Deliverable D3.3 Report on the NoE Mobility Program and Assessment of its Results
|
|
- Gwen Conley
- 8 years ago
- Views:
Transcription
1 Network of Excellence Deliverable D3.3 Report on the NoE Mobility Program and Assessment of its Results NESSoS
2 NESSoS
3 Project Number : Project Title : NESSoS Deliverable Type : Report Deliverable Number : D3.3 Title of Deliverable : Report on the NoE Mobility Program and Assessment of its Results Nature of Deliverable : R Dissemination Level : Public Internal Version Number : 4.0 (SVN Revision No. 3137) Contractual Delivery Date : September Actual Delivery Date : October Contributing WPs : WP 3 Editor(s) : Manuel Clavel (IMDEA) Author(s) : Manuel Clavel (IMDEA), Carolina Dania (IMDEA) Reviewer(s) : Jorge Cuellar (SIEMENS), Marina Egea (ATOS), Fabio Martinelly (CNR) Abstract The NESSoS Mobility Program is a mechanism that supports the integration of activities across various sites. It brings together researchers working on related topics; it drives knowledge exchange and knowledge generation through union and diversity. It increases the capability of joint cooperation among researchers. This deliverable contains a report covering the first two years of the NESSoS Mobility Program, and includes an assessment of its results. This assessment focuses on the integration of activities across the network partners through the mobility of their researchers among the different sites. Keyword List Mobility, integration, cooperation, exchange. NESSoS
4 Document History Version Type of Change Author(s) 0.1 Initial setup Manuel Clavel (IMDEA) 1.0 Complete draft Manuel Clavel (IMDEA), Carolina Dania (IMDEA) 2.0 Under internal review Manuel Clavel (IMDEA), Carolina Dania (IMDEA) 3.0 Revised version Manuel Clavel (IMDEA), Carolina Dania (IMDEA) 4.0 Approved by the internal reviewers NESSoS
5 Table of Contents LIST OF TABLES INTRODUCTION REPORT ON THE RESULTS The Mobility Portal The Mobility Actions Long-term visits Medium-term visits Short-term visits ASSESSMENT OF THE RESULTS The Mobility Portal The Mobility Actions CONCLUSIONS BIBLIOGRAPHY NESSoS
6 NESSoS
7 List of Tables Table 2.1: Mobility Portal: General statistics Table 2.2: Mobility Portal: Unique visitors in each month Table 2.3: Mobility Actions: Summary Table 2.4: Mobility Actions: by work package Table 2.5: Mobility Actions: by partner of origin Table 2.6: Mobility Actions: by partner of destination NESSoS
8 NESSoS
9 1 Introduction The NESSoS Mobility Program is a mechanism that supports the integration of activities across various sites within the network. It brings together researchers working on related topics; it drives knowledge exchange and knowledge generation through union and diversity; it increases the capability of joint cooperation among researchers. Each mobility action may pursue a different specific purpose e.g., teaching short graduate, undergraduate, or industry-oriented courses in a different hosting organization; collaboration with industrial partners in carrying out industrial case studies; integrating different tools or validating them against large, complex, multi-facet scenarios, but all of them will contribute to increase the cohesion of the research ideas developed within the network and to promote the exchange of knowledge among the different partners. As stated in the NESSoS Description of Work, this deliverable will provide a report on the NoE Mobility Program during its second year, as well as an assessment of its results. This second assessment will focus on the integration of activities across the network partners through the mobility of their researchers among the different sites. Accordingly, in chapter 2 we report on the first 2 years of the NESSoS Mobility Program, and we includes an assessment of its results in chapter 3. NESSoS
10 NESSoS
11 2 Report on the results 2.1 The Mobility Portal The Mobility Portal ( supports the NESSoS Mobility Programme in different ways. A report about the design and functionality of the NESSoS Mobility Portal was already included in Deliverable D3.2 [6]. During this second year, our work on the Mobility Portal has been focused on integrating the portal within the JVRL, so that the users can log in using the same access credentials than for the others JVRL web sites. To provide this functionality, we have enabled a binding with the NESSoS LDAP directory. Tables 2.1 and 2.2 show statistics about the Mobility Portal s visitors during the period from September 1st, 2011 to August 31st, They were automatically generated with Visitors Web Log Analyzer version 0.7. (Note: multiple hits with the same IP, user agent and access day, are considered a single visit). 9/2011-8/ /2011 Number of unique visitors 3, Number of unique visitors from Google Number of unique visitors from NESSoS Web Portal Different pages requested 186,851 34,883 Table 2.1: Mobility Portal: General statistics Jan 136 Feb Mar Apr May Jun Jul Aug Sept 787 Oct 536 Nov 341 Dec 269 Table 2.2: Mobility Portal: Unique visitors in each month. 2.2 The Mobility Actions The Mobility Program fosters short, medium-term, and long-term exchange visits of research professors, post-doctoral and PhD students, and industrial members. These exchange visits can be of different types, with different goals and durations. However, the NESSoS Mobility Program is mostly focused on: Medium-term exchange visits of PhD students, to integrate existing research infrastructure, methodologies and tools, and/or to carry out common case-studies and applications. Medium-term internships of PhD students with industrial partners, to reduce the gap among best practices and research. NESSoS
12 Type Year 2 Year 1 Num. Days Num. Days Short-term Medium-term Long-term Total Table 2.3: Mobility Actions: Summary. WP Year 2 Year 1 Num. Days Num. Days WP1 WP2 1(L) 30 WP3 WP4 1(M), 1(L) 41 1(M) 7 WP5 WP6 2(S), 1(L) 188 1(S) 3 WP7 3(S),5(M),2(L) 106 2(S), 1(L) 98 WP8 10(S) 18 1(S), 1(M) 11 WP9 2(L) 61 WP10 1(L) 182 1(S) 3 WP11 2(L), 1(S) 108 1(L) 30 WP12 1(L) 28 WP13 1(M), 1(L) 41 WP14 WP15 WP16 Table 2.4: Mobility Actions: by work package. Short-term, medium-term postdoctoral visits, to increase cohesion of research ideas, and promote exchange of knowledge. Short-term, medium-term visits of industrial members at academic research partners (and vice versa), to foster industry-driven research and technology transfer. Mobility action applications are submitted using the Mobility Portal. Each application is accompanied by a budget, not exceeding the amount assigned to the corresponding partners for carrying out mobility actions. Applications are evaluated by a small committee, based solely on their potential impact on existing or nascent collaborations among partners. When needed, work packages leaders are consulted before approving a mobility action. Final reports about mobility actions are also submitted using the Mobility Portal. Tables 2.3, 2.4, 2.5, and 2.6 summarize the mobility actions carried out between partners during the first two years of the NoE. Here and elsewhere, short-term visits (S) means visits that long less than 5 days; medium-term visits (M) means visits that long from 1 week to one month; and long-term visits (L) means visits that long more than one month. Next, we provide a brief summary of these mobility actions. In particular, for each mobility action, we will indicate: participant, origin, destination, starting date, total days, work packages, and funding sources (when different from NESSoS). More technical details about the context, background, and results of these actions are to be found in their corresponding work packages. NESSoS
13 Partner Year 2 Year 1 Total Num. Days Num. Days CNR ATOS 1(M), 1(S) 8 5 ETH 1(S) 3 1(S) 5 8 IMDEA 5(L), 3(M) INRIA 1(S) 2 1(S) 3 5 KUL 7(S) LMU 1(M) SIEMENS 1(M), 1(S) 13 1(M) 7 20 SINTEF UDE 1(S) 3 1(S), 1(M) UMA 2(L) 103 2(L) UNITN 2(L) Table 2.5: Mobility Actions: by partner of origin. Partner Year 2 Year 1 Total Num. Days Num. Days CNR 1(L) 28 1(L) ATOS ETH 2(M), 5(L) IMDEA 1(M), 2(S) 18 1(S) 5 23 INRIA 3(S), 1(L) KUL 2(S) 5 1(S) 1(M) LMU 2(M) SIEMENS 1(L), 3(s) 78 1(L) SINTEF 1(L) 182 1(S) UDE UMA 1(M) 11 1(S) 7 18 UNITN 2(S) 6 3 Table 2.6: Mobility Actions: by partner of destination. NESSoS
14 2.2.1 Long-term visits Participant Origin Destination Start Date Days Workpackages Funding Rios, Ruben UMA SIEMENS 15/9/11 90 WP 11 MICINN During this stay SIEMENS and UMA concentrated on location privacy services, in the field of Wireless Sensor Networks (WSN). The work carried out provides a protocol that refrain an attacker from finding out the location of the base station, which is the most critical node in the network. This collaboration has eventually resulted in two joint publications, namely, [2] and [11]. Bielova, Natalia UNITN INRIA 1/2/ WP 9 During this visit the participant from UNITN learned about static analysis techniques and dynamic mechanisms for secure information flow, that were proposed by the researchers at INRIA Rennes. They then identified the classes of security policies that should be enforced for JavaScript web applications and reasoned about the application of static, dynamic or hybrid techniques to enforce these policies in the web browser settings. Le Minh Sang, Tran UNITN SINTEF 1/2/ WP 6, WP 10 The main focus was on studying a method for allowing risk analysts to select a cost-effective strategy for identified risks in software systems. The outcome was a generic approach for selecting a costeffective countermeasure alternatives, which could be applied for defensive risk analysis techniques such as Fault Tree Analysis, CORAS, and so on. This approach was demonstrated by instantiating it to CORAS with an exemplified scenario taken from NESSOS case study [7] Clavel, Manuel IMDEA ETH 1/9/ WP 7, WP 13 Fundación Caja Madrid This mobility action is still ongoing. The main objectives are to write a joint journal paper on the ActionGUI methodology and tools [9], and to co-teach a Master-level course on Security Engineering. García, Miguel A. IMDEA ETH 1/9/ WP 11 This mobility action is still ongoing. The main objectives are to apply the ActionGUI methodology and tools to the NESSoS EHealth Use Case [8] and to write a joint paper on the lessons learned. Dania, Carolina IMDEA ETH 1/9/ WP 11 This mobility action is still ongoing. The main objectives are to further develop a methodology to formally analyse ActionGUI models [10], to apply it to the ActionGUI models which are being developed for the NESSoS EHealth Use Case [8], and to write a joint paper on the results. Valdazo, Javier IMDEA ETH 1/9/ WP 7 IMDEA This mobility action is still ongoing. The main objectives are to further develop an extension of the ActionGUI methodology and tools [9] for modeling business process with security policies (including separation of duties and binding of duties), and to write a joint paper on the results. Ortiz, Gonzalo IMDEA ETH 1/9/ WP 2 IMDEA This mobility action is still ongoing. The main objectives are to further develop the ActionGUI tools (including model editors and code generators) and to launch joint open projects associated to the ActionGUI methodology and tools. Fernández, Carmen UMA CNR 9/28/ WP 4, WP 12 During this stay UMA and CNR worked together closely in the finalization of D12.2 [5] and other aspects towards the preparation of the first review. We also discussed ideas for applying for new EUfunded project on the area of trust management and identified this as an area where joint research UMA-CNR will be done. NESSoS
15 2.2.2 Medium-term visits Participant Origin Destination Start Date Days Workpackages Funding Busch, Marianne LMU IMDEA 13/11/11 13 WP 4, WP 7 The goal of this action was to start a joint project on defining a model-to-model transformation from UWE models to ActionGUI models. UWE is a modeling language developed at LMU which focuses on a high level of abstraction, whereas ActionGUI is a modeling language developed at IMDEA whose models can directly be transformed to code. This collaboration eventually resulted in a joint technical report [1]. García, Miguel A. IMDEA LMU 23/1/12 10 WP 7 Clavel, Manuel IMDEA LMU 26/1/12 5 WP 7 The goal of this action was to continue our joint work on defining a model-to-model transformation from UWE models to ActionGUI models. This collaboration has resulted in a joint technical report [1]. Egea, Marina ATOS ETH 6/2/12 5 WP 7 Clavel, Manuel IMDEA ETH 6/2/12 5 WP 7 During this week, ETH, IMDEA and ATOS worked on a joint journal publication. We also discussed the writing of a book on model-driven security that would contain our results and experiences in this area. Cuellar, Jorge SIEMENS UMA 10/4/12 11 WP 11, WP 9, WP 13 Dr. Cuellar held a short course (10 hours) on Formal Methods for IT-Security. But the main purpose of the visit was to work on location-privacy protection, which will be crucial in FI scenarios. This collaboration has resulted in two joint publications, namely, [2] and [11]. NESSoS
16 2.2.3 Short-term visits Participant Origin Destination Start Date Days Workpackages Funding Ochoa, Martin SIEMENS IMDEA 6/10/11 2 WP 8 SIEMENS and IMDEA gave the first steps in defining a sound non-interference analysis for caches by exploiting existing abstract interpretation techniques. This collaboration has resulted in a joint conference publication [3] and a joint journal publication [4] Schmidt, Holger UDE KUL 10/10/11 3 WP 6, WP 8 UDE and KUL worked on joint research on security requirements engineering, secure software architectures, and security patterns. Burri, Samuel ETH IMDEA 23/11/11 3 WP 7 ETH and IMDEA identified potential extensions of IMDEA s work on model-driven security by ETH s work on authorization-constrained workflows. This collaboration eventually sparked off a Master s Thesis on transforming Secure BPML models into ActionGUI models [12]. Deryck, Philippe KUL SIEMENS 28/11/11 1 WP 8 IWT Van Acker, Steven KUL SIEMENS 28/11/11 1 WP 8 IWT Desmet, Lieven KUL SIEMENS 28/11/11 1 WP 8 IWT During this intensive 1-day research meeting on Web Application Security, KUL and SIEMENS have exchanged expertise on cross-domain communication, HTML5 and JavaScript security as part of ongoing collaborations between the two partners in work package 8, and have identified and discussed new strategic research directions in this domain. Yskout, Koen KUL INRIA 25/1/12 3 WP 7, WP 8 KUL and INRIA explored the conceptual and technical integration of change patterns and runtime reconfiguration with Kevoree for security (and access control in particular). Ben David, Olivier- INRIA KUL 2/5/12 2 WP 7, WP 8 Nathanael During these two days INRIA and KUL worked on the combination of change patterns and runtime adaptation. We studied a problem in relation with access-control. The problem was described with the problem frame notation and we started to implement a solution using Kevoree in order to determine the feasibility of the combination of both approaches. Egea, Marina ATOS UNITN 9/5/12 3 WP 6, WP 11 During this visit, ATOS presented and validated the NESSoS s Smart Grid scenario in the context of the evaluation of the application of erise methodologies to this scenario. It also participated in the students results assessment. Lagaisse, Bert KUL INRIA 22/8/12 1 WP 8 Decat, Maarten KUL INRIA 22/8/12 1 WP 8 The main goal of this visit was to review the possibilities of collaborative work on authorization technologies in the future. Both KUL and UNITN presented their current research, and a discussion was started about which topics could be explored in the future in a collaborative effort. Decat, Maarten KUL UNITN 26/9/12 3 WP 8 This visit happened in the context of a paper, co-authored by KUL and UNITN, about authorization and access control in Software-as-a-Service (SaaS) applications. NESSoS
17 3 Assessment of the results 3.1 The Mobility Portal As expected, given its current main focus on mobility actions among the network s partners (including associated partners), the number of visitors, although increasing, is not high. 3.2 The Mobility Actions As Table 2.3 shows, we seem to be fulfilling our goals. Notice that, if we count a long-term visit as two medium-term visits, we have already satisfied the success criteria established in the DoW for the whole project: namely, the number of short/mid-term visits should be greater or equal than 25. In fact, driven by the increasing integration of research activities across the network, we expect the number of exchange visits to grow (even more) in the third year of the project. More crucially, as Table 2.4 shows, the Mobility Program is indeed supporting the integration of activities, and, in particular, of the research activities, across the various sites within the network. Notice that the large majority of the mobility actions are either associated to research work packages (WP6 WP10), to the workbench work package (WP2), or to the industrial case studies work package (WP11). Finally, as Tables 2.5 and 2.6 show, the main risk that we identified in the DoW for this work package, namely, Weak commitment from partners, has not occurred. Indeed, all partners have already taken part in several mobility actions, either as origin, destination, or both. Notice also that, as proposed in the DoW, to counteract this risk, we have focused on medium-term exchange visits of PhD students and short, medium-term postdoctoral visits. NESSoS
18 NESSoS
19 4 Conclusions The overall goal of the NESSoS Mobility Program is to foster the integration of activities across the network partners. We have reported on the first 24 months of the Program and provided an assessment of its results. In summary, The Mobility Portal is available since month 4. During the second year, there have been 12 short-term visits, 6 medium-term visits, and 9 long-term visits. The large majority of the mobility actions are linked to joint-work within the different research work packages. All partners have been involved in exchange visits, either as origin, destination, or both. Driven by increasing integration of activities across the network, the number of exchange visits is bound to keep growing in the upcoming months. NESSoS
20 NESSoS
21 Bibliography [1] M. Busch and M. A. G. de Dios. ActionUWE: Transformation of UWE to ActionGUI models. Technical report, Ludwig-Maximilians-Universität München, [2] J. Cúellar, M. Ochoa, and R. Rios. Indistinguishable regions in geographic location privacy. In Proc. of the 2012 ACM Symposium on Applied Computing (SAC), Security Track. ACM, [3] B. Köpf, L. Mauborgne, and M. Ochoa. Automatic quantification of cache side-channels. In P. Madhusudan and S. A. Seshia, editors, Computer Aided Verification - 24th International Conference, CAV 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings, volume 7358 of Lecture Notes in Computer Science, pages Springer, [4] B. Köpf, L. Mauborgne, and M. Ochoa. Automatic quantification of cache side-channels. IACR Cryptology eprint Archive, 2012:34, [5] NESSoS. Deliverable 12.2: First report on dissemination and communication activities including the population of the dissemination web portal [6] NESSoS. Deliverable 3.2: Report on the NoE Mobility Program and assessment of its results. http: // [7] NESSoS. Deliverable 10.3: Prototypal tools to support risk and cost analysis. nessos-project.eu, [8] NESSoS. Deliverable 11.3: Initial version of two case studies, evaluating methodologies. http: // [9] NESSoS. Deliverable 7.3: Prototypes supporting secure service architectures and design. http: // [10] NESSoS. Deliverable 9.3: Initial set of prototypal support for security assurance for services. http: // [11] R. Rios, J. Cuellar, and J. Lopez. Robust probabilistic fake packet injection for receiver-location privacy in wsn. In S. Foresti, M. Yung, and F. Martinelli, editors, 17th European Symposium on Research in Computer Security (ESORICS 2012), volume 7459 of LNCS, pages , Pisa, Italy, Sep Springer, Springer. [12] J. Valdazo. Developing secure business applications from Secure BPMN models. Master s thesis, Universidad Complutense de Madrid, Spain, September NESSoS
Deliverable D13.2 Report describing the curricula for a master in Security Engineering for Future Internet Services and the co-tutela program setup
Network of Excellence on Engineering Secure Future Internet Software Services and Systems Network of Excellence Deliverable D13.2 Report describing the curricula for a master in Engineering for Future
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationAshley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
More informationEnhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
More informationJISC data.bris project & EPSRC Platform project: progress against workplan (October 2012)
Project Name : data.bris DBSG/5/2 JISC data.bris project & EPSRC Platform project: progress against workplan (October 2012) WORKPACKAGES Month: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Oct 11 Nov Dec
More informationGuillem Bernat (RAPITA) Communication, Deliverable, Dissemination, Publication, Reporting
D5.2 Project Handbook Document Information Contract Number 249100 Project Website Contractual Deadline Dissemination Level Nature Author Contributors Reviewer Keywords www.proartis-project.eu PM04 Public
More informationGEOTHERMAL ERA-NET: WP3: Towards a European Geothermal Database
GEOTHERMAL ERA-NET: WP3: Towards a European Geothermal Database WP3 status Adele Manzella Eugenio Trumpy CNR Organisational structure / work packages WP3 Towards a European Geothermal Information was:
More informationStatistics for www.brageboden.se (2008-08)
Statistics for www.brageboden.se (-08) Sida 1 av 5-08-10 Last Update: 10 Aug - 10:39 Reported period: Aug OK Summary Reported period Month Aug First visit 01 Aug - 02:19 Last visit 10 Aug - 07:08 Unique
More informationAbout CREST R&D Grant
1 About CREST R&D Grant Philosophy Higher value Electrical & Electronics (E&E) economic sector can be achieved when R&D thrives in the ecosystem This can be accelerated by promoting collaborative research
More informationFederated authorization for SaaS applications
Federated authorization for SaaS applications Maarten Decat, Bert Lagaisse, Wouter Joosen IBBT-DistriNet, KU Leuven, 3001 Leuven, Belgium Abstract. With Software-as-a-Service (SaaS), a centrally hosted
More informationDeep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
More informationD9.1 Project Website
H2020 FOF 09 2015 Innovation Action Smart integrated immersive and symbiotic human-robot collaboration system controlled by Internet of Things based dynamic manufacturing processes with emphasis on worker
More informationPowerSteering Product Roadmap Your Success Is Our Bottom Line
Drive strategy. Accelerate results. cloud-based program & portfolio management software PowerSteering Product Roadmap Your Success Is Our Bottom Line Jay Hoskins Director of Product Management PowerSteering
More informationAndrew Pylyp. Capital Market Day. Managing Director Wer liefert was? Stockholm 27. November 2006
Capital Market Day Andrew Pylyp Managing Director Wer liefert was? Stockholm 27. November 2006 Wer liefert was? GmbH Capital Market Day, November 27, 2006 134 Company History Media 1932 Business-to-Business
More informationCENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR
JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf
More informationCAFIS REPORT 2015.10
CAFIS REPORT 2015.10 INDEX Message CAFIS Inbound 03-06 07-08 CAFIS Arch 09-10 CAFIS Brain 11-12 CAFIS Global 13-14 What We Do 15-16 About CAFIS 17-18 Services for Member Stores 19-34 Services for Card
More informationFederal Cloud Computing Initiative Overview
Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing
More informationWeighted Thinned Arrays by Almost Difference Sets and Convex Programming
Guidelines for Student Reports Weighted Thinned Arrays by Almost Difference Sets and Convex Programming V. Depau Abstract The design of thinned arrays can be carried out with several techniques, including
More informationNICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
More informationCenters of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
More informationPortal Annual Report 2012/13
Portal Annual Report 2012/13 Introduction This report is provided for a diverse audience and covers the year 1st September 2012 31st August 2013, the seventh year of operation of the Portal. The Portal
More informationDetailed guidance for employers
April 2015 3 Detailed guidance for employers Appendix A: Pay reference periods This document accompanies: Detailed guidance no. 3 Assessing the workforce Pay reference period calendars where the definition
More informationDeep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
More informationPROJECT: DLS Website Redesign STATUS REPORT May-June 2015
PROJECT: DLS Website Redesign STATUS REPORT May-June 2015 Key Project Roles Project Sponsor: Karen Johnson Executive Director, DLS Project Advisor: Vanessa Salway Program Manager: Project Manager: Steve
More informationA!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks!
ATeamCymruEISReport:GrowingExploitationofSmall OfCiceRoutersCreatingSeriousRisks PoweredbyTeamCymru sthreatintelligencegroup Page 1of 14www.team-cymru.com www.team-cymru.com Threat'Intelligence'Group EXECUTIVE
More informationBusiness Idea Development Product production Services. Development Project. Software project management
Page 1, 1/20/2003 Ivica Crnkovic Mälardalen University Department of Computer Engineering ivica.crnkovic@mdh.se Development Project Product Lifecycle Business Idea Development Product production Services
More informationPROFESSIONAL INTERESTS WORK EXPERIENCE GINÉS DÓLERA TORMO CURRICULUM VITAE OCTOBER 2014
Ginés Dólera Tormo Phone: +49 176 90775273 E-mail: ginesdt@um.es Date of birth: 21 July, 1985 Nationality: Spanish Address: Dossenheimer Landsrtrasse 100 D-69121 Heidelberg, Germany PROFESSIONAL INTERESTS
More informationESCoRTS A European network for the Security of Control & Real Time Systems
ESCoRTS A European network for the Security of Control & Real Time Systems Luc Van den Berghe CEN-CENELEC Management Centre 20/05/10 Luxembourg workshop 1 Recommendations from a CEN/BT WG161 Survey in
More informationRBC Insurance Fetes Online Auto/Home Insurance Growth
Case Studies, K. Harris Research Note 29 October 2002 RBC Insurance Fetes Online Auto/Home Insurance Growth RBC Insurance's e-business successes are generating greater than $3 million in premiums per month.
More informationIntegrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects
Integrating the Internet of Things with Business Process Management: A Process-aware Framework for Smart Objects Giovanni Meroni 1 Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria
More informationEuropean Network on Cyber Security. NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga
European Network on Cyber Security NeCS Carmen Fernández Gago NICS Lab, Universidad de Málaga 9 December, 2015 A matter of legacy! NESSoS NeCS NeCS 2010-2014 2015-2019 Network and Information Security
More informationHow To Get Rid Of A Phish Locker On A Computer (For A Bank)
PHISH LOCKERS OUT IN THE WILD August 2013 RSA researchers have been increasingly witnessing the activity of highly targeted Trojans, dubbed Phish Lockers, used at the hands of cybercriminals to steal credentials.
More informationESSEX FIRE AUTHORITY Essex County Fire & Rescue Service
ESSEX FIRE AUTHORITY Essex County Fire & Rescue Service MEETING Policy & Strategy Committee AGENDA ITEM 7 MEETING DATE 25 March 2009 REPORT NUMBER SUBJECT REPORT BY Monitoring IT Transformation Progress
More informationJeff Haby, P.E. Director Sewer System Improvements. September 15, 2015. Agenda
SAWS Sanitary Sewer Overflow Reduction Program Jeff Haby, P.E. Director Sewer System Improvements SA Military Engineers Meeting Agenda SAWS Overview Consent Decree CD Compliance Programs Program Transition
More informationEducational Technology Services Monthly Report. March, 2009. Prepared by Educational Technology Services, State Fair Community College
Educational Technology Services Monthly Report March, 2009 Prepared by Educational Technology Services, State Fair Community College Robert Paulson, Vice President Service Satisfaction Results HDO Statistics
More informationComputing & Telecommunications Services Monthly Report March 2015
March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified
More informationSynthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS.
Guidelines for Student Reports Synthesis Of Polarization Agile Interleaved Arrays Based On Linear And Planar ADS And DS. A. Shariful Abstract The design of large arrays for radar applications require the
More informationSecurity Analysis Part I: Basics
Security Analysis Part I: Basics Ketil Stølen, SINTEF & UiO October 2, 2015 1 Objectives for Lectures on Security Analysis Classify security concepts Introduce, motivate and explain a basic apparatus for
More informationSecure Messaging Challenge Technical Demonstration
Secure Messaging Challenge Technical Demonstration The Open Group EMA Forum Boeing s Messaging Needs Provide access to strongly encrypted e-mail outside the enterprise Reduce complexity of deploying secure
More informationPATIENT JOURNEY BOARDS
PATIENT JOURNEY BOARDS at Manly, Mona Vale and Hornsby Ku-ring-gai Hospitals Sue Hair : Director of Nursing and Midwifery, Manly Hospital Deb Stewart : Manger Clinical Redesign, Northern Beaches and Hornsby
More informationDeliverable 1.2 Project Presentation
FP7-PEOPLE-2012-ITN EID Grant agreement no.: 317387 www.secentis.eu Deliverable 1.2 Project Presentation Abstract This document describes the training program, the objectives, the expected results, the
More informationAPPROACHABLE ANALYTICS MAKING SENSE OF DATA
APPROACHABLE ANALYTICS MAKING SENSE OF DATA AGENDA SAS DELIVERS PROVEN SOLUTIONS THAT DRIVE INNOVATION AND IMPROVE PERFORMANCE. About SAS SAS Business Analytics Framework Approachable Analytics SAS for
More information2015-16 BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun 29 30 Jul 1 2 3. Full Force Calc
July 2015 CM Period 1501075 July 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 August 2015 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
More informationSupervisor Instructions for Approving Web Time Entry
Supervisor Instructions for Approving Web Time Entry Time Approval Deadlines by Category Local 2110 Members members submit time by NOON on Monday of the pay week. Time should be approved no later than
More information2007 University Libraries of Notre Dame
Introduction Ben Heet, Electronic Resources Specialist, bheet1@nd.edu Mark Dehmlow, Electronic Services Librarian, mdehmlow@nd.edu Special Thanks to the Tom Lehman, the Web Presence Improvement Team, and
More informationApplication of Internet Traffic Characterization to All-Optical Networks
Application of Internet Traffic Characterization to All-Optical Networks Pedro M. Santiago del Río, Javier Ramos, Alfredo Salvador, Jorge E. López de Vergara, Javier Aracil, Senior Member IEEE* Antonio
More informationStanford Computer Security Lab. TrackBack Spam: Abuse and Prevention. Elie Bursztein, Peifung E. Lam, John C. Mitchell Stanford University
Abuse and Prevention Stanford University Stanford Computer Security Lab TrackBack Spam: Introduction Many users nowadays post information on cloud computing sites Sites sometimes need to link to each other
More informationCity & County of San Francisco Permit & Project Tracking System
City & County of San Francisco Permit & Project Tracking System PPTS Sneak Preview March 20, 2013 Welcome & Opening Statements AGENDA 1. Opening Statements Department Directors 2. Project Background 3.
More informationUsing Open Source Software to Manage Policies and Clinical Guidelines. Library & Knowledge Service Derby Teaching Hospitals NHS Foundation Trust
Using Open Source Software to Manage Policies and Clinical Guidelines Library & Knowledge Service Derby Teaching Hospitals NHS Foundation Trust Overview Background Existing System. Requirements. Implementation
More informationManaging ICT contracts in central government. An update
Managing ICT contracts in central government An update Prepared by Audit Scotland June 2015 Auditor General for Scotland The Auditor General s role is to: appoint auditors to Scotland s central government
More informationBILD and WELT: Two successful Paid Content Strategies Capital Markets Day Berlin, December 10, 2014. Donata Hopfen, Publishing Director BILD Group
BILD and WELT: Two successful Paid Content Strategies Capital Markets Day Berlin, December 10, 2014 Donata Hopfen, Publishing Director BILD Group Paid content is key to Axel Springer s strategy Start of
More informationRelease of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
More informationGuidelines for Virtual Transportation Management Center Development. National Rural ITS Meeting August 27, 2014
Guidelines for Virtual Transportation Management Center Development National Rural ITS Meeting August 27, 2014 1 Project Purpose Overview To develop a guidebook that provides technical guidance on planning
More informationDepartment of Public Welfare (DPW)
Department of Public Welfare (DPW) Office of Income Maintenance Electronic Benefits Transfer Card Risk Management Report Out-of-State Residency Review FISCAL YEAR 2012-2013 June 2013 (March, April and
More informationUsage Control in Cloud Systems
Usage Control in Cloud Systems Paolo Mori Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche Pisa Italy Agenda Examples of usage of Cloud services Usage Control Model Policy Language
More informationConsumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
More informationOpen Source Solution for IVI: Tizen IVI. Brett Branch Tizen IVI Product Marketing
Open Source Solution for IVI: Tizen IVI Brett Branch Tizen IVI Product Marketing Agenda The Connected Car ecosystem Connected Car Usages what drives us? Key Requirements Tizen in Automotive Open Standards
More informationFull Time MBA. Enjoy business your way
Full Time MBA Enjoy business your way Continuous Ascent Rankings Our continued ascent in the rankings demonstrates the effectiveness of our uniquely balanced and teamwork-centric methodology, which attracts
More informationLossless Compression of Cloud-Cover Forecasts for Low-Overhead Distribution in Solar-Harvesting Sensor Networks
Lossless Compression of Cloud-Cover Forecasts for Low-Overhead Distribution in Solar-Harvesting Sensor Networks Christian Renner and Phu Anh Tuan Nguyen ENSsys 14, Memphis, TN, USA November 6 th, 2014
More informationAdvisory User Group Meeting. October 18, 2011
Advisory User Group Meeting October 18, 2011 1 Agenda 11:30 Welcome Christine Lavoie 11:35 Session Objectives Christine Lavoie 11:40 USC s Research Administration System Christine Lavoie 11:50 Project
More informationDeep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
More informationAutomatic Security Analysis of Business Processes
Automatic Security Analysis of Business Processes Daniel Ricardo dos Santos 1,2 Advisors: Silvio Ranise 1 Luca Compagna 2 Serena Ponta 2 1 Security and Trust - FBK 2 SAP Labs France October 21st, 2014
More informationAccident & Emergency Department Clinical Quality Indicators
Overview This dashboard presents our performance in the new A&E clinical quality indicators. These 8 indicators will allow you to see the quality of care being delivered by our A&E department, and reflect
More informationRoles: Scrum Master & Project Manager
Roles: Scrum Master & Project Manager Scrum Master: Facilitate collaborative meetings Track team performance Remove impediments (Risk, Issue) Validate team alignment to Agile framework and scope Drive
More informationQi Liu Rutgers Business School ISACA New York 2013
Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,
More informationMarket Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT.
Market Assessment & Campaign SLA Calculator LOGO WE OPEN THE DOOR, SO YOU CAN CLOSE IT. Your Market Assessment Overview Your Inbound Market Assessment and Campaign SLA Calculator is broken down into several
More informationCareer Opportunities in Physiology Committee
Career Opportunities in Physiology Committee Careers Symposium This annual EB Careers session is intended to address the specific objective in the 2000 APS Strategic Plan, to promote interest in and understanding
More informationTrimble Navigation Limited (NasdaqGS:TRMB) > Public Ownership > Officials' Trading
Trimble Navigation Limited (NasdaqGS:TRMB) > Public Ownership > Officials' Trading Individual Trades Holder Name Trade Date Range Transacted Shares Transaction Value (USD) Transaction Type Price Range
More informationApplying ICT and IoT to Multifamily Buildings. U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS
Applying ICT and IoT to Multifamily Buildings U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS ETS is an Energy Technology, Behavior Management, and
More informationPNNL Institutional Research Cloud Pilot WENDY COWLEY PNNL
PNNL Institutional Research Cloud Pilot WENDY COWLEY PNNL Background Wendy Cowley Visual Analytics Researcher, National Security Directorate Project Management, software development 20+ years @ PNNL Interests
More informationSiemens Future Forum @ HANNOVER MESSE 2014. Internet of Things and Services Guido Stephan
Siemens Future Forum @ HANNOVER MESSE 2014 Internet of Things and Services Siemens AG 2014. All rights reserved. Hannover Messe 2014 From the Internet to a Web of Things thesis Internet Research Networks
More informationSUMMARY PROFESSIONAL EXPERIENCE. IBM Canada, Senior Business Transformation Consultant
Doreen Funk, MA 191 Discovery Ridge Blvd SW, Calgary Cell: 587-434- 0811 E- mail: dorfunk@hotmail.com SUMMARY Senior management consultant with 20 years of experience in applying strategies and implementing
More informationRapid Consumption and Deployment of SAP Software as Virtual Appliances Using SAP Cloud Appliance Library
Rapid Consumption and Deployment of SAP Software as Virtual Appliances Using SAP Cloud Appliance Library Sanjay Kulkarni, Chief Expert, Solution Management, Virtualization & Cloud Management May 2013 Customer
More information2013-2014. oct 03 / 2013 nov 12 / 2013. oct 05 / 2013. oct 07 / 2013. oct 21 / 2013. oct 24 / 2013. nov 07 / 2013 nov 14 / 2013.
2013- ACADEMIC CALENDARS SOUTH UNIVERSITY 2013- ACADEMIC CALENDAR Fall 2013 Winter Spring Summer New Student Orientation Session II (Mid ) oct 03 / 2013 nov 12 / 2013 jan 09 / feb 18 / apr 03 / may 13
More informationConcept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
More informationAnatomy of an Enterprise Software Delivery Project
Chapter 2 Anatomy of an Enterprise Software Delivery Project Chapter Summary I present an example of a typical enterprise software delivery project. I examine its key characteristics and analyze specific
More informationSECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
More informationThanks to an extension of the scope of
UNIX OPERATION FOR AUTOMOTIVE MANUFACTURER CASE STUDY IT SERVICES AT A GLANCE: Industry: Automotive Founded: 1916 Headquarters: Munich Employees: ~ 110,000 In 2012, an international automotive enterprise
More informationMUNICIPALITY OF CHATHAM-KENT CORPORATE SERVICES INFORMATION TECHNOLOGY SERVICES
MUNICIPALITY OF CHATHAM-KENT CORPORATE SERVICES INFORMATION TECHNOLOGY SERVICES TO: FROM: Mayor and Members of Council Gene Lusk, B.Eng. Business Analyst, Information Services DATE: January 4, 2013 SUBJECT:
More informationAcademic Calendars. Term I (20081) Term II (20082) Term III (20083) Weekend College. International Student Admission Deadlines
Academic Calendars Term I (20081) Term II (20082) Academic Calendars Term III (20083) Weekend College International Student Admission Deadlines Final Examination Schedule Broward Community College Catalog
More informationImportant Dates Calendar 2014-2015 FALL
Important Dates Calendar 204-205 FALL Rev. 6-8-4 st 8 H st 0 2nd 0 st 5 2nd 5 3rd 5 LSC Advanced Registration Begins May 27 May 27 May 27 May 27 May 27 May 27 May 27 May 27 May 27 Returning Students Advanced
More informationAnnexure B: Planning, Budgeting and Performance Management Programme
Annexure B:, Budgeting Programme The following are key activities that need take place in more detail than Time frame Nature Period referred Start Finish 2012/09/01 /08/31 /or September /09/01 /09/26 August
More informationMaking Healthcare Meaningful Through Meaningful Use Stage 2
Making Healthcare Meaningful Through Meaningful Use Stage 2 Keith Griffin, MD Chief Medical Information Officer Novant Health Medical Group Novant Health: Making Healthcare Remarkable Not-for-profit, integrated
More informationMarch 1, 2007 ADVICE 2107-E (U 338-E) PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA ENERGY DIVISION
Akbar Jazayeri Vice President, Revenue and Tariffs March 1, 2007 ADVICE 2107-E (U 338-E) PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA ENERGY DIVISION SUBJECT: Late Payment Charge Revenue Balancing
More informationInvoice Magic: Business Intelligence Telecommunications Expense Management Solution
Invoice Magic: Business Intelligence Telecommunications Expense Management Solution Award Category Data, Information and Knowledge Management Michigan Department of Information Technology Nominees: Bazella
More informationHow to Develop a Mobile Strategy
How to Develop a Mobile Strategy 1 Presenter Andy Etemadi EYEMAGINE President & Chief Technology Officer 2 Presenter Greg Lett Lett Direct Vice President Web Marketing 3 Agenda Mobile Trends in ecommerce
More informationDigital Certificate Discovery for Health Care Providers
Provider Directories Initiative Overview PD PD PD PD PD PD PD January 20, 2012 Table of Contents 1 Introduction to the S&I Framework 2 3 What is unique about the S&I Framework Introduction to Provider
More informationTEMPUS IRIS. Project Scope
TEMPUS IRIS Fostering Academic International Relations in Israeli Colleges To promote education, research and innovation. Project Scope Project number 53035-TEMPUS--202--IL-TEMPUS-JPGR This project has
More informationService Management Policy
Service Management Policy XIT-POL-006 Policy - PUBLIC- Author Jan Pavel Version 1.4 Status Reviewed by Approved by Responsible Final Tomas Kucera Tomas Kucera Pavel JANÁK Valid from 9.6.2010 Scope Whole
More informationMED-DESIRE. MEDiterranean Development of Support schemes for solar Initiatives and Renewable Energies
MED-DESIRE MEDiterranean Development of Support schemes for solar Initiatives and Renewable Energies The MED-DESIRE Strategic Project At policy level aims at strengthening the capacity of Partner Countries
More informationWeb Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
More informationNAB Community Microfinance. NAB Microenterprise Loans Minimum requirements for business plans
NAB Community Microfinance NAB Microenterprise Loans Minimum requirements for business plans Money Magazine s Best of the Best Awards 2009 judged NAB Microenterprise Loans for the second year running,
More informationACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks
Session 1 Academic Calendar August 24, 2015 to October 17, 2015 Tuesday / Thursday, 5:30 pm to 8:30 pm M/W T/TH T/W TH S Saturday lab as scheduled Classes Begin 24-Aug 25-Aug 25-Aug 27-Aug 29-Aug NU205
More informationACCESS Nursing Programs Session 1 Center Valley Campus Only 8 Weeks Academic Calendar 8 Weeks
Session 1 Academic Calendar August 24, 2015 to October 17, 2015 Tuesday / Thursday, 5:30 pm to 8:30 pm M/W T/TH T/W TH S Saturday lab as scheduled Classes Begin 24-Aug 25-Aug 25-Aug 27-Aug 29-Aug NU205
More informationEnd of Life Content Report November 2014. Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net
End of Life Content Report November 2014 Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net End of Life Dashboard Page 1 Overall Choices Site Visits Tag cloud showing end of life
More informationCyber-Physical System Security of the Power Grid
Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation
More information