Usable access control enabled by Sensing Enterprise architectures

Size: px
Start display at page:

Download "Usable access control enabled by Sensing Enterprise architectures"

Transcription

1 Usable access control enabled by Sensing Enterprise architectures IWEI 2015 Nimes, France, May 27-29th Mikel Uriarte Itzazelaia, 27/05/2015

2 Application domain: Seaports

3 The need Port processes under stress throughput must be improved 2 or 3 times WITHOUT infrastructure investments AND full traceability of people & assets, keeping and evolving legacy systems Traceability vs efficiency

4 The need Port processes under stress throughput must be improved 2 or 3 times WITHOUT infrastructure investments AND full traceability of people & assets, keeping and evolving legacy systems Traceability vs efficiency

5 The problem... Port of Valencia is required to identify the daily 4000 users, by Spanish Authorities

6 A problem indeed

7 Valencia Port in figures Unified messaging system: PCS +400 user companies +100 million of transactions Savings in time and cost Activity Companies Freight forwarders 122 Shipping agents 64 Truck carrier 224 Container terminals 5 Other terminals 8 Depots 17 Total 440 Checking a 5000 movements list takes only 3 minutes (4 hours before having this tool)

8 Valencia Port in Europe 10 th port in EU, in number of tons (Eurostat, 2011) 8

9 Seaport needs and challenges (I) 1. Weak physical access control of people (drivers, passengers, port employees or other workers, visitors and ship crews), as stated in Directive 2005/65/EC 2. Lack of control of other vehicle passengers (copilot seat) 3. Insufficient definition in information systems (PCS or other) to enter information for access control of people. 4. Transport companies can inform about drivers, other companies inform about employees or other workers, but currently this information is optional.

10 Seaport needs and challenges (II) 5. Port authorities need fluidity in access points in order to not slow down traffic and commercial activity. 6. Access requirements may vary depending on the port sub-area and security levels. 7. Need to make a liaison with cargo control, vehicle and driver. 8. Different authorizer agent for each type of subarea (port terminal, port authority, depot, warehouse, etc.) 9. Different information provider for each element (logistic operator for containers and cargo, transport company for vehicles and drivers, shipper for passengers, companies for employees, etc.)

11 Solution approach Digital port business processes efficiency under control Port efficiency challenge: Usability challenge: Access control challenge: Access control slows down business process execution Physical-Digital world data synchronization & exchange Multi-domain, contextsensitive seamless access control for fast decision making Augment AC with Sensing Capabilities

12 Sensing AC covered processes Freight transport access control Authorized workers access control Freight operations communications access control Outsourced workers and visitors access control Port authority activity awareness Passengers access control...looking at usability and AC effectiveness

13 Solution approach principles Automate data acquisition (people, goods, vehicles, services). Accelerate muti-domain cross system and cross platform data exchange. Fast & easy multi-factor access control policy delegation with traceability. Big data context-related segmentation for fast analysis. Seamless Physical-digital world cloud-based data exchange management. Digital evidence management and auditing.

14 Contextualizing the approach, new networking levels An Internet of Everything brings together people, process, data and things to make networked connections turning information into actions more valuable and relevant

15 Future enterprise evolution

16 Contextualizing the approach

17 Sensing enterprise reference architecture SERVICE MANAGER Real World DEVICES AND OBJECTS DEVICES/ OBJECTS INTERFACE RW SENSORS AND ACTUATORS SENSOR/ ACTUATOR ABSTRACTION REAL-WORLD BUS INTER-WORLD ROUTER SERVICE MANAGER MULTIMEDIA CONTENT SERVICE USER CONTENT SERVICE SERVICE MANAGER DW SENSORS AND ACTUATORS SENSOR/ ACTUATOR ABSTRACTION DIGITAL-WORLD BUS AR/VR APPLICATIONS AR/VR INTERFACE Virtual World VW SENSORS AND ACTUATORS SENSOR/ ACTUATOR ABSTRACTION VIRTUAL-WORLD BUS INTER-WORLD ROUTER INNER- CONTEXT WORLD MANAGER SERVICE INNER- CONTEXT WORLD MANAGER SERVICE INNER- CONTEXT WORLD MANAGER SERVICE INTER-WORLD ROUTER Digital World

18 Sensing access control architecture Data bus Authorization Server

19 Sensing AC features In motion identification Multifactor authentication Centralized, dynamic and holistic AC related decision making system Smart enforcers Multidomain context integration in AC decision Real time sensoring integration in AC decision Activity tracking and processing Cloud oriented architecture Tight and adaptive enforcement Usability and fluency Policy manageability Awareness Anomaly detection Auditability Forensic analysis

20 Sensing AC implementation

21 Message brokering and policy decision making detail

22 Message flow

23 Testing scenario Source of data: in motion identification and geolocation message simulator (VW) Inter world bus activity: message brokering cluster (2 instances) (DW) Processing and analysis cluster: parallel and chained analysis threats for authorization decision making, deviation detection, accounting (2 instances) (DW) Output: authorization enforcement and recording (RW) Up to messages per second Topless 100 messaging topics Up to 4 chained threats Topless 30 addressed enforcers

24 Testing scenario Source of data: in motion identification and geolocation message simulator (VW) Inter world bus activity: message brokering cluster (2 instances) (DW) Processing and analysis cluster: parallel and chained analysis threats for authorization decision making, deviation detection, accounting (2 instances) (DW) Output: authorization enforcement and recording (RW) Up to messages per second Topless 100 messaging topics Up to 4 chained threats Topless 30 addressed enforcers Measurement reference: sensing terminal on Valencia port states an stimated flow of 8000 messages per second

25 Testing output Sensing terminal on Valencia port states an estimated flow of 8000 msg/s msg/s. Validation output states that 35% of CPU load is reached to process msg/s 8000 msg/s.

26 Conclusions Sensing AC enables: Integrated AC Holistic AC Sensing AC s performance is beyond of nowadays requirements Modularity and scalability of the ACIO solution enable high density sensitivity deployments

27 AC in organizations as a project Partners Duration 30 months Project Budget 522,660 Effort in Person Years 39,07

28 Thank you, Merci beaucoup Mikel Uriarte Itzazelaia IWEI 2015, Nimes, France 27/05/2015 Follow us!

RFID current applications and potential economic benefits

RFID current applications and potential economic benefits OECD ICCP Foresight Forum on RFID Applications and Public Policy Considerations RFID current applications and potential economic benefits Naji Najjar Director, IBM South West Europe IBM is involved in

More information

Cargo Management Software: What to Look for When Choosing a Platform

Cargo Management Software: What to Look for When Choosing a Platform White Paper Number 1 September 2014 Cargo Management Software: What to Look for When Choosing a Platform The Boeing Company 2014, QuantumID Technologies. All rights reserved. Introduction For decades in

More information

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Securing Virtualization with Check Point and Consolidation with Virtualized Security Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized

More information

SAP Supply Chain Management Elinor Castell Solution Owner Transportation, SAP SE

SAP Supply Chain Management Elinor Castell Solution Owner Transportation, SAP SE SAP Supply Chain Management Elinor Castell Solution Owner Transportation, SAP SE 2014 SAP SE or an SAP affiliate company. All rights reserved. 1 SAP Extended Supply Chain Management Solution Strategy 2

More information

Cloud security architecture

Cloud security architecture ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide

More information

Securing the private cloud

Securing the private cloud Securing the private cloud Gary Gardiner Security Engineer 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone Top Trends of 2011 1 2 3 4 5 6 7 8 9 Virtualization & Cloud Computing

More information

WESTAC 2015 Fall Member Forum Paul Bingham, Economic Development Research Group. Calgary, Alberta November 10, 2015

WESTAC 2015 Fall Member Forum Paul Bingham, Economic Development Research Group. Calgary, Alberta November 10, 2015 WESTAC 2015 Fall Member Forum Paul Bingham, Economic Development Research Group Calgary, Alberta November 10, 2015 Operations and planning for the freight transport system is fragmented reflecting the

More information

Planning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration

Planning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration Planning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration Prof. Dr. Rod Franklin, P.E. Vice President, Product Development Kuehne + Nagel Management AG Adjunct

More information

How to Leverage Big Data in the Cloud to Gain Competitive Advantage

How to Leverage Big Data in the Cloud to Gain Competitive Advantage How to Leverage Big Data in the Cloud to Gain Competitive Advantage James Kobielus, IBM Big Data Evangelist Editor-in-Chief, IBM Data Magazine Senior Program Director, Product Marketing, Big Data Analytics

More information

3 Myths about IoT in Logistics

3 Myths about IoT in Logistics 3 Myths about IoT in Logistics Executive White Paper Contents Executive Summary... 2 Myth #1: IoT benefits advanced countries only.... 3 Myth #2: We mean the same thing by internet of things.... 4 Myth

More information

Accenture Freight & Logistics Software. Achieving high performance in the ocean cargo industry

Accenture Freight & Logistics Software. Achieving high performance in the ocean cargo industry Accenture Freight & Logistics Software Achieving high performance in the ocean cargo industry 2 Large enough to carry several warehouses of goods in one journey, container ships are figuratively and literally

More information

The Liaison ALLOY Platform

The Liaison ALLOY Platform PRODUCT OVERVIEW The Liaison ALLOY Platform WELCOME TO YOUR DATA-INSPIRED FUTURE Data is a core enterprise asset. Extracting insights from data is a fundamental business need. As the volume, velocity,

More information

Management of Security Information and Events in Future Internet

Management of Security Information and Events in Future Internet Management of Security Information and Events in Future Internet Who? Andrew Hutchison 1 Roland Rieke 2 From? 1 T-Systems South Africa 2 Fraunhofer Institute for Secure Information Technology SIT When?

More information

Streaming Analytics and the Internet of Things: Transportation and Logistics

Streaming Analytics and the Internet of Things: Transportation and Logistics Streaming Analytics and the Internet of Things: Transportation and Logistics FOOD WASTE AND THE IoT According to the Food and Agriculture Organization of the United Nations, every year about a third of

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

ALICE Working Groups Descriptions. WG1: Sustainable Safe and Secure Supply Chains. Vision. Mision. Scope: Research and Innovation Areas and Challenges

ALICE Working Groups Descriptions. WG1: Sustainable Safe and Secure Supply Chains. Vision. Mision. Scope: Research and Innovation Areas and Challenges ALICE Working Groups Descriptions WG1: Sustainable Safe and Secure Supply Chains The vision of the WG is to do more with less and ensuring safety and security in the supply chains thereof contributing

More information

Deploying Big Data to the Cloud: Roadmap for Success

Deploying Big Data to the Cloud: Roadmap for Success Deploying Big Data to the Cloud: Roadmap for Success James Kobielus Chair, CSCC Big Data in the Cloud Working Group IBM Big Data Evangelist. IBM Data Magazine, Editor-in- Chief. IBM Senior Program Director,

More information

FITMAN Future Internet Enablers for the Sensing Enterprise: A FIWARE Approach & Industrial Trialing

FITMAN Future Internet Enablers for the Sensing Enterprise: A FIWARE Approach & Industrial Trialing FITMAN Future Internet Enablers for the Sensing Enterprise: A FIWARE Approach & Industrial Trialing Oscar Lazaro. olazaro@innovalia.org Ainara Gonzalez agonzalez@innovalia.org June Sola jsola@innovalia.org

More information

MODAClouds. An FP7 Integrated Project

MODAClouds. An FP7 Integrated Project MODAClouds An FP7 Integrated Project MODAClouds the consortium FP7 Integrated Project (n. 318484) Duration: Oct. 1 st, 2012 Sept 30 th, 2015 28 July, 2014 e-infrastructure Services for Society 2 MODAClouds

More information

Software and Services for the Freight & Logistics Industry. Helping ocean transportation organizations achieve high performance

Software and Services for the Freight & Logistics Industry. Helping ocean transportation organizations achieve high performance Software and Services for the Freight & Logistics Industry Helping ocean transportation organizations achieve high performance Large enough to carry several warehouses of goods in one journey, container

More information

Big Data - Infrastructure Considerations

Big Data - Infrastructure Considerations April 2014, HAPPIEST MINDS TECHNOLOGIES Big Data - Infrastructure Considerations Author Anand Veeramani / Deepak Shivamurthy SHARING. MINDFUL. INTEGRITY. LEARNING. EXCELLENCE. SOCIAL RESPONSIBILITY. Copyright

More information

WHITE PAPER. Enabling predictive analysis in service oriented BPM solutions.

WHITE PAPER. Enabling predictive analysis in service oriented BPM solutions. WHITE PAPER Enabling predictive analysis in service oriented BPM solutions. Summary Complex Event Processing (CEP) is a real time event analysis, correlation and processing mechanism that fits in seamlessly

More information

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network

More information

Globe Tracker case study

Globe Tracker case study Globe Tracker case study Vodafone Global M2M Globe Tracker transforms the global supply chain Vodafone Power to you Globe Tracker case study Globe Tracker and Vodafone M2M transform the global supply chain

More information

OSMOSE: A Paradigm for the Liquid- Sensing Enterprise

OSMOSE: A Paradigm for the Liquid- Sensing Enterprise OSMOSE: A Paradigm for the Liquid- Sensing Enterprise Sergio Gusmeroli, Carlos Agostinho, Catarina Lucena, Michele Sesana, Artur Felic, Klaus Fischer 1 Overview OSMOSE Project Motivation OSMOSE Basic Concepts

More information

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and, Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already

More information

The Identity Defined Security Alliance

The Identity Defined Security Alliance The Identity Defined Security Alliance A combined solution for achieving Identity Defined Security Whether it s creation of an authentication ceremony, definition and enforcement of policy, enforcement

More information

LOGISTICS STUDIES IN LUXEMBURG

LOGISTICS STUDIES IN LUXEMBURG LOGISTICS STUDIES IN LUXEMBURG Over the past few years, Luxembourg has continuously improved its positioning as an intercontinental logistics hub in Europe especially for contract, air and rail freight-based

More information

TIME TO RETHINK PERFORMANCE MONITORING

TIME TO RETHINK PERFORMANCE MONITORING TIME TO RETHINK PERFORMANCE MONITORING New requirements for application awareness and support for unified communications are challenging performance monitoring appliance vendors to reconsider their approach.

More information

An Introduction to Third Party Logistics. Panama - September 20, 2012

An Introduction to Third Party Logistics. Panama - September 20, 2012 An Introduction to Third Party Logistics Panama - September 20, 2012 If you don t like change, you will probably enjoy irrelevance even less CHAOS - OPPORTUNITY Before the beginning of great brilliance,

More information

Supply Chain Acceleration: Our Offering for Enabling Growth

Supply Chain Acceleration: Our Offering for Enabling Growth Supply Chain Acceleration: Our Offering for Enabling Growth Supply Chain Acceleration Services Supply Chain Acceleration (SCA) brings together 30 years of supply chain knowledge and domain expertise, that

More information

Big Data Are You Ready? Jorge Plascencia Solution Architect Manager

Big Data Are You Ready? Jorge Plascencia Solution Architect Manager Big Data Are You Ready? Jorge Plascencia Solution Architect Manager Big Data: The Datafication Of Everything Thoughts Devices Processes Thoughts Things Processes Run the Business Organize data to do something

More information

Step 5: Identify Feasible Supply Chain Configurations for Implementation

Step 5: Identify Feasible Supply Chain Configurations for Implementation Step 5: Identify Feasible Supply Chain Configurations for Implementation Step 5: Feasible Supply Chain Configurations for Implementation l For the product of your company (knowledge, product, solutions,

More information

How a Single-Platform TMS Powers Logistics Services Companies to Success

How a Single-Platform TMS Powers Logistics Services Companies to Success How a Single-Platform TMS Powers Logistics Services Companies to Success Smart logistics service providers are growing their business by leveraging the limitless possibilities of a single-platform, omni-modal

More information

European best practices in safe transport of dangerous material supported by GNSS

European best practices in safe transport of dangerous material supported by GNSS 2 nd GNSS Vulnerabilities and Solutions 2009 Conference, Baska, Croatia European best practices in safe transport of dangerous material supported by GNSS Gianmarco Baldini IPSC - JRC EC Antonella Di Fazio

More information

Enhancing Operational Capacities and Capabilities through Cloud Technologies

Enhancing Operational Capacities and Capabilities through Cloud Technologies Enhancing Operational Capacities and Capabilities through Cloud Technologies How freight forwarders and other logistics stakeholders can benefit from cloud-based solutions 2013 vcargo Cloud Pte Ltd All

More information

Protect Identities for people, workstations, mobiles, networks

Protect Identities for people, workstations, mobiles, networks ot Corporate ID Protect Identities for people, workstations, mobiles, networks Address your security needs with the leader in the corporate identity market Corporate security challenges The security of

More information

Cross-Domain Service Management vs. Traditional IT Service Management for Service Providers

Cross-Domain Service Management vs. Traditional IT Service Management for Service Providers Position Paper Cross-Domain vs. Traditional IT for Providers Joseph Bondi Copyright-2013 All rights reserved. Ni², Ni² logo, other vendors or their logos are trademarks of Network Infrastructure Inventory

More information

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches. Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference

More information

Logistics Enterprise Resource Planning in the cloud

Logistics Enterprise Resource Planning in the cloud Logistics Enterprise Resource Planning in the cloud An opportunity for opening up new markets in a globalized world Jan Andreas Daske, Gunter Teichmann SALT Solutions GmbH www.salt-solutions.de Agenda

More information

SOFTWARE. CONSULTING. SOLUTIONS. Smart IT Solutions

SOFTWARE. CONSULTING. SOLUTIONS. Smart IT Solutions SOFTWARE. CONSULTING. SOLUTIONS Smart IT Solutions 2 Content 3 4 6 8 10 11 12 14 15 dbh Logistics IT AG Key Competences and Overview Customs & Foreign Trade Solutions for Customs Clearance in Europe Compliance

More information

Logistics service is more than just transporting things from A to B

Logistics service is more than just transporting things from A to B best4log-x We Transport You into the Future Logistics service is more than just transporting things from A to B For you, shipping, handling and warehouse logistics go hand in hand Transport and warehouse

More information

Securing The Connected Enterprise

Securing The Connected Enterprise Securing The Connected Enterprise Pack Expo 2015 Las Vegas Chelsea An Business Development Lead, Network & Security PUBLIC Copyright 2015 Rockwell Automation, Inc. All Rights Reserved. 8 Connected Enterprise

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

Introducing Oracle Exalytics In-Memory Machine

Introducing Oracle Exalytics In-Memory Machine Introducing Oracle Exalytics In-Memory Machine Jon Ainsworth Director of Business Development Oracle EMEA Business Analytics 1 Copyright 2011, Oracle and/or its affiliates. All rights Agenda Topics Oracle

More information

Transportation Management Systems Solutions:

Transportation Management Systems Solutions: Transportation Management Systems Solutions: The Workhorse of Logistics 866.672.2862 m33integrated.com 511 Rhett Street, Suite 3 Greenville, South Carolina 29601 Few advances in commercial transportation

More information

The Internet of ANYthing

The Internet of ANYthing The of ANYthing Abstract It is projected that by 2020 there will be 50 billion things connected to the. This presents both unprecedented opportunity and challenge. In the global network of things, new

More information

The world s most popular transportation modeling suite

The world s most popular transportation modeling suite technical brochure of cube The world s most popular transportation modeling suite Cube is the most widely used and most complete transportation analysis system in the world. With Cube 5, Citilabs integrates

More information

Seed4C: A Cloud Security Infrastructure validated on Grid 5000

Seed4C: A Cloud Security Infrastructure validated on Grid 5000 Seed4C: A Cloud Security Infrastructure validated on Grid 5000 E. Caron 1, A. Lefray 1, B. Marquet 2, and J. Rouzaud-Cornabas 1 1 Université de Lyon. LIP Laboratory. UMR CNRS - ENS Lyon - INRIA - UCBL

More information

Internet Connected Devices: Evolving from the Internet of Things to the Internet of Everything. Bill Morelli Associate Director

Internet Connected Devices: Evolving from the Internet of Things to the Internet of Everything. Bill Morelli Associate Director Internet Connected Devices: Evolving from the Internet of Things to the Internet of Everything Bill Morelli Associate Director SEMI Texas Fall Outlook October 30, 2013 IoT vs Connected Devices Internet

More information

7 Ways Application Infrastructure and Middleware will drive growth. Barry Sponsler Solution Consultant

7 Ways Application Infrastructure and Middleware will drive growth. Barry Sponsler Solution Consultant 7 Ways Application Infrastructure and Middleware will drive growth Barry Sponsler Solution Consultant Growth-based B2B ecommerce challenges What B2B ecommerce challenges do growing companies face? Medical

More information

Overview to the Cisco Mobility Services Architecture

Overview to the Cisco Mobility Services Architecture Overview to the Cisco Mobility Services Architecture Introduction Business has gone mobile. The number of employees that expect access to network resources to improve productivity has increased significantly

More information

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation

Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core

More information

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet

More information

Cisco Passguide 648-385 Exam Questions & Answers

Cisco Passguide 648-385 Exam Questions & Answers Cisco Passguide 648-385 Exam Questions & Answers Number: 648-385 Passing Score: 800 Time Limit: 120 min File Version: 34.1 http://www.gratisexam.com/ Cisco 648-385 Exam Questions & Answers Exam Name: CXFF

More information

NEC s Juniper Technology Brief Issue 2

NEC s Juniper Technology Brief Issue 2 NEC s Juniper Technology Brief Issue 2 Inside This Issue: Juniper s New SPACE Solutions, Datacentre, Services and Switches Product Releases For further information email info@nec.co.nz or visit www.nec.co.nz

More information

Ericsson Intelligent Traffic Management Solutions. Presented by Renato Filjar, Ericsson Nikola Tesla, Zagreb, Croatia

Ericsson Intelligent Traffic Management Solutions. Presented by Renato Filjar, Ericsson Nikola Tesla, Zagreb, Croatia Ericsson Intelligent Traffic Management Solutions Presented by Renato Filjar, Ericsson Nikola Tesla, Zagreb, Croatia Challenges of modern transport can only be solved by intelligent systems that integrates

More information

10 Best Practices for Application Performance Testing

10 Best Practices for Application Performance Testing Business white paper 10 Best Practices for Application Performance Testing Leveraging Agile Performance Testing for Web and Mobile Applications 10 Best Practices for Application Performance Testing Table

More information

How can the Future Internet enable Smart Energy?

How can the Future Internet enable Smart Energy? How can the Future Internet enable Smart Energy? FINSENY overview presentation on achieved results Prepared by the FINSENY PMT April 2013 Outline Motivation and basic requirements FI-PPP approach FINSENY

More information

Superior Web Application Performance in the Cloud

Superior Web Application Performance in the Cloud SOLUTION WHITE PAPER Superior Web Application Performance in the Cloud Ensuring consistent service levels for users CONTENTS INTRODUCTION....................................................... 1 THE USER

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

Add a new perspective to your supply chain management.

Add a new perspective to your supply chain management. STATUS: 500 UNITS PRODUCTION "PART A-507" DEPARTED ETA LAX10:00 LOCAL PRODUCTION DATE: CONFIRMED Add a new perspective to your supply chain management. 360 visibility. Active control. Moving at the speed

More information

SAP Supply Chain Solutions. Which SAP Warehouse Management Application is Right for You?

SAP Supply Chain Solutions. Which SAP Warehouse Management Application is Right for You? Which SAP Warehouse Management Application is Right for You? Executive Summary The supply chain is getting faster, more dynamic, and ultimately more challenging every day. The next level of performance

More information

Adopting Cloud Apps? Ensuring Data Privacy & Compliance. Varun Badhwar Vice President of Product Strategy CipherCloud

Adopting Cloud Apps? Ensuring Data Privacy & Compliance. Varun Badhwar Vice President of Product Strategy CipherCloud Adopting Cloud Apps? Ensuring Data Privacy & Compliance Varun Badhwar Vice President of Product Strategy CipherCloud Agenda Cloud Adoption & Migration Challenges Introduction to Cloud Computing Cloud Security

More information

Transform your customer relationships. Avanade Customer Relationship Management Services

Transform your customer relationships. Avanade Customer Relationship Management Services Transform your customer relationships Avanade Customer Relationship Management Services The opportunity to improve business results with solutions that drive better customer relationships and insights

More information

ENTERPRISE CONVERGED NETWORK SOLUTION. Deliver a quality user experience, streamline operations and reduce costs

ENTERPRISE CONVERGED NETWORK SOLUTION. Deliver a quality user experience, streamline operations and reduce costs ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a quality user experience, streamline operations and reduce costs THE NEW CHALLENGES IN DELIVERING A HIGH-QUALITY USER EXPERIENCE Key trends are driving new

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

INTERNET OF THINGS EUROPE

INTERNET OF THINGS EUROPE INTERNET OF THINGS EUROPE www.internet-of-things.eu Internet of Things 2010 Conference 29-1 Nov/Dez 2010, Tokyo Workshop Session: From the INTRAnet of Things to the INTERnet of Things Establishing a common

More information

Industrial Internet @GE. Dr. Stefan Bungart

Industrial Internet @GE. Dr. Stefan Bungart Industrial Internet @GE Dr. Stefan Bungart The vision is clear The real opportunity for change surpassing the magnitude of the consumer Internet is the Industrial Internet, an open, global network that

More information

SAP Supply Chain Execution Strategy. Franz Hero, SVP Supply Chain Management & Logistics March, 2014

SAP Supply Chain Execution Strategy. Franz Hero, SVP Supply Chain Management & Logistics March, 2014 SAP Supply Chain Execution Strategy Franz Hero, SVP Supply Chain Management & Logistics March, 2014 Ready for the Future Customer Service Cost Efficiency Productivity Visibility Global Trade Compliance

More information

The High Availability and Resiliency of the Pertino Cloud Network Engine

The High Availability and Resiliency of the Pertino Cloud Network Engine The High Availability and Resiliency of the Pertino Cloud Network Engine Executive summary The emergence of cloud network architectures can be directly attributed to the evolution of business IT. As the

More information

Provide access control with innovative solutions from IBM.

Provide access control with innovative solutions from IBM. Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business

More information

SEE GREEN TO AVOID THE RED.

SEE GREEN TO AVOID THE RED. SEE GREEN TO AVOID THE RED. DATA INSIGHT THROUGHOUT THE SUPPLY CHAIN FUELS REVENUE, EFFICIENCIES, AND A GREENER FUTURE. By Abdul Abdullah OVER THE LAST 50 YEARS, INTERNATIONAL TRADE IN MANUFACTURED GOODS

More information

Six Challenges for the Privacy and Security of Health Information. Carl A. Gunter University of Illinois

Six Challenges for the Privacy and Security of Health Information. Carl A. Gunter University of Illinois Six Challenges for the Privacy and Security of Health Information Carl A. Gunter University of Illinois The Six Challenges 1. Access controls and audit 2. Encryption and trusted base 3. Automated policy

More information

Data Center Network Evolution: Increase the Value of IT in Your Organization

Data Center Network Evolution: Increase the Value of IT in Your Organization White Paper Data Center Network Evolution: Increase the Value of IT in Your Organization What You Will Learn New operating demands and technology trends are changing the role of IT and introducing new

More information

Data Centric Systems (DCS)

Data Centric Systems (DCS) Data Centric Systems (DCS) Architecture and Solutions for High Performance Computing, Big Data and High Performance Analytics High Performance Computing with Data Centric Systems 1 Data Centric Systems

More information

Intelligent Transportation Solutions for Sustainable City Logistics: Issues and Prospects

Intelligent Transportation Solutions for Sustainable City Logistics: Issues and Prospects TRANSPORTATION CENTER NORTHWESTERN UNIVERSITY Intelligent Transportation Solutions for Sustainable City Logistics: Issues and Prospects Hani S. Mahmassani LOGISTICS part of the supply chain process that

More information

Airbus PLM A350 Manufacturing Engineering strategy

Airbus PLM A350 Manufacturing Engineering strategy Jean-Bernard Hentz PLM R&T Airbus PLM A350 Manufacturing Engineering strategy Content 1 1 AIRBUS today 2 2 AIRBUS PLM Strategy for manufacturing 3 Some ideas for advanced research 4 Conclusion a world

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

How Solace Message Routers Reduce the Cost of IT Infrastructure

How Solace Message Routers Reduce the Cost of IT Infrastructure How Message Routers Reduce the Cost of IT Infrastructure This paper explains how s innovative solution can significantly reduce the total cost of ownership of your messaging middleware platform and IT

More information

move move us Newsletter 2014 Content MoveUs has successfully finished the first year of the project!

move move us Newsletter 2014 Content MoveUs has successfully finished the first year of the project! move us ICT CLOUD-BASED PLATFORM AND MOBILITY SERVICES : AVAILABLE, UNIVERSAL AND SAFE FOR ALL USERS MoveUs has successfully finished the first year of the project! Newsletter 2014 Welcome to MoveUs newsletter.

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Krishna Markande, Principal Architect Sridhar Murthy, Senior Architect. Unleashing the Potential of Cloud for Performance Testing

Krishna Markande, Principal Architect Sridhar Murthy, Senior Architect. Unleashing the Potential of Cloud for Performance Testing Krishna Markande, Principal Architect Sridhar Murthy, Senior Architect Unleashing the Potential of Cloud for Performance Testing 1 Agenda Software testing and Performance testing overview Leveraging cloud

More information

Strategic Healthcare IT Advanced Research. SHARPS Project and ILHIE Prototype June 26, 2013

Strategic Healthcare IT Advanced Research. SHARPS Project and ILHIE Prototype June 26, 2013 Strategic Healthcare IT Advanced Research Projects on Security (SHARPS) SHARPS Project and ILHIE Prototype June 26, 2013 Strategic Health IT Advanced Research Projects (SHARP) SHARP Area 1 Security and

More information

MANAGING USER DATA IN A DIGITAL WORLD

MANAGING USER DATA IN A DIGITAL WORLD MANAGING USER DATA IN A DIGITAL WORLD AIRLINE INDUSTRY CHALLENGES AND SOLUTIONS WHITE PAPER OVERVIEW AND DRIVERS In today's digital economy, enterprises are exploring ways to differentiate themselves from

More information

SaaS in the Warehouse

SaaS in the Warehouse SaaS in the Warehouse What is SaaS? A different model for Software deployment Users do not purchase a licence up front No capital purchase for the software Users pay a ongoing usage fee for the service

More information

WildFire. Preparing for Modern Network Attacks

WildFire. Preparing for Modern Network Attacks WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends

More information

Intermodal Freight Transportation Market by Solutions, & by Services Worldwide Forecast & Analysis (2014-2019)

Intermodal Freight Transportation Market by Solutions, & by Services Worldwide Forecast & Analysis (2014-2019) Brochure More information from http://www.researchandmarkets.com/reports/2964649/ Intermodal Freight Transportation Market by Solutions, & by Services Worldwide Forecast & Analysis (2014-2019) Description:

More information

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

GETTING THE MOST FROM THE CLOUD. A White Paper presented by GETTING THE MOST FROM THE CLOUD A White Paper presented by Why Move to the Cloud? CLOUD COMPUTING the latest evolution of IT services delivery is a scenario under which common business applications are

More information

Threat-Centric Security for Service Providers

Threat-Centric Security for Service Providers Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product

More information

Inventory Routing. An advanced solution for demand forecasting, stock replenishment, and route planning and execution

Inventory Routing. An advanced solution for demand forecasting, stock replenishment, and route planning and execution Inventory Routing An advanced solution for demand forecasting, stock replenishment, and route planning and execution Our solution delivers a competitive advantage that goes beyond the capabilities of ERP,

More information

How To Make Data Streaming A Real Time Intelligence

How To Make Data Streaming A Real Time Intelligence REAL-TIME OPERATIONAL INTELLIGENCE Competitive advantage from unstructured, high-velocity log and machine Big Data 2 SQLstream: Our s-streaming products unlock the value of high-velocity unstructured log

More information

Florida SUPPLY CHAIN MANAGEMENT. Executive Summary

Florida SUPPLY CHAIN MANAGEMENT. Executive Summary Florida SUPPLY CHAIN MANAGEMENT Executive Summary SUPPLY CHAIN MANAGEMENT OVERVIEW Supply Chain Management (SCM) practices govern the selection of an appropriate mode for the movement of goods and materials

More information

SIF 3: A NEW BEGINNING

SIF 3: A NEW BEGINNING SIF 3: A NEW BEGINNING The SIF Implementation Specification Defines common data formats and rules of interaction and architecture, and is made up of two parts: SIF Infrastructure Implementation Specification

More information

Virtualization Adoption & The Next Generation of Virtualization

Virtualization Adoption & The Next Generation of Virtualization Virtualization Adoption & The Next Generation of Virtualization Stelios Charalambakis Research Analyst IT Markets Greece, Cyprus & Malta Copyright 2009 IDC. Reproduction is forbidden unless authorized.

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Business Case for Virtual Managed Services

Business Case for Virtual Managed Services Business Case for Virtual Managed Services Executive Summary Managed services allow businesses to offload day-to-day network management tasks to service providers and thus free up internal talent to focus

More information

Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS

Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Outline The WAPS project Development steps 1. Low-power wireless sensor networks

More information

Big Data Driven Knowledge Discovery for Autonomic Future Internet

Big Data Driven Knowledge Discovery for Autonomic Future Internet Big Data Driven Knowledge Discovery for Autonomic Future Internet Professor Geyong Min Chair in High Performance Computing and Networking Department of Mathematics and Computer Science College of Engineering,

More information

P13 Route Plan. E216 Distribution &Transportation

P13 Route Plan. E216 Distribution &Transportation P13 Route Plan Vehicle Routing Problem (VRP) Principles of Good Routing Technologies to enhance Vehicle Routing Real-Life Application of Vehicle Routing E216 Distribution &Transportation Vehicle Routing

More information