Systems Analysis for IP Campaigns. William Betten Medical Technology Director UBM TechInsights December 5, 2012

Size: px
Start display at page:

Download "Systems Analysis for IP Campaigns. William Betten Medical Technology Director UBM TechInsights December 5, 2012"

Transcription

1 Systems Analysis for IP Campaigns William Betten Medical Technology Director UBM TechInsights December 5, 2012

2 UBM TechInsights Overview Professional Services Full suite of IP Services, including Patent Portfolio and Asset Management Capabilities, Licensing, Litigation Support, Deposition, Patent Brokerage, Technology Due Diligence, Product/Device Procurement Technical Intelligence Physical analysis of competitors device/product attributes incl. Circuits, Structures, Materials Analysis, Product Teardowns, BoM, IC Costing Business Intelligence Design Trends, Business Landscapes and Profiling, Product Distribution and Sales Data, Regional Sales Assessment.. Software & System Level Analysis Source Code, Algorithm Analysis, System Level Testing State-of-the-Art Laboratories Four world class locations with 340 highly experienced and energetic employees Skilled in the Art of Technology 2 I 2012, UBM LLC

3 Intellectual Property Program Why? Enables achievement of strategic goals Serves as the basis for favorable business deals and enhanced competitive position Diminishes a competitor s business momentum Blocks or delays a competing product s market entry Imposes cost disadvantages on competing products 3 I 2012, UBM LLC

4 White Hat Reverse Engineering (RE) RE is the systematic tear down and analysis of what lies under the hood. RE supports strategy and decision making across the IP lifecycle. RE protects a company s own intellectual property. 4 I 2012, UBM LLC

5 Body of Knowledge: Breadth & Depth Library of Analysis, Reports & Data Subject-matter Expertise & Domain Knowledge IP Knowledge & Tools 5 I 2012, UBM LLC

6 Comprehensive Technical Analysis Patent Review Technology Analysis Systems Analysis Process Analysis Teardown Circuit Analysis 6 I 2012, UBM LLC

7 Our Methodology 1 Patent Assessment 2 Target Assessment 3 Evidence of Use Plan 4 Feasibility Exercise 5 6 Detailed Investigation Results Documentation 7 I 2012, UBM LLC

8 Areas of Analysis Wireless Communication Hardware Electrical Test Static & Dynamic Software Analysis 8 I 2012, UBM LLC

9 Analysis Techniques: The Toolbox System Analysis Techniques Interface and Parameter Extraction Custom application development Bill-of-materials analysis Software Analysis Techniques Firmware extraction, binary code Inspection Static Code Analysis, software disassembly Dynamic analysis, custom test application development Circuit Analysis Techniques Package and PCB routing analysis, component identification IC de-layering & topographic imaging, layout extraction Schematic capture, design analysis, simulation & timing analysis 9 I 2012, UBM LLC Process Analysis Techniques Materials analysis High-magnification imaging and critical dimensions extraction IC design, packaging, cost-to-manufacture estimation

10 Hardware Electrical Test Functional test Waveform Analysis RF & Analog Board & die-level probing Examples: Micro-probing of camera image sensors SSD controller analysis via active bus monitoring Mobile device charging circuit analysis Circuit, waveform, and material analysis on a blood glucose meter 10 I 2012, UBM LLC

11 Software Reverse Engineering What s involved in Software RE? US XXX EP YYY Target Extraction of Software Find Portion of interest (Re)Construction of high(er) level representation Identification of infringing elements 11 I 2012, UBM LLC

12 Software Reverse Engineering Complications Software is a hidden part of the product. Software has a complex branching ability. Software is reconfigurable. Software is a more independent design realm than hardware. 12 I 2012, UBM LLC

13 Systems & Software RE Example Project Goals: Perform a RE study on a magnetic compass app to understand role of sensor data with respect to image orientation If applicable, perform a claims mapping to the app Project Deliverables: Detailed engineering report Claims mapping 13 I 2012, UBM LLC

14 Project Approach Assess patent & develop test plan Acquire smartphone & magnetic field detector app Functional Test Code analysis Client Review Claims Mapping 14 I 2012, UBM LLC

15 Code Analysis: To understand how the application applies the sensor data to calculate orientation of the displayed image Downloaded and unpacked the app and OS framework Disassembled the apps and the rendering frameworks, analyzed the code, and decompiled the disassembled code Created high level diagram of relevant functional elements Results: Operation of the compass and other device motion sensors was determined through RE of the compass app source code & device OS. We were able to conclusively determine whether the claim elements mapped to the application. 15 I 2012, UBM LLC

16 Conclusions Companies that fail to employ a rigorous program to protect their IP rights run the risk of costly litigation, lost revenue, and weakened market share. An effective and proactive IP strategy demands the under-the-hood intelligence that only RE can provide. Systems RE requires a unique blend of complementary skills. 16 I 2012, UBM LLC

17 Questions?? For More Information: Web:

Sample Project List. Software Reverse Engineering

Sample Project List. Software Reverse Engineering Sample Project List Software Reverse Engineering Automotive Computing Electronic power steering Embedded flash memory Inkjet printer software Laptop computers Laptop computers PC application software Software

More information

Open Source Management

Open Source Management Open Source Management Best practices for professional use of open source software Simont Braun Avenue Louise, 149/20 1050 Bruxelles T 32 2 533 17 71 F 32 2 533 17 97 E benjamin.docquir@simontbraun.eu

More information

Figure 1: Overview of the EEG Monitoring System.

Figure 1: Overview of the EEG Monitoring System. I TRODUCTIO : This document describes and serves as a template for preparation of a Project Readiness Package. The objective of the Project Readiness Package is to document customer needs and expectations,

More information

How to build a patent sales programme. Art Monk, TechInsights. Yearbook. Building IP value in the 21st century

How to build a patent sales programme. Art Monk, TechInsights. Yearbook. Building IP value in the 21st century How to build a patent sales programme Art Monk, TechInsights Yearbook 2015 Building IP value in the 21st century In a connected world, is your patent portfolio performing? Get results with TechInsights

More information

CREATING BUSINESS VALUE THROUGH PATENT KNOWLEDGE MANAGEMENT

CREATING BUSINESS VALUE THROUGH PATENT KNOWLEDGE MANAGEMENT CREATING BUSINESS VALUE THROUGH PATENT KNOWLEDGE MANAGEMENT UBM TechInsights THE RIGHT TOOL MAKES THE DIFFERENCE See what you ve been missing? PatentVista Enterprise, UBM TechInsights patent management

More information

Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments

Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Andrew J. Hall Fenwick & West LLP April 16, 2013 Linux Foundation Collaboration Summit Presentation Topics Introduction

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

About Yazata Business Consulting

About Yazata Business Consulting About Yazata Business Consulting Yazata Consulting is a, full service software consulting company offering web design, application development, software integration, embedded systems design & development,

More information

InvenSense MPU-6515 6-Axis Accelerometer Gyroscope MEMS Motion Sensor

InvenSense MPU-6515 6-Axis Accelerometer Gyroscope MEMS Motion Sensor InvenSense MPU-6515 6-Axis Accelerometer Gyroscope MEMS Motion Sensor 1891 Robertson Road, Suite 500, Ottawa, ON K2H 5B7 Canada Tel: 613-829-0414 www.chipworks.com Some of the information in this report

More information

Reverse Engineering: Printed Circuit Boards. Dr. Tarek A. Tutunji Philadelphia University, Jordan

Reverse Engineering: Printed Circuit Boards. Dr. Tarek A. Tutunji Philadelphia University, Jordan Reverse Engineering: Printed Circuit Boards Dr. Tarek A. Tutunji Philadelphia University, Jordan Reference PCB Reverse Engineering by John Armistead A Rapid Prototyping Methodology for Reverse Engineering

More information

Product Lifecycle Management. Diane Ryan Siemens PLM Software

Product Lifecycle Management. Diane Ryan Siemens PLM Software Product Lifecycle Management Diane Ryan Siemens PLM Software Discussion Topics Challenges in Manufacturing and Lifecycle Maintenance Product Lifecycle Management Communication and Collaboration Standardized

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

Business Models of Innovation Closed Innovation and Open Innovation (Topic 7 (c))

Business Models of Innovation Closed Innovation and Open Innovation (Topic 7 (c)) Business Models of Innovation Closed Innovation and Open Innovation (Topic 7 (c)) NATIONAL WORKSHOP ON INNOVATION PROMOTION AND TECHNOLOGY TRANSFER Belgrade, June 21 and 22, 2011 What is Open Innovation?

More information

VARIATION-AWARE CUSTOM IC DESIGN REPORT 2011

VARIATION-AWARE CUSTOM IC DESIGN REPORT 2011 VARIATION-AWARE CUSTOM IC DESIGN REPORT 2011 Amit Gupta President and CEO, Solido Design Automation Abstract This report covers the results of an independent worldwide custom IC design survey. The survey

More information

Leti Introduction and Overview

Leti Introduction and Overview Leti Introduction and Overview Leti Day in Tokyo, October 3rd 2012 Laurent Malier 2012 Leti 2012 1 CEA The CEA at a glance Commissariat à l Énergie Atomique et aux Énergies Alternatives is one of the largest

More information

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference

More information

The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC

The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC Introduction The SA601 is a mixed signal device fabricated in 0.18u CMOS.

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques

More information

Modern Market Sensors in Smartphones: State-of-the-art How to make smartphones even more smarter? Conclusions

Modern Market Sensors in Smartphones: State-of-the-art How to make smartphones even more smarter? Conclusions Smartphone Sensing: What Sensors Would we Like to Have in the Future Smartphones? Dr. Sergey Y. Yurish International Frequency Sensor Association (IFSA), Technology Assistance BCNA 2010, S.L. Barcelona,

More information

Opendiem Training Exercise 1 Opendiem-TRN-0001

Opendiem Training Exercise 1 Opendiem-TRN-0001 Opendiem Training Exercise 1 Revision 5.0.0 Status Initials Date Comment Released RAC 11/12/2010 Updated format and content Exercise 1 - Accessing the Opendiem Server through a Standard Web Browser Introduction

More information

Samsung Galaxy S6 Fingerprint Sensor New Synaptics Design

Samsung Galaxy S6 Fingerprint Sensor New Synaptics Design Samsung Galaxy S6 Fingerprint Sensor New Synaptics Design Second generation Samsung Galaxy fingerprint sensor: same capacitive technology but totally different design For the second time Samsung introduces

More information

Agilent EEsof EDA. www.agilent.com/find/eesof

Agilent EEsof EDA. www.agilent.com/find/eesof Agilent EEsof EDA This document is owned by Agilent Technologies, but is no longer kept current and may contain obsolete or inaccurate references. We regret any inconvenience this may cause. For the latest

More information

Qualcomm QCA6174 802.11ac Wi-Fi 2x2 MIMO Combo SoC

Qualcomm QCA6174 802.11ac Wi-Fi 2x2 MIMO Combo SoC Qualcomm QCA6174 Basic Functional Analysis 1891 Robertson Road, Suite 500, Ottawa, ON K2H 5B7 Canada Tel: 613-829-0414 www.chipworks.com Basic Functional Analysis 2 Some of the information in this report

More information

ADOPTING AN IP LIFECYCLE PROCESS TO MANAGE AND PROTECT THE CHANGING VALUE OF INTELLECTUAL PROPERTY. UBM TechInsights, Ottawa, Ontario, Canada

ADOPTING AN IP LIFECYCLE PROCESS TO MANAGE AND PROTECT THE CHANGING VALUE OF INTELLECTUAL PROPERTY. UBM TechInsights, Ottawa, Ontario, Canada ADOPTING AN IP LIFECYCLE PROCESS TO MANAGE AND PROTECT THE CHANGING VALUE OF UBM TechInsights, Ottawa, Ontario, Canada INTRODUCTION In today s competitive marketplace, intellectual property (IP) assets

More information

Improving Global BOM Management for Life Science Companies

Improving Global BOM Management for Life Science Companies P T C. c o m White Paper Global BOM Management Page 1 of 8 Improving Global BOM Management for Life Science Companies Unify Your Product Definition with a Single Enterprise Solution Executive Summary Today

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION

VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION Mark J. Norris Vision Inspection Technology, LLC Haverhill, MA mnorris@vitechnology.com ABSTRACT Traditional methods of identifying and

More information

Software User Guide UG-461

Software User Guide UG-461 Software User Guide UG-461 One Technology Way P.O. Box 9106 Norwood, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com ezlinx icoupler Isolated Interface Development Environment

More information

ni.com/vision NI Vision

ni.com/vision NI Vision ni.com/vision NI Vision The NI Vision Approach Integrate NI LabVIEW graphical system design software across the entire NI vision hardware portfolio to create a flexible, open platform that reduces development

More information

1 Introduction 1. 1 Introduction

1 Introduction 1. 1 Introduction 1 Introduction 1 1 Introduction Software is everywhere. Virtually every complex product manufactured today is controlled by software, and many commercial services are based on software systems. The quality

More information

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014

More information

WEB, HYBRID, NATIVE EXPLAINED CRAIG ISAKSON. June 2013 MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER

WEB, HYBRID, NATIVE EXPLAINED CRAIG ISAKSON. June 2013 MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER WEB, HYBRID, NATIVE EXPLAINED June 2013 CRAIG ISAKSON MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER 701.235.5525 888.sundog fax: 701.235.8941 2000 44th St. S Floor 6 Fargo, ND 58103 www.sundoginteractive.com

More information

Bluetooth SMART Advertise-Only Beacon Reference Design

Bluetooth SMART Advertise-Only Beacon Reference Design EM MICROELECTRONIC - MARIN SA PRELIMINARY Bluetooth SMART Advertise-Only Beacon Reference Design Features COMPLETE BLE BEACON SYSTEM o EM9301 Bluetooth SMART Controller o EM6819 0.9V Flash Microcontroller

More information

INTELLECTUAL PROPERTY CREDENTIALS. Services Summary Brooks Consulting s intellectual property offerings fall into three main categories:

INTELLECTUAL PROPERTY CREDENTIALS. Services Summary Brooks Consulting s intellectual property offerings fall into three main categories: INTELLECTUAL PROPERTY CREDENTIALS Brooks Consulting LLC provides litigation and management consulting services to small businesses, international conglomerates and law firms of every size. Not just consultants

More information

Fujitsu Semiconductor Europe CI-300113-E-V10 32-BIT MICROCONTROLLER STARTERKIT SK-FM3-100PMC FUNCTIONAL LIMITATION CUSTOMER INFORMATION

Fujitsu Semiconductor Europe CI-300113-E-V10 32-BIT MICROCONTROLLER STARTERKIT SK-FM3-100PMC FUNCTIONAL LIMITATION CUSTOMER INFORMATION Fujitsu Semiconductor Europe CI-300113-E-V10 32-BIT MICROCONTROLLER STARTERKIT SK-FM3-100PMC FUNCTIONAL LIMITATION CUSTOMER INFORMATION Revision History Revision History Date 2011-05-02 V1.0; 1 st version;

More information

Is Your Mobile Application Ready For Business?

Is Your Mobile Application Ready For Business? Is Your Mobile Application Ready For Business? It is clear that mobile technologies will transform the enterprise. The simple math is that if information and communications are available at any place and

More information

Visual Programming of Logic, Motion, and Robotics

Visual Programming of Logic, Motion, and Robotics ADVANCED Motion Controls October 2014 Visual Programming of Logic, Motion, and Robotics Sándor Barta Overview The art of programming consists of mentally translating a workflow into a sequential programming

More information

Adaptive Radio. Cognitive Radio

Adaptive Radio. Cognitive Radio What are Cognitive Radio and Dynamic Spectrum Access SDR can act as a key enabling technology for a variety of other reconfigurable radio equipments commonly discussed in the advanced wireless market 1.

More information

Medical Technologies. Helbling Technik Innovation, together we do it

Medical Technologies. Helbling Technik Innovation, together we do it Medical Technologies Helbling Technik Innovation, together we do it Innovation, together we do it The world is constantly changing new lifestyles, new desires, new insights and new goals demand effective

More information

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions

Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance

More information

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS

More information

PLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING

PLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING PLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING SUMMARY The use and downloading of the SDK is subject to the signing of the TomTom Mutual NDA for Apps. The TomTom SDK Terms of Use are applicable

More information

Assignment 4. Section 1. Section 2. Kevin Barresi, Justin Williams, Nishant Panchal

Assignment 4. Section 1. Section 2. Kevin Barresi, Justin Williams, Nishant Panchal Assignment 4 Section 1 Justin WIlliams Nishant Panchal Kevin Barresi Percentage of effort towards assignment 33.3% 33.3% 33.3% Table 1: Group contribution distribution Section 2 Smartphone Application

More information

IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!

IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS! The Bloor Group IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS VENDOR PROFILE The IBM Big Data Landscape IBM can legitimately claim to have been involved in Big Data and to have a much broader

More information

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION

More information

AMFitzgerald Company Overview

AMFitzgerald Company Overview AMFitzgerald Company Overview February 2015 12 th anniversary AMFitzgerald services MEMS Innovation MEMS Solutions Technology Strategy Creation of novel designs and IP Paths to manufacturing and market

More information

Normen & Standards Industrie 4.0 IEEE Standards

Normen & Standards Industrie 4.0 IEEE Standards Normen & Standards Industrie 4.0 IEEE Standards Stand: Oktober 2015 IEEE 1872 * IEEE 2015 IEEE Standard Ontologies for Robotics and Automation 1872-2015 IEEE 1232.3 * IEEE 1232.3- IEEE Guide for the Use

More information

Ryerson Digital Media Zone Online Resources Patent Essentials

Ryerson Digital Media Zone Online Resources Patent Essentials Maya Medeiros Lawyer, Patent Agent, Trademark Agent T: +1 416.216.4823 maya.medeiros@nortonrosefulbright.com http://www.nortonrosefulbright.com/people/99601/maya- medeiros PATENT ESSENTIALS WHAT IS A PATENT?

More information

Fraunhofer Institute for Telecommunications

Fraunhofer Institute for Telecommunications Fraunhofer Institute for Telecommunications Heinrich-Hertz-Institut SCUBE-ICT Emerging Berlin opportunities under FP7-ICT Call 5 Minsk, 25.-26.06.2009 Einsteinufer 37 10587 Berlin Germany Phone: Fax: email:

More information

A Biologically Inspired Approach to Network Vulnerability Identification

A Biologically Inspired Approach to Network Vulnerability Identification A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced

More information

How To Integrate Software And Systems

How To Integrate Software And Systems September 25, 2014 EFFECTIVE METHODS FOR SOFTWARE AND SYSTEMS INTEGRATION P R E S E N T E D B Y: D R. B O Y D L. S U M M E R S 1 Software Engineer (Quality) Defense and Space The Boeing Company - Seattle,

More information

OWNER S GUIDE OWNER S GUIDE

OWNER S GUIDE OWNER S GUIDE OWNER S GUIDE A L L D I G I T A L A N D R O I D S M A R T P H O N E Owner s Guide Please read this guide before operating your phone, and keep it for future reference. Important Customer Information Intellectual

More information

A bachelor of science degree in electrical engineering with a cumulative undergraduate GPA of at least 3.0 on a 4.0 scale

A bachelor of science degree in electrical engineering with a cumulative undergraduate GPA of at least 3.0 on a 4.0 scale What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V.

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V. EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management

More information

An Open Source Software Primer for Lawyers

An Open Source Software Primer for Lawyers An Open Source Software Primer for Lawyers July 17, 2014 Presentation to the ABA Open Source Committee, Section of Science & Technology Law Joanne Montague joannemontague@dwt.com Davis Wright Tremaine

More information

Cisco Unified Communications Remote Management Services

Cisco Unified Communications Remote Management Services Cisco Unified Communications Remote Management Services What You Will Learn Our remote, high-visibility, co-management approach gives you complete ownership and control of your converged network. Cisco

More information

INTELLECTUAL PROPERTY LAW FOR MOBILE TECHNOLOGY DEVELOPERS

INTELLECTUAL PROPERTY LAW FOR MOBILE TECHNOLOGY DEVELOPERS INTELLECTUAL PROPERTY LAW FOR MOBILE TECHNOLOGY DEVELOPERS Chapter 2 2012 Hoffman Warnick LLC 1 Chapter II. A Basic IP Framework The purpose of this chapter is to convey a basic IP rights framework that

More information

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere

More information

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015 ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS Blackhat USA 2015 About Texplained Texplained [Technology Explained] refers

More information

Motion Sensing with mcube igyro Delivering New Experiences for Motion Gaming and Augmented Reality for Android Mobile Devices

Motion Sensing with mcube igyro Delivering New Experiences for Motion Gaming and Augmented Reality for Android Mobile Devices Motion Sensing with mcube igyro Delivering New Experiences for Motion Gaming and Augmented Reality for Android Mobile Devices MAY 2014 Every high-end smartphone and tablet today contains three sensing

More information

2. Overview of Software Engineering Definitions and Software Quality

2. Overview of Software Engineering Definitions and Software Quality Miguel Angel Syll Development of an Android Application for Photogrammetric 3D Reconstruction Duration of the Thesis: 6 months Completion: July, 2014 Supervisor & Examiner: Prof. Dr. Ing. Dieter Fritsch

More information

Security Through Transparency: An Open Source Approach to Physical Security

Security Through Transparency: An Open Source Approach to Physical Security Security Through Transparency: An Open Source Approach to Physical Security John Loughlin Stanton Concepts Lebanon, NJ jpl@stantonconcepts.us Security through obscurity has never been a sensible approach

More information

Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic

Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic Clifford Wolf, Johann Glaser, Florian Schupfer, Jan Haase, Christoph Grimm Computer Technology /99 Overview Ultra-Low-Power

More information

INFORMATION TECHNOLOGY PROGRAM

INFORMATION TECHNOLOGY PROGRAM INFORMATION TECHNOLOGY PROGRAM The School of Information Technology offers a two-year bachelor degree program in Information Technology for students having acquired an advanced vocational certificate.

More information

Classification of Data Center Infrastructure Management (DCIM) Tools

Classification of Data Center Infrastructure Management (DCIM) Tools Classification of Infrastructure Management (DCIM) Tools White Paper 104 Revision 3 by Kevin Brown Dennis Bouley > Executive summary Data centers today lack a formal system for classifying infrastructure

More information

Securing the Supply Chain for Electronic Equipment: A Strategy and Framework by Scott Borg

Securing the Supply Chain for Electronic Equipment: A Strategy and Framework by Scott Borg The Internet Security Alliance Securing the Supply Chain for Electronic Equipment: A Strategy and Framework by Scott Borg Background on This Project This short paper is based on sixteen months of meetings,

More information

Security Intelligence Services. Cybersecurity training. www.kaspersky.com

Security Intelligence Services. Cybersecurity training. www.kaspersky.com Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative

More information

Evading Android Emulator

Evading Android Emulator Evading Android Emulator Thanasis Petsas petsas@ics.forth.gr petsas@ics.forth.gr - www.syssec-project.eu 1 What is a Virtual Machine? A software based computer that functions like a physical machine A

More information

Mobile App Proposal 0-000-000-000. - Magazine company- email@address.com. January 12, y. Direct Contact. Email

Mobile App Proposal 0-000-000-000. - Magazine company- email@address.com. January 12, y. Direct Contact. Email Mobile App Proposal - Magazine company- January 12, y Direct Contact 0-000-000-000 Email email@address.com TABLE OF CONTENTS 1. Introduction 2. Project Overview & Objectives 3. About Newsboard 4. Analytics

More information

Ivan Zatkovich. Intellectual Property Consulting & Patent Litigation Internet Telecommunications Information Technology

Ivan Zatkovich. Intellectual Property Consulting & Patent Litigation Internet Telecommunications Information Technology Ivan Zatkovich Intellectual Property Consulting & Patent Litigation Internet Telecommunications Information Technology ecomp Consulting, LLC 1507 Dumont Drive Valrico, FL 33594 813 601 8142 IvanZat@aol.com

More information

STAGE 1 COMPETENCY STANDARD FOR ENGINEERING ASSOCIATE

STAGE 1 COMPETENCY STANDARD FOR ENGINEERING ASSOCIATE STAGE 1 STANDARD FOR ENGINEERING ASSOCIATE ROLE DESCRIPTION THE MATURE ENGINEERING ASSOCIATE The following characterises the senior practice role that the mature, Engineering Associate may be expected

More information

Basic Wireless Infrastructure and Topologies

Basic Wireless Infrastructure and Topologies Basic Wireless Infrastructure and Topologies Developed by Sebastian Buettrich and Alberto Escudero Pascual 1 Goals To be aware of the most common wireless topologies To be able to identify and plan suitable

More information

Paul Spence. CEO, Global Outsourcing. Bank of America Merrill Lynch TMT Conference 2010 London, June 9

Paul Spence. CEO, Global Outsourcing. Bank of America Merrill Lynch TMT Conference 2010 London, June 9 Paul Spence CEO, Global Outsourcing Bank of America Merrill Lynch TMT Conference 2010 London, June 9 2010: Three keys to a successful year Growth: accelerate the top line recovery by focusing on 5 key

More information

System-on. on-chip Design Flow. Prof. Jouni Tomberg Tampere University of Technology Institute of Digital and Computer Systems. jouni.tomberg@tut.

System-on. on-chip Design Flow. Prof. Jouni Tomberg Tampere University of Technology Institute of Digital and Computer Systems. jouni.tomberg@tut. System-on on-chip Design Flow Prof. Jouni Tomberg Tampere University of Technology Institute of Digital and Computer Systems jouni.tomberg@tut.fi 26.03.2003 Jouni Tomberg / TUT 1 SoC - How and with whom?

More information

TDMS Test & Data Management Software

TDMS Test & Data Management Software Test & Data Management Software TDMS protective relays energy meters transducers power quality CT-VT-PT transformers ground grid circuit breakers batteries surge arresters The Integrated Testing Solution

More information

Wireless M2M. Key factors for a successful deployment strategy (Part 2) SUNIL HATTANGADY. President, Emblaze Consulting LLC. May, 2009 ABSTRACT

Wireless M2M. Key factors for a successful deployment strategy (Part 2) SUNIL HATTANGADY. President, Emblaze Consulting LLC. May, 2009 ABSTRACT CONTENTS 1. Business Strategy 2. ROI 3. Implementation 4. Level of Complexity 5. IT Infrastructure Integration 6. Service Activation/ Provisioning 7. Integration & Testing 8. Maintenance & Service 9. Training

More information

PFP Technology White Paper

PFP Technology White Paper PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions

More information

BIG DATA BETWEEN REVOLUTION AND CONFUSION SEBASTIAN LAND - RAPIDMINER GMBH, DORTMUND. 3/23/2015 RapidMiner 1

BIG DATA BETWEEN REVOLUTION AND CONFUSION SEBASTIAN LAND - RAPIDMINER GMBH, DORTMUND. 3/23/2015 RapidMiner 1 BIG DATA BETWEEN REVOLUTION AND CONFUSION SEBASTIAN LAND - RAPIDMINER GMBH, DORTMUND 3/23/2015 RapidMiner 1 Don ts Me, too effect Starting a Big Data Project for all costs But without purpose Likely to

More information

ESYST 123 - Residential Wiring

ESYST 123 - Residential Wiring ESYST 123 - Residential Wiring Approval Date: Effective Term: Department: ELECTRONIC SYSTEMS TECHNOLOGY Division: Career Technical Education Units: 4.00 Grading Option: Letter Grade Transferability: CSU

More information

Usage Based Insurance

Usage Based Insurance Usage Based Insurance Saving Money by Helping Modify Driving Behavior Product Code: idrd-14uscwsat-nuse Market: Connected Worlds Destination: U.S. Direction: Automotive Date Created: January 2014 Expert

More information

Eighth Annual Student Research Forum

Eighth Annual Student Research Forum Eighth Annual Student Research Forum February 18, 2011 COMPUTER SCIENCE AND COMPUTATIONAL SCIENCE PRESENTATION SCHEDULE Session Chair: Dr. George Miminis Head, Computer Science: Dr. Edward Brown Director,

More information

Development of a Service Robot System for a Remote Child Monitoring Platform

Development of a Service Robot System for a Remote Child Monitoring Platform , pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,

More information

Information Needed for Effective Asset Management

Information Needed for Effective Asset Management Emerson Reliability Consulting White Paper Information Needed for Effective Asset Management Bruce Hawkins, CMRP Director of Technical Excellence, Emerson Reliability Consulting Effective asset management

More information

Electrics & Electronics

Electrics & Electronics Area of competence Electrics & Electronics Maximum Focus ARRK P+Z Engineering For nearly 50 years, we have providing active product development support to customers from the automotive, aerospace and special

More information

1 st year / 2014-2015/ Principles of Industrial Eng. Chapter -3 -/ Dr. May G. Kassir. Chapter Three

1 st year / 2014-2015/ Principles of Industrial Eng. Chapter -3 -/ Dr. May G. Kassir. Chapter Three Chapter Three Scheduling, Sequencing and Dispatching 3-1- SCHEDULING Scheduling can be defined as prescribing of when and where each operation necessary to manufacture the product is to be performed. It

More information

Networking Services Trusted at every level and every phase

Networking Services Trusted at every level and every phase Networking Services Trusted at every level and every phase freescale.com/netservices Networking Services Overview Freescale has over 1000 in-house software resources providing networking expertise, software

More information

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China Agenda The Internet of Things ( IoT ): a New and Exciting Application Space A typical IoT application Lighting for Home

More information

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions September 2013 Silicon Support & Professional Eng. Services Customer Experience Freescale Provided SW & Solutions Provide Valued Software, Support & Professional Engineering Services, Competitively 2 Customer

More information

I. Introduction. Understanding the Business Objectives

I. Introduction. Understanding the Business Objectives Intellectual Property Due Diligence in Acquisitions Chen Wang, Deputy Chief IP Counsel, E.I. du Pont de Nemours and Company Neil Henderson, Partner, Borden Ladner Gervais LLP Marc Lampert, Student-at-Law,

More information

Getting Ahead of Malware

Getting Ahead of Malware IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

Night Owl 8 channel DVR system with HDMI output, 960H recording and a Free Night Owl Pro App with Owl Scan (No Hard Drive Included)

Night Owl 8 channel DVR system with HDMI output, 960H recording and a Free Night Owl Pro App with Owl Scan (No Hard Drive Included) Night Owl 8 channel DVR system with HDMI output, 960H recording and a Free Night Owl Pro App with Owl Scan (No Hard Drive Included) Night Owl s PE-DVR8 is an advanced 8 channel 960H Security DVR. The DVR

More information

MOTION NO. M2016-01 Contract for Transit Scheduling Software PROPOSED ACTION

MOTION NO. M2016-01 Contract for Transit Scheduling Software PROPOSED ACTION MOTION NO. M2016-01 Contract for Transit Scheduling Software MEETING: DATE: TYPE OF ACTION: STAFF CONTACT: Operations and Administration Committee 01/07/2016 Final Action Bonnie Todd, Executive Director

More information

PUF Physical Unclonable Functions

PUF Physical Unclonable Functions Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication

More information

Improving Service Asset and Configuration Management with CA Process Maps

Improving Service Asset and Configuration Management with CA Process Maps TECHNOLOGY BRIEF: SERVICE ASSET AND CONFIGURATION MANAGEMENT MAPS Improving Service Asset and Configuration with CA Process Maps Peter Doherty CA TECHNICAL SALES Table of Contents Executive Summary SECTION

More information

ZigBee-2.4-DK 2.4 GHZ ZIGBEE DEVELOPMENT KIT USER S GUIDE. 1. Kit Contents. Figure 1. 2.4 GHz ZigBee Development Kit

ZigBee-2.4-DK 2.4 GHZ ZIGBEE DEVELOPMENT KIT USER S GUIDE. 1. Kit Contents. Figure 1. 2.4 GHz ZigBee Development Kit 2.4 GHZ ZIGBEE DEVELOPMENT KIT USER S GUIDE 1. Kit Contents The 2.4 GHz ZigBee Development Kit contains the following items, shown in Figure 1. 2.4 GHz 802.15.4/ZigBee Target Boards (6) Antennas (6) 9

More information