IoT data sharing, is it possible?

Size: px
Start display at page:

Download "IoT data sharing, is it possible?"

Transcription

1 World s first search engine for the public Internet of Things IoT data sharing, is it possible? thingful.net Amsterdam, March 2015

2 Data and its value Growth in the emerging global IoT marketplace is accelerating. Core to every IoT business model is data, now seen as an asset class. World Economic Forum report 2011, Personal Data: The Emergence of a New Asset Class To make IoT data meaningful & valuable, you need to know: where it is who created it how good it is how it compares how to act upon it how to monetise it As the global IoT marketplace evolves, Thingful will tackle those issues & solve those problems, as the most trusted global service for finding connected devices assessing IoT data provenance & quality making decisions about & acting upon the world 2

3 but IoT is really not the web Not designed for discoverability Not designed for interoperability The IoT structure today is really many private data silos set up for each single service or product experience There are three ways to make IoT a universal proposition Adopt a universal technical solution for open and interoperable handling of data Create an open public data platform where all personal data from an individual can be ported and managed The other way is to enable a method of publishing entitlements independent of where the data resides such that the owner can set up preferences of who is entitled to access the data and in what resolution 3

4 What is Thingful s thesis There are billions of devices that are connected to the Internet in the public and private domains generating data The value of this data will remain locked behind private firewalls and obscure servers unless we can easily Search for it Acquire it through an entitlement system, and Transact on an economic value exchange mediated by a trusted intermediating party 4

5 Introducing Thingful Today a search engine for the Internet of Things Connected object index IoT networks/infrastructures Cross-network discovery Integrates across IoT data silos Geographical search Find connected physical objects Provenance & discussion People claim & verify ownership corporate, institutional & governmental public data Cf. mid-90 s Yahoo, managed directory of categorised links Search by geolocation & category Attach Twitter profiles, prove physical/data access Data source links, data preview & ownership details. Makes it easier to find things across all networks. Patent-pending ranking methodology, ThingRank Discussion/promotion of data, devices & deployments 5

6 What are the implications The monetisation model for IoT is different from the monetisation model of the web because the nature of IoT data, and how it s consumed, is fundamentally different. IoT manufacturers/infrastructures now have weak recurring revenue business models and will need to be part of a data consent and release chain in the long run may be totally dis-intermediated like ISPs were from content based transactions. IoT services market will remain fragmented around verticals Discoverability, data provenance, quality assessment and entitlement will be fundamental tools for both businesses, powered by secure IoT data from 3 rd parties, and consumers, managing, acting upon & monetising IoT data with full control & informed consent. 6

7 Why data sharing makes sense? Value creation occurs when data is pooled and shared across silos Consumer credit bureaus are a testament to that different types of enterprises agreed to start sharing data about an individual so that all could benefit In enterprise IoT we are where we were before the advent of credit bureaus each bank analysing its own records of loan defaults to predict if a particular customer is a good or a bad credit risk without the benefit of knowing who else might have given credit to the individual 7

8 Thingful IoT Data Services on Demand In 2016 a complete on demand IoT data service Industry-defining IoT search engine and data entitlement framework providing data discoverability, provenance, interoperability and secure mediation services for both individuals and companies. E.g. Thingful = Experian + Verisign + mid-90s Yahoo Discoverability Data Quality assessment Origin verification Data Entitlement for multiple use profiles Monetisation based on entitlement 8

9 IoT data sharing example of use case Real time road temperature data in London Activity tracking data from wearables Vehicle data from a telematics module 9

10 Moeen Khawaja Chief Operating Officer Thingful

Unlocking IoT data value

Unlocking IoT data value World s first search engine for the public Internet of Things thingful.net Unlocking IoT data value Smart Systems Summit, London 2nd October 2014 www.hvm-uk.com Data and its value Growth in the emerging

More information

onetransport 2016 InterDigital, Inc. All Rights Reserved.

onetransport 2016 InterDigital, Inc. All Rights Reserved. onetransport 1 onetransport: Who We are Today Platform Provider Transport Expert Analytics Sensors / Analytics Data providers / Use case owners 11 partners 2- year project 3.5m Total funding 2 How this

More information

TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI

TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI TMW01 Managing and Deploying BYOD Identity Solutions with a Microsoft PKI Mark B. Cooper President & Founder PKI Solutions Inc. @PKISOLUTIONS Level: Intermediate [ About PKI Solutions Inc. 10 years as

More information

Internet of Things From Idea to Scale

Internet of Things From Idea to Scale PRG Symposium Internet of Things From Idea to Scale September 12, 2014 alex.blanter@atkearney.com @AlexBlanter You are here today because you are interested in the Internet of Things and so is everybody

More information

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

Windows Firewall Configuration with Group Policy for SyAM System Client Installation with Group Policy for SyAM System Client Installation SyAM System Client can be deployed to systems on your network using SyAM Management Utilities. If Windows Firewall is enabled on target systems, it

More information

Security for the Internet of Things

Security for the Internet of Things Security for the Internet of Things Moderated by: Robin Duke-Woolley Founder & CEO Beecham Research Sponsored by: Syed Zaeem Hosain Chief Technology Officer Aeris 16 December 2016 Security for the Internet

More information

White paper Reaping Business Value from a Hybrid Cloud Strategy

White paper Reaping Business Value from a Hybrid Cloud Strategy White paper Fujitsu Hybrid Cloud Services White paper Reaping Business Value from a Hybrid Cloud Strategy How to embrace a hybrid cloud model to maximize the benefits of public and private cloud services

More information

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and,

Some Specific Parawise Suggestinons. 2. An application which collects and analyzes this data for further consolidation and, Comments by Amcham India on draft Internet of Things (IoT) Policy released by the Department of Electronics & Information Technology (DeitY), on October 16, 2014 Standards The Draft IoT Policy already

More information

AD RMS Microsoft Federation Gateway Support Installation and Configuration Guide... 3 About this guide... 3

AD RMS Microsoft Federation Gateway Support Installation and Configuration Guide... 3 About this guide... 3 Contents AD RMS Microsoft Federation Gateway Support Installation and Configuration Guide... 3 About this guide... 3 Microsoft Federation Gateway Support Overview... 4 Deploying and Configuring Microsoft

More information

Custom Software Development Portfolio. Innovation Collaboration Evolution Results

Custom Software Development Portfolio. Innovation Collaboration Evolution Results Phonecierge SOFTEL Verifier First Responder Innovation Collaboration Evolution Results Bespoke Custom Software Portfolio SOFTEL Communications Complete Customized Software Services Designing software that

More information

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting

More information

How To Choose Help Desk Software For Your Company

How To Choose Help Desk Software For Your Company With hundreds of Help Desk software packages available, how do you choose the best one for your company? When conducting an Internet search, how do you wade through the overwhelming results? The answer

More information

Three Asset Lifecycle Management Fundamentals for Optimizing Cloud and Hybrid Environments

Three Asset Lifecycle Management Fundamentals for Optimizing Cloud and Hybrid Environments Three Asset Lifecycle Management Fundamentals for Optimizing Cloud and Hybrid Environments An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for BMC April 2011 IT & DATA MANAGEMENT RESEARCH,

More information

Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products

Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Webinar. December 15, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO

More information

Can Cloud Database PaaS Solutions Replace In-House Systems?

Can Cloud Database PaaS Solutions Replace In-House Systems? Can Cloud Database PaaS Solutions Replace In-House Systems? Abstract: With the advent of Platform-as-a-Service as a viable alternative to traditional database solutions, there is a great deal of interest

More information

Machina Research Viewpoint. The critical role of connectivity platforms in M2M and IoT application enablement

Machina Research Viewpoint. The critical role of connectivity platforms in M2M and IoT application enablement Machina Research Viewpoint The critical role of connectivity platforms in M2M and IoT application enablement June 2014 Connected devices (billion) 2 Introduction The growth of connected devices in M2M

More information

The Canadian Realities of Big Data and Business Analytics. Utsav Arora February 12, 2014

The Canadian Realities of Big Data and Business Analytics. Utsav Arora February 12, 2014 The Canadian Realities of Big Data and Business Analytics Utsav Arora February 12, 2014 Things to think about for today How Important is Big Data for me? Why do I need to implement Big Data and Analytics

More information

MS 10972A Administering the Web Server (IIS) Role of Windows Server

MS 10972A Administering the Web Server (IIS) Role of Windows Server MS 10972A Administering the Web Server (IIS) Role of Windows Server Description: Days: 5 Prerequisites: This course provides students with the fundamental knowledge and skills to configure and manage Internet

More information

Understanding the Platform

Understanding the Platform Understanding the Platform TOC 2 Contents Understanding the Platform... 3 Platform Architecture...3 Services Layer... 3 Understanding Jive Search... 3 About Cloud Search... 4 About On-Premise Search...5

More information

Billing and Payment with the Elastic Path Ecommerce Platform

Billing and Payment with the Elastic Path Ecommerce Platform Billing and Payment with the Elastic Path Ecommerce Platform The Elastic Path Ecommerce Platform As the industry s most open and flexible ecommerce platform, Elastic Path is the right solution for large

More information

The Internet of Things RELEASING THE POTENTIAL OF A CONNECTED WORLD

The Internet of Things RELEASING THE POTENTIAL OF A CONNECTED WORLD The Internet of Things RELEASING THE POTENTIAL OF A CONNECTED WORLD Introduction Definition of the Internet of Things The Size of the Internet of Things Opportunity Obstacles to the Development of the

More information

10972-Administering the Web Server (IIS) Role of Windows Server

10972-Administering the Web Server (IIS) Role of Windows Server Course Outline 10972-Administering the Web Server (IIS) Role of Windows Server Duration: 5 days (30 hours) Target Audience: This course is intended for IT Professionals already experienced in general Windows

More information

Introduction to Penetration Testing Graham Weston

Introduction to Penetration Testing Graham Weston Introduction to Penetration Testing Graham Weston March 2014 Agenda Introduction and background Why do penetration testing? Aims and objectives Approaches Types of penetration test What can be penetration

More information

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency

Deploying the BIG-IP System with Microsoft Lync Server 2010 and 2013 for Site Resiliency Deployment Guide Document Version 1.2 What s inside: 2 Configuration example 5 Configuring the BIG-IP LTM using the Lync 2010 iapp 6 Configuring the BIG-IP GTM 11 Creating a Distributed Application for

More information

How To Understand The Internet Of Things

How To Understand The Internet Of Things www.ovum.com The Internet of Things: Understanding the evolving value chain Jamie Moss, Senior Analyst, Consumer Technology & IoT Gary Barnett, Chief Analyst, Software, Ovum Ovum s Internet of Things (IoT)

More information

NEED NETWORK VISIBILITY? www.netusage.net TOTAL NETWORK VISIBILITY

NEED NETWORK VISIBILITY? www.netusage.net TOTAL NETWORK VISIBILITY NEED NETWORK VISIBILITY? Look Inside >>>>>> www.netusage.net TOTAL NETWORK VISIBILITY Netusage in the enterprise Your Top 10 Network Dilemmas 1. Do you know at any point in time what applications are

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972A: Administering the Web Server (IIS) Role of Windows Server Course Details Course Outline Module 1: Overview and Installing Internet Information Services In this module students will learn

More information

Maximizing Local Lead Generation Opportunities:

Maximizing Local Lead Generation Opportunities: Maximizing Local Lead Generation Opportunities: Understanding the LookLocally.com Search Marketing Advantage A LOOKLOCALLY.COM WHITE PAPER W H I T E P A P E R The Expense and Challenge of Local Lead Generation

More information

Voted Best Web Design

Voted Best Web Design WHO IS JLB? Award winning web operations & technology marketing services firm Specialize in: Great design, focused on online brand and identity Development/integration of manageable and scalable Web technology

More information

Internet of Things markets

Internet of Things markets Connected Objects Internet of Things markets BIG - RussianTechTour - NUMA 29th October 2015 Yves GASSOT, CEO, IDATE Agenda Scope of Internet of Things market Main market figures New segmentation with emerging

More information

W3C Meeting ISO/IEC/IEEE P21451-1-4

W3C Meeting ISO/IEC/IEEE P21451-1-4 W3C Meeting ISO/IEC/IEEE P21451-1-4 1 st International Semantic Web 3.0 Standard for the Internet of Things (IoT) William J. Miller Chairman 07/22/2015 1 Internet of Things (IoT) http://www.sensei-iot.org

More information

IIS 6.0SSL Certificate Deployment Guide

IIS 6.0SSL Certificate Deployment Guide IIS 6.0SSL Certificate Deployment Guide StartCom CA Limited Contents 1.Generate the CSR by customer.... 3 1.1 Generate the private key files and CSR files... 3 1.2 Create a new certificate request... 3

More information

From a World-Wide Web of Pages to a World-Wide Web of Things

From a World-Wide Web of Pages to a World-Wide Web of Things From a World-Wide Web of Pages to a World-Wide Web of Things Interoperability for Connected Devices Jeff Jaffe, W3C CEO 25 February 2016 The Internet of Things Still very immature, but with massive potential

More information

The European Alliance for IoT Innovation

The European Alliance for IoT Innovation The European Alliance for IoT Innovation An Innovation Perspective Rolf Riemenschneider Thibaut Kleiner DG CONNECT E1 Network Technologies European Commission 1 Value creation from digitisation: Products,

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

FWD. What the Internet of Things will mean for business

FWD. What the Internet of Things will mean for business Article 6: September 2014 Internet of Things This year the focus of business has shifted to the Internet of Things (IoT), the connection and sharing of information between objects, machines, people and

More information

SERVICE ORIENTED DATA CENTER (SODC) AND STORAGE. Cisco on Cisco E-Learning Series - Executive Track TRANSCRIPT INTRODUCTION

SERVICE ORIENTED DATA CENTER (SODC) AND STORAGE. Cisco on Cisco E-Learning Series - Executive Track TRANSCRIPT INTRODUCTION SERVICE ORIENTED DATA CENTER (SODC) AND STORAGE Cisco on Cisco E-Learning Series - Executive Track TRANSCRIPT INTRODUCTION Welcome to the Data Center and Storage Networking module part of the Cisco on

More information

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014 A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies November 2014 Internet-Of-Things Solution Deployment Gains Momentum Among Firms Globally Improved Customer Experience

More information

LiveTalk Call Center solution

LiveTalk Call Center solution LiveTalk Call Center solution I. Introduction LiveTalk enables real-time interaction between callers and a pool of technical and customer support or sales agents via a completely web based interface. With

More information

Security IIS Service Lesson 6

Security IIS Service Lesson 6 Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and

More information

A Winning Supply Chain Vision. Razat Gaurav Senior Vice President, International

A Winning Supply Chain Vision. Razat Gaurav Senior Vice President, International A Winning Supply Chain Vision Razat Gaurav Senior Vice President, International Global Trends Variability, Uncertainty, Complexity, Ambiguity Emerging Markets Growing at 2 4X Volatility in commodity prices

More information

Controlling and Managing Security with Performance Tools

Controlling and Managing Security with Performance Tools Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance

More information

Basic instructions for configuring PPP MSSQL Express Firewall Settings for Server 2008 and Windows 7 Operating Systems

Basic instructions for configuring PPP MSSQL Express Firewall Settings for Server 2008 and Windows 7 Operating Systems Basic instructions for configuring PPP MSSQL Express Firewall Settings for Server 2008 and Windows 7 Operating Systems Prerequisites and Assumptions: PPP, MSSQL Express and Pervasive 32-bit and/or 64-bit

More information

Managed service provider Bell Techlogix shines its BEAM to differentiate

Managed service provider Bell Techlogix shines its BEAM to differentiate Analyst: Katy Ring 1 Nov, 2013 Managed service provider Bell Techlogix shines its BEAM to differentiate Bell Techlogix is a midsized US managed service provider (MSP) that is ahead of the curve in getting

More information

Developing the edge or scaling the core through corporate venturing Internet of Things. Daan Witteveen

Developing the edge or scaling the core through corporate venturing Internet of Things. Daan Witteveen Developing the edge or scaling the core through corporate venturing Internet of Things Daan Witteveen Global M2M Connections (billion) The Global IOT Market is expected to see a forecasted to grow at a

More information

Planning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration

Planning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration Planning in Transport and Logistics Future Internet Solutions for Improved Integration and Collaboration Prof. Dr. Rod Franklin, P.E. Vice President, Product Development Kuehne + Nagel Management AG Adjunct

More information

BUSINESS INTELLIGENCE. Keywords: business intelligence, architecture, concepts, dashboards, ETL, data mining

BUSINESS INTELLIGENCE. Keywords: business intelligence, architecture, concepts, dashboards, ETL, data mining BUSINESS INTELLIGENCE Bogdan Mohor Dumitrita 1 Abstract A Business Intelligence (BI)-driven approach can be very effective in implementing business transformation programs within an enterprise framework.

More information

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances

The Application Delivery Controller Understanding Next-Generation Load Balancing Appliances White Paper Overview To accelerate response times for end users and provide a high performance, highly secure and scalable foundation for Web applications and rich internet content, application networking

More information

Transform your customer relationships. Avanade Enterprise CRM Solutions

Transform your customer relationships. Avanade Enterprise CRM Solutions Transform your customer relationships Avanade Enterprise CRM Solutions Avanade has deployed more Microsoft Dynamics CRM solutions than any other organization in the world. Our CRM experts utilize our global

More information

Citrix XenServer Workload Balancing 6.5.0 Quick Start. Published February 2015 1.0 Edition

Citrix XenServer Workload Balancing 6.5.0 Quick Start. Published February 2015 1.0 Edition Citrix XenServer Workload Balancing 6.5.0 Quick Start Published February 2015 1.0 Edition Citrix XenServer Workload Balancing 6.5.0 Quick Start Copyright 2015 Citrix Systems. Inc. All Rights Reserved.

More information

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)

More information

Introductions. Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP chris.cognetta@tribridge.

Introductions. Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP chris.cognetta@tribridge. Hosted by Introductions Christopher Cognetta Practice Manager Client Field Engineering Microsoft Dynamics CRM MVP chris.cognetta@tribridge.com CRMUG Chairperson Miami & Tampa Co Chair 250+ Dynamics CRM

More information

Enterprise Microblogging Whitepaper. Ross Mayfield Updated September, 2009

Enterprise Microblogging Whitepaper. Ross Mayfield Updated September, 2009 Enterprise Microblogging Whitepaper Ross Mayfield Updated September, 2009 Summary Knowledge Workers find themselves drowning in email and interrupted by IM, yet spend 1 day per week searching for people

More information

System Center Configuration Manager 2007

System Center Configuration Manager 2007 System Center Configuration Manager 2007 Software Distribution Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

How effective information management helps fleet managers reduce operational risk and enhance commercial performance

How effective information management helps fleet managers reduce operational risk and enhance commercial performance How effective information management helps fleet managers reduce operational risk and enhance commercial performance October 2015 www.alcumusgroup.com Managing risk in the transport and logistics sector

More information

2009 CAP Grant Kickoff USGS, Reston, VA May 21, 2009

2009 CAP Grant Kickoff USGS, Reston, VA May 21, 2009 Leveraging GOS Map and Data Services for Search and Rescue Operations using NASA WorldWind Open Source 3D Visualization Platform Nadine Alameh, Ph.D. MobiLaps LLC 2009 CAP Grant Kickoff USGS, Reston, VA

More information

Digital Transformation

Digital Transformation Digital Transformation The Leadership Edge Pascal Giraud Senior Director EMEA Technology Copyright 2014 Oracle and/or its affiliates. All rights reserved. 2 Enterprise Computing Trends GLOBALIZATION DATA

More information

Deploying Microsoft Windows Rights Management Services

Deploying Microsoft Windows Rights Management Services Deploying Microsoft Windows Rights Management Services Key Data Course #: 2827A Number of Days: 3 Format: Instructor-Led Certification Exams: None Elements of this syllabus are subject to change. This

More information

Planning, Implementing and Managing a Microsoft SharePoint 2003 Infrastructure

Planning, Implementing and Managing a Microsoft SharePoint 2003 Infrastructure Planning, Implementing and Managing a Microsoft SharePoint 2003 Infrastructure Course 8036 - Three days - Instructor-led - Hands on Introduction This instructor-led course provides students with the knowledge

More information

MONETIZING IOT: THINGWORX MARKETPLACE AND THE SUBSCRIPTION ECONOMY

MONETIZING IOT: THINGWORX MARKETPLACE AND THE SUBSCRIPTION ECONOMY MONETIZING IOT: THINGWORX MARKETPLACE AND THE SUBSCRIPTION ECONOMY Relationship Business Management We build modern, flexible and easy to use enterprise software (RBM) that enables companies to manage

More information

Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS)

Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS) Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS) December 25 th, 2015 V.1.0 Prepared by: Manoj Karunarathne MCT, MCSA,

More information

Trusted Identities for Electronic Health Records A National Strategy

Trusted Identities for Electronic Health Records A National Strategy Trusted Identities for Electronic Health Records A National Strategy Jeremy Grant Senior Executive Advisor, Identity Management (NSTIC) National Institute of Standards and Technology (NIST) 1 Why does

More information

GLS Support Guide Tips and Tricks

GLS Support Guide Tips and Tricks GLS Support Guide Tips and Tricks NT14-28911, 3.0, 1/11/2014 Ascom. All rights reserved. TEMS is a trademark of Ascom. All other trademarks are the property of their respective holders. NT14-28911, 3.0,

More information

Federal Cloud Computing Strategy

Federal Cloud Computing Strategy Federal Cloud Computing Strategy Vivek Kundra U. S. Chief Information Officer www.whitehouse.gov The Case for Change 90 Manufacturing Capacity Utilization 80 Manufacturing Average 79% 70 60 % Utilization

More information

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos KERBEROS TOPIC HIERARCHY Distributed Environment Security Privacy Authentication Authorization Non Repudiation Kerberos ORIGIN MIT developed Kerberos to protect network services. Developed under the Project

More information

Impact of Internet of Things (IoT) on Industry and Supply Chain

Impact of Internet of Things (IoT) on Industry and Supply Chain Impact of Internet of Things (IoT) on Industry and Supply Chain Agenda Safety Message Part One CPS Energy Story Part Two The Digital Wave and the Internet of Things (IoT) CPS Energy Overview Largest municipally

More information

Certificates, Revocation and the new gtld's Oh My!

Certificates, Revocation and the new gtld's Oh My! Certificates, Revocation and the new gtld's Oh My! Dan Timpson sales@digicert.com www.digicert.com +1 (801) 877-2100 Focus What is a Certificate Authority? Current situation with gtld's and internal names

More information

IS THE INTERNET OF THINGS MAKING OUR LIVES EASIER OR MORE DIFFICULT? WHAT ARE THE OPPORTUNITIES AND CHALLENGES?

IS THE INTERNET OF THINGS MAKING OUR LIVES EASIER OR MORE DIFFICULT? WHAT ARE THE OPPORTUNITIES AND CHALLENGES? IS THE INTERNET OF THINGS MAKING OUR LIVES EASIER OR MORE DIFFICULT? WHAT ARE THE OPPORTUNITIES AND CHALLENGES? [Document subtitle] ValueInfinity Inc. Transformation with Purpose It is estimated that more

More information

Enterprise Data Governance

Enterprise Data Governance DATA GOVERNANCE Enterprise Data Governance Strategies and Approaches for Implementing a Multi-Domain Data Governance Model Mark Allen Sr. Consultant, Enterprise Data Governance WellPoint, Inc. 1 Introduction:

More information

Creating an IoT Ecosystem through scenarios

Creating an IoT Ecosystem through scenarios Creating an IoT Ecosystem through scenarios IEEE Internet of Things Initiative Hendrik Berndt, Scenarios Track Chair IoT Week Lisbon, June 17 th, 2015 1 16/06/15 An IoT Definition! The Internet of Things

More information

Establishing Environmental Best Practices. Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/

Establishing Environmental Best Practices. Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/ Establishing Environmental Best Practices Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/ Agenda Active Directory Service Accounts Database Platform Windows Platform Data Storage Planning Virtualisation

More information

Cloud Services and Business Process Outsourcing

Cloud Services and Business Process Outsourcing Cloud Services and Business Process Outsourcing What security concerns surround Cloud Services and Outsourcing? Prepared for the Western NY ISACA Conference April 28 2015 Presenter Kevin Wilkins, CISSP

More information

Making the Cloud a Safe and Secure Place for Data

Making the Cloud a Safe and Secure Place for Data ArkivumLimited R21 Langley Park Way Chippenham Wiltshire SN15 1GE UK +44 1249 405060 info@arkivum.com @Arkivum arkivum.com Making the Cloud a Safe and Secure Place for Data Whitepaper 1 / 5 Introduction

More information

Career Management. Making It Work for Employees and Employers

Career Management. Making It Work for Employees and Employers Career Management Making It Work for Employees and Employers Stuck in neutral. That s how many employees around the world would describe their career. In fact, according to the 2014 Global Workforce Study,

More information

Designing a Windows Server 2008 Network Infrastructure

Designing a Windows Server 2008 Network Infrastructure Designing a Windows Server 2008 Network Infrastructure MOC6435 About this Course This five-day course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure

More information

WHMCS LUXCLOUD MODULE

WHMCS LUXCLOUD MODULE èè WHMCS LUXCLOUD MODULE Update: 02.02.2015 Version 2.0 This information is only valid for partners who use the WHMCS module (v2.0 and higher). 1.1 General overview 1.2 Installing the plugin Go to your

More information

Security challenges for internet technologies on mobile devices

Security challenges for internet technologies on mobile devices Security challenges for internet technologies on mobile devices - Geir Olsen [geiro@microsoft.com], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [anild@microsoft.com],

More information

What to Look for When Selecting a Master Data Management Solution

What to Look for When Selecting a Master Data Management Solution What to Look for When Selecting a Master Data Management Solution What to Look for When Selecting a Master Data Management Solution Table of Contents Business Drivers of MDM... 3 Next-Generation MDM...

More information

Introducing the Microsoft IIS deployment guide

Introducing the Microsoft IIS deployment guide Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying

More information

How To Create A Global Signer For The Internet Of Everything

How To Create A Global Signer For The Internet Of Everything Identity Services. For the internet of everything. Securing commerce, communications, content delivery and community interactions. Mission To provide enterprises with end-to-end identity services for the

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

Horizontal IoT Application Development using Semantic Web Technologies

Horizontal IoT Application Development using Semantic Web Technologies Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges

More information

Case study: IBM s Journey to Becoming a Social Business

Case study: IBM s Journey to Becoming a Social Business Case study: IBM s Journey to Becoming a Social Business Rowan Hetherington, IBM, September 2012 Introduction The corporate world is in the midst of an important transformation: it is witnessing a significant

More information

Enterprise Voice and Online Services with Microsoft Lync Server 2013

Enterprise Voice and Online Services with Microsoft Lync Server 2013 Course 20337B: Enterprise Voice and Online Services with Microsoft Lync Server 2013 Course Details Course Outline Module 1: Voice Architecture This module introduce Enterprise Voice features of Lync Server

More information

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design. SSM6435 - Course 6435A: Designing a Windows Server 2008 Network Infrastructure Overview About this Course This five-day course will provide students with an understanding of how to design a Windows Server

More information

Service Oriented Architecture (SOA) An Introduction

Service Oriented Architecture (SOA) An Introduction Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages

More information

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION?

WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? M-112997 Rev 07/2015 FACTS Why? What? How? WHAT DOES CREDIT ONE BANK, N.A. DO WITH YOUR PERSONAL INFORMATION? Financial companies choose how they share your personal information. Federal law gives consumers

More information

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES

VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES VICNET is G-Cloud7 GOV UK Supplier VISIT DIGITAL MARKET PLACE VICNETCLOUD VICNET CLOUD MIGRATION SERVICES Consult and assess your business and technical requirements Advise you on the best cloud solutions

More information

Desktop Virtualization Made Easy Execution Plan

Desktop Virtualization Made Easy Execution Plan Consulting Solutions WHITE PAPER Citrix XenDesktop Desktop Virtualization Made Easy Execution Plan A desktop virtualization architecture guide for small to medium environments www.citrix.com Trying to

More information

MASHUPS FOR THE INTERNET OF THINGS

MASHUPS FOR THE INTERNET OF THINGS MASHUPS FOR THE INTERNET OF THINGS Matthias Heyde / Fraunhofer FOKUS glue.things a Mashup Platform for wiring the Internet of Things with the Internet of Services 5th International Workshop on the Web

More information

API Architecture. for the Data Interoperability at OSU initiative

API Architecture. for the Data Interoperability at OSU initiative API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models

More information

Email Marketing Buyer's Guide

Email Marketing Buyer's Guide Knowledge Guide: Email Marketing Buyer's Guide In-House Versus Hosted Email Marketing Solution virtualroi May 2009 by: Sally Lowery Online Marketing Manager Email Marketing Buyer's Guide This whitepaper

More information

Voted Best Web Design

Voted Best Web Design INTRODUCTION WHO IS JLB? Award winning web operations & technology marketing services firm Specialize in: Great design, focused on online brand and identity Development/integration of manageable and scalable

More information

Java and the Internet of Things

Java and the Internet of Things Java and the Internet of Things Henrik Stahl Vice President Java Product Management 1 9 Million+ Java developers worldwide #1 Choice for developers #1 Development platform 5 of Top 5 OEMs ship Java ME

More information

Cloud Brokers Can Help ISVs Move to SaaS

Cloud Brokers Can Help ISVs Move to SaaS Cognizant 20-20 Insights Cloud Brokers Can Help ISVs Move to SaaS Executive Summary Many large organizations are purchasing software as a service (SaaS) rather than buying and hosting software internally.

More information

Secure PostgreSQL Deployments

Secure PostgreSQL Deployments Secure PostgreSQL Deployments pgcon.br 2009 Campinas, Brazil Magnus Hagander Redpill Linpro AB There's much to security Identify the threats Apply the correct measures Don't do things just because you

More information

Richard T. Clark Chief Executive Officer and President. Executing on Our Strategy

Richard T. Clark Chief Executive Officer and President. Executing on Our Strategy Richard T. Clark Chief Executive Officer and President Executing on Our Strategy Merck s Plan to Win: Preparing for Our Future Success BECOME THE MOST TRUSTED INDUSTRY LEADER IN DELIVERING VALUE TO CUSTOMERS

More information

The Value of Software as a Service (SaaS) for the Travel Industry

The Value of Software as a Service (SaaS) for the Travel Industry The Value of Software as a Service (SaaS) for the Travel Industry Published by Galor Systems & Software Development, March 2009. This publication may be distributed freely in its entirety. Content must

More information