Introduc)on to the IoT- A methodology

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Introduc)on to the IoT- A methodology"

Transcription

1 10/11/14 1 Introduc)on to the IoTA methodology Olivier SAVRY CEA LETI

2 10/11/14 2 IoTA Objec)ves Provide a reference model of architecture (ARM) based on Interoperability Scalability Security and Privacy Provide guidelines to design an IoT architecture with the defini)on of a set of views Provide a common language and concepts to improve communica)on between partners (IoT Domain Model)

3 10/11/14 3 Virtual En)ty and IoT Services Physical World is virtualized by Virtual En))es (VE) Resources actuate and observe Physical World Resources are available thanks to IoT services VE Services requests IoT services Rela)on between VE Services and IoT Services needs to be modelled which is done in form of associa)ons

4 IoT Domain model The IoTA project defines a domain model as a descrip)on of concepts belonging to a par)cular area of interest. The main purpose of a domain model is to generate a common understanding of the target domain in ques)on. Only with a common understanding of the main concepts it becomes possible to argue about architectural solu)ons and to evaluate them. IoT domain model defines Devices, Virtual En)ty, Resources, Physical En)ty, User, Services and their interac)ons

5 An architecture is a set of views Physical view Context View Func)onal View Informa)on View Opera)onal and Deployment view

6 Requirement process helps to derive architectural views Threat analysis Defines requirements but also design choices Requirements engineering IoTA defines a list of High Level requirements Choose tac)cs Mapping of requirements onto quali)es (or perspec)ves ( for ex : interoperability)) and iden)fica)on of suitable tac)cs for how to adress said quali)es. Make design choices By means of the tac)cs iden)fied in the previous step, iden)fiy design choices for addressing the underlying qualita)ve requirements. View mapping of requirements Perform first mapping of nonfunc)onal and func)onal view

7 Schema)c of IoTA methodology (see D1.5)

8

9 IoT Context view the IoT Context View consists of two parts, the context view and the IoT Domain Model. It describes the rela)onships, dependencies, and interac)ons between the system and its environment (the people, systems, and external en))es with which it interacts). To be more specific, the context view describes what the system does and does not do; where the boundaries are between it and the outside world; and how the system interacts with other systems, organiza)ons, and people across these boundaries. The concerns addressed by the context view are: System scope and responsibili)es; Iden)ty of external en))es and services and data used; Nature and characteris)cs of external en))es; Iden)ty and responsibili)es of external interfaces; Nature and characteris)cs of external interfaces; Other external interdependencies;

10 Func)onal view Composed of Func)onal Group and Components The service Organisa)on is used for composing and orchestra)ng To provide the func)onal concepts and interfaces necessary to augment Services at different levels of abstrac)ons tradi)onal (business) processes To enable the management of the IoT: configura)on of devices, tracking of faults, monitoring, repor)ng, administra)on. It contains func)ons for interac)ng with the IoT system on the basis of Ves as welll as func)onali)es for discovering and looking up services that can provide informa)on about Ves, or which allow the interac)on with VEs (but also for managing associa)ons and finding new associa)ons ) It contains IoT services as well as func)onali)es for discovery, lookup, and name resolu)on of IoT services The communica)on FG is an abstrac)on, modelling the variety of interac)on schemes derived from the many technologies belonging to IoT systems and providing a common interface to the IoT service FG.

11 Informa)on view Considering a part of a use case, informa)on view defines how the func)onal components interact together

12 Deployment & opera)on view these views will discuss how to move from the service descrip)on and the iden)fica)on of the different func)onal elements to the selec)on among the many available technologies in the IoT to build up the overall networking behaviour for the deployment. What sort of technologies of devices And communica)on methods Where to deploy the sofware related to a given device On smart object On gateways In the cloud Where to store the informa)on collected by the system Local only Web Only Local with web cache Where to deploy resolu)on of service And en))es Internal deployment External deployment (provided by a third party) Service Resources Devices

13 10/11/14 13 SOCIOTAL TUTORIAL SERIES: THE IOTA ARCHITECTURE REFERENCE MODEL Prepared by Olivier Savry, CEALe)

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Privileged Administra0on Best Prac0ces :: September 1, 2015

Privileged Administra0on Best Prac0ces :: September 1, 2015 Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program

More information

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael

More information

So#ware Defined Radio (SDR) Architecture and Systems Issues

So#ware Defined Radio (SDR) Architecture and Systems Issues So#ware Defined Radio (SDR) Architecture and Systems Issues Workshop on Spacecra# Flight So#ware (FSW 09) 2009 11 6 Kenneth J. Peters Jet Propulsion Laboratory, California Ins9tute of Technology Speaker

More information

Project Management Introduc1on

Project Management Introduc1on Project Management Introduc1on Session 1 Part I Introduc1on By Amal Le Collen, PMP Dr. Lauren1u Neamtu, PMP Session outline 1. PART I: Introduc1on 1. The Purpose of the PMBOK Guide 2. What is a project?

More information

Based at Wallara Industries

Based at Wallara Industries POSITION DESCRIPTION Loca%on: Based at Wallara Industries Warehouse Manager - Employment Primary purpose of role: The Warehouse Manager is responsible for the day to day planning, applica:on and coordina:on

More information

Business Analysis Center of Excellence The Cornerstone of Business Transformation

Business Analysis Center of Excellence The Cornerstone of Business Transformation February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President

More information

ARTIST Methodology and Tooling. Jesus Gorroñogoitia - Atos SOC Crete, 1 st July 2015

ARTIST Methodology and Tooling. Jesus Gorroñogoitia - Atos SOC Crete, 1 st July 2015 ARTIST Methodology and Tooling Jesus Gorroñogoitia - Atos SOC Crete, 1 st July 2015 Motivation: From SaaP to SaaS So#ware as a Product based Company So#ware as a Service based Company : Cloud Computing

More information

Cloud Compu)ng in Educa)on and Research

Cloud Compu)ng in Educa)on and Research Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research

More information

FINANCIAL SERVICES CASE STUDY COLLECTION. Broker Profile, Multrees Investor Services Ltd & Spayne Lindsay & Co. LLP

FINANCIAL SERVICES CASE STUDY COLLECTION. Broker Profile, Multrees Investor Services Ltd & Spayne Lindsay & Co. LLP FINANCIAL SERVICES CASE STUDY COLLECTION Broker Profile, Multrees Investor Services Ltd & Spayne Lindsay & Co. LLP The Workbooks product offered greater functionality... We also felt that we would receive

More information

The system approach in human resources. Functional Analysis of the System for Human Resources Management. Introduction. Arcles

The system approach in human resources. Functional Analysis of the System for Human Resources Management. Introduction. Arcles Functional Analysis of the System for Human Resources Management Assoc. Prof. Margarita Harizanova, Ph.D. Chief Assist. Prof. Nadya Mironova, Ph.D. Assist. Prof. Tatyana Shtetinska Summary: The arcle presents

More information

Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv.

Performance Management. Ch. 9 The Performance Measurement. Mechanism. Chiara Demar8ni UNIVERSITY OF PAVIA. mariachiara.demar8ni@unipv. UNIVERSITY OF PAVIA Performance Management Ch. 9 The Performance Measurement Mechanism Chiara Demar8ni mariachiara.demar8ni@unipv.it Master in Interna+onal Business and Economics Defini8on Performance

More information

Identity and Access Positioning of Paradgimo

Identity and Access Positioning of Paradgimo 1 1 Identity and Access Positioning of Paradgimo Olivier Naveau Managing Director assisted by Bruno Guillaume, CISSP IAM in 4D 1. Data Model 2. Functions & Processes 3. Key Components 4. Business Values

More information

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, alice.squires@stevens.edu Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom

More information

Sceneric Quote Engine

Sceneric Quote Engine Sceneric Quote Engine Contents Introduc0on Design Philosophy System Architecture Examples Demo About Sceneric Introduc0on This presenta0on provides a technical overview of the Sceneric Quotes Engine The

More information

April 20 th 2011, Internet2 Spring Member Mee5ng Aaron Brown Internet2. Circuit Monitoring for DYNES

April 20 th 2011, Internet2 Spring Member Mee5ng Aaron Brown Internet2. Circuit Monitoring for DYNES April 20 th 2011, Internet2 Spring Member Mee5ng Aaron Brown Internet2 Circuit Monitoring for DYNES Dynamic Circuits Scien5fic disciplines require greater network capacity and predictably to cope with

More information

How to Measure Progress & Impact: Network Mapping

How to Measure Progress & Impact: Network Mapping How to Measure Progress & Impact: Network Mapping Professor Robyn Keast Chair Collaborative Research Network: Policy and Planning for Regional Sustainability, Southern Cross University Measuring Collec/ve

More information

Chapter 3. Database Architectures and the Web Transparencies

Chapter 3. Database Architectures and the Web Transparencies Week 2: Chapter 3 Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objec

More information

IT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic

IT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic IT Governance in Organizations Experiencing Decentralization Jelena Zdravkovic Department of Computer & Systems Sciences (DSV), Stockholm University, Sweden Giannoulis About the Speaker Title: Associate

More information

The Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons

The Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Solu4ons The Reservoir 10 th September 2014 A growing demand Business Teams want Open access to more informa4on More

More information

Trus%ng your Cloud Provider s System

Trus%ng your Cloud Provider s System Trus%ng your Cloud Provider s System Retaining Control over Private Virtual Machines Hosted by a Cloud Provider Using Mandatory Access Control, Trusted Boot and A>esta?on Vorarlberg University of Applied

More information

Protec'ng Informa'on Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 10 - Identity Management and Access Control In the News Readings MIS5206 Week 10 Identity Management and Access Control Test Taking Tip Quiz In the News Discuss items

More information

Fixed Scope Offering (FSO) for Oracle SRM

Fixed Scope Offering (FSO) for Oracle SRM Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,

More information

Data Warehousing. Yeow Wei Choong Anne Laurent

Data Warehousing. Yeow Wei Choong Anne Laurent Data Warehousing Yeow Wei Choong Anne Laurent Databases Databases are developed on the IDEA that DATA is one of the cri>cal materials of the Informa>on Age Informa>on, which is created by data, becomes

More information

So#ware quality assurance - introduc4on. Dr Ana Magazinius

So#ware quality assurance - introduc4on. Dr Ana Magazinius So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something

More information

Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010

Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010 Poten&al Impact of FDA Regula&on of EMRs October 27, 2010 Agenda The case for regula&ng Impact on manufacturers Impact on providers Recommenda&ons and best prac&ces 2 A Medical Device Is an instrument,

More information

Steve Posick, Associate Director, ESPN Steve.J.Posick@espn.com

Steve Posick, Associate Director, ESPN Steve.J.Posick@espn.com Steve Posick, Associate Director, ESPN Steve.J.Posick@espn.com Internet of Things (IoT) An Internet like structure of uniquely iden?fied objects What is an Object (or Thing)? Devices SoKware or firmware

More information

RESTful or RESTless Current State of Today's Top Web APIs

RESTful or RESTless Current State of Today's Top Web APIs RESTful or RESTless Current State of Today's Top Web APIs Frederik Buelthoff, Maria Maleshkova AIFB, Karlsruhe Ins-tute of Technology (KIT), Germany [1] Growing Number of Web APIs Challenges Scalability

More information

METHODS AND TECHNIQUES OF PREDICTION OF KEY PERFORMANCE INDICATORS FOR IMPLEMENTATION OF CHANGES IN MAINTENANCE ORGANISATION

METHODS AND TECHNIQUES OF PREDICTION OF KEY PERFORMANCE INDICATORS FOR IMPLEMENTATION OF CHANGES IN MAINTENANCE ORGANISATION Management Systems in Production Engineering 0, No (5), pp 5 9 METHODS AND TECHNIQUES OF PREDICTION OF KEY PERFORMANCE INDICATORS FOR IMPLEMENTATION OF CHANGES IN MAINTENANCE ORGANISATION Andrzej WIECZOREK

More information

Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014

Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014 Quality Label and Cer0fica0on Processes France- Suisse Summit on ehealth Interoperability 20 May 2014 Karima Bourquard Director of Interoperability IHE- Europe Tes0ng and Cer0fica0on Objec0ves To design

More information

Trade Management. ì Module 5 Sales Management Model. ì Learning Objec7ves: ì Sales Management ì Forecas7ng

Trade Management. ì Module 5 Sales Management Model. ì Learning Objec7ves: ì Sales Management ì Forecas7ng ì Module 5 Sales Management Model ì Learning Objec7ves: ì Sales Management ì Forecas7ng Sales Management Model Structure Customer Contact Process Access (loca7ng qualified customers) Iden7fy (adver7sing,

More information

Networked Virtual Spaces and Clouds. Magda El Zarki UC Irvine

Networked Virtual Spaces and Clouds. Magda El Zarki UC Irvine Networked Virtual Spaces and Clouds Magda El Zarki UC Irvine Outline Introduc6on to Networked Virtual Environments (NVE) Networked Virtual Environment Architectures Quality of Experience Clouds and real

More information

Capitalize on your carbon management solu4on investment

Capitalize on your carbon management solu4on investment Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 info@cdproject.net www.cdproject.net

More information

REST (Representa.onal State Transfer) Ingegneria del So-ware e Lab. Università di Modena e Reggio Emilia Do<. Marzio Franzini

REST (Representa.onal State Transfer) Ingegneria del So-ware e Lab. Università di Modena e Reggio Emilia Do<. Marzio Franzini REST (Representa.onal State Transfer) Ingegneria del So-ware e Lab. Università di Modena e Reggio Emilia Do

More information

What s Driving Adop2on of IT Governance? ISACA North Texas Chapter. Aus2n Hu@on Hu@on Consul2ng October 11, 2012

What s Driving Adop2on of IT Governance? ISACA North Texas Chapter. Aus2n Hu@on Hu@on Consul2ng October 11, 2012 What s Driving Adop2on of IT Governance? ISACA North Texas Chapter Aus2n Hu@on Hu@on Consul2ng October 11, 2012 Learning Objec2ves Overview of the history of IT Governance The rela2onship to corporate

More information

From Big Data to Value

From Big Data to Value From Big Data to Value The Power of Master Data Management 2.0 Sergio Juarez SVP Elemica EMEA & LATAM Reveal Oct 2014 Agenda Master Data Management Why Now? What To Do? How To Do It? What s Next? Today

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,

More information

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November

More information

Mastering Your Data Center Move

Mastering Your Data Center Move Mastering Your Data Center Move Steps to a Successful Project PRESENTERS: Dean Evans and Art Dooling Introduc;ons Dean Evans: Director of the Empower prac;ce at Align 15+ years of experience in technology

More information

The importance of supply chain

The importance of supply chain Guidelines for Improving Supply Chain Management at Bulgarian Enterprises Chief Assist. Prof. Miroslava Rakovska, Ph.D. Department of Business Logistics, UNWE tеl. (02) 9435248, 0888704178 e-mail: mirar@unwe.acad.bg

More information

Case Study. The SACM Journey at the Ontario Government

Case Study. The SACM Journey at the Ontario Government Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons

More information

NIST Email Security Improvements. William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting

NIST Email Security Improvements. William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting NIST Email Security Improvements William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting Presenters Scott Rose Computer Scientist, NIST ITL William (Curt) Barker Guest Researcher,

More information

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces

Top Practices in Health IT Compliance. Data Breach & Leading Program Prac3ces Top Practices in Health IT Compliance Data Breach & Leading Program Prac3ces Overview Introduc3on to ID Experts & Secure Digital Solu3ons Healthcare Data Breach Trends & Drivers Data Incident Management

More information

BPO. Accerela*ng Revenue Enhancements Through Sales Support Services

BPO. Accerela*ng Revenue Enhancements Through Sales Support Services BPO Accerela*ng Revenue Enhancements Through Sales Support Services What is BPO? Business Process Outsorcing (BPO) is the process of outsourcing specific business func6ons to a third- party service provider

More information

Suppor&ng the Design of Safety Cri&cal Systems Using AADL

Suppor&ng the Design of Safety Cri&cal Systems Using AADL Suppor&ng the Design of Safety Cri&cal Systems Using AADL T. Correa, L. B. Becker, J.- M. Farines, J.- P. Bodeveix, M. Filali, F. Vernadat IRIT LAAS UFSC Agenda Introduc&on Proposed Approach Verifica&on

More information

Oracle Solu?ons for Higher Educa?on

Oracle Solu?ons for Higher Educa?on Presented with Oracle Solu?ons for Higher Educa?on Cole Clark Global Vice President Oracle, Educa?on & Research June 12, 2014 Oracle Confiden?al Internal/Restricted/Highly Restricted Safe Harbor Statement

More information

IE 618 Spring 2013 Slide content extracted from Hansen, Mowen, & Guan

IE 618 Spring 2013 Slide content extracted from Hansen, Mowen, & Guan IE 618 Spring 2013 Slide content extracted from Hansen, Mowen, & Guan 1 (c) 2013 Cengage Learning 1 IE 618 Spring 2014 Grade: 25 % Exam 1 25 % Exam 2 30 % Team Project 10 % Corporate Profiles 10 % Homework

More information

Cloud Compu?ng & Big Data in Higher Educa?on and Research: African Academic Experience

Cloud Compu?ng & Big Data in Higher Educa?on and Research: African Academic Experience 3 rd SG13 Regional Workshop for Africa on ITU- T Standardiza?on Challenges for Developing Countries Working for a Connected Africa (Livingstone, Zambia, 23-24 February 2015) Cloud Compu?ng & Big Data in

More information

IT Change Management Process Training

IT Change Management Process Training IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge

More information

What are Use Cases. Use cases are techniques to capture the func3onal requirements of a system

What are Use Cases. Use cases are techniques to capture the func3onal requirements of a system What are Use Cases Use cases are techniques to capture the func3onal requirements of a system Describe the typical interac3ons between the users and the system, providing a narra3ve of how a system is

More information

1 Actuate Corpora-on 2013. Big Data Business Analy/cs

1 Actuate Corpora-on 2013. Big Data Business Analy/cs 1 Big Data Business Analy/cs Introducing BIRT Analy3cs Provides analysts and business users with advanced visual data discovery and predictive analytics to make better, more timely decisions in the age

More information

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP

San Francisco Chapter. Presented by Mike O. Villegas, CISA, CISSP Presented by Mike O. Villegas, CISA, CISSP Agenda Information Security (IS) Vision at Newegg.com Typical Issues at Most Organizations Information Security Governance Four Inter-related CoBIT Domains ISO

More information

Assessment and Verifica/on for Online Courses

Assessment and Verifica/on for Online Courses Assessment and Verifica/on for Online Courses Barbara G. Zirkin Associate Dean, Distance Learning Stevenson University WCET Conference 2015 Conference Federal & Accredita/on Requirements Verifica/on of

More information

Strategic Management of IS/IT

Strategic Management of IS/IT Strategic Management of IS/IT Organization and Resources Chapter 8 Zainal A.Hasibuan zhasibua@cs.ui.ac.id Context of This Session External Business Environment Internal Business Environment Internal IS/IT

More information

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll

More information

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL San Jacinto College Banner & Enterprise Applica5on Review Task Force Report November 01, 2011 FINAL 1 Content Review goal and approach 3 Barriers to effec5ve use of Banner: Consultant observa5ons 10 Consultant

More information

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer

More information

2015-16 ITS Strategic Plan Enabling an Unbounded University

2015-16 ITS Strategic Plan Enabling an Unbounded University 2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave

More information

University of Maryland University College. Distance Education in Dual Degree Partnerships: Challenges and Opportunities

University of Maryland University College. Distance Education in Dual Degree Partnerships: Challenges and Opportunities University of Maryland University College Distance Education in Dual Degree Partnerships: Challenges and Opportunities Distance Educa-on in the United States Unlike Russia, the U.S. does not dis3nguish

More information

Governance as Leadership: Reframing the Work of Nonprofit Boards

Governance as Leadership: Reframing the Work of Nonprofit Boards Governance as Leadership: Reframing the Work of Nonprofit Boards Tradi

More information

By: Zainal A. Hasibuan Faculty of Computer Science University of Indonesia. Zainal A. Hasibuan, PhD

By: Zainal A. Hasibuan Faculty of Computer Science University of Indonesia. Zainal A. Hasibuan, PhD By: Zainal A. Hasibuan Faculty of Computer Science University of Indonesia Zainal A. Hasibuan, PhD (zhasibua@cs.ui.ac.id) Review Ques4ons What are the success criteria for IS/IT Strategic Plan? Improve

More information

Main Research Gaps in Cyber Security

Main Research Gaps in Cyber Security Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis

More information

CiviCRM Implementa/on Case Study

CiviCRM Implementa/on Case Study CiviCRM Implementa/on Case Study Leukaemia and Lymphoma Research www.leukaemialymphomaresearch.org.uk Parvez Saleh About the LLR Having gone through the socware/supplier selec/on process, the LLR decided

More information

The increasingly dynamic environment, in

The increasingly dynamic environment, in Main Aspects of Enterprise Architecture Concept Chief Assist. Prof. Petya Dankova, Ph.D. Икономически университет Варна, катедра Икономика и управление на индустрията e-mail: p_dankova@abv.bg Abstract:

More information

Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security

Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security Webinar: Having the Best of Both World- Class Customer Experience and Comprehensive Iden=ty Security With Iden>ty Expert and UnboundID Customer Bill Bonney Today s Speakers Bill Bonney Formerly Director,

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

CONTENTS. Introduc on 2. Undergraduate Program 4. BSC in Informa on Systems 4. Graduate Program 7. MSC in Informa on Science 7

CONTENTS. Introduc on 2. Undergraduate Program 4. BSC in Informa on Systems 4. Graduate Program 7. MSC in Informa on Science 7 1 1 2 CONTENTS Introducon 2 Undergraduate Program 4 BSC in Informaon Systems 4 Graduate Program 7 MSC in Informaon Science 7 MSC in Health Informacs 13 2 3 Introducon The School of Informaon Science at

More information

Connec(ng to the NC Educa(on Cloud

Connec(ng to the NC Educa(on Cloud NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are

More information

Scalus A)ribute Workshop. Paris, April 14th 15th

Scalus A)ribute Workshop. Paris, April 14th 15th Scalus A)ribute Workshop Paris, April 14th 15th Content Mo=va=on, objec=ves, and constraints Scalus strategy Scenario and architectural views How the architecture works Mo=va=on for this MCITN Storage

More information

The LCC Network Integrated Data Management Network GREAT NORTHERN LCC STEERING COMMITTEE MEETING MORAN, WY 25 SEPTEMBER 2011

The LCC Network Integrated Data Management Network GREAT NORTHERN LCC STEERING COMMITTEE MEETING MORAN, WY 25 SEPTEMBER 2011 The LCC Network Integrated Management Network GREAT NORTHERN LCC STEERING COMMITTEE MEETING MORAN, WY 25 SEPTEMBER 2011 Analysis A Common Challenge Work Environments Tools Ques&ons Needs Decision Tools

More information

Contact Center Rou,ng Strategies for Improving Customer Experience

Contact Center Rou,ng Strategies for Improving Customer Experience Contact Center Rou,ng Strategies for Improving Customer Experience an ebook from Genesys 1 The Contact Center Reality A finite number of available associates A variable volume of contacts A limited amount

More information

Managed Services. An essen/al set of tools for today's businesses

Managed Services. An essen/al set of tools for today's businesses Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng

More information

Data Governance Framework: Bank of Canada

Data Governance Framework: Bank of Canada Data Governance Framework: Bank of Canada The views and opinions expressed herein are those of the author and do not necessarily reflect the official policy or posi8on of the Bank of Canada or any agency

More information

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS Challenges of PM in Albania and a New Professional Perspec8ve Prepared by: Dritan Mezini, MBA, MPM B.S. CS Table of contents Presenter s brief introduc8on General Concepts What is a project? What is Project

More information

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895

More information

Enterprise Systems Tech. solutions, strategic persp. and org. considerations. TDEI13, 2014-09- 17 Özgün Imre

Enterprise Systems Tech. solutions, strategic persp. and org. considerations. TDEI13, 2014-09- 17 Özgün Imre Enterprise Systems Tech. solutions, strategic persp. and org. considerations TDEI13, 2014-09- 17 Özgün Imre Agenda Report presenta=ons With candy as reward Literature Discussion Lee, Jinyoul; Keng Siau

More information

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist

More information

How and When to Use Social Media Channels to Strategically Support Government Goals

How and When to Use Social Media Channels to Strategically Support Government Goals How and When to Use Social Media Channels to Strategically Support Government Goals October 2012 Prepared by Craig Thomler Managing Director Delib Australia Pty Ltd Email: craig@delib.net.au Phone: 0411

More information

Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit

Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit Presented to: ISACA and IIA Joint Mee/ng October 10, 2014 By Outline Introduc.on The Evolving Role of Internal Audit The importance

More information

M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security. Mihai Voicu CIO/CSO ILS Technology LLC

M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security. Mihai Voicu CIO/CSO ILS Technology LLC M2M & Cybersecurity Workshop TIA 2013 M2M Standards and Security Mihai Voicu CIO/CSO ILS Technology LLC Topics 1 What is the role of standardization in security for M2M solutions? 2 How are TIA and other

More information

Intenionality was not a considera1on but because of the role as leaders has lead to a legacy and gold standard

Intenionality was not a considera1on but because of the role as leaders has lead to a legacy and gold standard 1 Intenionality was not a considera1on but because of the role as leaders has lead to a legacy and gold standard physicians involved in cross- func1onal decision- making, inputs beyond medicine- based

More information

Performance Management. Ch. 8 The Strategy Implementa9on Mechanism. Chiara Demar9ni UNIVERSITY OF PAVIA. mariachiara.demar9ni@unipv.

Performance Management. Ch. 8 The Strategy Implementa9on Mechanism. Chiara Demar9ni UNIVERSITY OF PAVIA. mariachiara.demar9ni@unipv. UNIVERSITY OF PAVIA! Performance Management Ch. 8 The Strategy Implementa9on Mechanism Chiara Demar9ni mariachiara.demar9ni@unipv.it Master in Interna+onal Business and Economics! Defini9on Strategy implementa9on

More information

Lean Six Sigma and Project Management triangles and (virtuous) circles

Lean Six Sigma and Project Management triangles and (virtuous) circles Lean Six Sigma and Project Management triangles and (virtuous) circles APM, Holiday Inn Stevenage, 9 th May 2011 Elisabeth Goodman and John Riddell info@riverrhee.com hnp://www.riverrhee.com +44 (0) 7876

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana

More information

Pa#ent Involvement in Clinical Research In Rela#onship with Biobanking BBMRI 15 December 2009

Pa#ent Involvement in Clinical Research In Rela#onship with Biobanking BBMRI 15 December 2009 Pa#ent Involvement in Clinical Research In Rela#onship with Biobanking BBMRI 15 December 2009 Cor Oosterwijk Project Coordinator Pa;entPartner Dutch Gene;c Alliance VSOP European Gene;c Alliances Network

More information

HIPAA Breaches, Security Risk Analysis, and Audits

HIPAA Breaches, Security Risk Analysis, and Audits HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers

More information

Theo JD Bothma Department of Informa1on Science theo.bothma@up.ac.za

Theo JD Bothma Department of Informa1on Science theo.bothma@up.ac.za Theo JD Bothma Department of Informa1on Science theo.bothma@up.ac.za Reflec1ons on the role of corpora and big data in e- lexicography in rela1on to end user informa1on needs CILC 2015 7th Interna1onal

More information

BML Munjal University School of Management. Doctor of Philosophy (Ph.D.) Program In Business AdministraBon

BML Munjal University School of Management. Doctor of Philosophy (Ph.D.) Program In Business AdministraBon BML Munjal University School of Management Doctor of Philosophy (Ph.D.) Program In Business AdministraBon Inspire, Inquiry, Impact Content About School of Management: BML Munjal University Research Centres

More information

Splunk for Networking and SDN

Splunk for Networking and SDN Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking

More information

3B Strategic Planning: Giving your Association or Charity Purpose plus Direction. 25 26 November 2014 1:30pm 3:00pm #FL14

3B Strategic Planning: Giving your Association or Charity Purpose plus Direction. 25 26 November 2014 1:30pm 3:00pm #FL14 3B Strategic Planning: Giving your Association or Charity Purpose plus Direction 25 26 November 2014 1:30pm 3:00pm #FL14 (Strategic) Planning for Associations & Charities John Peacock General Manager Associa/ons

More information

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central

More information

UNIFIED, END- TO- END EDISCOVERY

UNIFIED, END- TO- END EDISCOVERY ac.onable informa.on governance Partners Providing Excellence in: UNIFIED, END- TO- END EDISCOVERY 2011 IBM Corpora.on Meet the Presenters Amir Jaibaji Vice President, Product Management StoredIQ Kevin

More information

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013 Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed

More information

Title V, Medicaid, and Oral Health: Strategies for Quality Improvement and Financing Care

Title V, Medicaid, and Oral Health: Strategies for Quality Improvement and Financing Care Title V, Medicaid, and Oral Health: Strategies for Quality Improvement and Financing Care Pamella Vodicka, MS, RD (Moderator) Program Director, MCHB Oral Health Mary E. Foley, MPH (Presenter) Execu=ve

More information

Cloud Compu)ng: Overview & challenges. Aminata A. Garba

Cloud Compu)ng: Overview & challenges. Aminata A. Garba Cloud Compu)ng: Overview & challenges Aminata A. Garba Outline I. Introduc*on II. Virtualiza*on III. Resources Op*miza*on VI. Challenges 2 A Historical Note 1960, the idea of organizing computa)on as a

More information

A Unified Management Framework for autonomic and so7ware- defined networks

A Unified Management Framework for autonomic and so7ware- defined networks A Unified Management Framework for autonomic and so7ware- defined networks IETF 86 29 th NMRG meenng 14 March 2013, Orlando FL, USA WWW.UNIVERSELF- PROJECT.EU OVERVIEW MOTIVATIONS UMF IN A NUTSHELL UMF

More information

Social Media in Community Supervision: Promising Prac8ces for Policy and Implementa8on

Social Media in Community Supervision: Promising Prac8ces for Policy and Implementa8on American Probation and Parole Association Social Media in Community Supervision: Promising Prac8ces for Policy and Implementa8on Hosted by the Na9onal Reentry Resource Center and American Proba9on and

More information

Opportuni)es and Challenges of Textual Big Data for the Humani)es

Opportuni)es and Challenges of Textual Big Data for the Humani)es Opportuni)es and Challenges of Textual Big Data for the Humani)es Dr. Adam Wyner, Department of Compu)ng Prof. Barbara Fennell, Department of Linguis)cs THiNK Network Knowledge Exchange in the Humani)es

More information