Web Technologies and Privacy Policies for the Smart Grid

Size: px
Start display at page:

Download "Web Technologies and Privacy Policies for the Smart Grid"

Transcription

1 Web Technologies and Privacy Policies for the Smart Grid Sebastian Speiser, Andreas Wagner, Oliver Raabe and Andreas Harth Energieinformatik 2013 INSTITUTE OF APPLIED INFORMATICS AND FORMAL DESCRIPTION METHODS AND ZENTRUM FÜR ANGEWANDTE RECHTSWISSENSCHAFT KIT University of the State of Baden-Wuerttemberg and National Laboratory of the Helmholtz Association

2 Agenda 1 Introduction 2 ICT Architecture and Data Model 3 Use-Case I 4 Policies for a Privacy-aware Smart Grid 5 Use-Case II 6 Evaluation 7 Conclusion Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

3 Introduction Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

4 (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

5 (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

6 (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

7 (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

8 (Some) Key ICT Requirements Requirements, see [2, 3] R1 Lightweight data access. R2 Open and flexible data model. R3 Distinction between syntactic and semantic data content. R4 Users decide what data in which granularity to expose to whom. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

9 Contributions R1-R3: Semantic Web communication architecture (Section 2). R4: Policy model (Section 4). Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

10 Contributions R1-R3: Semantic Web communication architecture (Section 2). R4: Policy model (Section 4). Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

11 Communication Architecture Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

12 Overview: A Semantic Web-based Communication Architecture I Data access layers URIs for identification of participants. TCP/IP stack with HTTP as transfer protocol. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

13 Overview: A Semantic Web-based Communication Architecture I Data access layers URIs for identification of participants. TCP/IP stack with HTTP as transfer protocol. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

14 Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

15 Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

16 Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

17 Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

18 Overview of a Semantic Web-based Communication Architecture II Data representation layers RDF(S) (if necessary extended with OWL features) for machine-interpretable data encoding. Linked Data principles for data access: Use (HTTP) URIs for identification of entities. When someone looks up a URI, provide useful (RDF) data. Include links to other URIs. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

19 Use-Case I Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

20 Use-Case I (izeus) Smart Grid/Traffic Service Platform Data Management I Service Requests Smart Traffic Navigator Smart Meter Analyzer Service Platform... Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

21 Use-Case I (izeus) Smart Grid/Traffic Service Platform Data Management II car:uamp760e1 car:uamp760e2 RDF Data car:uamp760e rdf:type sg:vehicle ; foaf:name "UltraAmp 760e". geo:location _:loc _:loc dc:date " T12:23:45"; geo:lat " " ; geo:lon " ". Get additional data RDF Data car:uamp760e3 RDF Data Data logging Service Requests Linked Data Endpoint Smart Traffic Navigator Service Platform RDF Data Smart Meter Analyzer... Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

22 Use-Case I (izeus) Smart Grid/Traffic Service Platform Data Management III car:uamp760e2 car:uamp760e1 car:uamp760e3 Smart home at KIT Future work RDF Data Service Requests Get additional data Linked Data Endpoint Get additional data Smart Traffic Navigator Smart Meter Analyzer RDF Data Service Platform... RDF Data Data logging Get additional RDF data Data sm:meter RDF data logging RDF Data RDF sm:apt RDF RDF TCP/IP/HTTP RDF Data RDF Data WWW Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

23 Use-Case I (izeus) Smart Grid/Traffic Service Platform Data Management IV car:uamp760e1 car:uamp760e2 car:uamp760e3 Smart home at KIT Future work RDF Data Service Requests RDF Data Get additional data Linked Data Endpoint Get additional data WWW Smart Traffic Navigator Smart Meter Analyzer RDF Data Service Platform... RDF Data Data logging Get additional RDF data Data sm:meter Data logging Gridpedia as data model RDF Data RDF sm:apt RDF RDF TCP/IP/HTTP RDF Data Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

24 Privacy Policies Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

25 Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

26 Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

27 Policy Model Intuition Policies model user intent, thus, they help to preserve data privacy. A Policy is bound to its associated data. Policies are taken into account whenever data is accessed. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

28 Policy Model II Policy allows Usage purpose validfrom validto perspective recipient Date Purpose Perspective Agent Description Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

29 Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) if request and policy match, requested data and (signed) policy is sent. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

30 Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) if request and policy match, requested data and (signed) policy is sent. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

31 Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) if request and policy match, requested data and (signed) policy is sent. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

32 Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) if request and policy match, requested data and (signed) policy is sent. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

33 Policy-aware Data Access Access procedure i) Requestor performs a HTTP lookup on a URI (e.g., ex:uamp760e). ii) Web server returns an authorisation required response. iii) Requestor sends a request, i.e., a specification of identity and purpose. iv) Device matches the request with an applicable policy (either a law-based or a user policy) if request and policy match, requested data and (signed) policy is sent. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

34 Use-Case II Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

35 Use-Case II (izeus) Smart Grid/Traffic Service Platform Data Privacy I Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

36 Use-Case II (izeus) Smart Grid/Traffic Service Platform Data Privacy II Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

37 Evaluation Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

38 Scope of Evaluation Our previous works aimed at evaluation of privacy policies via German privacy laws [1, 4]. This works evaluates the practical feasibility of privacy policies stored (matched) on lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

39 Scope of Evaluation Our previous works aimed at evaluation of privacy policies via German privacy laws [1, 4]. This works evaluates the practical feasibility of privacy policies stored (matched) on lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

40 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

41 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

42 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

43 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

44 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

45 Evaluation Setting We implemented a policy matcher based on Rasqal 1. Two hardware platforms: 2.4 GHz Core2Duo laptop with 4 GB RAM. SheevaPlug device with an 1.2 GHz ARM processor and 512 MB RAM. We created of varying sizes policies, i.e., we varied # allowed usages between 1 and 75. For each size, 10 policies with random allowed usages were matched against every request Test data and source code at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

46 Evaluation Results matching time in seconds Allowed Core2Duo Denied Core2Duo Allowed ARM Denied ARM policy size Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

47 Conclusion Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

48 Conclusion By means of real-world use-cases we showed that Semantic Web technologies are applicable and highly useful Linked Data allows for efficient data access policies give effective means for technical privacy enforcement in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

49 Conclusion By means of real-world use-cases we showed that Semantic Web technologies are applicable and highly useful Linked Data allows for efficient data access policies give effective means for technical privacy enforcement in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

50 Conclusion By means of real-world use-cases we showed that Semantic Web technologies are applicable and highly useful Linked Data allows for efficient data access policies give effective means for technical privacy enforcement in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

51 Conclusion By means of real-world use-cases we showed that Semantic Web technologies are applicable and highly useful Linked Data allows for efficient data access policies give effective means for technical privacy enforcement in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

52 Conclusion By means of real-world use-cases we showed that Semantic Web technologies are applicable and highly useful Linked Data allows for efficient data access policies give effective means for technical privacy enforcement in a Smart Grid setting. We evaluated our policy approach in terms of technical feasibility w.r.t. lower-power devices. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

53 Slides will be available at Paper will be available at Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

54 Acknowledgements: izeus Project This work was supported by the German Federal Ministry of Economics and Technology (E-Energy izeus, Grant 01 ME12013). The authors are responsible for the content of the presentation. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

55 References Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

56 References I Oliver Raabe. Datenschutz im SmartGrid. Datenschutz und Datensicherheit, S. Rohjans, C. Danekas, and M. Uslar. Requirements for Smart Grid ICT-architectures. In ISGT, Andreas Wagner, Sebastian Speiser, and Andreas Harth. Semantic Web Technologies for a Smart Energy Grid: Requirements and Challenges. In ISWC, Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

57 References II Andreas Wagner, Sebastian Speiser, Oliver Raabe, and Andreas Harth. Linked Data for a Privacy-aware Smart Grid. In GI Jahrestagung, Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

58 Backup Slides Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

59 Use-Case I (izeus) Collaborative Smart Grid Ontology Gripedia I Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

60 Use-Case I (izeus) Collaborative Smart Grid Ontology Gripedia II Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

61 Use-Case I (izeus) Collaborative Smart Grid Ontology Gripedia III Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

62 Linked Data for the Smart Grid Example Legend Communication Flow Actor Domain Network Charging Station (off-premise) Metering Provider B (third party provider) Electric Vehicle ex:uamp760e ex:mary Customer Premise ex:apt Washing Machine ex:coolwash Smart Meter ex:sm Cool Wash Inc. Energy Efficiency Service Provider Metering Provider A Clearing Markets Billing Service Provider Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

63 Linked Data for the Smart Grid Example II Mary s Linked Data / / lookup on ex : coolwash ; data resides at washing machine ex : coolwash r d f : type sg : Appliance ; sg : manufacturer <h t t p : / / coolwash. com / company>; sg : owner ex : mary ; sg : washingdata washer : program40 ; sg : consumption sm: data Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

64 Linked RDF Data for the Smart Grid III Mary s Linked Data II / / lookup on sm: data ; data resides at smart meter sm: data r d f : type sg : Consumption ; r d f : value ˆ ˆ sg :kwh; i c a l : d t s t a r t T00 : 0 0 : 0 0 ; i c a l : dtend T01 : 0 0 : 0 0. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

65 Policy-aware Data Access II Matching procedure The matching procedure is implemented as a rule, checking whether... i) requestor is subsumed by the recipient description and ii) the requested purpose is subsumed by the allowed purpose (both w.r.t. the applicable policy) Assumption: the same purpose and recipient definition is employed subclass-of or same-as check is sufficient for realising the subsume operation. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

66 Policy Model III An example policy for Mary s UltraAmp 760e I washer : ecarpol r d f : type sg : P o l i c y ; i c a l : d t s t a r t T00 : 0 0 : 0 0 ˆ ˆ xs : datetime ; i c a l : dtend T23 : 5 9 : 5 9 ˆ ˆ xs : datetime ; sg : allows #ultraampuse. #ultraampuse r d f : type sg : Usage ; sg : purpose gov : Purpose# s e r v i c e ; sg : r e c i p i e n t <h t t p : / / ultraamp. com / company>; sg : perspective # ultraampperspective. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

67 Policy Model IV An example policy for Mary s Mary s UltraAmp 760e II # ultraampperspective r d f : type sg : Perspective ; sg : d e f i n i t i o n PREFIX... CONSTRUCT {?s?p?o } WHERE {?s r d f : type sg : Appliance.?s sg : manufacturer <h t t p : / / ultraamp. com / company>.?s?p?o. FILTER (? p!= sg : consumption ) }. Speiser et al. Web Technologies and Privacy Policies for the Smart Grid Energieinformatik /41

Linked Data and Complex Event Processing for the Smart Energy Grid

Linked Data and Complex Event Processing for the Smart Energy Grid Linked Data and Complex Event Processing for the Smart Energy Grid Andreas Wagner 1, Darko Anicic 2, Roland Stühmer 2, Nenad Stojanovic 2, Andreas Harth 1, and Rudi Studer 1,2 1 Institute AIFB, Karlsruhe

More information

Smart Grid Challenges and Opportunities the Norwegian Perspective

Smart Grid Challenges and Opportunities the Norwegian Perspective Smart Grid Challenges and Opportunities the Norwegian Perspective Kjell Sand, Professor, Sintef Energy Research /NTNU/ The Norwegian Smart Grid Centre IEC Open Council Oslo 2012-10-05 The Norwegian Smartgrid

More information

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server) Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2

More information

Semantics and Ontology of Logistic Cloud Services*

Semantics and Ontology of Logistic Cloud Services* Semantics and Ontology of Logistic Cloud s* Dr. Sudhir Agarwal Karlsruhe Institute of Technology (KIT), Germany * Joint work with Julia Hoxha, Andreas Scheuermann, Jörg Leukel Usage Tasks Query Execution

More information

SysAidTM Product Description

SysAidTM Product Description SysAidTM Product Description September 2006 IT Challenges As the ratio of computers to IT staff grows, so does the visibility of the IT department in organizations. Efficiency and responsiveness has become

More information

September 2009 Cloud Storage for Cloud Computing

September 2009 Cloud Storage for Cloud Computing September 2009 Cloud Storage for Cloud Computing This paper is a joint production of the Storage Networking Industry Association and the Open Grid Forum. Copyright 2009 Open Grid Forum, Copyright 2009

More information

Secure and Semantic Web of Automation

Secure and Semantic Web of Automation Secure and Semantic Web of Automation Wolfgang Kastner 1, Andreas Fernbach 1, Wolfgang Granzer 2 1 Technische Universität Wien 2 NETxAutomation Software GmbH Automation Systems Group Computer Engineering/Software

More information

Managing IBM Lotus Notes Domino 7 Servers and Users. Course Description. Audience. Course Prerequisites. Machine Requirements.

Managing IBM Lotus Notes Domino 7 Servers and Users. Course Description. Audience. Course Prerequisites. Machine Requirements. Managing IBM Lotus Notes Domino 7 Servers and Users Course Code: 190-722 Course Title: Managing IBM Lotus Notes Domino 7 Servers and Users Duration: 3 classroom equivalent days Price: 990 USD + IVA Course

More information

YZP 480...495: SAUTER Vision Center

YZP 480...495: SAUTER Vision Center YZP 480...495: SAUTER Vision Center SAUTER Vision Center 3.0 - latest-generation modular building management software for energy-efficient buildings The SAUTER Vision Center (SVC) is a web-based building

More information

Basic Scheduling in Grid environment &Grid Scheduling Ontology

Basic Scheduling in Grid environment &Grid Scheduling Ontology Basic Scheduling in Grid environment &Grid Scheduling Ontology By: Shreyansh Vakil CSE714 Fall 2006 - Dr. Russ Miller. Department of Computer Science and Engineering, SUNY Buffalo What is Grid Computing??

More information

Benchmarking the Performance of Storage Systems that expose SPARQL Endpoints

Benchmarking the Performance of Storage Systems that expose SPARQL Endpoints Benchmarking the Performance of Storage Systems that expose SPARQL Endpoints Christian Bizer 1 and Andreas Schultz 1 1 Freie Universität Berlin, Web-based Systems Group, Garystr. 21, 14195 Berlin, Germany

More information

Building Web-based Infrastructures for Smart Meters

Building Web-based Infrastructures for Smart Meters Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.

More information

Smart Cities. Photo used under Creative Commons from nigelhowe

Smart Cities. Photo used under Creative Commons from nigelhowe Smart Cities Photo used under Creative Commons from nigelhowe Photo used under Creative Commons from tim-166 Cities are for People Citier Smart cities as a web of people, things and services Workshop 2,

More information

Wrap-Up & Way Forward A Perspective from the Edge of the Smart Grid

Wrap-Up & Way Forward A Perspective from the Edge of the Smart Grid Wrap-Up & Way Forward A Perspective from the Edge of the Smart Grid Eve M. Schooler, PhD Intel s Europe Energy and Sustainability 10/23/2012 1 Commentary Sustainability, SmartGrid, Cybersecurity Beyond

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

SierraVMI Sizing Guide

SierraVMI Sizing Guide SierraVMI Sizing Guide July 2015 SierraVMI Sizing Guide This document provides guidelines for choosing the optimal server hardware to host the SierraVMI gateway and the Android application server. The

More information

Very Large Enterprise Network, Deployment, 25000+ Users

Very Large Enterprise Network, Deployment, 25000+ Users Very Large Enterprise Network, Deployment, 25000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

Semantic EPC: Enhancing Process Modeling Using Ontologies

Semantic EPC: Enhancing Process Modeling Using Ontologies Institute for Information Systems IWi Institut (IWi) für at the German Research Wirtschaftsinformatik Center for im DFKI Saarbrücken Artificial Intelligence (DFKI), Saarland University Semantic EPC: Enhancing

More information

TUM & Siemens Corporate Technology. The "Internet of Things" for industrial applications

TUM & Siemens Corporate Technology. The Internet of Things for industrial applications The "Internet of Things" for industrial applications IoT Technologies: Semantics Challenges in the Future of Embedded Networks Growing number of interconnected heterogeneous devices in different kind of

More information

Information and Communication Technology. Firewall Policy

Information and Communication Technology. Firewall Policy BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL

More information

Enterprise Network Deployment, 10,000 25,000 Users

Enterprise Network Deployment, 10,000 25,000 Users Enterprise Network Deployment, 10,000 25,000 Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared

More information

Intro to Firewalls. Summary

Intro to Firewalls. Summary Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer

More information

www.airpatrolcorp.com 2012 AirPatrol Corporation White Paper: Wireless Endpoint Security

www.airpatrolcorp.com 2012 AirPatrol Corporation White Paper: Wireless Endpoint Security www.airpatrolcorp.com 2012 AirPatrol Corporation To enhance productivity and efficiency, employees are increasingly turning to wireless devices and networks to get the job done. The security experts at

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

AuditMatic Enterprise Edition Installation Specifications

AuditMatic Enterprise Edition Installation Specifications Enterprise Edition Installation Specifications Version: 4.0 Copyright 2005 F.A.S., Inc. All rights reserved. Copyright 2008 F.A.S., Inc. All rights reserved. Copyright Notice Information contained in this

More information

Controlling and Monitoring Devices with REST

Controlling and Monitoring Devices with REST Controlling and Monitoring Devices with REST Francesco Lelli and Cesare Pautasso Faculty of Informatics University of Lugano via Buffi 13 6900 Lugano, Switzerland firstname.lastname@lu.unisi.ch Abstract.

More information

Department of Defense. Enterprise Information Warehouse/Web (EIW) Using standards to Federate and Integrate Domains at DOD

Department of Defense. Enterprise Information Warehouse/Web (EIW) Using standards to Federate and Integrate Domains at DOD Department of Defense Human Resources - Enterprise Information Warehouse/Web (EIW) Using standards to Federate and Integrate Domains at DOD Federation Defined Members of a federation agree to certain standards

More information

Total Defense Endpoint Premium r12

Total Defense Endpoint Premium r12 DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious

More information

1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM

1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM 1 HARDWARE AND SOFTWARE REQUIREMENTS FOR HAL E-BANK SYSTEM 1.1 PRECONDITIONS FOR USING HAL E-BANK: An appropriate PC with Windows XP, Windows 2003, Windows Vista or Windows 7 operating system installed;

More information

Installing GFI MailSecurity

Installing GFI MailSecurity Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install

More information

Very Large Enterprise Network Deployment, 25,000+ Users

Very Large Enterprise Network Deployment, 25,000+ Users Very Large Enterprise Network Deployment, 25,000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

Implementing the Application Control Engine Service Module

Implementing the Application Control Engine Service Module Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application

More information

The use of Semantic Web Technologies in Spatial Decision Support Systems

The use of Semantic Web Technologies in Spatial Decision Support Systems The use of Semantic Web Technologies in Spatial Decision Support Systems Adam Iwaniak Jaromar Łukowicz Iwona Kaczmarek Marek Strzelecki The INSPIRE Conference 2013, 23-27 June Wroclaw University of Environmental

More information

Specifications SMART Bridgit software

Specifications SMART Bridgit software PLEASE THINK BEFORE YOU PRINT Specifications SMART Bridgit software Version 4.2 Product description SMART Bridgit conferencing software is a cost-effective client/server application that lets you easily

More information

An Energy-aware Multi-start Local Search Metaheuristic for Scheduling VMs within the OpenNebula Cloud Distribution

An Energy-aware Multi-start Local Search Metaheuristic for Scheduling VMs within the OpenNebula Cloud Distribution An Energy-aware Multi-start Local Search Metaheuristic for Scheduling VMs within the OpenNebula Cloud Distribution Y. Kessaci, N. Melab et E-G. Talbi Dolphin Project Team, Université Lille 1, LIFL-CNRS,

More information

Looking Ahead The Path to Moving Security into the Cloud

Looking Ahead The Path to Moving Security into the Cloud Looking Ahead The Path to Moving Security into the Cloud Gerhard Eschelbeck Sophos Session ID: SPO2-107 Session Classification: Intermediate Agenda The Changing Threat Landscape Evolution of Application

More information

StruxureWare TM Data Center Expert

StruxureWare TM Data Center Expert StruxureWare TM Data Center Expert Infrastructure management from rack to row to room to building Deploy in minutes, manage from anywhere, analyze instantly, integrate with other management systems. End

More information

Security Overview Introduction Application Firewall Compatibility

Security Overview Introduction Application Firewall Compatibility Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging

More information

Addressing Self-Management in Cloud Platforms: a Semantic Sensor Web Approach

Addressing Self-Management in Cloud Platforms: a Semantic Sensor Web Approach Addressing Self-Management in Cloud Platforms: a Semantic Sensor Web Approach Rustem Dautov Iraklis Paraskakis Dimitrios Kourtesis South-East European Research Centre International Faculty, The University

More information

Windows Server 2012 2,500-user pooled VDI deployment guide

Windows Server 2012 2,500-user pooled VDI deployment guide Windows Server 2012 2,500-user pooled VDI deployment guide Microsoft Corporation Published: August 2013 Abstract Microsoft Virtual Desktop Infrastructure (VDI) is a centralized desktop delivery solution

More information

Cloud Computing mit mathematischen Anwendungen

Cloud Computing mit mathematischen Anwendungen Cloud Computing mit mathematischen Anwendungen Dr. habil. Marcel Kunze Engineering Mathematics and Computing Lab (EMCL) Institut für Angewandte und Numerische Mathematik IV Karlsruhe Institute of Technology

More information

LDIF - Linked Data Integration Framework

LDIF - Linked Data Integration Framework LDIF - Linked Data Integration Framework Andreas Schultz 1, Andrea Matteini 2, Robert Isele 1, Christian Bizer 1, and Christian Becker 2 1. Web-based Systems Group, Freie Universität Berlin, Germany a.schultz@fu-berlin.de,

More information

Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator

Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator Products Covered: Who Should Attend: NetIQ Directory And Resource Administrator

More information

Requirements Document for ROI Print Assessment/Print Manager

Requirements Document for ROI Print Assessment/Print Manager Requirements Document for ROI Print Assessment/Print Manager Print Manager Pre-requisites for a successful deployment Contents 1. What is - a. Print Assessment? b. Print Manager? c. ROI Analytics? 2. About

More information

Capturing Barracuda Web Filter Activity in Reports

Capturing Barracuda Web Filter Activity in Reports Capturing Barracuda Web Filter Activity in Reports IT administrators require detailed information about Internet usage on the network. This helps budget computing resources and ensure adherence to corporate

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Using RDF Metadata To Enable Access Control on the Social Semantic Web

Using RDF Metadata To Enable Access Control on the Social Semantic Web Using RDF Metadata To Enable Access Control on the Social Semantic Web James Hollenbach, Joe Presbrey, and Tim Berners-Lee Decentralized Information Group, MIT CSAIL, 32 Vassar Street, Cambridge, MA, USA,

More information

Hardware Recommendations

Hardware Recommendations Hardware Recommendations Alpha Anywhere is a Windows based system that will run on various Windows versions. The minimum requirement is Windows XP SP3 or Server 2003. However, it is recommended that at

More information

Semantic Interoperability

Semantic Interoperability Ivan Herman Semantic Interoperability Olle Olsson Swedish W3C Office Swedish Institute of Computer Science (SICS) Stockholm Apr 27 2011 (2) Background Stockholm Apr 27, 2011 (2) Trends: from

More information

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes

Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes Ensim WEBppliance 3.0 for Windows (ServerXchange) Release Notes May 07, 2002 Thank you for choosing Ensim WEBppliance 3.0 for Windows. This document includes information about the following: About Ensim

More information

HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM)

HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM) HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM) Nasim Khozoie Department of Computer Engineering,yasuj branch, Islamic Azad University, yasuj, Iran n_khozooyi2003@yahoo.com ABSTRACT Information

More information

System Requirements for Microsoft Dynamics SL 2015

System Requirements for Microsoft Dynamics SL 2015 System for Microsoft Dynamics SL 2015 Overview This document contains the minimum client hardware requirements, server recommendations and Terminal Server minimum hardware requirements supported by the

More information

Travelling infrastructure - How to Build a Mobile Server Farm

Travelling infrastructure - How to Build a Mobile Server Farm REV.01 2013 p. 1/11 Roma, 16/01/2014 Dear Telefonica S.A. marketing department SUBJECT: Revenue Sharing Webee Telefonica INTRODUCTION Architecture will be the same as that already established in partnership

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing

Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing Introduction to Engineering Using Robotics Experiments Lecture 18 Cloud Computing Yinong Chen 2 Big Data Big Data Technologies Cloud Computing Service and Web-Based Computing Applications Industry Control

More information

Green Cloud Computing: Case Study Sri Lanka & Pakistan

Green Cloud Computing: Case Study Sri Lanka & Pakistan Green Cloud Computing: Case Study Sri Lanka & Pakistan 28-30 July 2015 Colombo, Sri Lanka Sameer Sharma, Senior Advisor Regional Office Asia-Pacific Recalling ITU TRCSL Workshop in 2013 ITU TRCSL Workshop

More information

NetIQ Advanced Authentication Framework. System Requirements. Version 5.1.0

NetIQ Advanced Authentication Framework. System Requirements. Version 5.1.0 NetIQ Advanced Authentication Framework System Requirements Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Infrastructure 4 Communication Channel Throughput

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Extending SOA Infrastructure for Semantic Interoperability

Extending SOA Infrastructure for Semantic Interoperability Extending SOA Infrastructure for Semantic Interoperability Wen Zhu wzhu@alionscience.com Sumeet Vij svij@alionscience.com 3rd Annual DoD SOA & Semantic Technology Symposium July 14, 2011 www.alionscience.com

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

HARDWARE, SOFTWARE AND CONFIGURATION REQUIREMENTS

HARDWARE, SOFTWARE AND CONFIGURATION REQUIREMENTS Team Services PREMISE INSTALLATION REQUIREMENTS HARDWARE, SOFTWARE AND CONFIGURATION REQUIREMENTS Team Services may require reconfiguration of a client s existing environment to support our new dedicated

More information

Server Installation Procedure - Load Balanced Environment

Server Installation Procedure - Load Balanced Environment Server Installation Procedure - Load Balanced Environment 1. Introduction This document explains a step-by-step procedure in case BackupAgent BV performs an installation of the BackupAgent Server Software

More information

Desktop Consolidation. Stéphane Verdy, CTO Devon IT

Desktop Consolidation. Stéphane Verdy, CTO Devon IT Desktop Consolidation Stéphane Verdy, CTO Devon IT Agenda - Desktop Consolidation Migrating from PCs to Hosted Desktops Desktop Centralization Deployment Graphics Compression PCs vs. Thin s TCO User segmentation

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

Planning Domain Controller Capacity

Planning Domain Controller Capacity C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,

More information

Developing Web 3.0. Nova Spivak & Lew Tucker http://radarnetworks.com/ Tim Boudreau http://weblogs.java.net/blog/timboudreau/

Developing Web 3.0. Nova Spivak & Lew Tucker http://radarnetworks.com/ Tim Boudreau http://weblogs.java.net/blog/timboudreau/ Developing Web 3.0 Nova Spivak & Lew Tucker http://radarnetworks.com/ Tim Boudreau http://weblogs.java.net/blog/timboudreau/ Henry Story http://blogs.sun.com/bblfish 2007 JavaOne SM Conference Session

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Check Point FireWall-1 HTTP Security Server performance tuning

Check Point FireWall-1 HTTP Security Server performance tuning PROFESSIONAL SECURITY SYSTEMS Check Point FireWall-1 HTTP Security Server performance tuning by Mariusz Stawowski CCSA/CCSE (4.1x, NG) Check Point FireWall-1 security system has been designed as a means

More information

SysAidTM Freeware Installation Guide

SysAidTM Freeware Installation Guide SysAidTM Freeware Installation Guide Document Updated: 10 November 2009 Introduction SysAid free edition is built for organizations with fewer than 100 computers and users. This document will help you

More information

Cloud computing based big data ecosystem and requirements

Cloud computing based big data ecosystem and requirements Cloud computing based big data ecosystem and requirements Yongshun Cai ( 蔡 永 顺 ) Associate Rapporteur of ITU T SG13 Q17 China Telecom Dong Wang ( 王 东 ) Rapporteur of ITU T SG13 Q18 ZTE Corporation Agenda

More information

Graph Database Performance: An Oracle Perspective

Graph Database Performance: An Oracle Perspective Graph Database Performance: An Oracle Perspective Xavier Lopez, Ph.D. Senior Director, Product Management 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Program Agenda Broad Perspective

More information

Semantic based Web Application Firewall (SWAF - V 1.6)

Semantic based Web Application Firewall (SWAF - V 1.6) Semantic based Web Application Firewall (SWAF - V 1.6) Installation and Troubleshooting Manual Document Version 1.0 1 Installation Manual SWAF Deployment Scenario: Client SWAF Firewall Applications Figure

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Symantec Backup Exec.cloud

Symantec Backup Exec.cloud Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information

Semantic Advertising for Web 3.0

Semantic Advertising for Web 3.0 Semantic Advertising for Web 3.0 Edward Thomas, Jeff Z. Pan, Stuart Taylor, Yuan Ren, Nophadol Jekjantuk, and Yuting Zhao Department of Computer Science University of Aberdeen Aberdeen, Scotland Abstract.

More information

PORTrockIT. Veeam : accelerating virtual machine replication with PORTrockIT

PORTrockIT. Veeam : accelerating virtual machine replication with PORTrockIT 1 PORTrockIT Veeam : accelerating virtual machine replication 2 Executive summary Business continuity solutions such as Veeam offer the ability to recover quickly from disaster by creating a replica of

More information

19531 - Telematics. 14th Tutorial - Proxies, Firewalls, P2P

19531 - Telematics. 14th Tutorial - Proxies, Firewalls, P2P 19531 - Telematics 14th Tutorial - Proxies, Firewalls, P2P Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 10. February, 2011 Institute of Computer Science Telematics

More information

Delphi+ System Requirements

Delphi+ System Requirements Delphi+ System Requirements Revision 1.1 Newmarket International, Inc. October 24, 2013 Delphi+ System Requirements Users Up to 15 Up to 25 Up to 50 Up to 90 Up to 200 Over 200 Minimum 2008 Server Hardware

More information

Configuration Workshop 2014 Novi Sad/Нови Сад

Configuration Workshop 2014 Novi Sad/Нови Сад Configuration Workshop 2014 Novi Sad/Нови Сад Integrating Distributed Configurations with RDFS and SPARQL Gottfried Schenner, Stefan Bischof, Axel Polleres, Simon Steyskal Use Case Large technical systems

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

CA Host-Based Intrusion Prevention System r8.1

CA Host-Based Intrusion Prevention System r8.1 PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8.1 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS ENDPOINT FIREWALL, INTRUSION DETECTION,

More information

Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery

Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Dimitrios Kourtesis, Iraklis Paraskakis SEERC South East European Research Centre, Greece Research centre of the University

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Networks 3. 2015 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

Networks 3. 2015 University of Stirling CSCU9B1 Essential Skills for the Information Age. Content Networks 3 Lecture Networks 3/Slide 1 Content What is a communications protocol? Network protocols TCP/IP High-level protocols Firewalls Network addresses Host name IP address Domain name system (DNS)

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

CISCO WIRELESS CONTROL SYSTEM (WCS)

CISCO WIRELESS CONTROL SYSTEM (WCS) CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform

More information

Performance Testing of a Cloud Service

Performance Testing of a Cloud Service Performance Testing of a Cloud Service Trilesh Bhurtun, Junior Consultant, Capacitas Ltd Capacitas 2012 1 Introduction Objectives Environment Tests and Results Issues Summary Agenda Capacitas 2012 2 1

More information

How can the Future Internet enable Smart Energy?

How can the Future Internet enable Smart Energy? How can the Future Internet enable Smart Energy? FINSENY overview presentation on achieved results Prepared by the FINSENY PMT April 2013 Outline Motivation and basic requirements FI-PPP approach FINSENY

More information

WebEx Security Overview Security Documentation

WebEx Security Overview Security Documentation WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication

More information

PlanetData Showcases: Linked/Open/Big Data in Smart Cities Data Integration

PlanetData Showcases: Linked/Open/Big Data in Smart Cities Data Integration PlanetData Showcases: Linked/Open/Big Data in Smart Cities Data Integration Andreas Harth (KIT), Oscar Corcho(UPM), Marko Grobelnik (JSI) 25 November 2013, Luxembourg Motivation The relevance of many types

More information

Sage Grant Management System Requirements

Sage Grant Management System Requirements Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to

More information

Cross-channel protection GSelector s exclusive cross-station protection prevents the same song from playing at the same time across your stations.

Cross-channel protection GSelector s exclusive cross-station protection prevents the same song from playing at the same time across your stations. Music scheduling reinvented GSelector is the world s first goal music scheduler; perfect for the diverse ways radio programmers deliver their stations to the audience. Build a better log GSelector virtually

More information

Ontology for Home Energy Management Domain

Ontology for Home Energy Management Domain Ontology for Home Energy Management Domain Nazaraf Shah 1,, Kuo-Ming Chao 1, 1 Faculty of Engineering and Computing Coventry University, Coventry, UK {nazaraf.shah, k.chao}@coventry.ac.uk Abstract. This

More information

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Interoperability Summit 2002 SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Gavenraj Sodhi Senior Technology Analyst Provisioning

More information

Network Service, Systems and Data Communications Monitoring Policy

Network Service, Systems and Data Communications Monitoring Policy Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring

More information

System Requirements for Microsoft Dynamics GP 2015

System Requirements for Microsoft Dynamics GP 2015 System Requirements for Microsoft Dynamics GP 2015 This document contains the minimum client hardware requirements, server recommendations and Terminal Server minimum hardware requirements supported by

More information