Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download ""

Transcription

1 Cisco Self-D efen d in g N et w Adaptive Threat Defense or k Latest Product Announcements 1

2 N ew Secu r it y Ch a llen g es E d g e F i r e w a l l i n g I n t r u s i o n & W o r m M i t i g a t i o n I n t e r n a l F i r e w a l l i n g a n d D e p a r t m e n t S e p a r a t i o n Vi r u s, & W o r m M i t i g a t i o n? S p y w a r e? VPN L o c a t i o n o r U s e r - b a s e d Po l i c i e s? VPN Access B l e n d e d T h r e a t s? A p p l i c a t i o n & Po r t 8 0 M i s u s e? D e n i a l o f S e r v i c e? T r o j a n s? R e m o t e A c c e s s a n d E x t r a n e t C o n t e n t M a n a g e m e n t Evolution of Threats 2

3 QQ Adaptive Threat Defense in Action Access Control, PP aa ck et I I nsp ecti on Ap p p li li ca ti ti on I I ntelli g g ence, Content I I nsp ecti on, V V i i ru ru s M M i i ti ti g g a a ti ti on I I d d enti ty ty, V V i i rtu a a li li z z a a ti ti on, Q Q os S S eg m m enta ti ti on, T T ra ra f f f f i i c V V i i si b b i i li li ty ty Ap p p I I nsp ecti on, U U se EE nf orcem ent, W W eb Control Application Security M M a a lw lw a a re/ Content D D ef ense, Anom aa ly ly D D etecti on Anti-X DD ef ens es T T ra ra f f f f i i c/ Ad m m i i ssi on Control, PP roa cti vv e R R esp onse CC ontainm ent && CC ontrol CC ii ss cc o o RR oo uu tt ee r r VPN CC SS AA CC ii ss cc o o DD DD oo SS CC aa tt aa ll yy ss tt VPN Access CC ii ss cc o o RR oo uu tt ee r r CC aa tt aa ll yy ss t t PI XX II dd ee nn tt ii tt yy -B aa ss ee dd Ne tt ww oo rr kk ii nn gg NA CC CC SS AA uu aa rr aa nn tt ii nn e e VL AA N CC ii ss cc o o II PS CC SS AA 3

4 OO Q O M OO OO S W I nteg rated S ec u rity I n Ac tio n: O utb reak Prev enti on E l ements Identify AA no mm aa ll oo uu ss BB eh aa vv io rr ( N A C ), A V, C S A N A C, A V C S A Identify aa nd PP rr ev ent uu tb rr ea kk ss PP er im eter PP rr oo tec tio n fo r r bb rr aa nc h h aa gg aa ins t ww oo rr mm s s,, vv ir uu ss es,, etc.. vv ia IO S S FF W W // IP SS C is c o IS R PP rr ev ent OO uu tb rr ea k k Intr oo du cc tio n aa nd PP rr oo pp aa gg aa tio n C i sco C l ea n Pi p e f f er ed T h r o u g h a n a g ed S ecu r i t y Pr o v i d er Service Provider N et w ork EE rr cc OO uu rr k k CC oo oo ll uu aa rr aa R P mm // aa cc cc ss nfo e tb ea ntr Q ntine R em edia te P er it deny es PP rr ev ent uu tb rr ea k k Intr oo du cc tio n && PP rr oo pp aa gg aa tio n C is c o IS R Identify aa nd CC oo nta in uu tb rr ea kk ss EE ns uu rr e SS ec uu rr ity CC oo mm pp ll ia nc e BB efo rr e AA ll ll oo ww ing Inter net BB rr oo ww ss ing C is c o P IX C is c o IP S S ens o r N A C, A V C S A CC oo mm pp ll aa NN oo C oo mm pp ll EE oo Identify ia nt nd n-cn ia nt ndp ints Cisco A cce ss Con t r ol S e r v e r C is c o C a ta l ys t PP rr ev ent SS er vv er - bb aa ss ed Infec tio n C o ntent E ng ine 3 r d P a r t y P ol icy S e r v e r Cisco W V M N on - R e sp on siv e A sse ssm e n t S e r v e r C S A or k s e b S e r v e r s E m a i l S e r v e r s D N S S e r v e r s HH oo ss t PP rr oo tec tio n 4

5 mm P ro du c t Anno u nc em ents S u m m ary PP rod uu cts I P S 5. 0 V P N Concentra tor 4. 7 I O S ( 1 4 ) T P I X 7. 0 Ci sco S ecu ri ty Ag ent 4. 5 Ca ta ly st D D os M od u les Ap pp li ca ti on SS ecu ri ty MM uu ll tt ii -Ve cc tt oo r r TT hh rr ee aa tt II dd ee nn tt ii ff ii cc aa tt ii oo nn SS SS L L VPN TT uu nn nn ee l l CC ll ii ee nn tt FF uu ll ll y y CC ll ii ee nn tt ll ee ss s s CC ii tt rr ii xx AA pp pp ll ii cc aa tt ii oo n n II nn ss pp ee cc tt ii oo n n // CC oo nn tt rr oo l l ff oo r r II OO S S FF ii rr ee ww aa ll ll AA pp pp ll ii cc aa tt ii oo n n II nn ss pp ee cc tt ii oo n n // CC oo nn tt rr oo l l ff oo r r FF ii rr ee ww aa ll ll EE nn hh aa nn cc ee d d Vo II P SS ee cc uu rr ii tt yy Anti -X Conta ii nm ent && Control MM aa ll ww aa rr e e,, vv ii rr uu s s,, ww oo rr m m ii tt ii gg aa tt ii oo nn CC ii ss cc o o SS ee cc uu rr e e DD ee ss kk tt oo pp EE nn hh aa nn cc ee d d II nn -L ii nn e e II PS AA nn oo mm aa ll y y GG uu aa rr d d MM oo dd uu ll ee TT rr aa ff ff ii c c AA nn oo mm aa ll y y DD ee tt ee cc tt oo r r AA cc cc uu rr aa tt e e Pr ee vv ee nn tt ii oo n n TT ee cc hh nn oo ll oo gg ii ee s s ff oo r r II nn -L ii nn e e II PS CC ii ss cc o o NA CC Ne tt ww oo rr k k FF oo uu nn dd aa tt ii oo n n Pr oo tt ee cc tt ii oo n n,, Vi rr tt uu aa l l FF ii rr ee ww aa ll l l,, II PS ee c c Vi rr tt uu aa l l II nn tt ee rr ff aa cc ee Vi rr tt uu aa l l ff ii rr ee ww aa ll l l,, QQ oo S S,, tt rr aa nn ss pp aa rr ee nn t t ff ii rr ee ww aa ll l l,, II Pv 66 SS pp yy ww aa rr ee mm ii tt ii gg aa tt ii oo nn CC oo nn tt ee xx tt -b aa ss ee d d pp oo ll ii cc ii ee ss SS yy ss tt ee m m ii nn vv ee nn tt oo rr y y // aa uu dd ii tt ii nn gg Ci sco M AR S EE vv ee nn t t cc oo rr rr ee ll aa tt ii oo n n ff oo r r pp rr oo aa cc tt ii vv e e rr ee ss pp oo nn ss ee Ci sco S ecu ri ty Au d i tor Ne tt ww oo rr kk -w ii dd e e ss ee cc uu rr ii tt y y pp oo ll ii cc y y aa uu dd ii tt ii nn g g 5

6 P ro du c t Anno u nc em ents IPS 5.0 V PN IO S ( 1 4 ) T PIX 7.0 C i s c o Se c u r i t y A g e n t ( C SA ) 4.5 C a t a l y s t D D o S M o d u l e Se c u r i t y M a n a g e m e n t - M A R S 6

7 B C isc o V P N C o nc entrato r Setting the Standard in Remote Access VPNs PRICE Integrated IPSec and SSL VPN solution D y nam ic load b alancing and dev ice clustering F lex ib le user auth entication m eth ods Integrated w eb -b ased m anagem ent Num erous industry aw ards V P N or Clu sters N x = s o f S S L VPN S e s s i o n s V P N S S L VPN S e s s i o n s V P N S S L VPN S e s s i o n s V P N S S L VPN S e s s i o n s SO HH OO RR OO BB OO SM B EE NN TT EE RR PP RR II SE F U N CT I O N AL I T Y 7

8 C u stom iz ab l e Appl ication Access AA ll l l SS SS L L VPN FF ee aa tt uu rr ee ss II nn cc ll uu dd ee d d ii n n BB aa ss e e Pr ii cc ii nn g g No SS pp ee cc ii aa l l LL ii cc ee nn ss ee s s!! Deployment Examples: Extend i ng A ppr opr i ate C onnec ti v i ty Ap p p SS ec CC CCom is co pany-m SSL anag VV PP N N ed TT unneling DD es kk top: CC lient CC PPontrolled ers is tent, ss of L tw AN are -lik env e ironm netw ork ent ed connectiv ity KK Acces now n s ss s ecurity to vv irtually pos ture any && application ss ys tem priv ileg es DD UUiv tiliz ers es application ss mm all, dd ynam req ically uirem load ents ed client PP Bos B es t-s t es option ss fclean-up f or bb road optional application acces ss L AN -lik e rem ote connectiv ity dd es ired HH CCom lientles e/ KK ios s s k k,, WWAcces eb -B s s as :: ed Acces ss UU RRncontrolled ev ers e prox env y f ironm irew alled ent - ss connection upport is ss ues UU Acces nk now s s n to ss ecurity ww eb -b as pos ed ture applications && ss ys tem and priv CCileg itrix es LL im NN o ited ss of tw application are dd ow nload acces ed s s allow ed PP os BB es ture t option as ss es ff sor s mm lim ent, ited pos ww t-s eb es application ss ion clean-up acces req s s uired and CC unm us tom anag iz ed ed acces dd kk s s tops portal of ten dd es irab le PP artner TT hh in CC Acces lient PP s s ort :: FF orw ard ing UU ncontrolled RR ev ers e prox env y f ironm irew alled ent - ss upport connection is ss ues UU nk Acces now s s n to ss ecurity ww eb,, em pos ail, ture calend && ss ys ar, tem II M M and priv ileg mm any es oth er VV ery TT CC P P gg ranular applications acces s s controls PP os Sm ture all JJ as av ss a es applet ss mm ent, dd ynam pos t-s ically es ss ion load clean-up ed req uired CC us BB es tom t option iz ed acces ff or lim s s portal ited ww eb of ten and dd es client/ irab le s s erv er applications and unm anag ed dd es kk tops 8

9 M S ec u rity C hal l eng es S S L V P N B r i ng s N ew P oi nts of A ttac k Anti -X BB ef ore SS SS L L VV PP N N SS essi on WW hh o ow ns th e end pp oi nt? EE nd pp oi nt secu ri ty pp ostu re: AV, pp ersona l ff ii rew aa ll? II s mm aa lw aa re ru nni ng?? DD uu ri ng SS SS L L VV PP N N SS essi on II s sessi on dd aa ta pp rotected?? pp pp aa pp?? Are ty ed ssw ord s rotected HH aa s mm aa lw aa re la uu nch ed?? Af ter SS SS L L VV PP N N SS essi on BB row ser ca ch ed ii ntra net ww eb pp aa gg es? BB row ser stored pp aa ssw ord s? DD ow nloa dd ed ff ii les lef t bb eh ii nd?? SS uu pp pp ll y y Pa rr tt nn ee rr E x t r a n e t D e v i c e EE mm pp ll oo yy ee e e aa t t HH oo mm ee U n m a n a g e d D e v i c e RR ee mm oo tt e e UU ss ee rr C u s t o m e r a n a g e d D e v i c e 9

10 M m C isc o S ec u re Desk to p C omp rehensiv e E ndp oint Secu rity f or SSL VPN Anti -X Com pp lete PP re-connect Assessm ent: LL oo cc aa tt ii oo n n aa ss ss ee ss ss mm ee nn t t m aa nn aa gg ee d d oo r r uu nn mm aa nn aa gg ee d d dd ee ss kk tt oo p p? SS ee cc uu rr ii tt y y pp oo ss tt uu rr e e aa ss ss ee ss ss mm ee nn t t AA V oo pp ee rr aa tt ii oo nn aa l l // uu pp -t t oo -d d aa tt e e,, pp ee rr ss oo nn aa l l ff ii rr ee ww aa ll l l oo pp ee rr aa tt ii oo nn aa l l,, mm aa ll ww aa rr ee pp rr ee ss ee nn t t? W in d ow s or X P Cisco Secure Desktop Com pp reh ensi vv e SS essi on PP rotecti on: DD aa tt a a ss aa nn dd bb oo x x aa nn d d ee nn cc rr yy pp tt ii oo n n pp rr oo tt ee cc tt s s ee vv ee rr y y aa ss pp ee cc t t oo f f ss ee ss ss ii oo nn MM aa ll ww aa rr ee dd ee tt ee cc tt ii oo n n ww ii tt h h hh oo oo kk s s tt o o M ii cc rr oo ss oo ff t t ff rr ee e e aa nn tt ii -s s pp yy ww aa rr ee ss oo ff tt ww aa rr ee O rig in a l U ser Desktop T em pora ry CSD Desktop PP ost-s S essi on Clea n-un U p p :: EE nn cc rr yy pp tt ee d d pp aa rr tt ii tt ii oo n n oo vv ee rr ww rr ii tt e e (( nn oo t t jj uu ss t t dd ee ll ee tt ii oo n n )) uu ss ii nn g g DD oo DD aa ll gg oo rr ii tt hh mm CC aa cc hh e e,, hh ii ss tt oo rr y y aa nn d d cc oo oo kk ii e e oo vv ee rr ww rr ii tt ee FF ii ll e e dd oo ww nn ll oo aa d d aa nn d d ee mm aa ii l l aa tt tt aa cc hh mm ee nn t t oo vv ee rr ww rr ii tt ee AA uu tt oo -c c oo mm pp ll ee tt e e pp aa ss ss ww oo rr d d oo vv ee rr ww rr ii tt ee Works with Desktop Guest Permissions NN o aa dd min priv il eg es req uired 10

11 W e eb V P N C l ientl ess Ac c ess F u lly C li entless C i tr i x S u ppor t Ap p p SS ec Po r t F o r w a r d i n g A p p l e t D o w n l o a d S l o w d o w n l o a d, s o f t w a r e c o n f l i c t s, b r o w s e r b l o c k s a p p l e t Ci tri x S erv er Ci tri x S erv er T r u l y C l i e n t l e s s C i t r i x S u p p o r t TT ypical SSL VV PP N N CC itrix Support Ci tri x x su pp pp ort req uu ii res vv end or SS SS L L Cli ent or JJ aa vv a a aa pp pp lets or oth er sy stem resi dd ent sof tw aa re SS ll oo w w aa pp pp ll ii cc aa tt ii oo n n ii nn ii tt ii aa tt ii oo nn MM aa y y nn oo t t ff uu nn cc tt ii oo n n dd uu e e tt o o bb rr oo ww ss ee r r ss ee cc uu rr ii tt y y ss ee tt tt ii nn gg ss Po tt ee nn tt ii aa l l ss oo ff tt ww aa rr e e cc oo nn ff ll ii cc tt s s,, ee ss pp ee cc ii aa ll ll y y oo n n nn oo nn -m m aa nn aa gg ee d d ss yy ss tt ee mm ss CC is co CC itrix Support TT ru ly cli entless Ci tri x x Access FF aa ss t t ii nn ii tt ii aa tt ii oo n n tt ii mm aa dd dd ii tt ii oo nn aa l l tt o o dd oo ww e nn oo tt hh ii nn g g nn ll oo aa dd HH ii gg h h pp ee rr ff oo rr mm aa nn cc e e nn o o ll oo cc aa l l aa pp pp ll ii cc aa tt ii oo n n tt rr aa nn ss ll aa tt ii oo nn No t t ii mm pp aa cc tt ee d d bb y y dd ii ff ff ee rr ee nn cc ee s s ii n n bb rr oo ww ss ee r r pp rr ee ff ee rr ee nn cc e e oo r r ss ee cc uu rr ii tt y y ss ee tt tt ii nn gg ss HH ii gg hh ll y y ss tt aa bb ll e e nn o o pp oo tt ee nn tt ii aa l l ff oo r r cc ll ii ee nn t t ss oo ff tt ww aa rr e e cc oo nn ff ll ii cc tt ss 11

12 SSL VPN DEMO 13

13 P ro du c t Anno u nc em ents IPS 5.0 V PN IO S ( 1 4 ) T PIX 7.0 C i s c o Se c u r i t y A g e n t ( C SA ) 4.5 C a t a l y s t D D o S M o d u l e Se c u r i t y M a n a g e m e n t 14

14 Advanc ed R o u ter S ec u rity S ervic es CC isc o II OO S S FF irewa ll ll CC isc o II OO S S II PS E n g in eerin g C is c o IO S F W C o r p o r a t e L AN I n t er n et A ccou n t in g Vi r t u a l i z e d F i r e w a l l s e r v i c e s VR F -A w a r e F i r e w a l l & I PS e c Vi r t u a l I n t e r f a c e A d v a n c e d A p p l i c a t i o n I n s p e c t i o n & C o n t r o l H T T P I n s p e c t i o n E n g i n e - Po r t 8 0 M i s u s e : I M a n d Pe e r -t o -Pe e r E m a i l Pr o t o c o l I n s p e c t i o n E n g i n e - S M T P, E S M T P, i M A P I PS S t r i n g E n g i n e s e n a b l e c u s t o m m a t c h i n g C u s t o m i z e d s i g n a t u r e s f o r n e w t h r e a t s n e w w o r m a n d a t t a c k s i g n a t u r e s D y n a m 2 D r o p P a c k et i c s e l e c t i o n o f s i g n a t u r e s S u p p o r t s n e w s i g n a t u r e s f r o m T r e n d M i c r o 4 A l a r m 3 R es et C o nn. 1 A tta c k IP S S er v er + + NN etwork FF ound aa tion Protec tion EE xx tensions 15

15 W W W C o m panies Are O pening P o rt 8 0 Attacks Enter Through Web-enabl ed Ap p l i cati ons Internet ac c es s 9 8 % Internal U s ers 7 5 % of successf ul attack s against eb serv ers are entering th rough ap p lications and not at th e netw ork lev el. R i c h m ed i a 4 3 % IM traf f i c 4 3 % eb enab led ap p s 5 5 % Port 80 eb s erv i c es 4 3 % Internet 8 0 H T T P 6 4 % of enterp ri ses h a v e op ened P ort 8 0 on th ei r f i rew a lls f or th ei r g row i ng w eb a p p li ca ti on tra f f i c Source: s e l f _ d e f e Aug n d i n g _ 2002 n e t w o r k InfoWorld/Network _ v b i e r i C i Computing s c o S y s t e m s, I n survey c. A l l r i g h of t s r IT e s e Professionals r v e d. John Pescatore, VP and Research Director, Gartner, June

16 C isco I O S F irew al l Ad v anced Ap p l i cati on I nsp ecti on and C ontrol Ap p p SS ec I a m em a il tr a ffic h o nes t! P a yl o a d P o r t 8 0 P a yl o a d P o r t 2 5 I a m h ttp w eb tr a ffic h o nes t! S erv er F arm Corporate O f f i c e HH TT TT P In ss pp ee cc tt ii oo n n EE nn gg ii nn ee D eliv ers application lev el control th roug h ins pection of port 8 0 tunneled traf f ic I O S F i a a I I P S i Conv erg ence of Ci sco rew ll nd nli ne tech nolog es C ontrol port 8 0 m is us e b y rog ue apps th at h id e traf f ic ins id e h ttp to av oid s crutiny E x a m p le: I nsta nt m essa g i ng a nd p eer-to-p eer a p p li ca ti ons su ch a s K a z a a E ma il I nspec tion E ng ine C ontrol m is us e of em ail protocols SM T P, E SM T P, I M AP, P O P ins pection eng ines I nspec tion E ng ines prov id e protoc ol a noma l y d etec tion serv ic es 18

17 C isc o I O S I P S N ew F eatures and Engi nes Al l I nl i ne! Anti -X N e w l y e n h a n c e d r o u t e r -b a s e d IPS e n a b l e s b r o a d l y - d e p l o y e d w o r m a n d t h r e a t m i t i g a t i o n s e r v i c e s -- e v e n t o r e m o t e b r a n c h o f f i c e s St r i n g E n g i n e s e n a b l e c u s t o m m a t c h i n g o f a n y s t r i n g i n t h e p a c k e t Customize signatures for quick reaction to new threats T C P S tring, U DP S tring, I C M P S tring, T rend M ic ro 4 00 w o r m a n d a t t a c k s i g n a t u r e s a d d e d m o r e t h a n t o t a l s i g n a t u r e s f r o m w h i c h t o d y n a m i c a l l y s e l e c t S up p orts Trend M i cro S i gnatures 19

18 C isc o I O S V irtu al iz ed S ervic es V R F -Aw are V i rtual F i rew al l & I P S ec V i rtual I nterf ace NN CC VV RR FF -Aw aa re V ii rtu aa l FF ii rew aa ll II PP sec V ii rtu aa l II nterf aa ce E n g in eerin g C i sco I O S F W C o r p o r a t e L AN I n t er n et T u nnel A ccou n t in g V R F s upports m ultiple ind epend ent contex ts ( ad d res s ing, routing and interf aces ) at th e b ranch location f or s eparation of d epartm ents, s ub s id iaries, or cus tom ers V R F -Aw are F W allow s cus tom ers to ad d F W to th e lis t of s erv ices av ailab le at th e ind iv id ual contex t lev el Sim plif ied I P s ec V P N conf ig uration and d es ig n ( N etw ork -aw are I P s ec) E as ier and s calab le m anag em ent, and f as ter d eploym ent of I P s ec tech nolog y E s f V 3 P N h M Q R s nh anced upport or applications th roug ulticas t, os and outing upport 20

19 SU M M A R Y 22

20 P ro du c t Anno u nc em ents S u m m ary PP rod uu cts I P S 5. 0 V P N Concentra tor 4. 7 P I X 7. 0 Ap pp li ca ti on SS ecu ri ty Anti -X Conta ii nm ent && Control I O S ( 1 4 ) T Ci sco S ecu ri ty Ag ent 4. 5 Ca ta ly st D D os M od u les Ci sco M AR S Ci sco S ecu ri ty Au d i tor 23

21 S el f-defending I nteg rated S ec u rity S y stem S ecuri ty i s not O p ti onal! s S ec urity a s a n O ption Security is an ad d -on C h alleng ing integ ration N ot cos t ef f ectiv e C annot f ocus on core priority S ec urity a s pa rt of a S y stem Security is b uilt-in I ntellig ent collab oration Appropriate s ecurity D irect f ocus on core priority 24

22 25

B y R us se ll E ri c Wr ig ht, DV M. M as te r of S ci en ce I n V et er in ar y Me di ca l Sc ie nc es. A pp ro ve d:

B y R us se ll E ri c Wr ig ht, DV M. M as te r of S ci en ce I n V et er in ar y Me di ca l Sc ie nc es. A pp ro ve d: E ff ec ts o f El ec tr ic al ly -S ti mu la te d Si lv er -C oa te d Im pl an ts a nd B ac te ri al C on ta mi na ti on i n a Ca ni ne R ad iu s Fr ac tu re G ap M od el B y R us se ll E ri c Wr ig ht,

More information

G ri d m on i tori n g w i th N A G I O S (*) (*) Work in collaboration with P. Lo Re, G. S av a and G. T ortone WP3-I CHEP 2000, N F N 10.02.2000 M e e t i n g, N a p l e s, 29.1 1.20 0 2 R o b e r 1

More information

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ). PROCEDIMIENTO DE RECUPERACION Y COPIAS DE SEGURIDAD DEL CORTAFUEGOS LINUX P ar a p od e r re c u p e ra r nu e s t r o c o rt a f u e go s an t e un d es a s t r e ( r ot u r a d e l di s c o o d e l a

More information

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct H ig h L e v e l O v e r v iew S te p h a n M a rt in S e n io r S y s te m A rc h i te ct OPEN XCHANGE Architecture Overview A ge nda D es ig n G o als A rc h i te ct u re O ve rv i ew S c a l a b ili

More information

Application Note: Cisco A S A - Ce r t if ica t e T o S S L V P N Con n e ct ion P r of il e Overview: T h i s a p p l i ca ti o n n o te e x p l a i n s h o w to co n f i g u r e th e A S A to a cco m

More information

W Cisco Kompetanse eek end 2 0 0 8 SMB = Store Mu ll ii gg hh eter! Nina Gullerud ng ulleru@ c is c o. c o m 1 Vår E n t e r p r i s e e r f a r i n g... 2 S m å o g M e llo m s t o r e B e d r i f t e

More information

UNDERSTANDING FLOW PROCESSING WITHIN THE CISCO ACE M ODULE Application de liv e r y pr odu cts can distr ib u te tr af f ic to applications and w e b se r v ice s u sing v ar y ing le v e ls of application

More information

ACE-1/onearm #show service-policy client-vips

ACE-1/onearm #show service-policy client-vips M A C E E x a m Basic Load Balancing Using O ne A r m M ode w it h S ou r ce N A T on t h e C isco A p p licat ion C ont r ol E ngine Goal Configure b a s ic l oa d b a l a nc ing (L a y er 3 ) w h ere

More information

SCO TT G LEA SO N D EM O Z G EB R E-

SCO TT G LEA SO N D EM O Z G EB R E- SCO TT G LEA SO N D EM O Z G EB R E- EG Z IA B H ER e d it o r s N ) LICA TIO N S A N D M ETH O D S t DVD N CLUDED C o n t e n Ls Pr e fa c e x v G l o b a l N a v i g a t i o n Sa t e llit e S y s t e

More information

m Future of learning Zehn J a hr e N et A c a d ei n E r f o l g s p r o g r a m Cisco E x p o 2 0 0 7 2 6. J u n i 2 0 0 7, M e sse W ie n C. D or n in g e r, b m u k k 1/ 12 P r e n t t z d e r p u t

More information

Device I n s t r u m en t a t io n E x a m p l es : I P S L A s & N et F l o w Presented by Emmanuel Tychon Techni cal M ark eti ng Eng i neer TU D resden, J anuary 1 7 th 2 0 0 7 1. C is co I O S I P

More information

IronPort Gateway Security Products The Leader in Communication Security Reiner Baumann IronPort Systems The Principles of Industry Leadership A n a l y s t L e a d e r s h i p R e c o g n i z e d a s t

More information

Enterprise Data Center A c h itec tu re Consorzio Operativo Gruppo MPS Case S t u d y : P r o g et t o D i sast er R ec o v er y Milano, 7 Febbraio 2006 1 Il G r u p p o M P S L a B a n c a M o n t e d

More information

First A S E M R e c to rs C o n f e re n c e : A sia E u ro p e H ig h e r E d u c a tio n L e a d e rsh ip D ia l o g u e Fre ie U n iv e rsitä t, B e rl in O c to b e r 2 7-2 9 2 0 0 8 G p A G e e a

More information

SIV for VoiceXM 3.0: a n g u a g e a n d A p p l ica t ion D es ig n C on s id era t ion s Ken Rehor C i s c o S y s t em s, I nc. krehor@cisco.com March 05, 2009 G VoiceXM Application Architecture PSTN

More information

Collaboration in Public H e alth be tw e e n U niv e rs ity of H e id e lbe rg and U niv e rs ity of D ar e s S alaam How t h e c oop e r a t i on e m e r g e d Informal c ont ac t s from e arly 1 9

More information

T e s t e xp re s s i o n B o d y o f i f E xi t F i g u re 1 - F l o w c h art o f th e i f s tate m M u l ti S tate m s i n th e i f B o d y : L ik

T e s t e xp re s s i o n B o d y o f i f E xi t F i g u re 1 - F l o w c h art o f th e i f s tate m M u l ti S tate m s i n th e i f B o d y : L ik MQL4 COURSE By Coders guru w w w. f orex -t sd. c om -6- Loops & Decisions Part 2 ---------------------------- We l c o m e t o t h e s ix t h l e s s o n in m y c o u r s e a b o u t M Q L 4. I h o pe

More information

M Fast forward into th e fu tu re Accelerating b u s ines s o p p o rtu nity and natio nal p ro s p erity Viktor Kovacs anaging D irecto r H u ngary & Ad riatic R egio n C h a n g e t h e w o r l d» O

More information

Data Center end users for 40G/100G and market dy nami c s for 40G/100G on S M F Adam Carter Ci s c o 1 W Now that 40GbE is part of the IEEE 802.3ba there will be a wid er array of applic ation s that will

More information

The Business Case for D om aink ey s I d ent ified M ail Andy Spillane V ic e P r es ident, Y ah o o! M February 13, 2006 ail 1 Fighting Spam & Email Abuse R eq uir es a M ulti-fac eted Appr o ac h DomainKeys

More information

W Regional Cooperation in the Field of A u tom otiv e E ngineering in S ty ria Dr. Peter Riedler 2 9.1 1.2 0 1 1 i e n GmbH Graz B u s ines s S trategy S ty ria 2 0 2 0 H is tory 1 9 9 4 1 9 9 5 1 9 9

More information

PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB

PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB M IPCC EXPRESS Product Solution (IPCC - IP Co n t a c t Ce n t e r ) E i n f ü h r u n g Ü b e r h u nd e r t M il l io ne n N u t ze r - P r o g no s e n zu f o l g e w e r d e n e s in d ie s e m J ah

More information

Put the human back in Human Resources.

Put the human back in Human Resources. Put the human back in Human Resources A Co m p l et e Hu m a n Ca p i t a l Ma n a g em en t So l u t i o n t h a t em p o w er s HR p r o f essi o n a l s t o m eet t h ei r co r p o r a t e o b j ect

More information

Video og IP TV - h v or da n p هv ir k es n et t v er k en e? t t a d A c c o u n t M a n a g S P / T o m S m t Ole-P et er R s er elec eg en 1 Hva gjorde vi u t en T V.... 2 2 0 0 m il l s am t idige

More information

2005/05/20 S A C S I S 2005 1 2005/05/20 S A C S I S 2005 4 ID ID A A ID Id P ID ID B B C C ID ID Id P ID A B ID IdP ID IdP ID ID ID A ID A ID Id P B ID B ID L A L A ID A B I D C ID OASIS: Or g a

More information

e Videobewaking ov er I P Marty K n o p e rt 1 A l l m z u l l b t g r u m a k h w k h w k z a l z r E p r m a r k t t c m a r k t Video vision: e vor en va n video en in de na ij e oek om st eb ik en

More information

EM EA. D is trib u te d D e n ia l O f S e rv ic e

EM EA. D is trib u te d D e n ia l O f S e rv ic e EM EA S e c u rity D e p lo y m e n t F o ru m D e n ia l o f S e rv ic e U p d a te P e te r P ro v a rt C o n s u ltin g S E p p ro v a rt@ c is c o.c o m 1 A g e n d a T h re a t U p d a te IO S Es

More information

Campus Sustainability Assessment and Related Literature

Campus Sustainability Assessment and Related Literature Campus Sustainability Assessment and Related Literature An Annotated Bibliography and Resource Guide Andrew Nixon February 2002 Campus Sustainability Assessment Review Project Telephone: (616) 387-5626

More information

Practice Writing the Letter A

Practice Writing the Letter A Aa Practice Writing the Letter A A a A a Write a in the blank to finish each word. c t re h d Write A in the blank to finish each word. nn US ndy Bb Practice Writing the Letter B B b B l P b Write b in

More information

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner í d : r ' " B o m m 1 E x p e r i e n c e L : i i n g S e c u r it y. 1-1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his g u id e å ] - ew i c h P e t e r M u la e n PACKT ' TAÞ$Æo

More information

proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->

proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters-> Overview of the New S ec u rity M od el WP6 Meeting V I D t G R I D C o nf er enc e B r c el o ne, 1 2-1 5 M y 2 0 0 3 Overview focus is on VOMS C A d e t il s r e in D 7. 6 Se cur it y D e sig n proxy

More information

MPLS VPN (RFC2547bis) Seminar P c h i u p c h i. i u p c h i @ c i s c c Umberto os mberto@ os t os o. om Umberto P os c h i 1 MPLS What i t I s N o t an d What I t I s MPLS IS NOT a mechanism that allows

More information

Positioning 40 and 100 GbE in data center inter-sw itch l ink ap p l ications and 40GbE PM D recom m endations Adam Carter, Cisco Al essan dro B arb ieri, Cisco 1 m Data Center inter-s w itc h l ink ap

More information

G S e r v i c i o C i s c o S m a r t C a r e u ي a d e l L a b o r a t o r i o d e D e m o s t r a c i n R ل p i d a V e r s i n d e l S e r v i c i o C i s c o S m a r t C a r e : 1 4 ع l t i m a A c

More information

«С e n tra l- A s ia n E le c tric - P o w e r C o rp o ra tio n», JS C

«С e n tra l- A s ia n E le c tric - P o w e r C o rp o ra tio n», JS C J o in t - s t o c k c o m p C E N T R A L - A S IA N E L E C T R IC P O W a n y E R C O R P O R A T IO N I n t e r n a l A u d i t P O L IC Y o f J o in t - S t o c k C o m p a n y C E N T R A L - A S

More information

IntИg r a ti o n d e s s o l u ti o ns IB M e t C i s c o : C o l l a b o r a ti o n e t C o m m u ni c a ti o ns U ni f i Иe s ( U C 2 ) Mathieu in tr at Sales Business ev elop ent anag er om unic at

More information

3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4.

3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4. C i s c o P r o f i l e C o n t a c t s & F e e d b a c k H e l p Cisc o SM B Sup p ort Assist ant Configure ASA/PIX as Easy VPN Server or Client H om e > W ork W it h M y Sec urit y D ev ic es > Cisc

More information

O s OAM Requirements for 40/100 GE Eth ernet AI S? Gary Nicholl C is co S ys t e m I E E E 8 0 2. 3 b a T as k F orce M arch 1 8, 2 0 0 8 rlan d o, F L 1 O O O O Background E t h e r n e t i s r a p i

More information

FORT WAYNE COMMUNITY SCHOOLS 12 00 SOUTH CLINTON STREET FORT WAYNE, IN 468 02 6:02 p.m. Ma r c h 2 3, 2 015 OFFICIAL P ROCEED ING S Ro l l Ca l l e a r d o f h o o l u e e o f t h e r t y m m u t y h o

More information

SCHOOL PESTICIDE SAFETY AN D IN TEG R ATED PEST M AN AG EM EN T Statutes put into law by the Louisiana Department of Agriculture & Forestry to ensure the safety and well-being of children and school personnel

More information

M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. M P L S /V P N S e c u rity M ic h a e l B e h rin g e r < m b e h rin g @ c is c o.c o m > M b e h rin g - M P L S S e c u rity 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h

More information

I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y

I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y and KB rl iak s iol mi a, hme t a ro cp hm a5 a 2k p0r0o 9f i,e ls hv oa nr t ds eu rmv oedye l o nf dae cr

More information

Unit 16 : Software Development Standards O b jec t ive T o p r o v id e a gu ide on ho w t o ac h iev e so f t wa r e p r o cess improvement through the use of software and systems engineering standards.

More information

Ontwikkelingen van R o u ter N etwer ken Fred Rabouw 1 3-t i e r R o u t e r N e t w e r k e n. Core: forwarden van grote h oeveel h eden data. D i s tri b u ti e: Cl as s i fi c eren en fi l teren A c

More information

Cisco Unified Com m u nica t ions M a na g er 6. 0 I S A M, E d u c N o N o b 2 7, 2 0 0 7 Christian Greve atio n rthw est vem er 2 0 0 7 C i s c o S y s t e m s, I n c. A l l r i g h t s r e s e r v e

More information

RIEEW 2007 C i s c o m e e t s T U D r e s d e n Device Manageability I ns tr u m entatio n ( DMI ) O ver view [ D r e s d e n 200701 1 7] B r u n o K l a u s e r C o n s u l t i n g En g i n e e r N M

More information

M Mobile Based Clinical Decision Support System Bhudeb Chakravarti & Dr. Suman Bhusan Bhattacharyya Provider & Public Health Group, VBU-HL P S aty am C om puter S ervices L im ited Bhudeb_ C hak ravarti@

More information

C o a t i a n P u b l i c D e b tm a n a g e m e n t a n d C h a l l e n g e s o f M a k e t D e v e l o p m e n t Z a g e bo 8 t h A p i l 2 0 1 1 h t t pdd w w wp i j fp h D p u b l i c2 d e b td S t

More information

AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D.

AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D. AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981 P. A. V a le s, Ph.D. SYNOPSIS Two in d ep en d en t tre a tm e n t g ro u p s, p a r t ic ip

More information

How to Subnet a Network How to use this paper Absolute Beginner: Read all Sections 1-4 N eed a q uick rev iew : Read Sections 2-4 J ust need a little h elp : Read Section 4 P a r t I : F o r t h e I P

More information

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 T e le c o m m u n ic a t io n s a n d th e C h a n g in g G e o g r a p h ie s o f K n o w le d g e T r a n s m is s io n in th e L a te

More information

118% ( n = 5). Th is m e thod is conven ien t, rap id and accu ra te. It is read ily app lied to the qua li2

118% ( n = 5). Th is m e thod is conven ien t, rap id and accu ra te. It is read ily app lied to the qua li2 2010 2 Vo l. 28 N o. 2 Feb rua ry 2010 C h inese J ou rna l of Ch rom a tography 204 208 DO I: 10. 3724 /SP. J. 1123. 2010. 00204 C 4 3,, (, 453003) : C C 4, S inoch rom OD S2B P (416 mm 200 mm, 5 m ),

More information

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process Improvement Understanding, Modelling and Improving the Software Process Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process improvement Understanding existing processes

More information

Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage

Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage CAS Loss Reserve Seminar 23 Session 3 Private Passenger Automobile Insurance Frank Cacchione Carlos Ariza September 8, 23 Today

More information

<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"

<?xml version=1.0 encoding=utf-8?> <soapenv:envelope xmlns:soapenv=http://schemas.xmlsoap.org/soap/envelope/ Applicazioni Java W S con Ax is sistema di tr ac c iab il ità ag r o al imen tar e Ing. Mario G.C.A. Cimino M.G.C.A.Cimino, Applicazioni Java-W S con Ax is, D ipar t ime nt o d i I ng e g ne r ia d e ll

More information

Morningstar Document Research

Morningstar Document Research Morningstar Document Research FORM8-K EMC INSURANCE GROUP INC - EMCI Filed: May 11, 2016 (period: May 11, 2016) Report of unscheduled material events or corporate changes. The information contained herein

More information

Cisco Connected Real Estate Lead the Experience Can Habib Vertical Sales Manager C entral & E astern E u ro p e 1 yy Trends Shaping the Future of Buildings PP oo pp uu ll at io n GG rr oo ww tt hh Doubled

More information

Overview of Spellings on www.spellzoo.co.uk

Overview of Spellings on www.spellzoo.co.uk Overview of Spellings on www.spellzoo.co.uk Year 1 Set 1: CVC words Set 2: CVC and CCVC words Set 3: CVC, CCVC and CCVCC words Set 4: Words containing 'ch', 'sh', 'th' and 'wh' Set 5: Words ending in 'll',

More information

GENERAL INFORMAT ION:

GENERAL INFORMAT ION: > > >, < > < < _ Pos ta lc od e_ > > > PERFORM ANCE APPRAISAL Employee Name: [Click here

More information

Cisco D a t a Ce n t e r N e t w or k A r ch it e ct u r e 1 What is Cisco Data Center? Cisco Systems Core Technologies A d v a nced Technologies Switching R o u ting D a ta C e nte r W ir e l e s s U

More information

ta tio n a l s c ie n c e b y s u p p o rtin g th e e m e rg in g G rid p ro to c o ls o n W in d o w s a n d

ta tio n a l s c ie n c e b y s u p p o rtin g th e e m e rg in g G rid p ro to c o ls o n W in d o w s a n d A p p e a rs in th e P ro c e e d in g s o f th e 2 0 0 5 In te rn a tio n a l C o n fe re n c e o n C o m p u ta tio n a l S c ie n c e (IC C S 2 0 0 5 ), E m o ry U n iv e rs ity, A tla n ta, G A, M

More information

bello words how to build them? tt tt

bello words how to build them? tt tt 99 practical stuff Reproducing and using this material in any form without a written permission from Underware is probhibited. p 1/8 bello words how to build them? tt tt tt 11 Rep input the same character

More information

w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 -

w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 - E ffic a c y o f S e le c tiv e M y e lo id L in e a g e L e u c o c y te D e p le tio n in P y o d e r m a G a n g re n o su m a n d P so r ia sis A sso c ia te d w ith In fla m m a to r y B o w e l D

More information

CUSTOMER INFORMATION SECURITY AWARENESS TRAINING

CUSTOMER INFORMATION SECURITY AWARENESS TRAINING CUSTOMER INFORMATION SECURITY AWARENESS TRAINING IN T RO DUCT ION T h i s c o u r s e i s d e s i g n e d to p r o v i d e yo u w i t h t h e k n o w l e d g e to p r o t e c t y o u r p e r s o n a l

More information

W h a t is m e tro e th e rn e t

W h a t is m e tro e th e rn e t 110 tv c h a n n e ls to 10 0 0 0 0 u s e rs U lf V in n e ra s C is c o S y s te m s 2 0 0 2, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h a t is m e tro e th e rn e t O b je c tiv

More information

Emerging Security T h rea ts Maurizio Taffone m t affone@ c is c o. c om P rod uc t Manag er S ec urit y E urop ean Mark et s 1 Agenda Trends in Motivation E x ist ing t h rea t s a nd L e s s ons f r

More information

Voxeo CXP Analyzer Report Samples

Voxeo CXP Analyzer Report Samples Analysis of phone self-services including business tasks, customer behavior, application tuning, and system performance TABLE OF CONTENTS Introduction... 2 Business Task Analysis... 3 Personalization Analysis...

More information

FedEx Ground Rates. Effective January 7, 2013

FedEx Ground Rates. Effective January 7, 2013 FedEx Ground Rates Effective January 7, 2013 Introduction FedEx Ground shipping services provide you with dependable, cost-effective, day-definite delivery for packages that don t require the speed of

More information

G d y n i a U s ł u g a r e j e s t r a c j i i p o m i a r u c z a s u u c z e s t n i k ó w i m p r e z s p o r t o w y c h G d y s k i e g o O r o d k a S p o r t u i R e k r e a c j i w r o k u 2 0

More information

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years Claim#:021914-174 Initials: J.T. Last4SSN: 6996 DOB: 5/3/1970 Crime Date: 4/30/2013 Status: Claim is currently under review. Decision expected within 7 days Claim#:041715-334 Initials: M.S. Last4SSN: 2957

More information

QuesCom I P -T E L E F O N I E & G S M -G A T E W A Y S Robert Urban D i rec tor I nternati onal S al es Agenda Üb e r Q u e s C o m K u n d e n M a r k t üb e r s i c h t Q u e s c o m Lös u n g Q u e

More information

1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1.

1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1. 1. O b l a s t r o z v o j s p o l k a S U U K 1. 1. Z v y š o v á n í k v a l i f i k a c e Š k o l e n í o S t u d e n t s k á u n i e U n i v e r z i t y K a r l o v y ( d á l e j e n S U U K ) z í

More information

Bonn Declaration on Regional Cooperation in Quality Assurance in Higher Education Adopted on 20 June 2007 during the Conference Enhancing Quality Across Borders R egional Cooperation in Quality Assurance

More information

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management The EU D a t a G r i d I n f o r m a t i o n a n d M o n i t o r i n g S er v i c es The European D at ag ri d P roj ec t Team http://www.eu- d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d

More information

Scope and Sequence - Synthetic Phonics Schedule

Scope and Sequence - Synthetic Phonics Schedule Correspondences () Kindy/Prep/Pre-Primary Kindy/Prep/Pre-Primary Term 1 Basic Code Power 1 Getting to Grips with Handwriting s m c t g p a o I, the, was, to, are, she Reading and beginning to spell Vocabulary

More information

Cisco Security Agent (CSA) CSA je v í c eúčelo v ý s o f t w a r o v ý ná s t r o j, k t er ý lze p o už í t k v ynuc ení r ů zný c h b ezp ečno s t ní c h p o li t i k. CSA a na lyzuje c h o v á ní a

More information

Internationalization strategy of the SEPT Program Design of market-oriented training and ed u c ation p rod u c ts Utz D o r n b e r g e r ( Un i v e r s i ty o f L e i p zi g ) & N g u y e n T h i T h

More information

Der Bologna- P roz es s u nd d i e S t aat s ex am Stefan Bienefeld i na Service-St el l e B o l o g n a d er H R K Sem in a r D er B o l o g n a P ro z es s U m s et z u n g u n d M it g es t a l t u

More information

PRIMER TESTIMONIO. -F o l i o n ú m e r o 1 2 0. ḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋ ESC RITU RA NU MERO TREINTA.- E n l a c i u d a d d e B u e n os A i r e s, c a p i t a l d e l a R e p ú b l i c

More information

Free Animal Alphabet Match. Halloween Version & Anytime version. October and November Calendar pieces

Free Animal Alphabet Match. Halloween Version & Anytime version. October and November Calendar pieces Free Animal Alphabet Match Halloween Version & Anytime version October and November Calendar pieces Aa alligator Recognize and name all upper- and lowercase letters of the alphabet. Table of Contents ALL

More information

CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. CIS CO S Y S T E M S A c c e s s T e c h n o lo g y T e le c o m /IT Co n n e c tiv ity W o rk s h o p G u ille rm o A g u irre, Cis c o Ch ile g m o.a g u irre @ c is c o.c o m S e s s io n N u m b e

More information

IV Foro de seguridad R edir IS SECURE WIRELESS LANS José C a sa d o M e l én d e z, S y st e m s E n g i n e e r, P u b l i c S e c t or S p a i n 1 A genda WLAN Security Vulnerabilities and Threats WLAN

More information

Software Quality Requirements and Evaluation, the ISO 25000 Series

Software Quality Requirements and Evaluation, the ISO 25000 Series Pittsburgh, PA 15213-3890 Software Quality Requirements and Evaluation, the ISO 25000 Series PSM Technical Working Group February 2004 Dave Zubrow Sponsored by the U.S. Department of Defense Background

More information

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m Symposium on Public Transportation in Indian Cities with Special focus on Bus Rapid Transit (BRT) System New Delhi 20-21 Jan 2010 B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g

More information

A n d r e w S P o m e r a n tz, M D

A n d r e w S P o m e r a n tz, M D T e le h e a lth in V A : B r in g in g h e a lth c a r e to th e u n d e r s e r v e d in c lin ic a n d h o m e A n d r e w S P o m e r a n tz, M D N a tio n a l M e n ta l H e a lth D ir e c to r f

More information

D The Joint Master of Science eg ree C ou rse in V eterinary P u b l ic H eal th ( MScVPH), F U -C MU Dr. L e rt ra k S ri k i t j a k a rn R e g i o n a l C e n t re f o r V e t e ri n a ry P u b l i

More information

N W IronPort Gateway Security Products Internet Ir o n P o r t S e n d e r B a s e BLOCK Incoming Threats AP P LIC AT IO N -S P EC IF IC S EC U R IT Y

N W IronPort Gateway Security Products Internet Ir o n P o r t S e n d e r B a s e BLOCK Incoming Threats AP P LIC AT IO N -S P EC IF IC S EC U R IT Y IronPort Gateway Security Products EMAIL SECURITY APPLIANCES Luk Schoonaert IronPort Systems, Inc. N W IronPort Gateway Security Products Internet Ir o n P o r t S e n d e r B a s e BLOCK Incoming Threats

More information

Service Provider IPv6 Deployment Igor Giangrossi igor.giangrossi@cisco.com 2 0 0 8 C i s c o S y s t e m s, I n c. A l l r i g h t s r e s e r v e d. C i s c o P u b l i c 1 Prerequisites: Session Abstract

More information

IT-S i c h e r h e i t Stephan Meier s m eier@ c is c o. c o m 1 The Evolution d er Z iele Vom H ob b y i s t e n z u m P r of e s s i on a l T hreats b ec o m ing inc reas ing l y d if f ic u l t to d

More information

How is phonics taught in our school? Wednesday 23 rd September 2015

How is phonics taught in our school? Wednesday 23 rd September 2015 Phonics? How is phonics taught in our school? Wednesday 23 rd September 2015 What is phonics? What is phonics? Phonics is a way of teaching children to read quickly and skilfully. They are taught how to:

More information

R e t r o f i t o f t C i r u n i s g e C o n t r o l

R e t r o f i t o f t C i r u n i s g e C o n t r o l R e t r o f i t o f t C i r u n i s g e C o n t r o l VB Sprinter D e s c r i p t i o n T h i s r e t r o f i t c o n s i s t s o f i n s t a l l i n g a c r u i s e c o n t r o l s wi t c h k i t i n

More information

PRESENTATION FOR SWERN

PRESENTATION FOR SWERN PRESENTATION FOR SWERN C lick to editm astersubtitle style Michael Queenan HISTORY Established, Growing Company Privately held Management team have history of successfully growing a company Over 50% of

More information

Printing Letters Correctly

Printing Letters Correctly Printing Letters Correctly The ball and stick method of teaching beginners to print has been proven to be the best. Letters formed this way are easier for small children to print, and this print is similar

More information

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop

More information

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management The EU D a t a G r i d D a t a M a n a g em en t (EDG release 1.4.x) T h e Eu ro p ean Dat agri d P ro j ec t T eam http://www.e u - d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d b y th e

More information

BMC ITSM Suite - nabité skúsenosťami. Juraj Izák, 13.10.2011

BMC ITSM Suite - nabité skúsenosťami. Juraj Izák, 13.10.2011 BMC ITSM Suite - nabité skúsenosťami Juraj Izák, 13.10.2011 MATERNA GmbH 2011 www.materna.com 1 Presenter Name Function E-mail Telephone Fax Mobile Ing. Juraj Izák Senior Consultant juraj.izak@materna.com

More information

Phonics. Grades K 3. Scope and Sequence

Phonics. Grades K 3. Scope and Sequence Grades K 3 Scope and Sequence Scope & Sequence Lesson Kindergarten First Grade Back to School Alphabet: Upper- and Lowercase Letters Rhyming Words Blend Syllables Letter Names Distinguish Vowel Sounds

More information

d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o

d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o P o s t a w y s p o і e c z e t s t w a w o b e c o s у b n i e p e і n o s p r a w n y c h z e s z c z e g у l n y m u w z g lb d n i e n i e m o s у b z z e s p o і e m D o w n a T h e a t t i t uodf

More information

Cisco IS High Availability (HA) In -Se r vice Sof tw ar e U p gr ad e (ISSU ) Technical verview 1 Cisco IS In-Se r v ice Sof t w a r e U p g r a d e ( ISSU ) 2 ISSU T yp if ie s Cisco s IS High Availability

More information

Tim o th y H ig h le y. tjh ig h le c s.v irg in ia.e d u. U n iv e rs ity o f V irg in ia

Tim o th y H ig h le y. tjh ig h le c s.v irg in ia.e d u. U n iv e rs ity o f V irg in ia Ma rg in a l C o s t-b e n e fit A n a ly s is fo r P re d ic tiv e F ile P re fe tc h in g Tim o th y H ig h le y D e p a rtm e n t o f C o m p u te r S c ie n c e U n iv e rs ity o f V irg in ia tjh

More information