management
new enable=yes
Note
See additional Windows PowerShell cmdlets for networking at http://technet.microsoft.com/library/hh826123, http://technet.microsoft.com/library/jj134956, and
http://technet.microsoft.com/library/hh848620.
Task
Steps
Install an update
Run systeminfo
Remove an update
Task
Steps
Run Get-Service
Start a service
Run Start-Service
Stop a service
Run Stop-Service
See
http://technet.microsoft.com/library/dd347650.aspx.
See
http://technet.microsoft.com/library/dd347650.aspx.
Run taskmgr
Manage the performance counters and logging with commands such as typeperf, logman, relog,
tracerprt.
See http://go.microsoft.com/fwlink/?LinkId=84872.
Task
Steps
Defragment a volume
Compact a file
1.7. Hardware
Task
Add a driver for a new hardware device
Steps
See also
Service Updates on a Server Core Server
Configure and Manage Server Core Installations
Windows Server Installation Options
Evaluation Versions and Upgrade Options for Windows Server 2012
Windows PowerShell Support for Windows Server 2012
The following is a list of features and functionalities in Windows Server 2012 that have either been removed from the product in the current release or are planned for
potential removal in subsequent releases. It is intended for IT professionals who are updating operating systems in a commercial environment. This list is subject to change
in subsequent releases and may not include every deprecated feature or functionality.
Clustering
The Cluster Automation Server (MSClus) COM application programming interface (API) has been made an optional component called FailoverClusterAutomationServer which is not installed by default. Cluster programmatic functionality is now provided by the Failover Cluster API and the Failover Cluster WMI
provider.
The Cluster.exe command-line interface has been made an optional component called FailoverCluster-CmdInterface which is not installed by default. Cluster
command-line functionality is provided by the Failover Cluster PowerShell cmdlets.
Support for 32-bit cluster resource DLLs has been deprecated. Use 64-bit versions instead.
Graphics
Support for hardwire drivers for XDDM has been removed. As a result, XDDM graphics drivers will not load in Windows Server 2012. Instead, you can do any
of the following:
Use the WDDM basic displayonly driver included in the operating system.
Use a WDDM displayonly driver provided by a hardware vendor.
Use a full WDDM driver provided by a hardware vendor.
Support for native VGA via the PC/AT BIOS is removed. The WDDM basic displayonly driver included in the operating system will replace this functionality. In
UEFI systems, you may see fewer high-resolution (VESA) modes, but there is no other impact.
Hyper-V
VM Chimney (also called TCP Offload) has been removed. The TCP chimney will not be available to guest operating systems.
Support for Static VMQ has been removed. Drivers using NDIS 6.3 will automatically access Dynamic VMQ capabilities that are new in Windows Server 2012.
Networking
Server roles
The Role Collector (Ceiprole.exe) and the associated API (Ceiprole.dll) have been removed. To collect telemetry data on server roles, use Server Manager.
SQL Server
Versions of Microsoft SQL Server prior to 7.0 are no longer supported. Computers running Windows Server 2012 that connect to computers running SQL Server 6.5
(or earlier) will receive an error message.
Storage
The Storage Manager for SANs snap-in for MMC has been removed. Instead, manage storage with PowerShell cmdlets and Server Manager.
The Storage Explorer snap-in for MMC has been removed.
The SCSIport host-bus adapter driver has been removed. Instead, either use a Storport driver or a different host-bus adapter.
Visual Studio
Support for Visual Studio Analyzer 2003 over ODBC, OLEDB, and ADO has been removed.
Windows Help
The Windows Help program (specifically, WinHlp32.exe, the executable file that opens *.hlp help files) has been removed from Windows since Windows Server 2008.
Previously, downloadable packages that provide this functionality were made available (see http://support.microsoft.com/kb/917607). Starting with this release, no
download will be provided to enable you to view *.hlp files on Windows Server 2012. For this milestone release, Windows Help is also currently unsupported in
Windows 8.
Active Directory
Dcpromo.exe has been deprecated. In Windows Server 2012, if you run dcpromo.exe (without any parameters) from a command prompt, you receive a message
directing you to Server Manager, where you can install Active Directory Domain Services using the Add Roles wizard. If you run dcpromo /unattend from a command
prompt, you can still perform unattended installations that use Dcpromo.exe. This allows organizations to continue to use automated Active Directory Domain Services
(AD DS) installation routines based on dcpromo.exe until they can rewrite those routines using Windows PowerShell. For more information, see
http://technet.microsoft.com/library/hh472160.aspx.
Networking
The Network Driver Interface Specification (NDIS) version 5.0, 5.1, and 5.2 APIs are deprecated. New drivers for NDIS 6.0 must be written.
Hyper-V
The WMI root\virtualization namespace is deprecated. The new namespace is root\virtualization\v2.
Windows Authorization Manager (AzMan) is deprecated. You may need to use new management tools for virtual machines or redesign the authorization
model.
Printing
The line printer daemon protocol (LPR/LPD) is deprecated. When this feature is eventually removed, clients that print to a server using this protocol, such as UNIX
clients, will not be able to connect or print. Instead, UNIX clients should use IPP. Windows clients can connect to UNIX shared printers using the Windows Standard
Port Monitor (see http://support.microsoft.com/kb/246868for more information).
SMTP
SMTP and the associated management tools are deprecated. Though the functionality is still available in Windows Server 2012, you should begin using
System.Net.Smtp. With this API, you will not be able to insert a message into a file for pickup; instead configure Web applications to connect on port 25 to another
server using SMTP.
Transport protocols
The Transport Driver Interface (TDI) is deprecated. Use Windows Filtering Platform instead.
Layered Service Providers (LSP) are deprecated. Use Windows Filtering Platform instead.
Winsock Direct is deprecated. Use Network Direct instead.
SNMP
SNMP is deprecated. Instead, use the Common Information Model (CIM), which is supported by the WS-Management web services protocol and implemented as
Windows Remote Management.
SQL Server
ODBC/OLEDB support for SQL is deprecated for versions beyond SQL Server 7 and SQL 2000. Migrate to SQL Native Client (SNAC) to use features provided by
SQL Server 2005, SQL Server 2008, and later versions.
SQLXMLX is deprecated. Migrate code to use SQLXML.
WMI providers
The WMI provider for Simple Network Management Protocol (SNMP) is deprecated because the SNMP service is being deprecated.
The WMI provider for the Win32_ServerFeature API is deprecated.
The WMI provider for Active Directory is deprecated. Manage Active Directory with PowerShell cmdlets.
The WMI command-line tool (Wmic) is deprecated. Use PowerShell cmdlets instead.
The namespace for version 1.0 of WMI is deprecated. Prepare to adapt scripts for a revised namespace.
XML
XML-Data Reduced (XDR) schema elements are deprecated. Migrate Web applications that use this schema to the W3C Standards-compliant XML schema.
The XSL pattern feature of MSXML3 is deprecated. Migrate Web applications that use this feature to the W3C Standards-compliant XML Path Language (XPath)
feature set.
Copyright
This document is provided asis. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal,
reference purposes.
2012 Microsoft Corporation. All rights reserved.
Microsoft, Active Directory, Hyper-V, MS-DOS, Windows, Windows NT, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
This product contains graphics filter software; this software is based in part on the work of the Independent JPEG Group.
All other trademarks are property of their respective owners.
4.1
Copyright attributions
Published: August 21, 2013
Updated: August 21, 2012
Applies To: Windows 8.1, Windows Server 2012 R2
Copyright
Information in this document, including URL and other Internet website references, is subject to change without notice. Unless otherwise noted, the companies,
organizations, products, domain names, email addresses, logos, people, places, and events depicted in examples herein are fictitious. No association with any real
company, organization, product, domain name, email address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright
laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval
system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written
permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as
expressly provided in any written license terms from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights,
or other intellectual property.
2013 Microsoft Corporation. All rights reserved.
Microsoft, MS-DOS, Visual Basic, Visual Studio, Windows, Windows NT, Windows Server, Active Directory, Aero, BitLocker, HotStart, ReadyBoost, ReadyDrive, SideShow,
and SuperFetch are either registered trademarks or trademarks of Microsoft group of companies.
-----------------------------------------------Portions of this software are based in part on the work of Spider Systems Limited. Because Microsoft has included the Spider Systems Limited software in this
product, Microsoft is required to include the following text that accompanied such software:
Copyright 1987 Spider Systems Limited
Copyright 1988 Spider Systems Limited
Copyright 1990 Spider Systems Limited
Portions of this software are based in part on the work of Seagate Software.
Portions of this software are based in part on the work of ACE*COMM Corp. Because Microsoft has included the ACE*COMM Corp. software in this product, Microsoft is
required to include the following text that accompanied such software:
Copyright 1995-1997 ACE*COMM Corp
Portions of this software are based in part on the work of Sam Leffler and Silicon Graphics, Inc. Because Microsoft has included the Sam Leffler and Silicon Graphics
software in this product, Microsoft is required to include the following text that accompanied such software:
Copyright 1988-1997 Sam Leffler
Copyright 1991-1997 Silicon Graphics, Inc.
Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, providedthat (i) the above
copyright notices and this permission notice appear inall copies of the software and related documentation, and (ii) the names ofSam Leffler and Silicon Graphics may
not be used in any advertising orpublicity relating to the software without the specific, prior writtenpermission of Sam Leffler and Silicon Graphics.
THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY
OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FORANY SPECIAL, INCIDENTAL,
INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND,OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA, OR PROFITS,WHETHER OR NOT
ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
Portions of this software are based in part on the work of Highground Systems. Because Microsoft has included the Highground Systems software in this product,
Microsoft is required to include the following text that accompanied such software:
Copyright 19961999 Highground Systems
This product incorporates compression code from the Info-ZIP group. There are no extra charges or costs due to the use of this code, and the original compression
sources are freely available from http://www.info-zip.org/ or ftp://ftp.info-zip.org/pub/infozip/src/ on the Internet.
Portions Copyright 2000 SRS Labs, Inc
This product includes software from the 'zlib' general purpose compression library.Portions of this software are based in part on the work of ScanSoft, Inc. Because
Microsoft has included the ScanSoft, Inc. software in this product, Microsoft is required to include the following text that accompanied such software:TextBridge OCR
by ScanSoft, Inc.
Portions of this software are based in part on the work of University of Southern California. Because Microsoft has included the University of Southern California software
in this product, Microsoft is required to include the following text that accompanied such software:
Copyright 1996 by the University of Southern California
All rights reserved.
Permission to use, copy, modify, and distribute this software and its documentation in source and binary forms for any purpose and without fee is hereby granted,
provided that both the above copyright notice and this permission notice appear in all copies, and that any documentation, advertising materials, and other materials
related to such distribution and use acknowledge that the software was developed in part by the University of Southern California, Information Sciences Institute. The
name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.THE UNIVERSITY OF
SOUTHERN CALIFORNIA makes no representations about the suitability of this software for any purpose. THIS SOFTWARE IS PROVIDED "AS IS" AND WITHOUT ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Other copyrights might apply to parts of this software and are so noted when applicable.
Portions of this software are based in part on the work of James Kanze. Because Microsoft has included the James Kanze software in this product, Microsoft is required
to include the following text that accompanied such software:
COPYRIGHT AND PERMISSION NOTICE
All rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the
Software without restriction, including without limitation the rights to use, copy, publish, distribute, and/or sell copies of the Software, and to permit persons to whom
the Software is furnished to do so, provided that the above copyright notice(s) and this permission notice appear in all copies of the Software and that both the above
copyright notice(s) and this permission notice appear in supporting documentation. Permission is also given to modify the software to any extend, under the condition
that, in the modified software, the prefix "GB_" is changed to something else, and the name directories for includes files ("gb" in this distribution) is also changed.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER
RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use, or other dealings in this
Software without prior written authorization of the copyright holder.
This product contains software from Cisco ISAKMP Services.
Portions of this software are based in part on the work of RSA Data Security, Inc. Because Microsoft has included the RSA Data Security, Inc. software in this product,
Microsoft is required to include the following text that accompanied such software:
Copyright 1990, RSA Data Security, Inc. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning
or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA
Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.RSA Data Security, Inc. makes no representations
concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied
warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
Portions of this software are based in part on the work of Regents of The University of Michigan. Because Microsoft has included the Regents of The University of
Michigan software in this product, Microsoft is required to include the following text that accompanied such software:
Copyright 1995, 1996 Regents of The University of Michigan.
All Rights Reserved.
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above
copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of The
University of Michigan not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. This software is
supplied as is without expressed or implied warranties of any kind.
Copyright 1993, 1994 Regents of the University of Michigan.
All rights reserved.
Redistribution and use in source and binary forms are permitted provided that this notice is preserved and that due credit is given to the University of Michigan at Ann
Arbor. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission. This software
is provided ``as is'' without express or implied warranty.
Portions of this software are based in part on the work of Massachusetts Institute of Technology. Because Microsoft has included the Massachusetts Institute of
Technology software in this product, Microsoft is required to include the following text that accompanied such software:
Copyright 1989, 1990 by the Massachusetts Institute of Technology. All Rights Reserved.
Export of this software from the United States of America may require a specific license from the United States Government. It is the responsibility of any person or
organization contemplating export to obtain such a license before exporting.
WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted,
provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and
that the name of M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. M.I.T. makes no
representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
Under U.S. law, this software may not be exported outside the US without license from the U.S. Commerce department.
Copyright 1994 by the Massachusetts Institute of Technology. All Rights Reserved.
Export of this software from the United States of America may require a specific license from the United States Government. It is the responsibility of any person or
organization contemplating export to obtain such a license before exporting.
WITHIN THAT CONSTRAINT, permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted,
provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and
that the name of M.I.T. not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. M.I.T. makes no
representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
This product includes software developed by the University of California, Berkeley and its contributors.
Portions of this software are based in part on the work of Autodesk, Inc. Because Microsoft has included the Autodesk, Inc. software in this product, Microsoft is
required to include the following text that accompanied such software:
Copyright 1995 by Autodesk, Inc.
This product contains graphics filter software; this software is based in part on the work of the Independent JPEG Group.
This product includes software from the 'libpng' PNG reference library.
This product includes True Verb technology from KS Waves Ltd.
Contains Runtime Modules of Lotus C++ API Toolkit for Notes/Domino. (c) Copyright IBM Corporation 2003. All rights reserved.
Portions of this software are based in part on the work of SGS-Thomson Microelectronics, Inc. Because Microsoft has included the SGS-Thomson Microelectronics, Inc.
software in this product, Microsoft is required to include the following text that accompanied such software:
Copyright 1996 SGS-Thomson Microelectronics, Inc. All Rights Reserved
Portions of this software are based in part on the work of Unicode, Inc. Because Microsoft has included the Unicode, Inc. software in this product, Microsoft is required
to include the following text that accompanied such software:
COPYRIGHT AND PERMISSION NOTICE
Copyright 19912005 Unicode, Inc. All rights reserved. Distributed under the Terms of Use in http://www.unicode.org/copyright.html.
Permission is hereby granted, free of charge, to any person obtaining a copy of the Unicode data files and any associated documentation (the "Data Files") or Unicode
software and any associated documentation (the "Software") to deal in the Data Files or Software without restriction, including without limitation the rights to use, copy,
modify, merge, publish, distribute, and/or sell copies of the Data Files or Software, and to permit persons to whom the Data Files or Software are furnished to do so,
provided that (a) the above copyright notice(s) and this permission notice appear with all copies of the Data Files or Software, (b) both the above copyright notice(s) and
this permission notice appear in associated documentation, and (c) there is clear notice in each modified Data File or in the Software as well as in the documentation
associated with the Data File(s) or Software that the data or software has been modified.
THE DATA FILES AND SOFTWARE ARE PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT
HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THE DATA FILES OR SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in these Data
Files or Software without prior written authorization of the copyright holder.
The Combined PostScript Driver was the result of a cooperative development process by Adobe Systems Incorporated and Microsoft Corporation.
Portions of this software are based in part on the work of Media Cybernetics. Because Microsoft has included the Media Cybernetics software in this product, Microsoft
is required to include the following text that accompanied such software:
HALO Image File Format Library 19911992 Media Cybernetics, Inc.
Portions of this software are based in part on the work of Luigi Rizzo. Because Microsoft has included the Luigi Rizzo software in this product, Microsoft is required to
include the following text that accompanied such software:
199798 Luigi Rizzo [email protected]
Portions derived from code by Phil Karn ([email protected]), Robert Morelos-Zaragoza ([email protected]) and Hari Thirumoorthy
([email protected]), Aug 1995
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHORS AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Portions of this software are based in part on the work of W3C. Because Microsoft has included the W3C software in this product, Microsoft is required to include the
following text that accompanied such software:
1. The full text of this NOTICE in a location viewable to users of the redistributed or derivative work.
2. Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, the W3C Software Short Notice should be included (hypertext is
preferred, text is permitted) within the body of any redistributed or derivative code.
3. Notice of any changes or modifications to the files, including the date changes were made. (We recommend you provide URLs to the location from which the
code is derived.)
THIS SOFTWARE AND DOCUMENTATION IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR
DOCUMENTATION WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS.COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR
ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENTATION.
The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the software without specific, written prior permission. Title to
copyright in this software and any associated documentation will at all times remain with copyright holders.
Portions of this software are based in part on the work of Sun Microsystems, Inc. Because Microsoft has included the Sun Microsystems, Inc. software in this product,
Microsoft is required to include the following text that accompanied such software:
Sun RPC is a product of Sun Microsystems, Inc. and is provided for unrestricted use provided that this legend is included on all tape media and as a part of the software
program in whole or part. Users may copy or modify Sun RPC without charge, but are not authorized to license or distribute it to anyone else except as part of a
product or program developed by the user.
SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
Sun RPC is provided with no support and without any obligation on the part of Sun Microsystems, Inc. to assist in its use, correction, modification or enhancement.
SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC OR ANY
PART THEREOF.
In no event will Sun Microsystems, Inc. be liable for any lost revenue or profits or other special, indirect and consequential damages, even if Sun has been advised of the
possibility of such damages.
Sun Microsystems, Inc.
2550 Garcia Avenue
Mountain View, California 94043
Manufactured under license from Dolby Laboratories. Dolby and the doubleD symbol are trademarks of Dolby Laboratories. Confidential unpublished works.
Copyright 1992-1997 Dolby Laboratories. All rights reserved.
Contains Adobe [Flash and/or Shockwave] Player technology by Adobe Systems Incorporated. Copyright 1996 2013 Adobe Systems Incorporated. All rights
reserved. Adobe, Flash, and Shockwave are trademarks or registered trademarks of Adobe Systems Incorporated in the United States and internationally.
Portions of this software are based in part on the work of Andrei Alexandrescu. Because Microsoft has included the Andrei Alexandrescu software in this product,
Microsoft is required to include the following text that accompanied such software:
The Loki Library
Copyright 2001 by Andrei Alexandrescu
This code accompanies the book: Alexandrescu, Andrei. "Modern C++ Design: Generic Programming and Design Patterns Applied." Copyright 2001. AddisonWesley.
Permission to use, copy, modify, distribute and sell this software for any purpose is hereby granted without fee, provided that the above copyright notice appear in all
copies and that both that copyright notice and this permission notice appear in supporting documentation.
The author or Addison-Welsey Longman make no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied
warranty.
Portions of this software are based in part on the work of the Distributed Management Task Force, Inc. (DMTF). Because Microsoft has included software based on
DMTF specifications in this product, Microsoft is required to include the following text:
Copyright 2007 Distributed Management Task Force, Inc. DMTF. All rights reserved.
Portions of this work are derived from "The Draft Standard C++ Library" Copyright 1995 by P.J. Plauger published by PrenticeHall and are used with permission.
Portions Copyright 2002-2007 Charlie Poole or Copyright 2002-2004 James W. Newkirk, Michael C. Two, Alexei A. Vorontsov or Copyright 2000-2002 Philip A. Craig
Portions of this software are based in part on the work of Hewlett-Packard Company. Because Microsoft has included the Hewlett-Packard Company software in this
product, Microsoft is required to include the following text that accompanied such software:
Copyright 2002, 2003 HewlettPackard Company.
About Notice:
This software is based on software available from http://mpvtools.sourceforge.net.
This software processes a format called MPV. MPV is an open specification for managing collections and multimedia playlists of photo, video, and music content and
associated metadata and is available at no cost from the Optical Storage Technology Association. More information about the MPV specification can be found at
http://www.osta.org/mpv.
Permission Notice:
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the
Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice, this permission notice, and the above About Notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this
Software without prior written authorization of the copyright holder.
Portions of International CorrectSpell spelling correction system 1993 by Lernout & Hauspie Speech Products N.V. All rights reserved. The American Heritage
Dictionary of the English Language, Third Edition Copyright 1992 Houghton Mifflin Company. Electronic version licensed from Lernout & Hauspie Speech Products
N.V. All rights reserved.
Portions Copyright 2005 Gregory WildSmith
Authors Website: http://www.twilightuniverse.com/
All rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files the Software, to deal in the
Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies of the Software, and to permit
persons to whom the Software is furnished to do so, provided that the above copyright notice(s), authors website url, and this permission notice appear in all copies of
the Software and that the above copyright notice(s), authors url, and this permission notice appear in supporting documentation.
This product includes software from the Box2D engine developed by Erin Catto (www.box2d.org).
---------------------------------This product uses materials from Bigelow and Holmes
Lucida typefaces
Copyright 1985, 1986, 1987, 1988 and 1990 by Bigelow & Holmes
U.S. Patents Des. 289,420; Des. 289,421; Des. 289,422; Des. 289,773
---------------------------------Portions of this software are based in part on flex. Because Microsoft has included flex software in this product, Microsoft is required to include the following text that
accompanied such software:
Copyright (c) 2001, 2002, 2003, 2004, 2005, 2006, 2007 The Flex Project.
Copyright (c) 1990, 1997 The Regents of the University of California.
All rights reserved.
This code is derived from software contributed to Berkeley by Vern Paxson.
The United States Government has rights in this work pursuant to contract no. DE-AC03-76SF00098 between the United States Department of Energy and the University
of California.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior
written permission.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
---------------------------------This product uses materials from FastCGI
fastcgi.h
Defines for the FastCGI protocol.
Copyright (c) 1995-1996 Open Market, Inc.
This FastCGI application library source and object code (the "Software") and its documentation (the "Documentation") are copyrighted by Open Market, Inc ("Open
Market"). The following terms apply to all files associated with the Software and Documentation unless explicitly disclaimed in individual files.
Open Market permits you to use, copy, modify, distribute, and license this Software and the Documentation for any purpose, provided that existing copyright notices are
retained in all copies and that this notice is included verbatim in any distributions. No written agreement, license, or royalty fee is required for any of the authorized
uses. Modifications to this Software and Documentation may be copyrighted by their authors and need not follow the licensing terms described here. If modifications to
this Software and Documentation have new licensing terms, the new terms must be clearly indicated on the first page of each file where they apply.
OPEN MARKET MAKES NO EXPRESS OR IMPLIED WARRANTY WITH RESPECT TO THE SOFTWARE OR THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION ANY
WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL OPEN MARKET BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY
DAMAGES ARISING FROM OR RELATING TO THIS SOFTWARE OR THE DOCUMENTATION, INCLUDING, WITHOUT LIMITATION, ANY INDIRECT, SPECIAL OR
CONSEQUENTIAL DAMAGES OR SIMILAR DAMAGES, INCLUDING LOST PROFITS OR LOST DATA, EVEN IF OPEN MARKET HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. THE SOFTWARE AND DOCUMENTATION ARE PROVIDED "AS IS". OPEN MARKET HAS NO LIABILITY IN CONTRACT, TORT, NEGLIGENCE OR OTHERWISE
ARISING OUT OF THIS SOFTWARE OR THE DOCUMENTATION.
---------------------------------This product uses materials from PJ Naughters Base64 Implementation.
Copyright (c) 1999 - 2004 by PJ Naughter.
All rights reserved.
Used by permission.
---------------------------------This product uses materials from RFC 3174.
Copyright (C) The Internet Society (2001). All Rights Reserved.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation
may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references
to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights
defined in the Internet Standards process must be followed, or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE
DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT
INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
---------------------------------This product uses materials from RFC 3550.
Copyright (C) The Internet Society (2001). All Rights Reserved.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation
may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this document itself may not be modified in any way, such as by removing the copyright notice or references
to the Internet Society or other Internet organizations, except as needed for the purpose of developing Internet standards in which case the procedures for copyrights
defined in the Internet Standards process must be followed, or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE
DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT
INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
---------------------------------This product uses materials copyright Bob Jenkins.
(c) Bob Jenkins, 1996. [email protected].
You may use this code any way you wish, private, educational, or commercial, as long as this whole comment accompanies it.
See http://ourworld.compuserve.com/homepages/bob_jenkins/evahash.htm
Use to detect changes between revisions of documents, assuming nobody is trying to cause collisions. Do NOT use for cryptography.
---------------------------------This product uses materials copyright OpenVision Technologies, Inc. Copyright 1993 by OpenVision Technologies, Inc.
Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above
copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of
OpenVision not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. OpenVision makes no
representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO
EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE,
DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
---------------------------------Copyright (c) 2006 by BEA, BMC, CA, Cisco, Dell, EMC, HP, IBM, Intel, Microsoft, and Sun. All rights reserved.
Permission to copy, display, and distribute this Service Modeling Language (SML) Schema Document, in any medium without fee or royalty is hereby granted, provided
that you include the following on ALL copies of the SML Schema
Document, or portions thereof, that you make:
BEA, BMC, CA, Cisco, Dell, EMC, HP, IBM, Intel, Microsoft, and Sun collectively, the Authors each agree to grant you a royaltyfree license, under reasonable, non
discriminatory terms and conditions to their respective patents that they deem necessary to implement the Service Modeling Language Schema Document.
THE SML SCHEMA DOCUMENT IS PROVIDED "AS IS," AND THE AUTHORS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT
LIMITED TO, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR TITLE; THAT THE CONTENTS OF THE SML SCHEMA
DOCUMENT ARE SUITABLE FOR ANY PURPOSE; NOR THAT THE IMPLEMENTATION OF SUCH CONTENTS WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS,
TRADEMARKS OR OTHER RIGHTS.THE AUTHORS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT
OF OR RELATING TO ANY USE OR DISTRIBUTION OF THE SML SCHEMA DOCUMENT.
The name and trademarks of the Authors may NOT be used in any manner, including advertising or publicity pertaining to the SML Schema Document or its contents
without specific, written prior permission. Title to copyright in the SML Schema Document will at all times remain with the Authors.
(c) 2001-2006 BEA Systems, Inc., BMC Software, CA, Inc.,
International Business Machines Corporation, Layer 7 Technologies, Microsoft Corporation, Inc., Novell, Inc. and VeriSign, Inc. All rights reserved.
Permission to copy, display, perform, modify and distribute WS-AUTHORIZATION.XSD (the "Document"), and to authorize others to do the foregoing, in any medium
without fee or royalty is hereby granted for the purpose of developing and evaluating the Document.
BEA Systems, BMC Software, CA Inc., IBM, Layer 7 Technologies, Microsoft, Novell and VeriSign (collectively, the "Authors") each agree to grant a license to third parties,
under royalty-free and otherwise reasonable, non-discriminatory terms and conditions, to their respective essential patent claims that they deem necessary to implement
the Document.
THE DOCUMENT IS PROVIDED "AS IS," AND THE AUTHORS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR TITLE; THAT THE CONTENTS OF THE DOCUMENT IS SUITABLE
FOR ANY PURPOSE; NOR THAT THE IMPLEMENTATION OF SUCH CONTENTS WILL NOT INFRINGE ANY THIRD PARTY, PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER
RIGHTS.
THE AUTHORS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE DOCUMENT
OR THE PERFORMANCE OR IMPLEMENTATION OF THE CONTENTS THEREOF.
You may remove these disclaimers from your modified versions of the Document provided that you effectively disclaim all warranties and liabilities on behalf of all
copyright holders in the copies of any such modified versions you distribute.
The name and trademarks of the Authors may NOT be used in any manner, including advertising or publicity pertaining to the Document or its contents without specific,
written prior permission. Title to copyright in the Document will at all times remain with the Authors.
(c) 2001-2006 BEA Systems Inc., International Business Machines Corporation, Microsoft Corporation, Inc., SAP AG, Sonic Software, and VeriSign, Inc. All rights reserved.
Permission to copy and display the WS-Policy Specification (the "Specification", which includes WSDL and schema documents), in any medium without fee or royalty is
hereby granted, provided that you include the following on ALL copies of the WS-Policy Specification, that you make:
BEA Systems, IBM, Microsoft, SAP, Sonic Software, and VeriSign (collectively, the "Authors") each agree to grant you a license, under royalty-free and otherwise
reasonable, non-discriminatory terms and conditions, to their respective essential patent claims that they deem necessary to implement the WS-Policy Specification.
THE WS-POLICY SPECIFICATION IS PROVIDED "AS IS," AND THE AUTHORS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT
LIMITED TO, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR TITLE; THAT THE CONTENTS OF THE WS-POLICY
SPECIFICATION ARE SUITABLE FOR ANY PURPOSE; NOR THAT THE IMPLEMENTATION OF SUCH CONTENTS WILL NOT INFRINGE ANY THIRD PARTY PATENTS,
COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS.
THE AUTHORS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF OR RELATING TO ANY USE OR
DISTRIBUTION OF THE WS-POLICY SPECIFICATION.
The name and trademarks of the Authors may NOT be used in any manner, including advertising or publicity pertaining to the WS-Policy Specification or its contents
without specific, written prior permission. Title to copyright in the WS-Policy Specification will at all times remain with the Authors.
No other rights are granted by implication, estoppel or otherwise.
---------------------------------This product uses materials authored by J. Zobel.Quickly computes a hash value from a sequence of bytes.This type of hash is NOT CRYPTOGRAPHIC; it is designedonly
for use in hash tables. The author has made itpublic domain as long as it has this comment:
Author: J. Zobel, April 2001. Permission to use this codeis freely granted, provided that this statement is retained.
---------------------------------This product uses materials copyright Regents of the University of California.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
This product includes software developed by the University of California, Berkeley and its contributors.
4. Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
---------------------------------This product uses materials copyright OASIS.
Copyright OASIS Open 2002-2006. All Rights Reserved.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation
may be prepared, copied, published and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this document itself does not be modified in any way, such as by removing the copyright notice or references
to OASIS, except as needed for the purpose of developing OASIS specifications, in which case the procedures for copyrights defined in the OASIS Intellectual Property
Rights document must be followed, or as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns.
This document and the information contained herein is provided on an AS IS basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
---------------------------------This product uses materials copyright David Gottner.
Copyright 1994, David Gottner
All Rights Reserved
Permission to use, copy, modify, and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above
copyright notice, this permission notice and the following disclaimer notice appear unmodified in all copies.
I DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL I BE
LIABLE FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA, OR PROFITS, WHETHER
IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
---------------------------------This product uses materials copyright William E. Kempf, Inc.
(c) Copyright William E. Kempf 2001
Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above
copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. William E. Kempf makes no
representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
---------------------------------This file uses materials from LibTIFF.
Copyright (c) 1988-1997 Sam Leffler
Copyright (c) 1991-1997 Silicon Graphics, Inc.
Permission to use, copy, modify, distribute, and sell this software and its documentation for any purpose is hereby granted without fee, provided that (i) the above
copyright notices and this permission notice appear in all copies of the software and related documentation, and (ii) the names of Sam Leffler and Silicon Graphics may
not be used in any advertising or publicity relating to the software without the specific, prior written permission of Sam Leffler and Silicon Graphics.
THE SOFTWARE IS PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EXPRESS, IMPLIED OR OTHERWISE, INCLUDING WITHOUT LIMITATION, ANY WARRANTY
OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL SAM LEFFLER OR SILICON GRAPHICS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT OR CONSEQUENTIAL DAMAGES OF ANY KIND, OR ANY
DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER OR NOT ADVISED OF THE POSSIBILITY OF DAMAGE, AND ON ANY THEORY OF
LIABILITY, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
---------------------------------This this software is based in part on the work of the Independent JPEG Group.
Copyright (C) 1991-2013, Thomas G. Lane, Guido Vollbeding.
All Rights Reserved except as specified below.
Permission is hereby granted to use, copy, modify, and distribute this software (or portions thereof) for any purpose, without fee, subject to these conditions:
1. If any part of the source code for this software is distributed, then this README file must be included, with this copyright and no-warranty notice unaltered; and
any additions, deletions, or changes to the original files must be clearly indicated in accompanying documentation.
2. If only executable code is distributed, then the accompanying documentation must state that "this software is based in part on the work of the Independent JPEG
Group".
3. Permission for use of this software is granted only if the user accepts full responsibility for any undesirable consequences; the authors accept NO LIABILITY for
damages of any kind.
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an
acknowledgment in the product documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
This work was supported in part by funding from the Defense Advanced Research Projects Agency and the National Science Foundation of the United States of America,
and the CMU Sphinx Speech Consortium.
THIS SOFTWARE IS PROVIDED BY CARNEGIE MELLON UNIVERSITY ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY NOR
ITS EMPLOYEES BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
------------------------------This product uses materials copyright Silicon Graphics, Inc.
Copyright (C) Silicon Graphics, Inc. All Rights Reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the
Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice including the dates of first publication and either this permission notice or a reference to http://oss.sgi.com/projects/FreeB/ shall be included
in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIESOF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ANDNONINFRINGEMENT. IN NO EVENT SHALL SILICON GRAPHICS, INC. BELIABLE FOR ANY CLAIM, DAMAGES
OR OTHER LIABILITY, WHETHER IN ANACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF ORIN CONNECTION WITH THE SOFTWARE OR THE USE
OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of Silicon Graphics, Inc. shall not be used in advertising or otherwise to promote the sale, use or other dealings in this
Software without prior written authorization from Silicon Graphics, Inc.
-----------------------------This product uses materials copyright The NetBSD Foundation, Inc.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION
OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
------------------------------This product uses materials copyright John Dyer.
Portions derived from MediaElement.js
Copyright 2010-2013, John Dyer (http://j.hn)
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the
Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to the following conditions:The above copyright notice and this permission notice shall be included
in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
------------------------------This product uses materials copyright the World Wide Web Consortium.
Copyright (c) 1994-2000 World Wide Web Consortium, (Massachusetts Institute of Technology, Institut National de Recherche en Informatique et en Automatique, Keio
University).
All Rights Reserved.
This program is distributed under the W3C's Software Intellectual Property License. This program is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See W3C License http://www.w3.org/Consortium/Legal/
for more details.
Copyright 1995 CERN. "This product includes computer software created and made available by CERN. This acknowledgment shall be mentioned in full in any product
which includes the CERN computer software included herein or parts thereof."
License
By obtaining, using and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions.
Permission to copy, modify, and distribute this software and its documentation, with or without modification, for any purpose and without fee or royalty is hereby
granted, provided that you include the following on ALL copies of the software and documentation or portions thereof, including modifications:
The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. Any pre-existing intellectual property disclaimers, notices, or terms and
conditions. If none exist, the W3C Software Short Notice should be included (hypertext is preferred, text is permitted) within the body of any redistributed or derivative
code.
Notice of any changes or modifications to the files, including the date changes were made. (We recommend you provide URIs to the location from which the code is
derived.)
Disclaimers
THIS SOFTWARE AND DOCUMENTATION IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR
DOCUMENTATION WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS.
COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR
DOCUMENTATION.
The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the software without specific, written prior permission. Title to
copyright in this software and any associated documentation will at all times remain with copyright holders.
------------------------------This product uses materials copyright W3C.
Copyright 1998-2004 W3C (MIT, ERCIM, Keio),
All Rights Reserved. Permission to use, copy, modify and distribute the SSML core schema and its accompanying documentation for any purpose and without fee is
hereby granted in perpetuity, provided that the above copyright notice and this paragraph appear in all copies. The copyright holders make no representation about
the suitability of the schema for any purpose. It is provided "as is" without expressed or implied warranty.
------------------------------This product uses materials copyright Ralph Hancock, and John Hudson.
Hebrew OpenType Layout logic copyright (c) 2003 & 2007, Ralph Hancock & John Hudson. This layout logic for Biblical Hebrew is open source software under the MIT
License.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the
Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
------------------------------This product uses materials copyright the CodePlex Foundation.
Copyright (c) 2009 CodePlex Foundation.
All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
Neither the name of the CodePlex Foundation nor the names of its contributors may be used to endorse or promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL <COPYRIGHT HOLDER> BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
------------------------------This product uses materials copyright the University of Illinois.
University of Illinois/NCSA
Open Source License
Copyright (c) 2003-2010 University of Illinois at Urbana-Champaign.
All rights reserved.
Developed by:
LLVM Team
University of Illinois at Urbana-Champaign
http://llvm.org
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal with the
Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to
permit persons to whom the Software is furnished to do so, subject to the following conditions:
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimers.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimers in the documentation and/or other
materials provided with the distribution.
* Neither the names of the LLVM Team, University of Illinois at Urbana-Champaign, nor the names of its contributors may be used to endorse or promote products
derived from this Software without specific prior written permission.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE CONTRIBUTORS OR COPYRIGHT HOLDERS BE LIABLE
FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH
THE SOFTWARE OR THE USE OR OTHER DEALINGS WITH THESOFTWARE.
_____________________________________
All other trademarks are property of their respective owners.