Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Minor corrections to text

...

  1. Configuration of the Fragments - i.e. the protocol, connection and authentication methods to be used for the source and target parts of the operation.
  2. Configuration of the the Profile - i.e. the operation to be carried out (e.g. copy or move), the fragments to be used for the source and target parts of the transfer and any specific directories that are to be used.
    • Note that the Profile can also be used to specify other elements such as any notifications to be made or preprocessing that is to be carried out. These will be described later on.
  3. Calling the Configuration and Profile from the command line, a batch file or via the JADE API.

...