A hint of existing information systems analysis

Size: px
Start display at page:

Download "A hint of existing information systems analysis"

Transcription

1 systems analysis 2nd year PhD Student at Co-Founder of Master SCCI 10th Birthday, 12th September 2011

2 1A + 2A Engineering studies 3A Master SCCI Doctorate in virology Startup company in IS reengineering Existing

3 One particular interest for existing systems analysis : Handling complex, very informative, human-related systems No documentation From a practical point of view, standard methods & tools do not suce. Two activities: Fundamental research in computer virology Co-founding of a startup company,, specialized in system reengineering.

4

5 INRIA Nancy - Grand Est, Team CARTE A study of the ambiguous nature of software (particularly malware), because of: Implementation language (assembler x86) Mass, execution context dependency Self-modication/self-organization (capability of a program to modify/reorganize itself at execution) Programming tricks (security aw exploits, deep system features, designer experience). Ideally, we want to recover from binary les (e.g. compiled programs) a control ow graph (also called owchart) upon which we base malware detection.

6 Basic rules The player moves foward and collects objects. The only possible solution (execution trace): Rule #1 Control flow graph 0

7 Doors Two possible solutions: Door: when the player has the key, he must pass the door. Otherwise, he goes in the opposite direction. Door direct branching Rule #2 Control flow graph 0 With key Without key

8 More sophisticated rules? Teleporter: the player moves to a cell depending on the objects he has collected. Teleporter indirect branching Rule #3 Control flow graph 0... L Rule #4 Trap: makes some walls move, depending on the objects he has collected Trap self-modification......

9 Managing what is unexpected Rule #0 What if objects were appearing/disappearing through time?

10

11 Emerging startup company founded by Patrice (20 years engineering & reengineering experience) and in Nancy. Laureate of Entreprendre 2011 in emergence category. uses internal software/document reengineering and applied software engineering methodologies to provide an enlightenment to its client. Personal contribution: R&D management. KW: High Tech - Professionalism - Performance Comprendre pour mieux construire

12 Materials What kind of system? Hardware, software, human resources, industrial process Any organized set which regroup, classify, compute and broadcast on a given environment. What tools? An ontological schema: a schema that classies and gives semantics to by the mean of objects and relations between objects (implemented in Workshop). Automatic shape recognition (implemented as a module of Workshop). Research-oriented languages (Lisp, Prolog, OCaml, F#), compiler compilers, nite state automata.

13 Ontological schema: example

14 (in French)

15 To conclude One passion, two activities. Cryptography & reengineering: dierent goals but same spirit (reengineering system cryptanalysis). Master SCCI: excellent culture of scientic research, system administration and security business.

16 Questions Thank you for your attention. Questions? Contact:

Master Specialization in Knowledge Engineering

Master Specialization in Knowledge Engineering Master Specialization in Knowledge Engineering Pavel Kordík, Ph.D. Department of Computer Science Faculty of Information Technology Czech Technical University in Prague Prague, Czech Republic http://www.fit.cvut.cz/en

More information

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected

South East of Process Main Building / 1F. North East of Process Main Building / 1F. At 14:05 April 16, 2011. Sample not collected At 14:05 April 16, 2011 At 13:55 April 16, 2011 At 14:20 April 16, 2011 ND ND 3.6E-01 ND ND 3.6E-01 1.3E-01 9.1E-02 5.0E-01 ND 3.7E-02 4.5E-01 ND ND 2.2E-02 ND 3.3E-02 4.5E-01 At 11:37 April 17, 2011 At

More information

Software Architecture

Software Architecture Cairo University Faculty of Computers and Information Computer Science Department Premasters Studies Software Architecture Report on Software Product Line Submitted to: Dr. Hany Ammar Submitted by: Hadeel

More information

MULTI-AGENT SYSTEM FOR DECENTRALIZED COMPUTER NETWORK MANAGEMENT Krzysztof Cetnarowicz Jaros law Kozlak Institute of Computer Science, AGH - University of Mining and Metallurgy Al. Mickiewicza 30, 30-059

More information

MAQAO Performance Analysis and Optimization Tool

MAQAO Performance Analysis and Optimization Tool MAQAO Performance Analysis and Optimization Tool Andres S. CHARIF-RUBIAL [email protected] Performance Evaluation Team, University of Versailles S-Q-Y http://www.maqao.org VI-HPS 18 th Grenoble 18/22

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

CS 6371: Advanced Programming Languages

CS 6371: Advanced Programming Languages CS 6371: Advanced Programming Languages Dr. Kevin Hamlen Spring 2014 Fill out, sign, and return prereq forms: Course number: CS 6371 Section: 1 Prerequisites: CS 5343: Algorithm Analysis & Data Structures

More information

3 SOFTWARE AND PROGRAMMING LANGUAGES

3 SOFTWARE AND PROGRAMMING LANGUAGES 3 SOFTWARE AND PROGRAMMING LANGUAGES 3.1 INTRODUCTION In the previous lesson we discussed about the different parts and configurations of computer. It has been mentioned that programs or instructions have

More information

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University

Analysis of Data Mining Concepts in Higher Education with Needs to Najran University 590 Analysis of Data Mining Concepts in Higher Education with Needs to Najran University Mohamed Hussain Tawarish 1, Farooqui Waseemuddin 2 Department of Computer Science, Najran Community College. Najran

More information

Bachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.

Bachelor of Technology (Computer Engineering.) Scheme of Courses/Examination. (3 rd SEMESTER) 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2. Bachelor of Technology (Computer Engineering.) Scheme of s/examination Sl. (3 rd SEMESTER) Teaching Schedule Examination Schedule 1 HUT-211 Organizational Behaviour 2 1-3 60 40-100 3 2.5 2 COT-201 Programming

More information

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France

Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Minor in ii INFORMATION SECURITY i at ESIEA Laval, France Program Strengths Provides a thorough overview of information and network security, from secure programming to risk management within a company.

More information

The Eighth International Conference INCOSE_IL 2015. Formal Methods Security Tools in the Service of Cyber Security

The Eighth International Conference INCOSE_IL 2015. Formal Methods Security Tools in the Service of Cyber Security The Eighth International Conference INCOSE_IL 2015 כלים ובדיקות Formal Methods Security Tools in the Service of Cyber Security Dr. Michael J. May Kinneret College on the Sea of Galilee 1 כלים ובדיקות /

More information

B) Using Processor-Cache Affinity Information in Shared Memory Multiprocessor Scheduling

B) Using Processor-Cache Affinity Information in Shared Memory Multiprocessor Scheduling A) Recovery Management in Quicksilver 1) What role does the Transaction manager play in the recovery management? It manages commit coordination by communicating with servers at its own node and with transaction

More information

The CompCert verified C compiler

The CompCert verified C compiler The CompCert verified C compiler Compiler built and proved by Xavier Leroy et al. Talk given by David Pichardie - Harvard University / INRIA Rennes Slides largely inspired by Xavier Leroy own material

More information

THE TRANSITION GAME "WHAT IT IS AND HOW TO TEACH IT" PRESENTED BY TIM TAYLOR FOR MASS. DISTRICT USA HOCKEY COACHES CLINIC

THE TRANSITION GAME WHAT IT IS AND HOW TO TEACH IT PRESENTED BY TIM TAYLOR FOR MASS. DISTRICT USA HOCKEY COACHES CLINIC THE TRANSITION GAME "WHAT IT IS AND HOW TO TEACH IT" PRESENTED BY TIM TAYLOR FOR MASS. DISTRICT USA HOCKEY COACHES CLINIC The Transition Game - What Is It And Row To Teach It. The Dictionary definition:

More information

Programming Languages

Programming Languages Programming Languages Programming languages bridge the gap between people and machines; for that matter, they also bridge the gap among people who would like to share algorithms in a way that immediately

More information

Evaluation of speech technologies

Evaluation of speech technologies CLARA Training course on evaluation of Human Language Technologies Evaluations and Language resources Distribution Agency November 27, 2012 Evaluation of speaker identification Speech technologies Outline

More information

Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics

Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics Progress Report to ONR on MURI Project Building Interactive Formal Digital Libraries of Algorithmic Mathematics Robert L. Constable Cornell University February 2003 Project Web Page http://www.cs.cornell.edu/info/projects/nuprl/html/digital

More information

Customer Service. Training Manual Corporate Training Materials

Customer Service. Training Manual Corporate Training Materials Customer Service Training Manual Corporate Training Materials TABLE OF CONTENTS Module One: Getting Started...4 Pre-Assignment Review... 4 Workshop Objectives... 5 Module Two: Who We Are and What We Do...6

More information

Start up licenses high performance traffic analysis engine from Exploit Technologies

Start up licenses high performance traffic analysis engine from Exploit Technologies MEDIA RELEASE FOR IMMEDIATE RELEASE Singapore, 10 February 2010 Total: 6 pages (including notes to editor) Start up licenses high performance traffic analysis engine from Exploit Technologies Singapore,

More information

Developing SAP Enterprise Cloud Computing Strategy

Developing SAP Enterprise Cloud Computing Strategy White Paper WFT Cloud Technology SAP Cloud Integration Service Provider Developing SAP Enterprise Cloud Computing Strategy SAP Cloud Computing is a significant IT paradigm change with the potential to

More information

Department of Commerce National Institute of Standards and Technology (NIST)

Department of Commerce National Institute of Standards and Technology (NIST) Department of Commerce National Institute of Standards and Technology (NIST) Response to Request for Information on Quantum Information Science and the Needs of U.S. Industry Posted Date: April 8, 2015

More information

Tech Presentation 2016

Tech Presentation 2016 Tech Presentation 2016 Our Management Team Marvin Igelman CEO Alex Zivkovic CTO David Berman CFO Matt Burns PM and Growth BreakingSports is the world s first fully automated real-time alerts platform for

More information

The Enterprise Semantic Reference Framework

The Enterprise Semantic Reference Framework The Enterprise Semantic Reference Framework Simon Polovina Conceptual Structures Research Group Communication and Computing Research Centre Cultural Communication and Computing Research Institute (C3RI)

More information

2933A: Developing Business Process and Integration Solutions Using Microsoft BizTalk Server 2006

2933A: Developing Business Process and Integration Solutions Using Microsoft BizTalk Server 2006 www.peaksolutions.com 2933A: Developing Business Process and Integration Solutions Using Microsoft BizTalk Server 2006 Course 2933A: Five days; Instructor-Led Introduction This five-day instructor-led

More information

App: HomeBound 1.1 (https://play.google.com/store/apps/developer?id=zebu+games) Device: Samsung GT-S5302 Android 2.3.6

App: HomeBound 1.1 (https://play.google.com/store/apps/developer?id=zebu+games) Device: Samsung GT-S5302 Android 2.3.6 Contest 12 Task Pick any three mnemonics from http://www.qualityperspectives.ca/resources_mnemonics.html and find at least three bugs for each mnemonic. Feel free to use any application (website/desktop/mobile)

More information

Certificate in Cyber Security

Certificate in Cyber Security Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff

More information

Certification Programs

Certification Programs Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 [email protected] (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the

More information

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE

UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE UNDERGRADUATE DEGREE PROGRAMME IN COMPUTER SCIENCE ENGINEERING SCHOOL OF COMPUTER SCIENCE ENGINEERING, ALBACETE SCHOOL OF COMPUTER SCIENCE, CIUDAD REAL Core Subjects (CS) Compulsory Subjects (CPS) Optional

More information

SIPAC. Signals and Data Identification, Processing, Analysis, and Classification

SIPAC. Signals and Data Identification, Processing, Analysis, and Classification SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is

More information

Guidelines on Allowable Project Costs

Guidelines on Allowable Project Costs Guidelines on Allowable Project Costs 2013/2014 LIST OF CONTENTS 1. INTRODUCTION 3 2. BUDGET CATEGORIES 5 2.1 HUMAN RESOURCES 5 2.2 RUNNING COSTS (DIRECT COSTS) 7 2.3 OVERHEADS (INDIRECT COSTS) 8 2.4 CAPEX

More information

MS in Computer Sciences MS in Software Engineering

MS in Computer Sciences MS in Software Engineering SUKKUR INSTITUTE OF BUSINESS ADMINISTRATION Merit-Quality-Excellence Schema of Studies for MS in Computer Sciences MS in Software Engineering (2013-2014) DEPARTMENT OF COMPUTER SCIENCE FACULTY OF SCIENCE

More information

Mission Statement. Program Overview. PhD Program in Microbiology & Immunology (MIM)

Mission Statement. Program Overview. PhD Program in Microbiology & Immunology (MIM) PhD Program in Microbiology & Immunology (MIM) Mission Statement The aim of the PhD program in Microbiology and Immunology (MIM) is to recruit and train future leaders in different fields of Microbiology

More information

Cold Calling College A Four-Part Teleclass

Cold Calling College A Four-Part Teleclass Cold Calling College A Four-Part Teleclass Part I: Why Your Customer Needs You Presented by Wendy Weiss The Queen of Cold Calling http://www.wendyweiss.com For information (212) 463-8212 [email protected]

More information

DOCTORAL WORKSHOP PHD ON THE GO. «Study and Analysis of the olive oil process: Quality and Traceability»

DOCTORAL WORKSHOP PHD ON THE GO. «Study and Analysis of the olive oil process: Quality and Traceability» DOCTORAL WORKSHOP PHD ON THE GO «Study and Analysis of the olive oil process: Quality and Traceability» RESEARCH FIELD: The Food Sector is more and more competitive and the food companies have to qualify

More information

Major Work of the Grade

Major Work of the Grade Counting and Cardinality Know number names and the count sequence. Count to tell the number of objects. Compare numbers. Kindergarten Describe and compare measurable attributes. Classify objects and count

More information

B2B Social Media Marketing Social s Means Business

B2B Social Media Marketing Social s Means Business B2B Social Media Marketing Social s Means Business Elissa Kline May 2011 1 Social media is changing the way companies interact with customers Why Does Social Media fit With B2B Companies? Key Trends: Social

More information

Spreadsheet Programming:

Spreadsheet Programming: Spreadsheet Programming: The New Paradigm in Rapid Application Development Contact: [email protected] www.knowledgedynamics.com Spreadsheet Programming: The New Paradigm in Rapid Application Development

More information

Senior Information Technology Systems Analyst

Senior Information Technology Systems Analyst Career Service Authority Senior Information Technology Systems Analyst Page 1 of 6 GENERAL STATEMENT OF CLASS DUTIES Performs full performance level professional work analyzing, refining and documenting

More information

The Agency for Public Intangibles of France accompanies public sector actors in developing value from intangibles

The Agency for Public Intangibles of France accompanies public sector actors in developing value from intangibles The Agency for Public Intangibles of France accompanies public sector actors in developing value from intangibles Public Intangibles and the Role of APIE Public intangibles cover a broad spectrum of assets,

More information

"BIG DATA A PROLIFIC USE OF INFORMATION"

BIG DATA A PROLIFIC USE OF INFORMATION Ojulari Moshood Cameron University - IT4444 Capstone 2013 "BIG DATA A PROLIFIC USE OF INFORMATION" Abstract: The idea of big data is to better use the information generated by individual to remake and

More information

Implementing a Microsoft SQL Server 2005 Database

Implementing a Microsoft SQL Server 2005 Database This class combines two courses into one 5-day class. 2779 (3-day) & 2780 (2-day) Implementing a Microsoft SQL Server 2005 Database Course 2779: Three days; Instructor-Led Introduction This three-day instructor-led

More information

Department of Information Systems and Cyber Security

Department of Information Systems and Cyber Security The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

More information

WorkJam Media Kit. Company Overview: Executive Bios

WorkJam Media Kit. Company Overview: Executive Bios WorkJam Media Kit Company Overview: WorkJam is a web and mobile app that runs either stand-alone or integrated with existing workforce management systems to enable better communication with associates,

More information

An Automated Workflow System Geared Towards Consumer Goods and Services Companies

An Automated Workflow System Geared Towards Consumer Goods and Services Companies Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 An Automated Workflow System Geared Towards Consumer Goods and Services

More information

Module: Software Instruction Scheduling Part I

Module: Software Instruction Scheduling Part I Module: Software Instruction Scheduling Part I Sudhakar Yalamanchili, Georgia Institute of Technology Reading for this Module Loop Unrolling and Instruction Scheduling Section 2.2 Dependence Analysis Section

More information

Media for Equity: the newest VC concept from Europe. Elena Bocharova for Berliner Börsenkreis 30 June, 2015

Media for Equity: the newest VC concept from Europe. Elena Bocharova for Berliner Börsenkreis 30 June, 2015 Media for Equity: the newest VC concept from Europe Elena Bocharova for Berliner Börsenkreis 30 June, 2015 Outline: get excited How do you finance a company? A brief overview Media for Equity: what do

More information

Pacman 3D. Suggestions Multiple levels Powerups that let Pacman chase and eat Ghosts; ghosts need to respawn

Pacman 3D. Suggestions Multiple levels Powerups that let Pacman chase and eat Ghosts; ghosts need to respawn Mario 3D Mario is a classic game featuring a side scrolling 2D Mario character that can jump to avoid moving enemies and collect coins. In this 3D version, you will program a Mario like character to respond

More information

Management School. MSc/PG Dip/PG Cert. MSc Business and Management. University of Stirling Management School

Management School. MSc/PG Dip/PG Cert. MSc Business and Management. University of Stirling Management School Management School MSc/PG Dip/PG Cert MSc Business and Management University of Stirling Management School I am passionate about helping our students to excel and achieve whatever they wish in their careers.

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

Curriculum Vitae. May 10, 1975 (Born in Alexandria, Egypt)

Curriculum Vitae. May 10, 1975 (Born in Alexandria, Egypt) Curriculum Vitae NAME: BIRTH DATE: ADDRESS: Islam Tharwat Elkabani May 10, 1975 (Born in Alexandria, Egypt) Beirut Arab University, Faculty of Science, Department of Mathematics and Computer Science, Beirut,

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many

More information

Cradlepoint unleashes LTE-A modems for enterprise networking, SD WANs

Cradlepoint unleashes LTE-A modems for enterprise networking, SD WANs IMPACT REPORT Cradlepoint unleashes LTE-A modems for enterprise networking, SD WANs APRIL 29 2016 BY JAMES DUFFY Cradlepoint unveiled a Category 6 LTE Advanced (LTE-A) modem for 4G cellular enterprise

More information

Ann-Charlotte TEGLBORG Department: Entrepreneurship and Innovation

Ann-Charlotte TEGLBORG Department: Entrepreneurship and Innovation Ann-Charlotte TEGLBORG Department: Entrepreneurship and Innovation Biography Ann-Charlotte TEGLBORG hold her Ph.D. in December 2010 at Paris I- Sorbonne (IAE). Her research interest focuses on democratization

More information

HYDRONIC DESIGNER / INSTALLER MODULE DESCRIPTIONS

HYDRONIC DESIGNER / INSTALLER MODULE DESCRIPTIONS HYDRONIC DESIGNER / INSTALLER MODULE DESCRIPTIONS PIP301: Blueprint Reading This module covers the basic skills required for interpreting information provided by drawings. These skills are essential in

More information

Design and Implementation of an Open Ended Automated Vault Security System

Design and Implementation of an Open Ended Automated Vault Security System Design and Implementation of an Open Ended Automated Vault Security System Saunak Mitra Sarit Hati Diganta Sengupta Indraneel Datta Pratim Sinha Roy Soumyanil Banerjee Future Institute of Engineering and

More information

White Paper. Data Mining for Business

White Paper. Data Mining for Business White Paper Data Mining for Business January 2010 Contents 1. INTRODUCTION... 3 2. WHY IS DATA MINING IMPORTANT?... 3 FUNDAMENTALS... 3 Example 1...3 Example 2...3 3. OPERATIONAL CONSIDERATIONS... 4 ORGANISATIONAL

More information

Common Criteria For Information Technology Security Evaluation

Common Criteria For Information Technology Security Evaluation Security Characterisation and Integrity Assurance for Software Components and Component-Based Systems Jun Han and Yuliang Zheng Peninsula School of Computing and Information Technology Monash University,

More information

Master of Science Service Oriented Architecture for Enterprise. Courses description

Master of Science Service Oriented Architecture for Enterprise. Courses description Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,

More information

Nemea: Searching for Botnet Footprints

Nemea: Searching for Botnet Footprints Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech

More information

Spécication et analyse formelle des politiques de sécurité dans le cloud computing

Spécication et analyse formelle des politiques de sécurité dans le cloud computing Spécication et analyse formelle des politiques de sécurité dans le cloud computing Asma GUESMI, Patrice CLEMENTE, Frédéric LOULERGUE, Pascal BERTHOMÉ Laboratoire d'informatique Fondamentale d'orléans (LIFO)

More information

Adversary Modelling 1

Adversary Modelling 1 Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway

More information

THE BEST HR SOLUTIONS FOR YOUR BUSINESS

THE BEST HR SOLUTIONS FOR YOUR BUSINESS THE BEST HR SOLUTIONS FOR YOUR BUSINESS WORK SERVICE The largest HR outsourcing company in Central and Eastern Europe Founded In 1999 in Poland Operates In more than 16 countries Present in the Russian

More information

Enterprise Software Development Services

Enterprise Software Development Services Introduction Business Software is moving from in-house to cloud based solution, where companies can focus on business and ignore IT overhead for managing their business software. MB9 is a pioneer in cloud

More information

Complexity problems over algebraic structures

Complexity problems over algebraic structures Complexity problems over algebraic structures Theses of PhD dissertation Created by: Horváth Gábor Mathematical Doctoral School Theor. Mathematical Doctoral Program Dir. of School: Dr. Laczkovich Miklós

More information

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Certifications and Standards in Academia Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute Accreditation What is it? Why is it important? How is it attained? The National Centers

More information

Efficient Program Exploration by Input Fuzzing

Efficient Program Exploration by Input Fuzzing Efficient Program Exploration by Input Fuzzing towards a new approach in malcious code detection Guillaume Bonfante Jean-Yves Marion Ta Thanh Dinh Université de Lorraine CNRS - INRIA Nancy First Botnet

More information

Compilers. Introduction to Compilers. Lecture 1. Spring term. Mick O Donnell: [email protected] Alfonso Ortega: alfonso.ortega@uam.

Compilers. Introduction to Compilers. Lecture 1. Spring term. Mick O Donnell: michael.odonnell@uam.es Alfonso Ortega: alfonso.ortega@uam. Compilers Spring term Mick O Donnell: [email protected] Alfonso Ortega: [email protected] Lecture 1 to Compilers 1 Topic 1: What is a Compiler? 3 What is a Compiler? A compiler is a computer

More information

Change Management. Why Change Management? CHAPTER

Change Management. Why Change Management? CHAPTER Change Management 19 CHAPTER In this chapter, you will Learn why change management is an important enterprise management tool Understand the key concept of segregation of duties Review the essential elements

More information

A Change Impact Analysis Tool for Software Development Phase

A Change Impact Analysis Tool for Software Development Phase , pp. 245-256 http://dx.doi.org/10.14257/ijseia.2015.9.9.21 A Change Impact Analysis Tool for Software Development Phase Sufyan Basri, Nazri Kama, Roslina Ibrahim and Saiful Adli Ismail Advanced Informatics

More information

Reviving smart card analysis

Reviving smart card analysis Reviving smart card analysis Christopher Tarnovsky Karsten Nohl [email protected] [email protected] Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information