Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business

Size: px
Start display at page:

Download "Intrusion Detection, Internet Law Enforcement and Insurance Coverage to Accelerate the Proliferation of Internet Business"

Transcription

1 Intrusion Detection, Internet Lw Enforcement nd Insurnce Coverge to Accelerte the Prolifertion of Internet Business Abstrct Christopher Ting, Ong Ting Hwee, Tn Yong Ti & Ng Pek Yong DSO Ntionl Lbortories 20 Science Prk Drive Singpore In this rticle, we propose frmework to ccelerte the ubiquitous cpitliztion of Internet s vehicle to merchndise goods nd services. The motivtion for proposing this frmework derives from the fct tht mny consumers nd smll-to-medium-sized compnies re still hesitnt to use Internet to shop, trde nd disclose sensitive informtion such s credit crd numbers. While IT security technologies nd products re widely vilble, there re still gps tht hve to be filled in before Internet becomes truly vible nd profitble chnnel to do business. The business model tht we propose is nchored upon the trilogy of three elements, which re interwoven nd indispensble. We believe tht to do business over the cyberspce, IT security technologies need to be complemented by finncil nd lw enforcement instruments. We propose nd present the cse tht Intrusion Detection, Internet Lw Enforcement nd Insurnce Coverge (I3) cn fill the gps, both from the technicl s well s non-technicl stndpoints. Just like Commnd, Control nd Communictions (C3) re indispensble in ny militry opertions, I3 re criticl to creting trusted environment for Internet Business. The highlight of the I3 frmework is n Agent-bsed Monitoring, Intrusion Detection And Response (AMIDAR) system. AMIDAR is proposed to enble the lw enforcement gency to police the cyberspce effectively, so tht both the virtul shop owners nd the consumers feel secure to buy nd sell on the Internet. For the insurnce underwriters, AMIDAR forms the bsis to gin insights into the residul risk, nd to drw up relistic insurnce policies tht sell well. We lso point out tht risk ssessment, utomted systems configurtion checking s well s computer forensics re the ssocited technologies to help mke the I3 business model fesible. Another novelty is the shopping protocol. It is designed to rise the level of ssurnce to the proposed I3 frmework ginst frud. We hope tht the I3 frmework with the ssocited shopping protocol cn turn the Internet into mrket plce. 1. Introduction Evolving from working prototype in the reserch lbs nd cdemi, Internet hs gined its sttute in reching out to the mss in the erly 90 s. Although electronic trnsctions re not new nd they hve existed even before the rrivl of Internet nd web, only big corportions nd government bodies cn fford the resources to stremline their finncil, tendering nd other trnsctions with externl business prtners. Internet bnking, Internet commerce, Internet retiling nd so on re still t the rudimentry stge, t lest in the context of Singpore. Set in the Asin bckdrop, Singporen consumers re reluctnt to disclose their credit crd informtion over the insecure Internet. The entrepreneurs nd retilers, especilly those not in the IT-relted businesses re lso hesitnt to exercise the option of using 1

2 Internet s vehicle to lunch strtegic dimension to their trditionl business prctices. Prt of the reson stnds from the fct tht there is no security ssurnce; the libilities re lso mbiguous. Despite the vilbility of IT infrstructure, IT security products nd consulting services, there is prevlent sense of mystique nd insecurity s fr s Internet business is concerned. In this pper, we propose triprtite frmework to ddress the issues of lck of ssurnce nd confidence. It is hoped tht the I3 frmework of Intrusion Detection, Internet Lw Enforcement nd Insurnce Coverge will ctlyze the process of turning Internet into vibrnt mrket plce. 2. Problem Formultion & Principl Considertions If smll-sized business tke florist shop for instnce were to put up web server to dvertise the rnge of goods nd the order informtion, would the shop owner end up loosing money? On more positive note, wht is the profit mrgin tht he cn expect from the sles tht re ttributed to the orders coming through the Internet? On the other hnd, from the consumer s point of view, is there mechnism to ssure tht his credit crd informtion is well protected? There re probbly more issues tht need to be considered, such s non-repudition, clims of goods not received physiclly nd not in good conditions nd so on. However, these issues re common to ordering piece of pizz over the telephone, or wtch by mil. As they re not specific to Internet business, we shll not discuss them in this pper. Agin, much s people still prefer reding hrd-copied documents thn their electronic versions, chnging the hbit of choosing merchndised objects with physicl touch is not over-night. Hving sid tht, it is up to the imgintion of every money-mking merchnt to think of innovtive nd clever wys to llow the Internet shoppers to exmine goods, sy durins, through the web. Hence, we will not ddress the problem of hbits here. Suppose, buy-nd-sell (be it flower, durin or stock option) vi the Internet is ccompnied by finncil commitment in the form of credit or other types of electronic rrngement, wht re the instruments needed to give confidence to both the suppliers nd consumers? This is the problem tht this pper is ddressing. From the consumer s point of view, he is worried tht C1 He loses his credit crd informtion nd other personl informtion C2 It seems tht Singporens re not the exception. The British poll shows tht 69% of the British compnies re hesitnt to do business over the Internet [1]. In this pper, the I3 frmework is restricted to the locl context of Singpore. Although it is interesting, more meningful nd useful to conceive frmework tht pplies cross ntionl borders, the legl spects re likely to become overwhelmingly complex nd controversil to ddress in this conference dequtely. 2

3 He is trnscting with spoofed web site From the supplier s point of view, he is worried tht S1 He is lible to py for the customer s clim tht its web site is responsible for disclosing the personl informtion. S2 His web server is broken into by hckers, who my lter the content of the web pges. S3 His web server is crshed by denil-of-service ttcks, nd during the downtime, his business my potentilly lose out to his competitors. 3. Intrusion Monitoring, Detection nd Response Before discussing the proposed I3 frmework, description of n Agent-bsed Monitoring, Intrusion Detection And Response (AMIDAR) system is in order. While there re mny technicl spects of AMIDAR, we hve selected to describe those tht re relevnt to this pper. In our technologicl development project, we hve rpid-prototyped n AMIDAR tht provides the following security services: Monitor the IP pckets trvelling in the network to detect nd respond to network-bsed ttcks Monitor the log generted by the firewll to look for suspicious ctivities in the network Monitor the servers log entries online to detect nd respond to host-bsed ttcks Monitor the behviour of the router to detect nd respond to ttcks trgeted t it While there re mny intrusion detection products in the mrket, s well s mny dvnced prototypes in the reserch lbs ll over the world, the AMIDAR is the first in being n integrted suite of intrusion detection nd response cpbility. In ddition, AMIDAR is contemporry in the sense tht it dopts the technology of softwre gents in building the prototype. From our experience, we find tht the benefits tht we hve obtined in dopting the gent-bsed pproch re s follows. Ese of instlltion nd deployment Ese of dministrtion Relibility nd robustness in the communictions of intrusion detection informtion to the dministrtor or the custodin of the informtion systems. 3

4 Sclbility Re-configurbility Ese of softwre development becuse of high re-usbility nd modulrity Ese of updte for detection nd response ginst new cyberspce exploits 4. Some Technicl Aspects of AMIDAR The system rchitecture of AMIDAR prototype [2] is depicted in Figure 1. From the user s point of view, it is very importnt to see to it tht the IT security product does not introduce noticeble performnce hit on the computer systems nd networks tht it is protecting. Therefore, when designing AMIDAR, we hve dopted the strtegy: pssive sniffing to monitor the networks nd systems. distributed computing to rrive t the decisions of hving detected intrusion ttempts. In other words, the ides re to imge or mirror IP dt from the networks nd systems, s well s to process IP dt on different mchines. Now, given the sme price, the performnce of PC is doubled every yer; it is costeffective to run monitoring progrm (cyberspce sensor or imger) on the PC. Wht bout the brin of AMIDAR, which is to process the IP nd rrive t some conclusions? It too, is being run in the sme PC tht runs the monitoring progrm. The brin is distributed becuse for every monitor (sensor), there is clss of gents ssocited to it to detect cyberspce intrusion ttempts. Essentilly, AMIDAR hs the following modules: Network-bsed Intrusion Detection Module Network Monitor. Building upon tcpdump, this is n in-house developed network sniffer. It runs on PC. It is high- performnce in the sense tht it cn sniff pckets from the network without missing ny (on 10 Mbit/sec trffic flow). Being pssive listener of the network trffic, the network monitor does not ffect the network performnce. They re most effective when deployed t strtegic loctions. Network Intrusion Detection Agents. By processing the IP pckets provided by the network monitor, this clss of gents scns nd monitors the network to check for bnorml nd mlicious network pckets. It lso hs the functionlity to record importnt network sessions. The gents run in the sme PC tht hosts the network monitor. Firewll-bsed Intrusion Detection Module Firewll Monitor. Anlogous to the network monitor, this is n in-house developed progrm tht sniffs the log generted by the firewll softwre. It lso runs on PC, which is connected directly to the computer tht runs the firewll. 4

5 Firewll Intrusion Detection Agents. This clss of gents prses the log dt nd look for events tht re indictive of network-bsed ttcks. Dropped pckets, unusul network ccess trces re the things the gents look for. The gents run in the sme PC tht runs the firewll monitor. Host-bsed Intrusion Detection Module Host Monitor. Host refers to informtion system servers such s emil server, web server, dtbse server, ppliction server nd so on. Anlogous to the network monitor, this is n in-house developed progrm tht sniffs the log generted by the server to be monitored. Host monitor runs on PC, which is directly connected to the host. Host Intrusion Detection Agents.This clss of gents prse the log dt nd look for events tht re indictive of ttempted brek-in vi for exmple buffer overflow. It lso keeps trck of filed login events. The gents run in the sme PC tht runs the host monitor. Intrusion Detection Module for Router Router Monitor. Connected directly to the router, router monitor is PCclss mchine tht pulls event dt from the router. Router Intrusion Detection Agents. This clss of gents prses the event dt nd looks for tell-tle signs of ttcks trgeted t the router itself. The gents run on the router monitor mchine. Centrl Controller The centrl controller is the nerve centre of the intrusion detection gents. It controls, distributes nd dministers ll the four clsses of gents. It runs two bckground processes: the hertbet listener nd the lert listener. These two processes form the core to mintin uthenticted communictions with the gents distributed to the network monitors, firewll monitors, host monitors nd router monitors. Whenever the detection gents hve detected intrusions, they will report to the centrl controller for it to respond by, for exmple, pging the system dministrtors. 5. Re-engineering AMIDAR for Internet Lw Enforcement In erlier sections, we hve seen tht AMIDAR is network of distributed cyberspce sensors nd detectors. The deployment of AMIDAR is bout superimposing it on existing networks nd computer systems to be protected. In the context of Internet business, the lw enforcement gency hs definitive role to ply to police the cyberspce. The objective is to provide sense of security for Internet users to set up virtul shops nd counters, nd for consumers to purchse goods nd services. For lw enforcement gency to police the cyberspce effectively, tools re needed. Quite nlogous to the concept of neighbourhood police post, the vrious detection modules Other types of responses re conceivble nd implemented, but they will not be discussed here to keep the pper concise. 5

6 cn be deployed t virtul shops on the Internet. The centrl controllers, or hierrchy of them cn be deployed t the hedqurters. Unlike physicl spce, cyberspce respects no ntionl boundries. It is hopeless to stop nd prosecute overses hckers to come in nd crete senstionl story lines on locl mss medi. Given this relity, which is not likely to improve for the next 5 yers, the Internet business we hve in mind is restricted to the locl scene. In ny cse, multi-ntionl nd big compnies hve lredy strted using the Internet to do their business, nd they cn fford to engge consultnts, buy security products to protect themselves, nd mnge the risk. But wht bout locl smll- nd medium-sized compnies? Wht bout locl consumers who wnt to shop nd buy goods nd services vilble on the locl mrket? We know tht every country is ssigned rnge of well-defined IP ddresses. Techniclly, router cn be configured to filter IP pckets bsed on IP ddresses. Therefore, it is possible to restrict Internet business to the locl mrket until n interntionl frmework for lw enforcement is put in plce. We believe tht true indictor of success of Internet business in Singpore is the emergence of locl compnies to provide wide rnge of goods nd services to the locl consumers vi Internet. To crete locl virtul mrket plce, vibrnt with billions of buy-nd-sell trnsctions everydy, frmework nd tool such s AMIDAR re indispensble to provide confidence nd sense of security to the locl popultion. With AMIDAR deployed, the intrusion detection modules will estblish n uthenticted chnnel to communicte with the centrl controllers. Whenever intrusion ttempts re detected, the centrl controllers will be lerted. Depending on the types of intrusions, centrl controllers t the physicl neighbourhood police posts nd HQ s of the lw enforcement gency cn respond ccordingly. 6. Frmework of I3 The underlying principle behind I3 is risk reduction, risk elimintion, risk shring nd online frud prevention, detection nd response. As in ny trde, there will be government registrr to grnt license for setting up virtul shop on the locl Internet. Under the license, the virtul shop owner hs to set up the following bsic pckges: Web server tht provides merchndised informtion to the requests originted from the locl IP ddresses Security services to provide end-to-end secure session to trnsmit credit crd nd other personl informtion # Of course, locl supplier cn still estblish its own logiclly different connectivity to the overses business prtners, distributors, resellers nd customers. Only port 80 is open. # Mny web servers nd browsers hve this security feture. To mke it more secure, we will discuss simple mechnism (Internet Shopping Protocol) in Section 8. 6

7 Router tht filters IP pckets to llow only locl IP ddresses Intrusion monitor nd detection gents tht mke police report t regulr intervl to the centrl controllers (housed in the physicl confines of the lw enforcement gency) in rel-time. We hve discussed the link between intrusion detection nd Internet lw enforcement. Wht bout the role of insurnce coverge in this frmework? As credit crd informtion, personl nd finncil informtion of the consumers will reside in the computers of the Internet merchnts, the risk of losing the informtion to hckers hs to be ddressed. If cyberspce incident hs hppened, the Internet merchnt my be sued nd lible to py for the dmges climed by the customers. Therefore, it is wise nd in fct dvntgeous from the business viewpoint to tke up suitble insurnce policy. The objective is to shre nd mnge the risk with the insurnce compnies. In this proposed frmework, our opinion is tht insurnce coverge should be instituted, just like every irliner must insure itself ginst ir crshes. Although it increses the business cost somewht, there re cler dvntges to dopt this pproch. In Singpore, consumers will feel more confident to shop on the Internet when they know tht the virtul shops re officilly registered monitored by the uthorities in rel time responsible to py them for their losses (vi the insurnce mechnisms) should cyberspce incidents occurred. In essence, ll these mesure re imed t creting confidence in the consumers, nd thereby incresing the consumer bse. From the viewpoint of insurnce compny, it is foolhrdy to underwrite n insurnce policy without bsis to estimte the risk involved. It is lso possible tht the virtul shop is delibertely set on fire by the owner itself, so s to clim the insurnce money frudulently. To ddress the first problem, the insurnce compny cn buy consulting services from competent security firms to conduct computer nd network risk ssessment if the insurnce sum is lrge. If the mount is smll, softwre tool to check for systems configurtions my be sufficient to do the job. Whtever the cse, both risk ssessment nd utomted systems configurtion checking re mture technologies in the computer security ren. In the I3 frmework, the risk ssessment cn tke into considertion the types of intrusions tht AMIDAR cn detect nd hndle. So it is possible to estimte the risk involved. The insurnce premium, terms nd conditions cn then be determined ccordingly. For the second problem where n unscrupulous virtul shop owner is exploiting the insurnce policy, computer forensics is indispensble here. Agin, the Internet lw enforcement gency hs role to ply in this respect. In the proposed I3 frmework, it is possible to bse the evidence on the regulr police reports sent by the Intrusion monitor nd detection gents. In ddition, the legl frmework cn be set up such tht the insured sum is pid nd distributed to the customers rther thn to the virtul shop owners. This is becuse the consumers hve lost their crd numbers nd personl 7

8 informtion, nd therefore they re the ones tht ought to be compensted. With this proviso, it becomes much hrder for the unscrupulous virtul shop owners to succeed in the frud without collborting with the customers. 7. Firness in Addressing the Concerns In ny business ventures, the return of investment should be proportionl to the business risk. Since the consumers re pying money, the Internet business model should mke it risk-free for them. On the other hnd, since the suppliers re mking money by getting their return from investing in the virtul shops, they hve to be prepred to tke the risk. Among other things, the suppliers re exposed to the risk of hckers ttcking their virtul shops, nd lible to py the consumers for losing their credit crd nd personl informtion when brek-in occurs. In the previous sections, we hve ddressed these concerns with the loclized I3 model. To mke it ttrctive for the smll- nd medium-sized compnies to set up virtul shops, insurnce policies nd lw enforcement with AMIDAR s described before re necessry. With these three components, the risk is shred nd distributed to the insurnce compnies. Not only tht, they cn provide dded ssurnce nd confidence to the consumers who re buying from them. Therefore, suppliers concerns (S1 to S3) hve been ddressed. 8. Shopping Protocol in I3 To ddress the concern C1 nd concern C2 of the consumers further, we proposed shopping protocol under the I3 frmework. In this protocol, credit crd service providers hve role to ply s well. The credit crd service provider genertes tokens rndomly nd prcel out the tokens to their clients rndomly. The credit crd service provider sets up number of secure servers on the Internet to provide the checking nd verifiction services. Through the monthly sttement of ccount received by hrdcopy mil, the shopper obtins the tokens (sy one hundred tokens per month). Ech time when consumer pys n item with his credit crd, he sends one hlf of the token to the virtul shop (with his credit crd number) nd the other hlf to the credit crd service provider. The virtul shop sends tht hlf of the token he hs received from the consumer to the credit crd service provider. The credit crd service provider checks if the combined tokens it hs received is mong one in the prcel of the consumer. The credit crd service provider notifies both the supplier nd the consumer of the verifiction results. Ech token is vlid for one purchse only. To do nother purchse, the consumer hs to use different token in his prcel. 8

9 This is preliminry nd simplest version of the shopping protocol nd there re mny wys to improve it. The ide is to render it impossible for hckers who hve mnged to obtin the credit crd informtion to derive ny benefits. With this shopping protocol, on top of the credit crd informtion, the hckers hve to stel the tokens from the consumer s well. Even if the consumer is tricked into trnscting with spoofed virtul shop, the hcker hs to somehow intercept the other hlf of the token tht is sent to the credit crd service provider. This is by no mens esy over the Internet. In the cse of purchse tht involves delivery of goods, it is even impossible for the hcker to gin nything out of it, becuse by defult, the goods will be delivered to the residentil or office ddress of the consumer. If the consumer wishes to mke purchse nd hve the goods delivered not to him but to his loved ones s gifts, he cn register their ddresses with the credit crd service provider. So in ddition to checking the tokens, the credit crd service provider cn lso check the delivery ddress. If the ddress for the goods to be delivered to is not one of the registered, the credit crd service provider cn quickly deduce tht there is frud or nomly nd should contct the consumer immeditely for clrifiction. 9. Remrks The upshot of I3 frmework is tht it genertes two supporting industries: insurnce underwriting for Internet business, risk ssessment nd systems security evlution nd certifiction. For the I3 frmework to work, the relevnt government bodies, the lw enforcement gency, the IT security professionls nd vendors, the insurnce compnies s well s the credit crd service providers hve to tke prt nd ply their respective roles. We emphsize tht IT security technologies re vilble tody nd they cn only do tht much; the business, legl nd socil spects re more importnt nd complex. 10. Summry E-commerce nd more generlly Internet business hve yet to permete into the society. Consumers sty t the sideline, feeling insecure to send credit crd nd other personl informtion cross the Internet. Smll- nd medium-sized compnies lso find it not esy nd risky to open virtul shops nd counters. Given this stte of the ffirs, we propose I3 frmework nd its ssocited shopping protocol in the locl context of Singpore. The I3 refers to Intrusion Detection, Internet Lw Enforcement nd Insurnce Coverge. It encompsses technicl, legl nd finncil dimensions. We hve discussed Agent-bsed Monitoring, Intrusion Detection And Response (AMIDAR), which is useful for Internet lw enforcement nd insurnce underwriting. To provide consumers with n even higher level of ssurnce, the shopping protocol within the I3 frmework ws lso proposed. Of course, there is remote chnce tht the hcker is so lucky to guess the token right for the first time. But the odds cn be mde s smll s possible in designing the tokens. Filed ttempts to guess the token will be detected esily. 9

10 11. Acknowledgement We wish to cknowledge the support of the Directorte of Reserch nd Development, s well s the useful discussions with the collegues of Computer Systems Lb. 12. Bibliogrphy [1] Bill Hncock, Security Views, Computers & Security Vol. 17 (1998) [2] Next-genertion Intrusion Detection nd Response, DSO Technicl Report 10

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Corporate Compliance vs. Enterprise-Wide Risk Management

Corporate Compliance vs. Enterprise-Wide Risk Management Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

Blackbaud The Raiser s Edge

Blackbaud The Raiser s Edge Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs TechAdvisory.org SME Reports sponsored by Cybernut Solutions provides outsourced IT support from welth of knowledgeble technicins nd system dministrtors certified

More information

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A Agend Who re we? Wht is Cloud Computing? Drivers nd Adoption Enbling Technologies Cloud Computing in Everydy Life Joe Wong Senior Development Mnger, ICS, IBM Kit Yeung Advisory Softwre Engineer, ICS, IBM

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

E-Commerce Comparison

E-Commerce Comparison www.syroxemedi.co.uk E-Commerce Comprison We pride ourselves in creting innovtive inspired websites tht re designed to sell. Developed over mny yers, our solutions re robust nd relible in opertion, flexible

More information

Application Bundles & Data Plans

Application Bundles & Data Plans Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help

More information

The 8 Essential Layers of Small-Business IT Security

The 8 Essential Layers of Small-Business IT Security The 8 Essentil Lyers of Smll-Business IT Security While there is no technology tht cn gurntee your network is truly impenetrble, you cn significntly reduce your risk by deploying multiple lyers of defense.

More information

According to Webster s, the

According to Webster s, the dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly

More information

QUESTIONNAIRE. 1. Your Name: 2. Age-group: Below 25 years 26-35 years. 3. Gender : Male Female. 4. Education : H.S.C or Below H.S.C.

QUESTIONNAIRE. 1. Your Name: 2. Age-group: Below 25 years 26-35 years. 3. Gender : Male Female. 4. Education : H.S.C or Below H.S.C. QUESTIONNAIRE A. PERSONAL DETAILS: 1. Your Nme: 2. Age-group: Below 25 yers 26-35 yers 36-45 yers Over 45 yers 3. Gender : Mle Femle 4. Eduction : H.S.C or Below H.S.C. Grdution Post-Grdution Any other

More information

UNITED STATES DEPARTMENT OF AGRICULTURE Washington, D.C. 20250. ACTION BY: All Divisions and Offices. FGIS Directive 2510.

UNITED STATES DEPARTMENT OF AGRICULTURE Washington, D.C. 20250. ACTION BY: All Divisions and Offices. FGIS Directive 2510. UNITED STATES DEPARTMENT OF AGRICULTURE Wshington, D.C. 20250 ACTION BY: All Divisions nd Offices FGIS Directive 2510.1 12-11-73 FEDERAL TORT CLAIMS I PURPOSE This Instruction: A Sets forth the bsic provisions

More information

Recognition Scheme Forensic Science Content Within Educational Programmes

Recognition Scheme Forensic Science Content Within Educational Programmes Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses

More information

Protection of Critical Information Infrastructure in Korea

Protection of Critical Information Infrastructure in Korea Protection of Criticl Informtion Infrstructure in Kore Kim, Woonyon 2005. 10 Ntionl Security Reserch Institute Contents Ntionl Cyber Security Mngement System Criticl Informtion Infrstructure (CII) Mngement

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab. Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

How To Improve Network Performance

How To Improve Network Performance Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network

More information

Pay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details

Pay over time with low monthly payments. Types of Promotional Options that may be available: *, ** See Page 10 for details With CreCredit... Strt cre immeditely Py over time with low monthly pyments For yourself nd your fmily Types of Promotionl Options tht my be vilble: Not ll enrolled helthcre prctices offer ll specil finncing

More information

Total Data Protection for Sensitive Data Wherever It May Flow

Total Data Protection for Sensitive Data Wherever It May Flow Totl Dt Protection for Sensitive Dt Wherever It My Flow PGP Corportion nd Protegrity protect sensitive dt throughout its lifecycle, while enforcing nd verifying policy requirements for complince. Protegrity

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Understanding Cloud Accounting and QuickBooks Online

Understanding Cloud Accounting and QuickBooks Online Understnding Cloud Accounting nd QuickBooks Online This guide is intended to provide comprehensive look t the prcticl benefits of working in the cloud, nd how QuickBooks Online cn help your business chieve

More information

Talent (or guardian) signature: Date:

Talent (or guardian) signature: Date: Sesme Communictions Sesme Communictions Mkers of Ortho Sesme nd Dentl Sesme PRESENTS: Sesme Prctice Mrketing SAVE ALL IDEAS: Strt file to store the news items nd ides tht come up between your scheduled

More information

Your Image through Client Reporting

Your Image through Client Reporting Your Imge through Client Reporting Prtnerships: Logits is n escrow gent, prtner of Softwre editors nd users, to design, control nd preserve ccurte deposits of sources. Contct: For ny dditionl informtion

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Your duty, however, does not require disclosure of matter:

Your duty, however, does not require disclosure of matter: Your Duty of Disclosure Before you enter into contrct of generl insurnce with n insurer, you hve duty, under the Insurnce Contrcts Act 1984 (Cth), to disclose to the insurer every mtter tht you know, or

More information

DATA SCIENTIST WHY IT S THE SEXIEST JOB OF THE 21 ST CENTURY

DATA SCIENTIST WHY IT S THE SEXIEST JOB OF THE 21 ST CENTURY Brought to you by HTTP://WWW.ANALYTICS-MAGAZINE.ORG DRIVING BETTER BUSINESS DECISIONS JULY/AUGUST 2013 ADVENT OF THE DATA SCIENTIST WHY IT S THE SEXIEST JOB OF THE 21 ST CENTURY ALSO INSIDE: Anlytics &

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

aaaaaaa aaaaaaa aaaaaaa a Welcome To The ADP TotalPay Visa Card Program!

aaaaaaa aaaaaaa aaaaaaa a Welcome To The ADP TotalPay Visa Card Program! Welcome To The ADP TotlPy Vis Crd Progrm! The TotlPy Vis Crd Account Experience the ese & relibility of direct deposit through n ADP TotlPy VISA crd ccount ADP TotlPy VISA crd ccounts llow crdholders to

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems

More information

Structuring. Your Business a Brazilian or in Brazil

Structuring. Your Business a Brazilian or in Brazil Setting Up Your Compny nd Office in Brzil MOBILITY Mgzine, April 2007 As the B in BRIC, Brzil hs been gining gret del of ttention on the globl business front, with mny compnies investigting how to get

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

2001 Attachment Sequence No. 118

2001 Attachment Sequence No. 118 Form Deprtment of the Tresury Internl Revenue Service Importnt: Return of U.S. Persons With Respect to Certin Foreign Prtnerships Attch to your tx return. See seprte instructions. Informtion furnished

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Assessing authentically in the Graduate Diploma of Education

Assessing authentically in the Graduate Diploma of Education Assessing uthenticlly in the Grdute Diplom of Eduction Dr Mree DinnThompson Dr Ruth Hickey Dr Michelle Lsen WIL Seminr JCU Nov 12 2009 Key ides plnning process tht embeds uthentic ssessment, workintegrted

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

FDIC Study of Bank Overdraft Programs

FDIC Study of Bank Overdraft Programs FDIC Study of Bnk Overdrft Progrms Federl Deposit Insurnce Corportion November 2008 Executive Summry In 2006, the Federl Deposit Insurnce Corportion (FDIC) initited two-prt study to gther empiricl dt on

More information

Facilitating Rapid Analysis and Decision Making in the Analytical Lab.

Facilitating Rapid Analysis and Decision Making in the Analytical Lab. Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires

More information

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 -

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 - A Sn Mteo County ACCEL Adult-Eduction College nd Creer Eductionl Ledership AB 86 Adult Eduction Consortium Project Mngement Pln - Februry 24, 2014 - This project mngement pln presents ACCEL s process frmework

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

l,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- -

l,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- - rrsrgfqmrreremrers I Publiction dte: My 2g,Z01S Pilol Progrm tof g_llpqtg Resilience: Building Resilience to Climte Retted Hzrds-AMtS (ppcr: BRCH-AM S) Project ld No.: P1275Ao Vj.nplry of Agriculturl Development

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce

More information

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007 elerning pltforms nd consulttion service t CU Presented by Judy Lo 31 August 2007 Agend The elerning guidelines How elerning cn lower your work burden nd enhnce lerning? The elerning pltforms The elerning

More information

IFC3 India-Android Application Development

IFC3 India-Android Application Development IFC3 Indi-Android Appliction Development Android Operting System hs been progressing quite rpidly. Conceived s counterpoint IOS, Android is grph showing significnt development in this workshop Students

More information

Quick Reference Guide: One-time Account Update

Quick Reference Guide: One-time Account Update Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)

More information

Pre-Approval Application

Pre-Approval Application Pre-Approvl Appliction In tody s rel estte mrket, Pre-Approved mortgge provides you the buyer with powerful tool in the home purchse process! Once you hve received your Pre-Approvl, you cn shop for your

More information

Humana Critical Illness/Cancer

Humana Critical Illness/Cancer Humn Criticl Illness/Cncer Criticl illness/cncer voluntry coverges py benefits however you wnt With our criticl illness nd cncer plns, you'll receive benefit fter serious illness or condition such s hert

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

FortiClient (Mac OS X) Release Notes VERSION 5.0.10

FortiClient (Mac OS X) Release Notes VERSION 5.0.10 FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Welch Allyn CardioPerfect Workstation Installation Guide

Welch Allyn CardioPerfect Workstation Installation Guide Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to

More information

Maximizer CRM 2015 Overview. A comprehensive look at Maximizer Software s latest CRM solutions

Maximizer CRM 2015 Overview. A comprehensive look at Maximizer Software s latest CRM solutions Mximizer CRM Overview A comprehensive look t Mximizer Softwre s ltest CRM solutions The softwre just mkes it esy in fst moving environment for everyone in the orgnistion to know wht is going on nd who

More information

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification

QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of

More information

PROPERTY AND CASUALTY INSURANCE. Effects of the Nonadmitted and Reinsurance Reform Act of 2010

PROPERTY AND CASUALTY INSURANCE. Effects of the Nonadmitted and Reinsurance Reform Act of 2010 United Sttes Government Accountbility Office Report to Congressionl Committees Jnury 2014 PROPERTY AND CASUALTY INSURANCE Effects of the Nondmitted nd Reinsurnce Reform Act of 2010 GAO-14-136 Jnury 2014

More information

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory Implementtion Evlution Modeling of Selecting ERP Softwre Bsed on Fuzzy Theory Xukn Xu 1, Ydong Jing 1 nd Zheng Shi 2 1 Informtion Mngement Deprtment, Chngzhou Cmpus, Hohi University, Chngzhou 213022, Jingsu,

More information

File Storage Guidelines Intended Usage

File Storage Guidelines Intended Usage Storge 1 Google Cloud 2 Other cloud storge Exmple or Box, Dropbox, Crbonite, idrive File Storge Guidelines Usge Fculty nd student collbortion Specil use cses. When non-lcc employee nd students need ccess

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Combined Liability Insurance. Information and Communication Technology Proposal form

Combined Liability Insurance. Information and Communication Technology Proposal form Comined Liility Insurnce Informtion nd Communiction Technology Proposl form Comined Liility Insurnce Informtion nd Communiction Technology - Proposl form This proposl form must e completed nd signed y

More information