Big Data & Security. Edgar Weippl SBA Research

Size: px
Start display at page:

Download "Big Data & Security. Edgar Weippl SBA Research"

Transcription

1 Big Data & Security Edgar Weippl SBA Research

2 Security Challenges Confidentiality Cloud storage (e.g. Dropbox) Authentication (e.g. WhatsApp) Open data vs. unintended data leaks Availability Dependability on infrastructure Complex and hidden dependability Integrity incomplete data, entry errors, processing, sensors, social media, latency of information, deception, modeling approximations,

3 Privacy won t work 1. My data should not have an impact on the results released. 2. One should learn nothing about me. Ad 1) then the results have no utility. Ad 2) even if you do share your data, the trend is true for you.

4 Privacy that might work Weaker assumption: Differential Privacy Given result R can anyone guess which possible world it came from? Result R Prob (R) = A A B Prob (R) = B Possible world with MY data Possible world without my data

5 Risks Small Data Intake Age Total Priors Gender Race Source: Richard Berk, The Role of Race in Forecasts of Violent Crime, Race Soc. Probl. Dec 2009; 1(4): , DOI /s z pdf

6 Future Attribute Screening Technology (FAST) Crimethink - Facecrime Science-fiction concept of 'pre-crime', in which security services can detect someone's intention to commit a crime. DHS has claimed accuracy rates of around 70%. Really? Minority Report Source: Sharon Weinberger, Terrorist 'precrime' detector field tested in United States, online 27 May 2011, Nature, doi: /news

7 Looking for terrorists Let s assume we have an analysis tool with 98 % sensitivity and 99% specificity. Our software flags a person as a possible terrorists. Heavily armed you enter the apartment. How likely is that you really have a terrorist looking into barrel of your gun? a. 98 % (sensitivity)? b. 99 % (specificity)? c. None of the above? ~ 100 / ~ 1 /

8 Statistics refresher 500 Mio people 100 terrorists innocent people 2 terrorists are not found 98 terrorists are found Approx. 5 Mio innocent people are interrogated by police They were lucky

9 This will never happen Auffällig sei der Gebrauch von Fachbegriffen wie Gentrifizierung, heißt es in den Akten. An jenem Sommertag vor einem Jahr ist es schon morgens um 7 Uhr sehr warm. Holm läuft halbnackt durch die Wohnung, als Polizisten mit gezogenen Waffen hereinstürmen und ihn zu Boden werfen. Source: Hannes Heine, Man weiß jetzt, was Gentrifizierung ist, Der Tagesspiegel Berlin, ,

10 Ever think you re being watched? It isn t the consumers job to know what they want. Source: Steve Lohr, Can Apple Find More Hits Without Its Tastemaker? The New York Times, Jan 18, 2011 Market research is very good at determining consumer preferences among products that currently exist. Source: Peter Noel Murray, How Steve Jobs Knew What You Wanted, Psychology Today, Oct 13, 2011,

11 WhatsApp Sebastian Schrittwieser, Peter Fruehwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, and Edgar R. Weippl. Guess who is texting you? evaluating the security of smartphone messaging applications. In Network and Distributed System Security Symposium (NDSS 2012),

12 Man-in-the-Middle

13 CERTIFICATES?

14

15 Authentication

16

17

18 In Reality

19 Even Worse Code = Hi!

20 Completely Stealthy

21 WowTalk

22 Status Messages

23

24

25 iphone/u.php?cc=countrycode&me=p honenumber&s=statusmessage

26 Enumeration Attack

27 Enumeration Attack

28 Enumeration Attack

29 On vacation Sleeping At work... Bleh. Missing my love! Heartbroken Nicaragua in 4 days!! On my way to Ireland at work but not doing shit I m never drinking again

30

31 WhatsApp ebuddy XMS WowTalk Viber HeyTell Forfone Voypi Tango EasyTalk

32 Results

33 Contact Edgar Weippl

Cloud Security and Mobile Applica4on Security

Cloud Security and Mobile Applica4on Security 2/22/13 Cloud Security and Mobile Applica4on Security SBA Research & Vienna University of Technology Edgar R. Weippl Target Audience Graduate students in computer science Some knowledge in in security

More information

Cloud Security and Mobile Application Security. SBA Research & Vienna University of Technology Edgar R. Weippl

Cloud Security and Mobile Application Security. SBA Research & Vienna University of Technology Edgar R. Weippl Cloud Security and Mobile Application Security SBA Research & Vienna University of Technology Edgar R. Weippl Target Audience Graduate students in computer science Some knowledge in in security but no

More information

EHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R.

EHR: System Architecture and Systems Security An Analysis of Interdependencies. SBA Research & Vienna University of Technology Edgar R. EHR: System Architecture and Systems Security An Analysis of Interdependencies SBA Research & Vienna University of Technology Edgar R. Weippl Typical Security Errors in Large-Scale Systems SBA Research

More information

Observa(on & Empirical Research. Advanced Persistent Threats & Social Engineering. Observa(on of complex systems

Observa(on & Empirical Research. Advanced Persistent Threats & Social Engineering. Observa(on of complex systems 17/03/15 Advanced Persistent Threats & Social Engineering SBA Research & Vienna University of Technology Edgar R. Weippl Observa(on & Empirical Research Observa(on of complex systems 1 Impact Real- World

More information

Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications

Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl

More information

Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications

Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Guess Who s Texting You? Evaluating the Security of Smartphone Messaging Applications Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar Weippl

More information

Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015

Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015 Welcome to SBA Research! NIST/ACTS Team Visit Vienna, April 10 th, 2015 SBA Research Overview Markus D. Klemen Managing director Basic facts Founded 2006 Research center (for applied information security)

More information

Re-evaluating Smartphone Messaging Application Security

Re-evaluating Smartphone Messaging Application Security Re-evaluating Smartphone Messaging Application Security Robin Müller University of Technology Vienna, Austria robin.m@gmx.at Abstract During the last two years mobile messaging and VoIP applications for

More information

SBA Research. Angewandte Forschung Angewandtes Wissen. UBIT Club IT, 12. Mai 2015 Best of Cybersecurity

SBA Research. Angewandte Forschung Angewandtes Wissen. UBIT Club IT, 12. Mai 2015 Best of Cybersecurity SBA Research Angewandte Forschung Angewandtes Wissen SBA Die Fakten gegründet 2006 größtes Forschungszentrum für IT-Sicherheit und einer der größten Sicherheitsdienstleister in der DACH-Region Know-how

More information

3 rd Young Researcher s Day 2013

3 rd Young Researcher s Day 2013 Einladung zum 3 rd Young Researcher s Day 2013 Nach zwei erfolgreichen Young Researcher s Days starten wir kurz vor dem Sommer in Runde drei. Frau Ingrid Schaumüller-Bichl und Herr Edgar Weippl laden ganz

More information

I Textarbeit. Text 1. I never leave my horse

I Textarbeit. Text 1. I never leave my horse BEJ Musterprüfung Englisch (11020) 1 I Textarbeit Text 1 I never leave my horse 1 5 10 15 20 Police officers in Ireland don t carry guns. But they often ride through Dublin on horses. Julie Folan is a

More information

Spoiled Onions: Exposing Malicious Tor Exit Relays

Spoiled Onions: Exposing Malicious Tor Exit Relays Spoiled Onions: Exposing Malicious Tor Exit Relays Philipp Winter, Richard Köwer, Martin Mulazzani, Markus Huber, Sebastian Schrittwieser, Stefan Lindskog, Edgar Weippl Outline This talk is about: Detecting

More information

AppInspect: Large-scale Evaluation of Social Networking Apps

AppInspect: Large-scale Evaluation of Social Networking Apps AppInspect: Large-scale Evaluation of Social Networking Apps ACM COSN, Boston, 10/08/2013 Markus Huber, Martin Mulazzani, Sebastian Schrittwieser, Edgar Weippl mhuber[at]sba-research[dot]org Main Contributions

More information

Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins

Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins Is Cloud relevant for SOA? 2014-06-12 - Corsin Decurtins Abstract SOA (Service-Orientierte Architektur) war vor einigen Jahren ein absolutes Hype- Thema in Unternehmen. Mittlerweile ist es aber sehr viel

More information

CS; SSART-Treffen, November 18, 2015. Internet Banking: Increasing power of cyber crime... and what to do?

CS; SSART-Treffen, November 18, 2015. Internet Banking: Increasing power of cyber crime... and what to do? CS; SSART-Treffen, November 18, 2015 Internet Banking: Increasing power of cyber crime.. and what to do? Different targets for cyber crime Collect large data volumes (financial data) Collect customer related

More information

GETTING FEEDBACK REALLY FAST WITH DESIGN THINKING AND AGILE SOFTWARE ENGINEERING

GETTING FEEDBACK REALLY FAST WITH DESIGN THINKING AND AGILE SOFTWARE ENGINEERING GETTING FEEDBACK REALLY FAST WITH DESIGN THINKING AND AGILE SOFTWARE ENGINEERING Dr. Tobias Hildenbrand & Christian Suessenbach, SAP AG Entwicklertag Karlsruhe, 22 May 2014 Ich wollte Mitarbeiter so motivieren,

More information

Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland

Moderne Sicherheit. Fokussiert auf Business Continuity, Mobilität & Application Control. Marc Mathys Country Manager Switzerland Moderne Sicherheit Fokussiert auf Business Continuity, Mobilität & Application Control Marc Mathys Country Manager Switzerland Network Security History in a Nutshell 1990s The Internet is bad if we do

More information

Radio D Teil 1. Deutsch lernen und unterrichten Arbeitsmaterialien. Episode 01 A Visit to the Countryside

Radio D Teil 1. Deutsch lernen und unterrichten Arbeitsmaterialien. Episode 01 A Visit to the Countryside Episode 01 A Visit to the Countryside, a young man, drives to the countryside to visit his mother Hanne. He plans to relax there, but soon finds out that the idyllic country landscape has its downsides

More information

Organizational Details Summer 2015

Organizational Details Summer 2015 Organizational Details Summer 2015 This presentation contains the organizational details of (most) courses on information security offered by 188/1, 183/1-ISecLab and SBA Research Cooperation for all security

More information

quick documentation Die Parameter der Installation sind in diesem Artikel zu finden:

quick documentation Die Parameter der Installation sind in diesem Artikel zu finden: quick documentation TO: FROM: SUBJECT: ARND.SPIERING@AS-INFORMATIK.NET ASTARO FIREWALL SCAN MIT NESSUS AUS BACKTRACK 5 R1 DATE: 24.11.2011 Inhalt Dieses Dokument beschreibt einen Nessus Scan einer Astaro

More information

Online Rumors. Lauren didn t think much of it when a classmate came. Lauren didn t have to ask where on the Internet;

Online Rumors. Lauren didn t think much of it when a classmate came. Lauren didn t have to ask where on the Internet; Carol Adams Huntington Junior College Literary Material Marked in 20 Word Groups Online Rumors Lauren didn t think much of it when a classmate came into the band hall and said, Hey, Lauren, did you 1 hear

More information

All the English here is taken from students work, both written and spoken. Can you spot the errors and correct them?

All the English here is taken from students work, both written and spoken. Can you spot the errors and correct them? Grammar Tasks This is a set of tasks for use in the Basic Grammar Class. Although they only really make sense when used with the other materials from the course, you can use them as a quick test as the

More information

Lernsituation 9. Giving information on the phone. 62 Lernsituation 9 Giving information on the phone

Lernsituation 9. Giving information on the phone. 62 Lernsituation 9 Giving information on the phone Fachkunde 1, Lernfeld 2, Useful Office Vocabulary Lernsituation 9 Giving information on the phone Rolf astian, Managing Director of E Partners KG, recently visited the Promo World Fair in Düsseldorf, an

More information

Search Engines Chapter 2 Architecture. 14.4.2011 Felix Naumann

Search Engines Chapter 2 Architecture. 14.4.2011 Felix Naumann Search Engines Chapter 2 Architecture 14.4.2011 Felix Naumann Overview 2 Basic Building Blocks Indexing Text Acquisition Text Transformation Index Creation Querying User Interaction Ranking Evaluation

More information

Analytics & Marketing 4.0 Wie die Anwendung von BigData die Customer Loyalty von morgen schafft

Analytics & Marketing 4.0 Wie die Anwendung von BigData die Customer Loyalty von morgen schafft Analytics & Marketing 4.0 Wie die Anwendung von BigData die Customer Loyalty von morgen schafft Oliver Börner Thomas Thalhammer 1 / digital business by 2 / digital business by 3 / digital business by 4

More information

What s going on with iphone touch performance?

What s going on with iphone touch performance? What s going on with iphone touch performance? - A performance comparison between Apple iphone 5S and iphone 5C Apple released two new iphones to market few weeks ago, the new flag ship model 5S and the

More information

2016 ABFF STAR PROJECT MONOLOGUE CHOICES

2016 ABFF STAR PROJECT MONOLOGUE CHOICES 2016 ABFF STAR PROJECT MONOLOGUE CHOICES Hard Deadline: February 1, 2016 SELF-TAPE INSTRUCTION TIPS Submission period: December 14, 2015 February 1, 2016 The Star Project is sponsored by NBCUniversal,

More information

Forensic Acquisition and Analysis of Tango VoIP

Forensic Acquisition and Analysis of Tango VoIP Forensic Acquisition and Analysis of Tango VoIP Nhien-An Le-Khac*, Christos Sgaras, and M-Tahar Kechadi School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4, Ireland.

More information

2012 NCSA / McAfee Online Safety Survey

2012 NCSA / McAfee Online Safety Survey 2012 NCSA / McAfee Online Safety Survey National Cyber Security Alliance McAfee JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National Cyber Security

More information

MUK-IT 63. Roundtable. Herzlich Willkommen bei der Software AG. Anton Hofmeier VP Sales Terracotta DACH / MdGL

MUK-IT 63. Roundtable. Herzlich Willkommen bei der Software AG. Anton Hofmeier VP Sales Terracotta DACH / MdGL MUK-IT 63. Roundtable Herzlich Willkommen bei der Software AG Anton Hofmeier VP Sales Terracotta DACH / MdGL Überblick February 15, 2013 2 Software AG www.softwareag.com 5.500 Mitarbeiter >1Mrd Umsatz

More information

Bei Fragen zu dieser Änderung wenden Sie sich bitte an Ihren Kundenbetreuer, der Ihnen gerne weiterhilft.

Bei Fragen zu dieser Änderung wenden Sie sich bitte an Ihren Kundenbetreuer, der Ihnen gerne weiterhilft. FIL Investment Management (Luxembourg) S.A. 2a rue Albert Borschette, L-1246 B.P. 2174, L-1021 Luxembourg Tél: +352 250 404 1 Fax: +352 26 38 39 38 R.C.S. Luxembourg B 88635 Dezember 2014 Wichtige Ankündigung:

More information

Microsoft Azure. Die "Hyper-Scale" Cloudplattform. Gerwald Oberleitner 22. September 2015

Microsoft Azure. Die Hyper-Scale Cloudplattform. Gerwald Oberleitner 22. September 2015 Microsoft Azure Die "Hyper-Scale" Cloudplattform Gerwald Oberleitner 22. September 2015 Wie sich Microsoft Hyper-scale Azure differenziert Enterprise Grade Hybrid Azure footprint Azure footprint Datacenter

More information

Varieties of specification and underspecification: A view from semantics

Varieties of specification and underspecification: A view from semantics Varieties of specification and underspecification: A view from semantics Torgrim Solstad D1/B4 SFB meeting on long-term goals June 29th, 2009 The technique of underspecification I Presupposed: in semantics,

More information

Thomas Ragni (Seco, CH): SAPS for choosing effective measures in Switzerland SAPS. Statistically Assisted Program Selection

Thomas Ragni (Seco, CH): SAPS for choosing effective measures in Switzerland SAPS. Statistically Assisted Program Selection Thomas Ragni (Seco, CH): SAPS for choosing effective measures in Switzerland Slide 1 SAPS Statistically Assisted Program Selection A Targeting System of Swiss Active Labor Market Policies (ALMPs) Slide

More information

Big Data for Social Good. Nuria Oliver, PhD Scientific Director User, Data and Media Intelligence Telefonica Research

Big Data for Social Good. Nuria Oliver, PhD Scientific Director User, Data and Media Intelligence Telefonica Research Big Data for Social Good Nuria Oliver, PhD Scientific Director User, Data and Media Intelligence Telefonica Research 6.8 billion subscriptions 96% of world s population (ITU) Mobile penetration of 120%

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

Is Privacy A Cloud Illusion? Five Hidden Facts You Need to Know

Is Privacy A Cloud Illusion? Five Hidden Facts You Need to Know Is Privacy A Cloud Illusion? Five Hidden Facts You Need to Know 2014 StoAmigo. The information contained within these marketing materials is strictly for illustrative purposes, and the figures herein are

More information

Network and device forensic analysis of Android social- messaging applica=ons

Network and device forensic analysis of Android social- messaging applica=ons Network and device forensic analysis of Android social- messaging applica=ons Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Brei=nger Graduate Research Assistant, UNHcFREG Member

More information

Adaptive Business Intelligence

Adaptive Business Intelligence Adaptive Business Intelligence Bearbeitet von Zbigniew Michalewicz, Martin Schmidt, Matthew Michalewicz, Constantin Chiriac 1. Auflage 2006. Buch. xiii, 246 S. Hardcover ISBN 978 3 540 32928 2 Format (B

More information

Enterprise Mobility Changing the way of doing business

Enterprise Mobility Changing the way of doing business Enterprise Mobility Changing the way of doing business Wolfgang Kuzel Business Development Manager Tieto Austria Gmbh E-mail: wolfgang.kuzel@tieto.com 2013 Tieto Corporation We already have mobile solutions

More information

Formal Methods and the Internet of Things

Formal Methods and the Internet of Things Formal Methods and the Internet of Things Definition of an Internet-of-Things-Platform and its reference implementation in conjunction with an exemplary usage of Formal Methods. Bachelor thesis Heinrich

More information

Exemplar for Internal Assessment Resource German Level 1. Resource title: Planning a School Exchange

Exemplar for Internal Assessment Resource German Level 1. Resource title: Planning a School Exchange Exemplar for internal assessment resource German 1.5A for Achievement Standard 90887! Exemplar for Internal Assessment Resource German Level 1 Resource title: Planning a School Exchange This exemplar supports

More information

Embedded Software Development and Test in 2011 using a mini- HIL approach

Embedded Software Development and Test in 2011 using a mini- HIL approach Primoz Alic, isystem, Slovenia Erol Simsek, isystem, Munich Embedded Software Development and Test in 2011 using a mini- HIL approach Kurzfassung Dieser Artikel beschreibt den grundsätzlichen Aufbau des

More information

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents

The Digital Divide: How the Online Behavior of Teens is Getting Past Parents June 2012 The Digital Divide: How the Online Behavior of Teens is Getting Past Parents Parent Disconnect Despite the obvious disconnect between teens online behaviors and parents knowledge of them, parents

More information

Thinking Cloud Services Look Before You Leap

Thinking Cloud Services Look Before You Leap Thinking Cloud Services Look Before You Leap Brian V. Cummings brian.cummings@tcs.com Tata Consultancy Services Friday, March 16, 2012 Session 10358 Preamble Cloud security literature consistently boils

More information

Product Availability List Graphic Arts Film Products. September 2007 (version 3.0)

Product Availability List Graphic Arts Film Products. September 2007 (version 3.0) Product Availability List Graphic Arts Film Products September 2007 (version 3.0) Krauchthal, September 2007 Dear business partner, As usual at this time of the year our film availability list has been

More information

TRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED GIS

TRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED GIS Illustration: alengo/getty Images TRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED GIS Smart Cities PRIVACY SECURITY TRANSPORTATION - SENSORS - AND THE SMART CITY GEOG 491/591 ADVANCED

More information

IoT - Wie die Flut an Daten nutzbar wird

IoT - Wie die Flut an Daten nutzbar wird IoT - Wie die Flut an Daten nutzbar wird Maik Jordt Sales Director, DACH November 2014 IoT eine Standortbestimmung Maik Jordt, MapR Technologies 2 Was ist IoT? Das Internet der Dinge (auch englisch Internet

More information

A. Arguments are made up of statements, which can be either true or false. Which of the following are statements?

A. Arguments are made up of statements, which can be either true or false. Which of the following are statements? Critical Thinking University of St Andrews March 2007 Bullet point material is not on the students copies. Feel free to use the material as you see fit, depending on timing, ability, enthusiasm etc. Good

More information

Great Books: Tales of Edgar Allan Poe Teacher s Guide

Great Books: Tales of Edgar Allan Poe Teacher s Guide Teacher s Guide Grade Level: 9-12 Curriculum Focus: Literature Lesson Duration: 1 2 class periods Program Description Explore the psychology of terror in some of Poe s most-haunting tales. Interwoven through

More information

DATA is just like CRUDE. It s valuable, but if unrefined it cannot really be used.

DATA is just like CRUDE. It s valuable, but if unrefined it cannot really be used. Data is the new Oil DATA is just like CRUDE. It s valuable, but if unrefined it cannot really be used. Clive Humby "Digitale Informationsspeicher Im Meer der Daten" "Die Menschen produzieren immer mehr

More information

Quantified Self: Analyzing the Big Data of our Daily Life. Andreas Schreiber <Andreas.Schreiber@dlr.de> PyData Berlin 2014

Quantified Self: Analyzing the Big Data of our Daily Life. Andreas Schreiber <Andreas.Schreiber@dlr.de> PyData Berlin 2014 DLR.de Chart 1 Quantified Self: Analyzing the Big Data of our Daily Life Andreas Schreiber PyData Berlin 2014 DLR.de Chart 2 Introduction Scientist, Head of department Co-Founder,

More information

Can we save our online freedom?

Can we save our online freedom? Can we save our online freedom? Jaap-Henk Hoepman TNO, Groningen, the Netherlands jaap-henk.hoepman@tno.nl Digital Security (DS) Radboud University Nijmegen, the Netherlands jhh@cs.ru.nl / www.cs.ru.nl/~jhh

More information

language-related erp components: n400

language-related erp components: n400 language-related erp components: n400 Based on Luck & Kappenmann (2012) and Kutas & Federmeier (2011) Alina Karakanta, Max Paulus 19.11.2015, Supervisor: Sahri Morbey Saarland University Kutas & Hillyard

More information

strategies and actions for flood emergency risk management Projektkoordinatorin Anne Kolega Regierungspräsidium Stuttgart Contents of this presentation Background of the project Dates, costs and grant

More information

Machine Learning for natural language processing

Machine Learning for natural language processing Machine Learning for natural language processing Introduction Laura Kallmeyer Heinrich-Heine-Universität Düsseldorf Summer 2016 1 / 13 Introduction Goal of machine learning: Automatically learn how to

More information

MUSTER. ENGLISH G 21/D3 Test No. 1 Unit 1: My London. 1 LISTENING The London Eye. G - Level: Listen to three texts and tick the correct box.

MUSTER. ENGLISH G 21/D3 Test No. 1 Unit 1: My London. 1 LISTENING The London Eye. G - Level: Listen to three texts and tick the correct box. Name: Date: 1 LISTENING The London Eye G - Level: Listen to three texts and tick the correct box. Right Wrong 1 can buy tickets for the London Eye at the ticket office. 2 The ticket office opens at 10.00

More information

How to Use the California Identity Theft Registry

How to Use the California Identity Theft Registry How to Use the California Identity Theft Registry A Guide for Victims of Criminal Identity Theft Tips for Consumers Consumer Information Sheet 8 June 2014 What Is Criminal Identity Theft?...1 How You May

More information

Welcome! What We Do At IntelliSystems, our goal is to get Information Technology and telecommunications management out of your way so that you can focus on your business. Historical PC Business Network

More information

Identity Theft and Data Management Public Records Are Not the Problem

Identity Theft and Data Management Public Records Are Not the Problem Identity Theft and Data Management Public Records Are Not the Problem Richard J. H. Varn Coalition for Sensible Public Records Access (CSPRA) 1 Overview of Key Points Un-validated, single factor authentication

More information

Uncover security risks on your enterprise network

Uncover security risks on your enterprise network Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up

More information

Mobile Cloud Computing In Business

Mobile Cloud Computing In Business Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud

More information

info@healthcarefuturists.com

info@healthcarefuturists.com Big Data in Health-Care als Innovationstreiber Von in-vitro-diagnostik zu in-algorithmo-diagnostik Dr. med. Tobias D. Gantner, MBA, LL. M. HealthCare Futurists GmbH 09.12.2015 1 Berlin, 9.12.2015 Big Data

More information

SOOKASA WHITEPAPER CASB SECURITY OVERVIEW. www.sookasa.com

SOOKASA WHITEPAPER CASB SECURITY OVERVIEW. www.sookasa.com SOOKASA WHITEPAPER CASB SECURITY OVERVIEW www.sookasa.com Sookasa Overview Nearly 90 percent of enterprises currently use the public cloud, and by 2020, practically every business across the country is

More information

Whereas I was Blind, Now I See. John 9: 1-11; 25

Whereas I was Blind, Now I See. John 9: 1-11; 25 Whereas I was Blind, Now I See John 9: 1-11; 25 We all know that great hymn well: Amazing grace, how sweet the sound, that saved a wretch like me; I once was lost, but now I m found; was blind, but now

More information

Home Invasion Safety. Protecting Your Family

Home Invasion Safety. Protecting Your Family Home Invasion Safety Protecting Your Family Point of Entry and Confrontation A home invasion is when robbers force their way into an occupied home, apartment or hotel room to commit a robbery or other

More information

BMC DB2 Entwicklungsstrategie, Performance Advisor und mehr! Peter Plevka, BMC Software

BMC DB2 Entwicklungsstrategie, Performance Advisor und mehr! Peter Plevka, BMC Software BMC DB2 Entwicklungsstrategie, Performance Advisor und mehr! Peter Plevka, BMC Software Agenda BMC DB2 Entwicklungsstrategie Performance Advisor Update Copyright 5/17/2010 BMC Software, Inc 2 General Development

More information

Post-Traumatic Stress Disorder

Post-Traumatic Stress Disorder Post-Traumatic Stress Disorder It s natural to be afraid when you re in danger. It s natural to be upset when something bad happens to you or someone you know. But if you feel afraid and upset weeks or

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo

Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight

More information

Programmieren von Schnittstellen für LiveCycle ES2-Modulen (November 2009)

Programmieren von Schnittstellen für LiveCycle ES2-Modulen (November 2009) Programmieren von Schnittstellen für LiveCycle ES2-Modulen (November 2009) In diesem Dokument werden die Programmierschnittstellen aufgeführt, mit deren Hilfe Entwickler Anwendungen unter Verwendung von

More information

DAS ALSO MICROSOFT ONLINE MEETING «NUTSHELL» September 2015 startet um 13.30 Uhr. Wir lizenzieren Microsoft -Software

DAS ALSO MICROSOFT ONLINE MEETING «NUTSHELL» September 2015 startet um 13.30 Uhr. Wir lizenzieren Microsoft -Software DAS ALSO MICROSOFT ONLINE MEETING «NUTSHELL» September 2015 startet um 13.30 Uhr Wir lizenzieren Microsoft -Software DAS ALSO MICROSOFT ONLINE MEETING SEPTEMBER 2015 Wir verkaufen nur Original-Microsoft

More information

The Basics of Building Credit

The Basics of Building Credit The Basics of Building Credit This program was developed to help middle school students learn the basics of building credit. At the end of this lesson, you should know about all of the Key Topics below:»

More information

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns

Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns Selecting a Law Firm Cloud Provider: Questions to Ask and Ethical/Security Concerns by Sharon D. Nelson, Esq. and John W. Simek 2013 Sensei Enterprises, Inc. It seems like everybody is talking about the

More information

From Epistemology to Praxis in Translator Education: A Moodle-Based Project. Don Kiraly University of Mainz

From Epistemology to Praxis in Translator Education: A Moodle-Based Project. Don Kiraly University of Mainz From Epistemology to Praxis in Translator Education: A Moodle-Based Project Don Kiraly University of Mainz A place for learning? The Schoolmaster (A. van Ostade 1662) A better place for learning? (Somewhere

More information

The 20/20 Club Training Manual

The 20/20 Club Training Manual The 20/20 Club Training Manual The purpose of this manual is to help each 20 Club Member in Profit Leads to build their business. Below I will go over how to contact Business Opportunity Seekers and Network

More information

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements

Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Deduplication as security issue in cloud services, and its representation in Terms of Service Agreements Cecilia Wirfelt Louise Wallin Email: {cecwi155, louwa538}@student.liu.se Supervisor: Jan-Åke Larsson,

More information

Digital Citizenship Lesson Plan

Digital Citizenship Lesson Plan Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

More information

FACTS & FIGURES AUGUST 2013

FACTS & FIGURES AUGUST 2013 AUGUST 2013 WHAT THE MARKET SAYS ABOUT AUGMENTED REALITY 1. INTRODUCTION At Layar we measure everything that we do and our customers can measure everything that they do. We use these insights to continuously

More information

RUNNING HEAD: Drunk Driving Harrawood 1

RUNNING HEAD: Drunk Driving Harrawood 1 RUNNING HEAD: Drunk Driving Harrawood 1 Community Problem Report on Drunk Driving in El Paso Erika Harrawood ENGL 1311 Drunk Driving Harrawood 2 Community Problem Report It is said that El Paso is one

More information

Is it really all going into the Cloud? Dr Geoff Barrall CEO Connected Data

Is it really all going into the Cloud? Dr Geoff Barrall CEO Connected Data Is it really all going into the Cloud? Dr Geoff Barrall CEO Connected Data Heard on Sand Hill Road It s all going into the cloud in the next two years Enterprises don t want to manage their own storage

More information

For those of you keen to have a written version on the podcast, here is the script below:

For those of you keen to have a written version on the podcast, here is the script below: German Language Guide Script For those of you keen to have a written version on the podcast, here is the script below: Anna: Vorsicht! Scott: Oh sorry! Do you speak English it s kinda squashed in here,

More information

Chapter 1 Introduction to Correlation

Chapter 1 Introduction to Correlation Chapter 1 Introduction to Correlation Suppose that you woke up one morning and discovered that you had been given the gift of being able to predict the future. Suddenly, you found yourself able to predict,

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Know your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions?

Know your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions? Know your rights What rights do I have as a non-immigrant, F-1/J-1 visa holder? Whether or not you re a citizen, you have rights under the United States Constitution. The Fifth Amendment gives every person

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved. Customer Presentation

Copyright 2013, Oracle and/or its affiliates. All rights reserved. Customer Presentation 1 SAM, NFS und SMB Dirk Nitschke Principal Sales Consultant SAM-QFS 5.3.2 / 5.3.9 Unterstützung neuer Geräte LTO-5, LTO-6, T10000-C, SL150, ACSLS 8 Unterstützung neuer Betriebssystemversionen Solaris 11,

More information

Wir stellen uns vor We introduce ourselves

Wir stellen uns vor We introduce ourselves Wir stellen uns vor We introduce ourselves Wir bieten Ihnen ein umfassendes Spektrum an Dienstleistungen in der Nukleartechnik. Dabei setzen wir unsere langjфhrige Erfahrung und unser umfassendes Know-how

More information

The Five W's of SOC Operations. Kevin Young, @IT3700

The Five W's of SOC Operations. Kevin Young, @IT3700 The Five W's of SOC Operations Kevin Young, @IT3700 Thank you Todd Thanks to Randall Munroe https://xkcd.com/838/ Overview Introduction Five W s of SOC Operations When do I need a SOC? Readiness What exactly

More information

Pavlo Baron. Big Data and CDN

Pavlo Baron. Big Data and CDN Pavlo Baron Big Data and CDN Pavlo Baron www.pbit.org pb@pbit.org @pavlobaron What is Big Data Big Data describes datasets that grow so large that they become awkward to work with using on-hand database

More information

Green Building Water Technology: Use of Renewable Water Resources in Multi-Storey Buildings

Green Building Water Technology: Use of Renewable Water Resources in Multi-Storey Buildings Green Building Water Technology: Use of Renewable Water Resources in Multi-Storey Buildings Speaker: Erwin Nolde, Berlin email: mail@nolde-partner.de Wasserforum für f r die EMA-Region 11. und 12. März

More information

Statistical Methods for Network and Computer Security p.1/43

Statistical Methods for Network and Computer Security p.1/43 Statistical Methods for Network and Computer Security David J. Marchette marchettedj@nswc.navy.mil Naval Surface Warfare Center Code B10 Statistical Methods for Network and Computer Security p.1/43 A Few

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

Coffee Break German. Lesson 03. Study Notes. Coffee Break German: Lesson 03 - Notes page 1 of 15

Coffee Break German. Lesson 03. Study Notes. Coffee Break German: Lesson 03 - Notes page 1 of 15 Coffee Break German Lesson 03 Study Notes Coffee Break German: Lesson 03 - Notes page 1 of 15 LESSON NOTES ICH KOMME AUS DEUTSCHLAND. UND SIE? In this lesson of Coffee Break German we will learn to talk

More information

Sermon Promise in Unexpected Places Genesis 39:1-23, September 21, 2014

Sermon Promise in Unexpected Places Genesis 39:1-23, September 21, 2014 1 How many of you have your Be a Blessing stones with you from last week? For those of you who weren t here, these stones are to remind us of the promise that God made to Abraham when he was called to

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

Hitachi inverter user manual

Hitachi inverter user manual Hitachi inverter user manual Epson px700w printer manual.honda nc700x service manual.45381801086 - Hitachi inverter user manual.manual for epson stylus nx430.der Tag der ersten erlaubten Г ffentlichen

More information

Irvine Police Victim Advocate s Office 949-724-7274

Irvine Police Victim Advocate s Office 949-724-7274 Irvine Police Victim Advocate s Office 9497247274 View this Resource Guide online at www.cityofirvine.org/pd/info_center/victim_service.asp 1 Irvine Police Victim Advocate s Office 9497247274 1 Irvine

More information

FOR TEACHERS ONLY SECOND LANGUAGE PROFICIENCY EXAMINATION GERMAN. Monday, June 18, 2001 9:15 a.m. SCORING KEY

FOR TEACHERS ONLY SECOND LANGUAGE PROFICIENCY EXAMINATION GERMAN. Monday, June 18, 2001 9:15 a.m. SCORING KEY FOR TEACHERS ONLY SECOND LANGUAGE PROFICIENCY EXAMINATION GERMAN Monday, June 18, 2001 9:15 a.m. SCORING KEY Mechanics of Rating Use only red ink or red pencil in rating proficiency examination papers.

More information

Elena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna)

Elena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna) Elena Chiocchetti & Natascia Ralli (EURAC) Tanja Wissik & Vesna Lušicky (University of Vienna) VII Conference on Legal Translation, Court Interpreting and Comparative Legilinguistics Poznań, 28-30.06.2013

More information

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts)

Enhancing Cloud Security By: Gotcha (Generating Panoptic Turing Tests to Tell Computers and Human Aparts) International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 8 (2014), pp. 837-841 International Research Publication House http://www.irphouse.com Enhancing Cloud Security

More information