Systems Analysis for IP Campaigns. William Betten Medical Technology Director UBM TechInsights December 5, 2012
|
|
- Trevor Lyons
- 8 years ago
- Views:
Transcription
1 Systems Analysis for IP Campaigns William Betten Medical Technology Director UBM TechInsights December 5, 2012
2 UBM TechInsights Overview Professional Services Full suite of IP Services, including Patent Portfolio and Asset Management Capabilities, Licensing, Litigation Support, Deposition, Patent Brokerage, Technology Due Diligence, Product/Device Procurement Technical Intelligence Physical analysis of competitors device/product attributes incl. Circuits, Structures, Materials Analysis, Product Teardowns, BoM, IC Costing Business Intelligence Design Trends, Business Landscapes and Profiling, Product Distribution and Sales Data, Regional Sales Assessment.. Software & System Level Analysis Source Code, Algorithm Analysis, System Level Testing State-of-the-Art Laboratories Four world class locations with 340 highly experienced and energetic employees Skilled in the Art of Technology 2 I 2012, UBM LLC
3 Intellectual Property Program Why? Enables achievement of strategic goals Serves as the basis for favorable business deals and enhanced competitive position Diminishes a competitor s business momentum Blocks or delays a competing product s market entry Imposes cost disadvantages on competing products 3 I 2012, UBM LLC
4 White Hat Reverse Engineering (RE) RE is the systematic tear down and analysis of what lies under the hood. RE supports strategy and decision making across the IP lifecycle. RE protects a company s own intellectual property. 4 I 2012, UBM LLC
5 Body of Knowledge: Breadth & Depth Library of Analysis, Reports & Data Subject-matter Expertise & Domain Knowledge IP Knowledge & Tools 5 I 2012, UBM LLC
6 Comprehensive Technical Analysis Patent Review Technology Analysis Systems Analysis Process Analysis Teardown Circuit Analysis 6 I 2012, UBM LLC
7 Our Methodology 1 Patent Assessment 2 Target Assessment 3 Evidence of Use Plan 4 Feasibility Exercise 5 6 Detailed Investigation Results Documentation 7 I 2012, UBM LLC
8 Areas of Analysis Wireless Communication Hardware Electrical Test Static & Dynamic Software Analysis 8 I 2012, UBM LLC
9 Analysis Techniques: The Toolbox System Analysis Techniques Interface and Parameter Extraction Custom application development Bill-of-materials analysis Software Analysis Techniques Firmware extraction, binary code Inspection Static Code Analysis, software disassembly Dynamic analysis, custom test application development Circuit Analysis Techniques Package and PCB routing analysis, component identification IC de-layering & topographic imaging, layout extraction Schematic capture, design analysis, simulation & timing analysis 9 I 2012, UBM LLC Process Analysis Techniques Materials analysis High-magnification imaging and critical dimensions extraction IC design, packaging, cost-to-manufacture estimation
10 Hardware Electrical Test Functional test Waveform Analysis RF & Analog Board & die-level probing Examples: Micro-probing of camera image sensors SSD controller analysis via active bus monitoring Mobile device charging circuit analysis Circuit, waveform, and material analysis on a blood glucose meter 10 I 2012, UBM LLC
11 Software Reverse Engineering What s involved in Software RE? US XXX EP YYY Target Extraction of Software Find Portion of interest (Re)Construction of high(er) level representation Identification of infringing elements 11 I 2012, UBM LLC
12 Software Reverse Engineering Complications Software is a hidden part of the product. Software has a complex branching ability. Software is reconfigurable. Software is a more independent design realm than hardware. 12 I 2012, UBM LLC
13 Systems & Software RE Example Project Goals: Perform a RE study on a magnetic compass app to understand role of sensor data with respect to image orientation If applicable, perform a claims mapping to the app Project Deliverables: Detailed engineering report Claims mapping 13 I 2012, UBM LLC
14 Project Approach Assess patent & develop test plan Acquire smartphone & magnetic field detector app Functional Test Code analysis Client Review Claims Mapping 14 I 2012, UBM LLC
15 Code Analysis: To understand how the application applies the sensor data to calculate orientation of the displayed image Downloaded and unpacked the app and OS framework Disassembled the apps and the rendering frameworks, analyzed the code, and decompiled the disassembled code Created high level diagram of relevant functional elements Results: Operation of the compass and other device motion sensors was determined through RE of the compass app source code & device OS. We were able to conclusively determine whether the claim elements mapped to the application. 15 I 2012, UBM LLC
16 Conclusions Companies that fail to employ a rigorous program to protect their IP rights run the risk of costly litigation, lost revenue, and weakened market share. An effective and proactive IP strategy demands the under-the-hood intelligence that only RE can provide. Systems RE requires a unique blend of complementary skills. 16 I 2012, UBM LLC
17 Questions?? For More Information: Web:
Sample Project List. Software Reverse Engineering
Sample Project List Software Reverse Engineering Automotive Computing Electronic power steering Embedded flash memory Inkjet printer software Laptop computers Laptop computers PC application software Software
More informationOpen Source Management
Open Source Management Best practices for professional use of open source software Simont Braun Avenue Louise, 149/20 1050 Bruxelles T 32 2 533 17 71 F 32 2 533 17 97 E benjamin.docquir@simontbraun.eu
More informationFigure 1: Overview of the EEG Monitoring System.
I TRODUCTIO : This document describes and serves as a template for preparation of a Project Readiness Package. The objective of the Project Readiness Package is to document customer needs and expectations,
More informationHow to build a patent sales programme. Art Monk, TechInsights. Yearbook. Building IP value in the 21st century
How to build a patent sales programme Art Monk, TechInsights Yearbook 2015 Building IP value in the 21st century In a connected world, is your patent portfolio performing? Get results with TechInsights
More informationCREATING BUSINESS VALUE THROUGH PATENT KNOWLEDGE MANAGEMENT
CREATING BUSINESS VALUE THROUGH PATENT KNOWLEDGE MANAGEMENT UBM TechInsights THE RIGHT TOOL MAKES THE DIFFERENCE See what you ve been missing? PatentVista Enterprise, UBM TechInsights patent management
More informationFree and Open-Source Software Diligence in Mergers, Acquisitions, and Investments
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Andrew J. Hall Fenwick & West LLP April 16, 2013 Linux Foundation Collaboration Summit Presentation Topics Introduction
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationAbout Yazata Business Consulting
About Yazata Business Consulting Yazata Consulting is a, full service software consulting company offering web design, application development, software integration, embedded systems design & development,
More informationInvenSense MPU-6515 6-Axis Accelerometer Gyroscope MEMS Motion Sensor
InvenSense MPU-6515 6-Axis Accelerometer Gyroscope MEMS Motion Sensor 1891 Robertson Road, Suite 500, Ottawa, ON K2H 5B7 Canada Tel: 613-829-0414 www.chipworks.com Some of the information in this report
More informationReverse Engineering: Printed Circuit Boards. Dr. Tarek A. Tutunji Philadelphia University, Jordan
Reverse Engineering: Printed Circuit Boards Dr. Tarek A. Tutunji Philadelphia University, Jordan Reference PCB Reverse Engineering by John Armistead A Rapid Prototyping Methodology for Reverse Engineering
More informationProduct Lifecycle Management. Diane Ryan Siemens PLM Software
Product Lifecycle Management Diane Ryan Siemens PLM Software Discussion Topics Challenges in Manufacturing and Lifecycle Maintenance Product Lifecycle Management Communication and Collaboration Standardized
More informationWindows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
More informationBusiness Models of Innovation Closed Innovation and Open Innovation (Topic 7 (c))
Business Models of Innovation Closed Innovation and Open Innovation (Topic 7 (c)) NATIONAL WORKSHOP ON INNOVATION PROMOTION AND TECHNOLOGY TRANSFER Belgrade, June 21 and 22, 2011 What is Open Innovation?
More informationVARIATION-AWARE CUSTOM IC DESIGN REPORT 2011
VARIATION-AWARE CUSTOM IC DESIGN REPORT 2011 Amit Gupta President and CEO, Solido Design Automation Abstract This report covers the results of an independent worldwide custom IC design survey. The survey
More informationLeti Introduction and Overview
Leti Introduction and Overview Leti Day in Tokyo, October 3rd 2012 Laurent Malier 2012 Leti 2012 1 CEA The CEA at a glance Commissariat à l Énergie Atomique et aux Énergies Alternatives is one of the largest
More informationAQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference
More informationThe SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC
The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC Introduction The SA601 is a mixed signal device fabricated in 0.18u CMOS.
More informationVON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
More informationMobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
More informationModern Market Sensors in Smartphones: State-of-the-art How to make smartphones even more smarter? Conclusions
Smartphone Sensing: What Sensors Would we Like to Have in the Future Smartphones? Dr. Sergey Y. Yurish International Frequency Sensor Association (IFSA), Technology Assistance BCNA 2010, S.L. Barcelona,
More informationOpendiem Training Exercise 1 Opendiem-TRN-0001
Opendiem Training Exercise 1 Revision 5.0.0 Status Initials Date Comment Released RAC 11/12/2010 Updated format and content Exercise 1 - Accessing the Opendiem Server through a Standard Web Browser Introduction
More informationSamsung Galaxy S6 Fingerprint Sensor New Synaptics Design
Samsung Galaxy S6 Fingerprint Sensor New Synaptics Design Second generation Samsung Galaxy fingerprint sensor: same capacitive technology but totally different design For the second time Samsung introduces
More informationAgilent EEsof EDA. www.agilent.com/find/eesof
Agilent EEsof EDA This document is owned by Agilent Technologies, but is no longer kept current and may contain obsolete or inaccurate references. We regret any inconvenience this may cause. For the latest
More informationQualcomm QCA6174 802.11ac Wi-Fi 2x2 MIMO Combo SoC
Qualcomm QCA6174 Basic Functional Analysis 1891 Robertson Road, Suite 500, Ottawa, ON K2H 5B7 Canada Tel: 613-829-0414 www.chipworks.com Basic Functional Analysis 2 Some of the information in this report
More informationADOPTING AN IP LIFECYCLE PROCESS TO MANAGE AND PROTECT THE CHANGING VALUE OF INTELLECTUAL PROPERTY. UBM TechInsights, Ottawa, Ontario, Canada
ADOPTING AN IP LIFECYCLE PROCESS TO MANAGE AND PROTECT THE CHANGING VALUE OF UBM TechInsights, Ottawa, Ontario, Canada INTRODUCTION In today s competitive marketplace, intellectual property (IP) assets
More informationImproving Global BOM Management for Life Science Companies
P T C. c o m White Paper Global BOM Management Page 1 of 8 Improving Global BOM Management for Life Science Companies Unify Your Product Definition with a Single Enterprise Solution Executive Summary Today
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationVECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION
VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION Mark J. Norris Vision Inspection Technology, LLC Haverhill, MA mnorris@vitechnology.com ABSTRACT Traditional methods of identifying and
More informationSoftware User Guide UG-461
Software User Guide UG-461 One Technology Way P.O. Box 9106 Norwood, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com ezlinx icoupler Isolated Interface Development Environment
More informationni.com/vision NI Vision
ni.com/vision NI Vision The NI Vision Approach Integrate NI LabVIEW graphical system design software across the entire NI vision hardware portfolio to create a flexible, open platform that reduces development
More information1 Introduction 1. 1 Introduction
1 Introduction 1 1 Introduction Software is everywhere. Virtually every complex product manufactured today is controlled by software, and many commercial services are based on software systems. The quality
More informationSEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
More informationWEB, HYBRID, NATIVE EXPLAINED CRAIG ISAKSON. June 2013 MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER
WEB, HYBRID, NATIVE EXPLAINED June 2013 CRAIG ISAKSON MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER 701.235.5525 888.sundog fax: 701.235.8941 2000 44th St. S Floor 6 Fargo, ND 58103 www.sundoginteractive.com
More informationBluetooth SMART Advertise-Only Beacon Reference Design
EM MICROELECTRONIC - MARIN SA PRELIMINARY Bluetooth SMART Advertise-Only Beacon Reference Design Features COMPLETE BLE BEACON SYSTEM o EM9301 Bluetooth SMART Controller o EM6819 0.9V Flash Microcontroller
More informationINTELLECTUAL PROPERTY CREDENTIALS. Services Summary Brooks Consulting s intellectual property offerings fall into three main categories:
INTELLECTUAL PROPERTY CREDENTIALS Brooks Consulting LLC provides litigation and management consulting services to small businesses, international conglomerates and law firms of every size. Not just consultants
More informationFujitsu Semiconductor Europe CI-300113-E-V10 32-BIT MICROCONTROLLER STARTERKIT SK-FM3-100PMC FUNCTIONAL LIMITATION CUSTOMER INFORMATION
Fujitsu Semiconductor Europe CI-300113-E-V10 32-BIT MICROCONTROLLER STARTERKIT SK-FM3-100PMC FUNCTIONAL LIMITATION CUSTOMER INFORMATION Revision History Revision History Date 2011-05-02 V1.0; 1 st version;
More informationIs Your Mobile Application Ready For Business?
Is Your Mobile Application Ready For Business? It is clear that mobile technologies will transform the enterprise. The simple math is that if information and communications are available at any place and
More informationVisual Programming of Logic, Motion, and Robotics
ADVANCED Motion Controls October 2014 Visual Programming of Logic, Motion, and Robotics Sándor Barta Overview The art of programming consists of mentally translating a workflow into a sequential programming
More informationAdaptive Radio. Cognitive Radio
What are Cognitive Radio and Dynamic Spectrum Access SDR can act as a key enabling technology for a variety of other reconfigurable radio equipments commonly discussed in the advanced wireless market 1.
More informationMedical Technologies. Helbling Technik Innovation, together we do it
Medical Technologies Helbling Technik Innovation, together we do it Innovation, together we do it The world is constantly changing new lifestyles, new desires, new insights and new goals demand effective
More informationComputer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions
Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance
More informationFLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS
FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS
More informationPLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING
PLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING SUMMARY The use and downloading of the SDK is subject to the signing of the TomTom Mutual NDA for Apps. The TomTom SDK Terms of Use are applicable
More informationAssignment 4. Section 1. Section 2. Kevin Barresi, Justin Williams, Nishant Panchal
Assignment 4 Section 1 Justin WIlliams Nishant Panchal Kevin Barresi Percentage of effort towards assignment 33.3% 33.3% 33.3% Table 1: Group contribution distribution Section 2 Smartphone Application
More informationIBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!
The Bloor Group IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS VENDOR PROFILE The IBM Big Data Landscape IBM can legitimately claim to have been involved in Big Data and to have a much broader
More informationIntel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
More informationAMFitzgerald Company Overview
AMFitzgerald Company Overview February 2015 12 th anniversary AMFitzgerald services MEMS Innovation MEMS Solutions Technology Strategy Creation of novel designs and IP Paths to manufacturing and market
More informationNormen & Standards Industrie 4.0 IEEE Standards
Normen & Standards Industrie 4.0 IEEE Standards Stand: Oktober 2015 IEEE 1872 * IEEE 2015 IEEE Standard Ontologies for Robotics and Automation 1872-2015 IEEE 1232.3 * IEEE 1232.3- IEEE Guide for the Use
More informationRyerson Digital Media Zone Online Resources Patent Essentials
Maya Medeiros Lawyer, Patent Agent, Trademark Agent T: +1 416.216.4823 maya.medeiros@nortonrosefulbright.com http://www.nortonrosefulbright.com/people/99601/maya- medeiros PATENT ESSENTIALS WHAT IS A PATENT?
More informationFraunhofer Institute for Telecommunications
Fraunhofer Institute for Telecommunications Heinrich-Hertz-Institut SCUBE-ICT Emerging Berlin opportunities under FP7-ICT Call 5 Minsk, 25.-26.06.2009 Einsteinufer 37 10587 Berlin Germany Phone: Fax: email:
More informationA Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
More informationHow To Integrate Software And Systems
September 25, 2014 EFFECTIVE METHODS FOR SOFTWARE AND SYSTEMS INTEGRATION P R E S E N T E D B Y: D R. B O Y D L. S U M M E R S 1 Software Engineer (Quality) Defense and Space The Boeing Company - Seattle,
More informationOWNER S GUIDE OWNER S GUIDE
OWNER S GUIDE A L L D I G I T A L A N D R O I D S M A R T P H O N E Owner s Guide Please read this guide before operating your phone, and keep it for future reference. Important Customer Information Intellectual
More informationA bachelor of science degree in electrical engineering with a cumulative undergraduate GPA of at least 3.0 on a 4.0 scale
What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF
More informationBachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries
First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as
More informationDevelopment of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V.
EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management
More informationAn Open Source Software Primer for Lawyers
An Open Source Software Primer for Lawyers July 17, 2014 Presentation to the ABA Open Source Committee, Section of Science & Technology Law Joanne Montague joannemontague@dwt.com Davis Wright Tremaine
More informationCisco Unified Communications Remote Management Services
Cisco Unified Communications Remote Management Services What You Will Learn Our remote, high-visibility, co-management approach gives you complete ownership and control of your converged network. Cisco
More informationINTELLECTUAL PROPERTY LAW FOR MOBILE TECHNOLOGY DEVELOPERS
INTELLECTUAL PROPERTY LAW FOR MOBILE TECHNOLOGY DEVELOPERS Chapter 2 2012 Hoffman Warnick LLC 1 Chapter II. A Basic IP Framework The purpose of this chapter is to convey a basic IP rights framework that
More informationCopyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and
Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere
More informationADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS Blackhat USA 2015 About Texplained Texplained [Technology Explained] refers
More informationMotion Sensing with mcube igyro Delivering New Experiences for Motion Gaming and Augmented Reality for Android Mobile Devices
Motion Sensing with mcube igyro Delivering New Experiences for Motion Gaming and Augmented Reality for Android Mobile Devices MAY 2014 Every high-end smartphone and tablet today contains three sensing
More information2. Overview of Software Engineering Definitions and Software Quality
Miguel Angel Syll Development of an Android Application for Photogrammetric 3D Reconstruction Duration of the Thesis: 6 months Completion: July, 2014 Supervisor & Examiner: Prof. Dr. Ing. Dieter Fritsch
More informationSecurity Through Transparency: An Open Source Approach to Physical Security
Security Through Transparency: An Open Source Approach to Physical Security John Loughlin Stanton Concepts Lebanon, NJ jpl@stantonconcepts.us Security through obscurity has never been a sensible approach
More informationExample-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic
Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic Clifford Wolf, Johann Glaser, Florian Schupfer, Jan Haase, Christoph Grimm Computer Technology /99 Overview Ultra-Low-Power
More informationINFORMATION TECHNOLOGY PROGRAM
INFORMATION TECHNOLOGY PROGRAM The School of Information Technology offers a two-year bachelor degree program in Information Technology for students having acquired an advanced vocational certificate.
More informationClassification of Data Center Infrastructure Management (DCIM) Tools
Classification of Infrastructure Management (DCIM) Tools White Paper 104 Revision 3 by Kevin Brown Dennis Bouley > Executive summary Data centers today lack a formal system for classifying infrastructure
More informationSecuring the Supply Chain for Electronic Equipment: A Strategy and Framework by Scott Borg
The Internet Security Alliance Securing the Supply Chain for Electronic Equipment: A Strategy and Framework by Scott Borg Background on This Project This short paper is based on sixteen months of meetings,
More informationSecurity Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
More informationEvading Android Emulator
Evading Android Emulator Thanasis Petsas petsas@ics.forth.gr petsas@ics.forth.gr - www.syssec-project.eu 1 What is a Virtual Machine? A software based computer that functions like a physical machine A
More informationMobile App Proposal 0-000-000-000. - Magazine company- email@address.com. January 12, y. Direct Contact. Email
Mobile App Proposal - Magazine company- January 12, y Direct Contact 0-000-000-000 Email email@address.com TABLE OF CONTENTS 1. Introduction 2. Project Overview & Objectives 3. About Newsboard 4. Analytics
More informationIvan Zatkovich. Intellectual Property Consulting & Patent Litigation Internet Telecommunications Information Technology
Ivan Zatkovich Intellectual Property Consulting & Patent Litigation Internet Telecommunications Information Technology ecomp Consulting, LLC 1507 Dumont Drive Valrico, FL 33594 813 601 8142 IvanZat@aol.com
More informationSTAGE 1 COMPETENCY STANDARD FOR ENGINEERING ASSOCIATE
STAGE 1 STANDARD FOR ENGINEERING ASSOCIATE ROLE DESCRIPTION THE MATURE ENGINEERING ASSOCIATE The following characterises the senior practice role that the mature, Engineering Associate may be expected
More informationBasic Wireless Infrastructure and Topologies
Basic Wireless Infrastructure and Topologies Developed by Sebastian Buettrich and Alberto Escudero Pascual 1 Goals To be aware of the most common wireless topologies To be able to identify and plan suitable
More informationPaul Spence. CEO, Global Outsourcing. Bank of America Merrill Lynch TMT Conference 2010 London, June 9
Paul Spence CEO, Global Outsourcing Bank of America Merrill Lynch TMT Conference 2010 London, June 9 2010: Three keys to a successful year Growth: accelerate the top line recovery by focusing on 5 key
More informationSystem-on. on-chip Design Flow. Prof. Jouni Tomberg Tampere University of Technology Institute of Digital and Computer Systems. jouni.tomberg@tut.
System-on on-chip Design Flow Prof. Jouni Tomberg Tampere University of Technology Institute of Digital and Computer Systems jouni.tomberg@tut.fi 26.03.2003 Jouni Tomberg / TUT 1 SoC - How and with whom?
More informationTDMS Test & Data Management Software
Test & Data Management Software TDMS protective relays energy meters transducers power quality CT-VT-PT transformers ground grid circuit breakers batteries surge arresters The Integrated Testing Solution
More informationWireless M2M. Key factors for a successful deployment strategy (Part 2) SUNIL HATTANGADY. President, Emblaze Consulting LLC. May, 2009 ABSTRACT
CONTENTS 1. Business Strategy 2. ROI 3. Implementation 4. Level of Complexity 5. IT Infrastructure Integration 6. Service Activation/ Provisioning 7. Integration & Testing 8. Maintenance & Service 9. Training
More informationPFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
More informationBIG DATA BETWEEN REVOLUTION AND CONFUSION SEBASTIAN LAND - RAPIDMINER GMBH, DORTMUND. 3/23/2015 RapidMiner 1
BIG DATA BETWEEN REVOLUTION AND CONFUSION SEBASTIAN LAND - RAPIDMINER GMBH, DORTMUND 3/23/2015 RapidMiner 1 Don ts Me, too effect Starting a Big Data Project for all costs But without purpose Likely to
More informationESYST 123 - Residential Wiring
ESYST 123 - Residential Wiring Approval Date: Effective Term: Department: ELECTRONIC SYSTEMS TECHNOLOGY Division: Career Technical Education Units: 4.00 Grading Option: Letter Grade Transferability: CSU
More informationUsage Based Insurance
Usage Based Insurance Saving Money by Helping Modify Driving Behavior Product Code: idrd-14uscwsat-nuse Market: Connected Worlds Destination: U.S. Direction: Automotive Date Created: January 2014 Expert
More informationEighth Annual Student Research Forum
Eighth Annual Student Research Forum February 18, 2011 COMPUTER SCIENCE AND COMPUTATIONAL SCIENCE PRESENTATION SCHEDULE Session Chair: Dr. George Miminis Head, Computer Science: Dr. Edward Brown Director,
More informationDevelopment of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
More informationInformation Needed for Effective Asset Management
Emerson Reliability Consulting White Paper Information Needed for Effective Asset Management Bruce Hawkins, CMRP Director of Technical Excellence, Emerson Reliability Consulting Effective asset management
More informationElectrics & Electronics
Area of competence Electrics & Electronics Maximum Focus ARRK P+Z Engineering For nearly 50 years, we have providing active product development support to customers from the automotive, aerospace and special
More information1 st year / 2014-2015/ Principles of Industrial Eng. Chapter -3 -/ Dr. May G. Kassir. Chapter Three
Chapter Three Scheduling, Sequencing and Dispatching 3-1- SCHEDULING Scheduling can be defined as prescribing of when and where each operation necessary to manufacture the product is to be performed. It
More informationNetworking Services Trusted at every level and every phase
Networking Services Trusted at every level and every phase freescale.com/netservices Networking Services Overview Freescale has over 1000 in-house software resources providing networking expertise, software
More informationNXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China
NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China Agenda The Internet of Things ( IoT ): a New and Exciting Application Space A typical IoT application Lighting for Home
More informationCustomer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions
September 2013 Silicon Support & Professional Eng. Services Customer Experience Freescale Provided SW & Solutions Provide Valued Software, Support & Professional Engineering Services, Competitively 2 Customer
More informationI. Introduction. Understanding the Business Objectives
Intellectual Property Due Diligence in Acquisitions Chen Wang, Deputy Chief IP Counsel, E.I. du Pont de Nemours and Company Neil Henderson, Partner, Borden Ladner Gervais LLP Marc Lampert, Student-at-Law,
More informationGetting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
More informationCONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
More informationNight Owl 8 channel DVR system with HDMI output, 960H recording and a Free Night Owl Pro App with Owl Scan (No Hard Drive Included)
Night Owl 8 channel DVR system with HDMI output, 960H recording and a Free Night Owl Pro App with Owl Scan (No Hard Drive Included) Night Owl s PE-DVR8 is an advanced 8 channel 960H Security DVR. The DVR
More informationMOTION NO. M2016-01 Contract for Transit Scheduling Software PROPOSED ACTION
MOTION NO. M2016-01 Contract for Transit Scheduling Software MEETING: DATE: TYPE OF ACTION: STAFF CONTACT: Operations and Administration Committee 01/07/2016 Final Action Bonnie Todd, Executive Director
More informationPUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
More informationImproving Service Asset and Configuration Management with CA Process Maps
TECHNOLOGY BRIEF: SERVICE ASSET AND CONFIGURATION MANAGEMENT MAPS Improving Service Asset and Configuration with CA Process Maps Peter Doherty CA TECHNICAL SALES Table of Contents Executive Summary SECTION
More informationZigBee-2.4-DK 2.4 GHZ ZIGBEE DEVELOPMENT KIT USER S GUIDE. 1. Kit Contents. Figure 1. 2.4 GHz ZigBee Development Kit
2.4 GHZ ZIGBEE DEVELOPMENT KIT USER S GUIDE 1. Kit Contents The 2.4 GHz ZigBee Development Kit contains the following items, shown in Figure 1. 2.4 GHz 802.15.4/ZigBee Target Boards (6) Antennas (6) 9
More information