Encryption Simplification and the October 3 rd rule. Michael Pender Senior Engineer Information Technology Controls Division
|
|
|
- Barbara Burns
- 9 years ago
- Views:
Transcription
1 Encryption Simplification and the October 3 rd rule Michael Pender Senior Engineer Information Technology Controls Division
2 Agenda Introduction Overview of the Encryption Simplification Process and the October 3 rd Rule Summary of changes New structure for License Exception ENC: - No review required, no reporting - No review required, with reporting - Review Required, no waiting - Review Required, with waiting period Questions and Answers
3 Introduction
4 Overview of Encryption Simplification and the October 3 rd Rule
5 Summary of Changes License Exception (LE) ENC restructured based on the type of review and the waiting period Removed Section and revised ECCN 5E002 to clarify current control list restrictions pertaining to technical assistance by U.S. persons Removed notification requirements for items classified as 5A992, 5D992 and 5E992 Removed LE KMI as obsolete
6 Summary of Changes (cont d) Bulgaria, Canada, Iceland, Romania and Turkey were added to the list of countries that receive favorable treatment under LE ENC (Supplement 3 to Part 740) Excludes certain items from review and/or reporting requirements including personal area network commodities and ancillary cryptography items Revised Guidelines for Submitting Review Requests for Encryption Items
7 Summary of Changes (cont d) Makes it clear that commodities and software pending mass market review are authorized by LE ENC under ECCNS 5A002 and 5D002. After the mass market review is complete, such commodities and software may be exported under ECCNs 5A992 and 5D992 using No License Required (NLR) Increases certain parameters under License Exception ENC Restricted.
8 No Review Required, No Reporting Exports to Private sector end users in countries in Supplement 3 to Part 740 ( (a)(1)) (for internal development or production of new products, only) To U.S. subsidiaries ( ( (a)(2)) and employees of U.S companies (internal use)
9 No Review Required, No Reporting: Short Range Wireless Items Short-range range wireless items not controlled under Cat. 5 ( ( (b)(4)(i) and (b)(3)(ii)) Nominal range 100 meters Examples: some* and May self classify under 5x002 or 5x992 as appropriate.
10 No Review Required, No Reporting: Wireless PAN Personal Area Network items arbitrary number of interconnected 'data devices' communicating directly with each other; and confined to immediate vicinity of an individual person or device controller (e.g.( e.g.,, single room, office, or automobile). 30 meters : class 2 and 3, but not class 1 May Self Classify as 5x002 or 5x992, as appropriate
11 No Review Required, No Reporting Wireless PAN Examples Hands-free headsets Wireless networking between personal computers Wireless mice, keyboards, printers GPS receivers with Bluetooth interfaces* Bar code scanners Wireless controllers for game consoles Software for transfer of files using OBEX
12 No Review Required, No Reporting Ancillary Cryptography Ancillary Cryptography (b)(4)(iv): not primarily useful for computing (including the operation of "digital computers"), communications, networking (includes operation, administration, management and provisioning) or "information security". May Self Classify as 5x002 or 5x992, as appropriate
13 No Review Required, No Reporting Ancillary Cryptography Examples Piracy and theft prevention for software, music, etc. Games and gaming Household utilities and appliances Printing, reproduction, imaging and video recording or playback Business process modeling and automation (e.g., supply chain management, inventory, scheduling and delivery) Industrial, manufacturing or mechanical systems (e.g., robotics, heavy equipment, facilities systems such as fire alarm, HVAC) Automotive, aviation, and other transportation systems
14 Mass Marketed Products No Review Required Short-range range wireless encryption functions ( (b)(3)(i)) Wireless personal area network items ( (b)(3)(ii)) Ancillary cryptography ( (b)(3)(iii))
15 Paragraph End User authorized (Outside E-1) E (a)(1) Private in Supp 3 (a)(2) U.S. Subs (b)(1)(i) In Supp 3 (b)(1)(ii) Outside Supp 3 (b)(2) (b)(3) (b)(4) License Exception ENC- Encryption No Gov t outside Supp 3 All except E-1E All except E-1E Item Description or Purpose of Export Dev/Production only Any internal purpose End Use or Transfer 80/1024/160 and Source code Any purpose Any purpose Short-range range Wireless Wireless PAN; Ancillary Crypto Review Required? No Review* No Review* Review no waiting Review no waiting Review with 30 day wait Review with 30 day wait No Review (e) Reporting required for (b)(1), (b)(2), and (b)(3), (b)(4)(ii) (4)(ii) *All products developed are subject to the EAR and require review
16 No Review Required, No Reporting: Section (a) Applies to 5A002, 5B002, 5D002, and 5E (a)(1) Internal development or production of new products No review, notification or reporting Only to private sector companies HQed in Supp. 3 country End use limited to internal use for the development or production of new products (a)(2) U.S. Subsidiaries No review, notification or reporting Only to U.S. Subsidiaries as defined in 772. HQed in U.S. Internal use Employees of U.S. companies or U.S. subsidiaries
17 Review Required, no Waiting Period: Section (b)(1) Applies to 5A002, 5B002, and 5D (b)(1)(i) Review required without waiting period to Supp 3 Countries Review Required prior to export Can export immediately after complete submission Only to Supplement 3 private companies and governments End use is not limited pending mass market reviews may be exported under this sec. Also includes 5E (b)(1)(ii) Review required without waiting period to Non-Supp 3 Countries 80 bits Symmetric 1024 bits Asymmetric 160 bits Elliptic Curve Source Code to non-government end users
18 Review Required, with Waiting Period: (b)(2) ENC Restricted Applies to 5A002, 5B002, and 5D002 Products authorized under (b)(2) include: network infrastructure products source code that is not publicly available certain specialized commodities and software Require a license if going to government end-users not in a Supp 3 country. Question 11 of Supp. 6 means evaluate your products against B2 Criteria
19 (b)(2)(i)-(vi) (vi) Criteria (i) Network infrastructure items with any of the following: (A) Aggregate encrypted WAN, MAN, VPN or backhaul throughput exceeding 90 Mbps.; or or (B) Single-channel input data rate exceeding 154 Mbps; (C) 250 concurrent encrypted data channels, or encrypted signaling to more than 1,000 endpoints for VOIP or converged products; ; or (D) Air-interface interface coverage exceeding 1,000 meters, with: (1) Maximum data rates >10> Mbps (at >1,000 meters); or (2) Max # of concurrent full-duplex voice channels >30; or (3) Substantial support is required for installation or use.
20 (b)(2)(i)-(vi) (vi) Criteria cont. (ii) Encryption source code not authorized by EAR (e)(1) (iii) Encryption items: (A) that have been modified or customized for government end-user/ end-use (e.g., (SOC/NOC); or (B) modified or customized to customer specifications; or (C) user-accessible & easily changed by user. (iv) Cryptanalytic items ; ; or (v) Providing functions necessary for quantum cryptography; or (vi) Modified for computers controlled by ECCN 4A003
21 Review Required, with Waiting Period: (b)(3) ENC Unrestricted Everything else designed to use encryption (5A002, 5B002, 5D002) If not B2 then B3 If not Mass Market then B3. Export to both non-government AND government end-users without a license.
22 No Review Required, No Reporting: (b)(4) Short-range range wireless encryption functions Foreign products developed with US- origin encryption source code, components or toolkits Wireless personal area network items Ancillary cryptography
23 Modifications to a Reviewed Product New review needed: Changes Cryptographic functionality affecting License Exception ENC eligibility New review NOT needed: Modifications do not change cryptographic functionality Name changes, version changes, updates to 3 rd party encryption library See Note to paragraph (b) at end of (b)
24 Guidance on the Web Step by step guidance to exporters for preparing review requests and notifications: EAR on the web: Specific questions: Information Technology Controls Division ENCRYPTION HOTLINE: (202)
25 Information Technology Randy Pratt Director Ph: Contacts Michael Pender Senior Engineer Ph: Joe Young Senior Engineer Ph: Judith Currie Senior Export Policy Analyst Ph: Sylvia Jimmison Export Policy Analyst Ph: Aaron Amundson Export Policy Analyst Ph: Anita Zinzuvadia BIS-Western Regional Office Electrical Engineer Ph: x x131
Encryption Export Controls: A Comparative Analysis between the EU and the US
2013 Annual International Trade Compliance Conference Encryption Export Controls: A Comparative Analysis between the EU and the US John F. McKenzie Baker & McKenzie San Francisco Jasper Helder Baker &
3. Designed for installation by the user without further substantial support by the supplier; and
Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information
Department of Commerce
Friday, June 25, 2010 Part II Department of Commerce Bureau of Industry and Security 15 CFR Parts 730, 734, 738, et al. Encryption Export Controls: Revision of License Exception ENC and Mass Market Eligibility,
Rules and Regulations
1059 Rules and Regulations Federal Register Vol. 76, No. 5 Friday, January 7, 2011 This section of the FEDERAL REGISTER contains regulatory documents having general applicability and legal effect, most
Top 10 Questions to Ask Before Exporting Software Containing Encryption
Top 10 Questions to Ask Before Exporting Software Containing Encryption January 14, 2009 Agenda Introduction FOSSBazaar Top Ten Questions Before Exporting Encryption Questions & Answers Speakers Eran Strod
Raytheon Oakley Systems
Raytheon Oakley Systems Michael Crouse VP, Sales & Marketing Daniel Velez Director, Program Operations Cleared for release. #IIS2013-226. Page 1 Raytheon Oakley Systems About us Founded as Oakley Networks
United States Export Controls on Internet Software Transactions. John F. McKenzie Partner, Baker & McKenzie LLP
United States Export Controls on Internet Software Transactions John F. McKenzie Partner, Baker & McKenzie LLP August 2010 Table of Contents 1. Introduction...1 2. The Concept of an "Export" for Export
Table of Contents 734.1 INTRODUCTION 734.1 INTRODUCTION... 1 734.2 IMPORTANT EAR TERMS AND PRINCIPLES... 1 734.3 ITEMS SUBJECT TO THE EAR..
Scope of the Export Administration Regulations Part 734 - page 1 Table of Contents 734.1 INTRODUCTION... 1 734.2 IMPORTANT EAR TERMS AND PRINCIPLES... 1 734.3 ITEMS SUBJECT TO THE EAR.. 4 734.4 DE MINIMIS
Cuban Regulations and Recent Easing of Activities in Cuba
Cuban Regulations and Recent Easing of Activities in Cuba As you are aware, the President has implemented several initiatives to ease the 50-year-old US embargo with Cuba. This was announced on December
Table of Contents 762.1 SCOPE 762.2 RECORDS TO BE RETAINED
Recordkeeping Part 762--page 1 Table of Contents 762.1 SCOPE... 1 762.2 RECORDS TO BE RETAINED... 1 762.3 RECORDS EXEMPT FROM RECORDKEEPING REQUIREMENTS... 3 762.4 ORIGINAL RECORDS REQUIRED... 4 762.5
COMPUTER & INTERNET. Westlaw Journal. Expert Analysis Software Development and U.S. Export Controls
Westlaw Journal COMPUTER & INTERNET Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 31, ISSUE 1 / JUNE 13, 2013 Expert Analysis Software Development and U.S. Export Controls
BID SPECIFICATION PACKAGE
REQUEST FOR PROPOSALS: E-RATE TELEPHONE SYSTEM & COMPLETE INTERNAL CONNECTIONS BID SPECIFICATION PACKAGE FOR: HOUSTON GATEWAY ACADEMY, INC. REQUEST FOR PROPOSAL Telephone System for Houston Gateway Academy,
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
How To Design A School Communication System
Integrated School Communications Curt Brautigan East Region Manager, Calypso Systems Seminar Agenda A bit about me (Who is this person talking and where is he from?) Changing dynamics / requirements in
Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS. Chapter-1L06: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS 1 Telecom Smart Cards, Examples Missiles and Satellites, Computer Networking, Digital Consumer Electronics, and Automotive 2 3 Exemplary Application Areas Also
Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider.
Common Core Network Readiness Guidelines Is your network ready? Detailed questions, processes, and actions to consider. Is Your School Network Ready? Network readiness is an important factor in any new
DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES
Information Analytics Expertise APRIL 2015 DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES John Byrne, Senior Principal Analyst +1 408 583 3320 [email protected] Internet
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
User Guide. BlackBerry Storm 9530 Smartphone. Version: 4.7
BlackBerry Storm 9530 Smartphone Version: 4.7 SWD-490426-0909090640-001 Contents Shortcuts... 9 BlackBerry basics shortcuts... 9 Phone shortcuts... 9 Camera shortcuts... 9 Media shortcuts... 9 Typing shortcuts...
Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
Introduction To Commerce Department. Export Controls U.S. DEPARTMENT OF COMMERCE BUREAU OF INDUSTRY AND SECURITY OFFICE OF EXPORTER SERVICES
Introduction To Commerce Department Export Controls U.S. DEPARTMENT OF COMMERCE BUREAU OF INDUSTRY AND SECURITY OFFICE OF EXPORTER SERVICES Overview The Department of Commerce s Bureau of Industry and
PCI Security Standards Council
PCI Security Standards Council Ralph Poore, Director, Emerging Standards 2013 About PCI Emerging Technologies OWASP and Mobile Guidelines About PCI About the PCI Council Open, global forum Founded 2006
Overview of broadband powerline communications
January 23, 2015 Overview of broadband powerline communications Jean-Philippe Faure, CEO Progilon Senior consultant at Panasonic System Networks Director Technology Standards at HD-PLC Alliance Biography
Mobile Commerce and Ubiquitous Computing. Chapter 6
Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure
HEAT DSM 2015.2 Release Overview. Andreas Fuchs Product Management November 16th, 2015
HEAT DSM 2015.2 Release Overview Andreas Fuchs Product Management November 16th, 2015 HEAT DSM 2015.2 Highlights HEAT Discovery Integration Patch Management Enhancements HEAT PatchLink Integration HEAT
CLASS 705 DATA PROCESSING: FINANCIAL, BUSINESS PRACTICE, MANAGE- 705-1 MENT, OR COST/PRICE DETERMINATION. 3..Patient record management
705 DATA PROCESSING: FINANCIAL, BUSINESS PRACTICE, MANAGE CLASS 705 DATA PROCESSING: FINANCIAL, BUSINESS PRACTICE, MANAGE- 705-1 50 BUSINESS PROCESSING USING 1.1 AUTOMATED ELECTRICAL FINANCIAL OR CRYPTOGRAPHY
AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications
General Description The AES core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. Basic core is very small (start at 800 Actel tiles). Enhanced versions
Cisco SPA525G2 5-Line IP Phone
Q & A Cisco SPA525G2 5-Line IP Phone Q. What is the Cisco SPA525G2 5-Line IP Phone? A. The Cisco SPA525G2 IP Phone is a five-line phone that features a high resolution color display. The phone operates
Value networking via FMC (Broadband Extension by Wireless LAN)
www.nespot.com Value networking via (Broadband Extension by Wireless LAN) HAHN, WON-SIC Ph.D. Managing Director Fixed Mobile Convergence Business Department KT [email protected] o) 82-31-727-2970 Hp) 82-16-9777-6711
Home networking Home automation. EASY & VALUE = MASS The business case is there Mark B.M. Ossel
Home networking Home automation EASY & VALUE = MASS The business case is there Mark B.M. Ossel Vice-President & GM ECHELON Europe, Middle East & Africa Agenda Home Automation & Networking The market opportunity
ORDER 1370.108. National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:
National Policy ORDER 1370.108 Effective Date 09/21/09 SUBJ: Voice Over Internet Protocol (VoIP) Security Policy 1. Purpose of This Order. This Order establishes the Federal Aviation Administration s (FAA)
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
RSA. Frequently Asked Questions. RSA Data Security, Inc. About Cryptography Export Laws. Answers to THE KEYS TO PRIVACY AND AUTHENTICATION
RSA Data Security, Inc. Answers to Frequently Asked Questions About Cryptography Export Laws RSA DATA SECURITY, INC. THE KEYS TO PRIVACY AND AUTHENTICATION Copyright Notice Copyright 1996 by RSA Data Security,
WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B
COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B TABLE OF CONTENTS COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B NSA COMMERCIAL SOLUTION FOR CLASSIFIED
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
Using & Offering Wholesale Ethernet Network and Operational Considerations
White Paper Using and Offering Wholesale Ethernet Using & Offering Wholesale Ethernet Network and Operational Considerations Introduction Business services customers are continuing to migrate to Carrier
Export Controls on Intrusion Software. Collin Anderson (@CDA) Tom Cross (@_decius_)
Export Controls on Intrusion Software Collin Anderson (@CDA) Tom Cross (@_decius_) Do Export Controls on Intrusion Software Threaten Security Research? Truth is we don t know. (We re not lawyers and this
The Impact of IoT on Semiconductor Companies
Advisory The Impact of IoT on Semiconductor Companies Rajesh Mani Director, Strategy and Operations April 15, 2015 The Internet of Things (IoT) has been defined in multiple ways here s our take! The collection
FREQUENTLY ASKED QUESTIONS: HOMEPLUG
FREQUENTLY ASKED QUESTIONS: HOMEPLUG 1. What is HomePlug / Powerline technology? Beginner 2. How do I set up a network with Aztech HomePlugs? Beginner 3. How will HomePlugs benefit me at home? Beginner
Table of Contents 758.1 THE ELECTRONIC EXPORT INFORMATION (EEI) FILING TO THE AUTOMATED EXPORT SYSTEM (AES)
Export Clearance Requirements Part 758-page 1 Table of Contents 758.1 THE ELECTRONIC EXPORT INFORMATION (EEI) FILING TO THE AUTOMATED EXPORT SYSTEM (AES)1 758.2 AUTOMATED EXPORT SYSTEM (AES)... 5 758.3
M2M ATDI services. M2M project development, Business model, Connectivity.
M2M ATDI services M2M project development, Business model, Connectivity. Introduction Thanks to our leadership in Spectrum management, Prospective planning, Network deployment, ATDI was/is involved in
INTRODUCTION Indiana Public Library Technology Plan Template
INTRODUCTION Indiana Public Library Template As of January 1, 2011, public libraries in Indiana are required to follow the standards in 590 IAC 6 in order to be eligible for the receipt of state and federal
Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services
Network Evolution, Cloud & Future Services Opportunities & Challenges for Next-Decade Services Outline Trends: Data, Services & Networks Cloud What is Next? 2 Law of Telecom Complexity Telecom complexity,
Chapter 1: Introduction. What is an Operating System?
Chapter 1: Introduction What is an Operating System? Mainframe Systems Desktop Systems Multiprocessor Systems Distributed Systems Clustered System Real -Time Systems Handheld Systems Computing Environments
A guide to VoIP for small to medium sized business
//VoIP Telecommunications Company A guide to VoIP for small to medium sized business Contents 1 I want to move my business to VoIP. The things you will need to consider. The key points 2 3 4 Types of connectivity
Level 3 Communications
Level 3 Communications Don Gips GVP, Corporate Development and Strategy TeleSoft's 10th Anniversary 2006 Annual Venture Capital EcoSystem Meeting October 19, 2006 1 Agenda Level 3: Built to meet the needs
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer
Pervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense
CONNECT PROTECT Communication, Networking and Security Solutions for Defense Engage Communication provides Defense, Homeland Security and Intelligence Communities with innovative and cost effective solutions
DC-8706K Auto Dial Alarm System
DC-8706K Auto Dial Alarm System User Guide Basic Contents: 1x the host unit; 1x wireless door (window) magnet; 1x wireless infrared detector; 2x remote control; 1x siren; 1x phone core; 1x AC to DC power
Alexander Nikov. 6. Telecommunications and networks, the Internet. Hyundai Heavy Industries Creates A Wireless Shipyard. a Wireless Shipyard
INFO 1500 Introduction to IT Fundamentals Learning Objectives 6. Telecommunications and networks, the Internet 1. Identify the principal components of telecommunications networks and key networking technologies.
Table of Contents 738.1 INTRODUCTION (CCL) STRUCTURE
Commerce Control List Overview and the Country Chart Part 738 page 1 Table of Contents 738.1 INTRODUCTION... 1 738.2 COMMERCE CONTROL LIST (CCL) STRUCTURE... 1 738.3 COMMERCE COUNTRY CHART STRUCTURE...
Information Systems Infrastructure. Learning Objectives. Components of Campus Telecommunications Infrastructure
Information Systems Infrastructure APPA-Institute for Facilities Management J. Craig Klimczak, D.V.M., M.S. 321 South Mosley Road St. Louis, MO 63141 [email protected] Learning Objectives Become familiar
Secure Navigation and Authentication. Sherman Lo November 2008
Secure Navigation and Authentication Sherman Lo November 2008 1 Outline Motivating Authentication Proposed techniques for authentication Source authentication Cross checking My research 2 GNSS: Position,
139.195 Definitions for KRS 139.105, 139.200, 139.215, and 139.775. As used in KRS 139.105, 139.200, 139.215, and 139.775: (1) "Ancillary services"
139.195 Definitions for KRS 139.105, 139.200, 139.215, and 139.775. As used in KRS 139.105, 139.200, 139.215, and 139.775: (1) "Ancillary services" means services that are associated with or incidental
Nokia Bluetooth Headset BH-604 User Guide
Nokia Bluetooth Headset BH-604 User Guide Issue 1 EN DECLARATION OF CONFORMITY Hereby, NOKIA CORPORATION declares that this HS-96W product is in compliance with the essential requirements and other relevant
SOUL S DIGITAL VOICE 30
SOUL S DIGITAL VOICE 30 SOUL S CONVERGENT NETWORK SOUL S DIGITAL VOICE 30 Soul is a new age telecommunications company capable of delivering both voice and data via an IP network to offer our customers
Guidelines for Preparing Export License Applications Involving Foreign Nationals
Guidelines for Preparing Export License Applications Involving Foreign Nationals I. Introduction BIS has prepared these guidelines for exporters to use in submitting license applications for foreign nationals
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
The Ubiquitous Web, UPnP and Smart Homes
The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision
Cambium Networks Wireless Broadband Solutions for Service Providers
Cambium Networks Wireless Broadband Solutions for Service Providers Leading Global Provider of: Broadband Wireless solutions Ene 2015 Copyright 2013 Cambium Networks, Inc. All rights reserved. 1 Cambium
Systems Engineering. Aim. Dr Peter Jones. Degree Course Leader
Systems Engineering Dr Peter Jones Degree Course Leader Aim Systems Engineering Course Structure: BEng Course Structure: MEng Electives Taking a Year Out PDR Professional Accreditation 1 Systems Engineering
THE ENTERPRISE MOBILITY POLICY GUIDEBOOK
THE ENTERPRISE MOBILITY POLICY GUIDEBOOK October 2010 Edition 2 About This Guidebook Research from Strategy Analytics shows that over 90% of organizations now have employees using smartphones within their
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
the about MPLS security
uth 22 the about truth MPLS security 11 MPLS is private. MPLS is a shared service! We use a private network is often stated as the reason for not protecting data as it travels over 3rd party networks.
Upper Perkiomen School District
Upper Perkiomen School District Network Infrastructure Review Executive Summary Prepared by 1001 James Drive, Suite A15 Leesport, PA 19533 610 916 9400 www.jlrconsulting.com Date: March 10, 2015 Report
Lab Testing Summary Report
Lab Testing Summary Report April 2007 Report 070409 Product Category: SMB IP-PBX Vendor Tested: Avaya Product Tested: Avaya Distributed Office Key findings and conclusions: Interconnected IP-PBX targeted
Preparing Your IP network for High Definition Video Conferencing
White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Access alternatives to mobile services and content: analysis of handset-based smartphone usage data
Access alternatives to mobile services and content: analysis of handset-based smartphone usage data ([email protected]) ITS 17th Biennial Conference Montreal, Canada, June 24-27, 2008 Outline Introduction
Applying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance
Applying the NFC Secure Element in Mobile Identity Apps RANDY VANDERHOOF Executive Director Smart Card Alliance Session ID: MBS - 403 Session Classification: Mobile Security Agenda Agenda topics NFC basics:
U.S. Department of Commerce Bureau of Industry and Security. How to Classify Your Item
U.S. Department of Commerce Bureau of Industry and Security How to Classify Your Item How is my Item Classified for Export Control Purposes? Commerce Control List ( CCL ) Export Control Classification
Voice over Internet Protocol (VoIP) in the Hospitality and Gaming Sectors
Voice over Internet Protocol (VoIP) in the Hospitality and Gaming Sectors Jayesh Amdekar Voice over Internet Protocol (VoIP) has emerged as a significant enabling technology and the adoption of industry
Greater Orlando Aviation Authority Buildings. Orlando International Airport Orlando, Florida, USA
Greater Orlando Aviation Authority Buildings Orlando International Airport Orlando, Florida, USA 800 flights per day on 40+ commercial airlines 13 th busiest airport in the U.S. / 29 th busiest in the
Mobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
TrustWay: the high security solution
TrustWay: the high security solution Industrial spying, eavesdropping, hacking... it has never been so vital to communicate securely in our networked world... and the threats have never been so great.
Securing Wireless Access for Vehicular Environments (WAVE)
Securing Wireless Access for Vehicular Environments (WAVE) May 7, 2009 CTST, New Orleans Tim Weil CISSP/CISA Security Architect ITS Engineering Booz Allen Hamilton 0 The concept of VII started upon the
Telecom Applications:
Wireless Broadband: As the global economy continues to expand, so does the demand for information. This information needs to be abundant, diversified, instant, scattered and mobile, all at the same time.
AGENDA ITEM 11B: AUDIOVISUAL POLICY PUBLIC SERVICE BROADCASTING
SCREENING CHAPTER 10 INFORMATION SOCIETY AND MEDIA AGENDA ITEM 11B: AUDIOVISUAL POLICY Country Session: The Republic of TURKEY 13-14 July 2006 Content I. General Overview II. Charter Agreement III. State
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Monitoring and Diagnosing Oracle RAC Performance with Oracle Enterprise Manager. Kai Yu, Orlando Gallegos Dell Oracle Solutions Engineering
Monitoring and Diagnosing Oracle RAC Performance with Oracle Enterprise Manager Kai Yu, Orlando Gallegos Dell Oracle Solutions Engineering About Author Kai Yu Senior System Engineer, Dell Oracle Solutions
Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading
Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading Summary Cisco outdoor wireless solutions make it practical to deploy and manage Wi-Fi on a citywide scale. This application note describes
Wireless Local Area Network Deployment and Security Practices
HIGHLIGHTS AUDIT REPORT Wireless Local Area Network Deployment and April 24, 2014 Report Number HIGHLIGHTS BACKGROUND: The U.S. Postal Service is committed to providing a high quality, secure, and cost-effective
