14:30 18:15 Private Equity Focus - Estrela HIGH TECH AND TELECOM COMPANIES: INVEST IN THE FRENCH EXPERTISE
|
|
- Charlene Weaver
- 8 years ago
- Views:
Transcription
1 14:30 18:15 Private Equity Focus - Estrela 1 HIGH TECH AND TELECOM COMPANIES: INVEST IN THE FRENCH EXPERTISE
2 2 CODASYSTEM You shoot, You prove. Frederic LEVAUX, Chief Executive Officer, Codasystems
3 What do we do? 3 Our solution creates «Original Digital Pictures», these originals cannot be modified and are stored in optimal security conditions. These Pictures are watermarked, encrypted, time-stamped, localized and signed. These Picture have legal value in court, They can be taken with a regular digital camera and PC or with a Mobile phone The solution is patented and protected worldwide since 2002 The solution is composed of a capture software on the mobile, a secured storage infrastructure and a web platform for picture integrity checking and reporting The solution is used by a lot of different sectors (retail, construction, real estate, field service..), basically any sector where proof of service can be made with a picture The company currently has more than 250 mobiles in operation for approx. 10 major clients acquired since Q1 06 Capturing devices Sample pictures Web service
4 The Value Proposition 4 CodaSystem creates certified digital pictures Pictures taken are localized, timestamped and signed by the author These picture are the only costeffective alternative to long and costly legal procedures Pictures are encrypted and watermarked at the time of capture These picture have legal value in court because they are in total conformity with all norms and laws in Europe and have had their first legal victories Most of our clients don t need to go to court, but using Codasystem Pictures adds credibility and professionalism to their activity / service / performance
5 Markets 5 Targeted sectors Retail Advertising and Billboards Cleaning Services Field Service Companies Security Real Estate Construction operators Engineering companies Detectives Express delivery / Transporters / Movers Law enforcement / Civil servants Insurance companies Independent experts in Insurance, construction Bailiffs / Legal experts / Attorneys, lawyers Graffiti Advertising / billboards Retail / Merchandising, Construction / real Estate ANY SECTOR WHERE PROOF OF SERVICE CAN BE MADE WITH A PICTURE
6 How does it work? GPS localization 2 GSM localization Picture Transfer GSM/EDGE/3G/WIFI/ LAN/xDSL ), encryption 3 Picture Integrity Testing Checking for any modification 4 Picture Archiving For Future reference and legal value 6 Tablet PC & camera or Smartphone / mobile phone 1 Picture Capture Localization (GPS/GSM/Wifi), Time stamping, Watermarking & encryption CodaSystem Servers CodaSystem archiving 5 Duplicate Picture Delivery to end user To use in their reporting / data mgmt system End user End User
7 Legal Value, How? 7 By conformity to norms and laws Electronic Signature: conformity with electronic signature law of March and related decrees By the Legal Audits of our solution Legal Audit have been performed by independent legal firms specialized in dematerialization issue (report available upon request ) Numerical Archiving : Conformity with French and European Norm NFZ Integrity : conformity to the European recommendation RSC 3029 Time Stamping : Use of Time Stamping authority in conformity to European recommendation RSC 3161 Confidentiality : conformity with the norm ISO Network Security : conformity with the norm ISO TR System Security : ISA Certified (in process) By the Technical Audits performed Codasystem has been technically audited by experts of the FNTC (fédération nationale des tiers de confiance) and is currently undergoing Different ISO certifications Regular Intrusion Audits By the results obtained in court First cases have been taken to court and produced in CodaSystem s client success (referral available upon request) By professional recognition CodaSystem has been awarded the innovation award for 2005 by the FNTC And the Orange Syntec Innovation Trophy in 2006
8 Positioning 8 Our Job CodaSystem is the first industrialized technological solution to instantly capture digital proof, of what you want, where you want and when you want. WHO - WHAT WHEN WHERE Legal Benefits CodaSystem, offers you and instantaneous and unlimited legal protection Quality Benefits With CodaSystem, provide your clients with the proof of you professionalism Other concrete Benefits : Productivity : The capture of the evidence, the creation of a report and the distribution of theses documents can be made on the spot in minutes Physical : Digital document archiving helps gain valuable square meters Financial : Avoiding expensive intervention by experts, officials to create evidence, systematically generating opposable documents saves costly judicial fees and reduces potential loss (payables..) Quality : Having digital evidence of work performed helps securing a higher quality perception Optimization : Have your resources allocated to real value added tasks
9 CodaSystem Products 9 PC Software All types of Tablet PC Itronix, HP, Acer, Flybook + Canon Digital Cameras
10 CodaSystem Product 10 Mobile Software Mobile with integrated GPS receivers or A-GPS support (WM, Symbian* / Java*) Mobiles without-gps but with localization through operator service (WM, Symbian* / Java)*) *dispo Q4 2006
11 The Web Service 11 Ludendo Example
12 The Web Service 12
13 The company 13 Time line Created in 2002, R&D for 3 years First prototype in Q First field test with clients Q First client signed in Q Finished product on mobile phones in Q3 05 Early stage funding round in Q3 05 (< 1M ) Won Innovation Trophy (Security Federation) First major client sign-up, Q2 06 First Sales in 05, up 150% as of Q2 06 Won Innovation Trophy (Orange) New Funding round closing in Q3 06 (> 2 M ) Team of 11 people More then 10 Active Accounts More then 200 mobiles currently active Partnership agreement with Microsoft (startup program), all major telecom operators, and mobile manufacturers
14 Assets 14 Key Technical Skills Cryptography Proprietary watermarking algorithms development adapted to mobile platforms Audio, video signal treatment Embedded devices development Network Security maintenance Transmission protocol security Device Security management Legal implication of IT security Security Value chain management Key Certification ISO (IT Security) Certification Microsoft (people, platform, applications..) European norms and laws on IT security Legal Victories Patent Owner of a Invention patent (Inspection apparatus) delivered in France and extended Worldwide
15 Strategy 15 A 2 step Strategy 1. Independent Development and positioning as a complete certification value chain Keeping control of two major aspects of our business : Capturing software and secured infrastructure Independent from telecom operators, and multi-device, Audio and videos developments International Development Objective : sign-up key accounts and have the solution recognized as a unique cost-effective professional tool 2. Start OEM Relations (licensing) and positioning as a certification «authority» Sell API license for capturing digital audio, video and image to devices manufacturers (phones, camcorder, cameras, webcam, CCTV..). Eventually keep control of certain sensitive elements or capture (steganography algorithms) Keep control of security and legal conformity Manage and maintain security infrastructure and storage Objective : Install the company as an independent authority for original numerical documents.
16 Shoot & Proof 16 Shoot & Proof Strategy With our APIs developed for integrators, editors and device manufacturer, the shoot & Proof label will take over the CodaSystem products.
17 Business Model 17 Product Business Model has two components Software license For our standard application we charge a flat license fee per mobile device For client-specific application we charge e flat license fee + integration and development fees API and SDK for systems integrators: we sell our certified photo capture for SDK to system integrators to add legally valid pictures to the application the develop for their clients Monthly subscription In all cases we charge a monthly subscription for each mobile device in activity We store all picture for the legal period asked by the clients ( years) Mobile devices are bought directly by the client, GSM/GPRS subscription are paid by the client
18 Distribution 18 Double approach Direct : We directly attack large accounts to create interest around legally valid pictures and their associates benefits to top management. The Target being to sign-up 2 to 3 large clients in each targeted sector Indirect : CodaSystem set up a distribution network through different kinds of partner (System integrators, independent mobile distributors, mobile operators, MVNO ).
19 Status 19 Mobile Fleet Status We more than double our fleet every Quarter since commercial launch Q Q Q Q Q3 2006
20 Status 20 Sales We are currently above our forecasts Forecast Actual Q Q Q Q Year 06
21 Clients 21 Construction / Engineering Distribution, retail Local Authorities Real Estate Security Field Marketing Media
22 US Market Potential 22 United States Market The American Market is one of our primary target for the following reasons : High penetration level of Smartphone High availability of location system (GPS, mobile, wifi..) Major carriers looking to offer value-added services to increase ARPU Highly competitive Business Environment leading to heavy use of legal services and / or binding contractual agreements in B to B We offer for these market a cost-competitive way to create undisputable «proof of work done» with their mobile phones. Penetration Strategy CodaSystem makes available to telecom operators, mobile phone manufacturers and mobile integrators a piece of software that adds legal capabilities to mobile phone. Therefore we will rely on partners to enter the US market, these partners can be global (operators, manufacturers) or specialized in different sectors (construction, real estate, retail..) Competitive Landscape No direct competition has been identified worldwide Partial competition on pieces of the value chain (watermarking, secured exchanges ) Main competition comes from «normal» use of photographs that we have to convert to our «shoot and prove» photographs. The concept and the value chain is protected by a worldwide patent since 2002
23 US Market Strategy and Timing 23 Strategy & Timing We are looking to make our first contact with potential partners in Q4 06 or Q1 07 Start Legal validation and field test in Q2 or Q3 07 Probable new funding round for international expansion (Asia also big market potential) in Q3 or Q4 07 Team and Resources Frédéric Levaux : CEO, BBA + MBA (HEC). Ex -entrepreneur and Strategy consultant Worked for 4 years for the U.S. Government and Department of Commerce, very good knowledge of the American Market 1 additional resource, probably non-french will join the international development team in Q2 07
24 References 24 Technology Winner of «Best Innovation» by the FNTC in 2005 Selected as one of the «BEST INNOV» at Capital IT 2006 Winner of Innovation trophy in 2006 by SYNTEC and France Telecom Strong Partnership with Microsoft (IDEES program)
25 Contacts 25 Frédéric Levaux Président CodaSystem France - S.A.S. Paris Cyber Village Boulevard MacDonald Paris Tél : Fax : CodaSystem Luxembourg S.A. Technoport Schlassgoart 66, rue de Luxembourg L-4221 Esch-sur-Alzette LUXEMBOURG Tel : Fax :
26 New York, Monday, October 23,
SAVINGS MADE EASY. SHERPA Purchasing Presentation
SAVINGS MADE EASY SHERPA Purchasing / 11, rue Tronchet - 75008 Paris FRANCE / +33 (0)1 40 56 00 30 / www.sherpa-purchasing.eu Executive Summary SHERPA proposes a new approach for sustainable savings An
More informationPIKTRAKK GENERAL CONDITIONS OF SUBSCRIPTION TO THE MONITORING SERVICE FOR PUBLICATINONS ON THE INTERNET WITH THE DEBT RECOVERY SERVICE
PIKTRAKK GENERAL CONDITIONS OF SUBSCRIPTION TO THE MONITORING SERVICE FOR PUBLICATINONS ON THE INTERNET WITH THE DEBT RECOVERY SERVICE P ixw a y s SA 1 9 r u e B é r a n g e r 7 5 0 0 3 P a r i s - F r
More informationPRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs
More informationSMALL BUSINESS. the basics. in telecommunications solutions
SMALL BUSINESS the basics in telecommunications solutions 1 2 Mobility Innovation, transformation and the cloud Security and business continuity At AT&T, we understand the unique needs that small businesses
More informationFORM 51-102F1 EMPOWER TECHNOLOGIES CORPORATION MANAGEMENT DISCUSSION AND ANALYSIS FOR THE THREE MONTH PERIOD ENDED MARCH 31, 2014
FORM 51-102F1 EMPOWER TECHNOLOGIES CORPORATION MANAGEMENT DISCUSSION AND ANALYSIS FOR THE THREE MONTH PERIOD ENDED MARCH 31, 2014 The following discussion and analysis, prepared as of May 30, 2014, should
More informationINTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge
More informationTelematics & Wireless M2M
www.lairdtech.com Telematics & Wireless M2M DEVICE PORTFOLIO About Laird Technologies Laird Technologies designs and manufactures customized, performance-critical products for wireless and other advanced
More informationPress Conference 28 February 2011
Press Conference 28 February 2011 This presentation and information included herein constitute a communication of a promotional nature and not a prospectus in the sense of the Directive 2003/71/CE of the
More informationGEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M
GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions
More informationOnline Proctoring Services
Online Proctoring Services Observing test takers online using webcams and microphones. It sounds simple, yet for educational institutions, it is no simple task. Kryterion is leading the industry in providing
More informationCase Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
More informationBUSINESS JET SECURITY SYSTEM
BUSINESS JET SECURITY SYSTEM WHAT HAPPENS IF...? A business jet can be subject to a variety of risks, usually when it is parked, often at minor airfields where security can be rudimentary. These risks,
More informationCase Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
More informationValidian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing
Validian Next Generation Information Policy Management & Intrusion Prevention: www.validian.com Securing Mobile, Cloud & Distributed Computing Validian Top Down IPMP & Cyber Security My name is Bruce Benn
More informationsmartphone users stay social & save money with voice over data Stephen Duke, co-founder 604 626-5037
smartphone users stay social & save money with voice over data Stephen Duke, co-founder 604 626-5037 how does your wireless carrier make you feel? gotta do this differently your smartphone was made for
More informationView from a European Trust Service Provider Server Signing: Return of experience and certification strategy
View from a European Trust Service Provider Server Signing: Return of experience and certification strategy January 16, 2014 - Berlin Thibault de Valroger VP Strategy & Development OPENTRUST Thibault.devalroger@opentrust.com
More informationTechnical Proposition. Security
Technical Proposition ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net info@adamsoftware.net Why Read this Technical Proposition?
More informationA feature on one of the exciting companies in our network
N 01 décembre 2004 - janvier 2005 Bimonthly newsletter dedicated to innovative entrepreneurship in Luxembourg N 23 August September 2008 Background information The high-tech business incubator Technoport
More informationSRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS
More informationsecurity changes with Orange focus on your business, we focus on your security
security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a
More informationTrustWay: the high security solution
TrustWay: the high security solution Industrial spying, eavesdropping, hacking... it has never been so vital to communicate securely in our networked world... and the threats have never been so great.
More informationPresented Talk : PoC(k)ET, les détails d'un rootkit pour Windows Mobile 6. Sogeti - ESEC R&D
Presented Talk : PoC(k)ET, les détails d'un rootkit pour Windows Cédric Halbronn, Sogeti - ESEC R&D Keywords : Rootkit, Mobile, Windows Quentin Pernier : quentin.pernier@ensimag.fr Kévin Gellenoncourt
More informationTERMS AND CONDITIONS OF USE OF THE WEBSITE GENERAL TERMS AND CONDITIONS
TERMS AND CONDITIONS OF USE OF THE WEBSITE GENERAL TERMS AND CONDITIONS Preamble Touscoprod, an EURL with capital of 7,500 Euros, listed on the Paris Companies Registry as number 510 096 365, with registered
More informationOT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,
More informationData Transfer Technology to Enable Communication between Displays and Smart Devices
Data Transfer Technology to Enable Communication between Displays and Smart Devices Kensuke Kuraki Shohei Nakagata Ryuta Tanaka Taizo Anan Recently, the chance to see videos in various places has increased
More informationIAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
More informationWe Believe in Security with a Capital S
Security Consulting by arvato Systems We Believe in Security with a Capital S The number of attacks on IT systems has increased dramatically in recent years, with the style and approach of such attacks
More informationsecurity peace of mind can drive your business forward
security peace of mind can drive your business forward a new paradigm is transforming the security requirement In recent years, you ve seen profound changes in information systems and usage patterns. New
More informationPiecing Digital Evidence Together. Service Information
Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM
More informationCanon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT
Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT This Webview Livescope Software Development Kit Developer License ("Agreement") between you, the "Developer" and the
More informationIntroduction to HIPAA Compliance Checklist:
Introduction to HIPAA Compliance Checklist: HIPAA Compliance Checklist The following is a comprehensive HIPAA Compliance Checklist created to provide guidance to treatment providers utilizing voice and
More informationJeff Edwards Head of Global Hotels Group June 2013
Jeff Edwards Head of Global s Group June 2013 Agenda Why? Industry context and business opportunity Distribution strategy and business proposition IT Competitive environment Our strategy Our product offering
More informationLEGAL BRANDSTOCK LEGAL EXPERT ADVICE FOR ALL IP MATTERS
BRANDSTOCK LEGAL EXPERT ADVICE FOR ALL IP MATTERS The Brandstock Group of companies is one of the world s leading and fastest-growing providers of Intellectual Property services that harnesses innovative
More informationComputer/IT Project LIST. Contact: 9860171201 8796142757
Computer/IT Project LIST Contact: 9860171201 8796142757 1. Detecting E Banking Phishing Websites Using Associative Classification 2. Vehicle Tracking Using Driver Mobile Gps Tracking 3. Sentiment Analysis
More informationEgyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
More informationIntegrated global lubricant data solutions
O Integrated global lubricant data solutions 0W-30 & 75W-80 ACEA 5W-30? 0W-20 API SAE! 15W-40 85W-90 10W-40 www.oats.co.uk OIntegrated global lubricant data solutions Glocal lubricant data solutions OATS
More informationTOGETHER WE CAN DO MORE
B3System S.A. is a leading provider of IT system and service management solutions ensuring optimized IT infrastructure performance, availability and security within businesses. The company has been operating
More information3 Reasons Xamarin is Best for Mobile App Development
Mobility Series The Quick Guide: 3 Reasons Xamarin is Best for Mobile App Development Sales Solutions 1 800 443 5210 www.aajtech.com So you ve decided to strengthen your organization s mobile strategy
More informationAdaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011
W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in
More informationBrainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
More informationCOURTESY TRANSLATION
PREMIER MINISTRE Secrétariat général de la défense nationale Paris, 7 April 2003 872 /SGDN/DCSSI/SDR Reference : SIG/P/01.1 Direction centrale de la sécurité des systèmes d information PROCEDURE CERTIFICATION
More informationVACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. ENISA/TA/AD/2007/13
VACANCY NOTICE FOR THE POSITION OF SENIOR EXPERT IN SECURITY TOOLS AND ARCHITECTURE Ref. Applications are invited for the position of Senior Expert in Security Tools and Architecture at the European Network
More informationTrust the Connectivity Experts
Trust the Connectivity Experts Simplified, Proven Connection Management Mobile operators, cable operators, and device OEMs require a dynamic solution to keep subscribers online across every possible combination
More informationMobile 2D Barcode/BIM-based Facilities Maintaining Management System
Mobile 2D Barcode/BIM-based Facilities Maintaining Management System Yu-Cheng Lin, Yu-Chih Su, Yen-Pei Chen Department of Civil Engineering, National Taipei University of Technology, No.1.Chung-Hsiao E.
More informationeform Suite for TeleForm Create and Process Intelligent eforms in PDF and HTML
eform Suite for TeleForm Create and Process Intelligent eforms in PDF and HTML Double the Value of your TeleForm Solution The product eform Suite extends your TeleForm solution with the ability to create
More informationAbout Reltronics Technologies, Inc. Secure & Track Anything, Anywhere, Anytime
Reltronics Technologies, Inc. specializes in Security and Tracking Solutions. The company focuses in manufacturing, deploying, and monitoring Security & Tracking systems that include radio frequency identification,
More informationThe Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
More informationTerms and Conditions of Use and Sale as at 1 st January 2009
Terms and Conditions of Use and Sale as at 1 st January 2009 The present standard terms and conditions of use and sale, also called the Contract, are concluded between the following parties: - with capital
More informationEngagements: Terrace Cloud Projects
Engagements: Terrace Cloud Projects Our company byline is 'Software Done Right'. We think this phrase precisely describes our mission. It's simple. We work closely with clients, listen to their vision,
More informationWHITE PAPER. Telecom industry the expatriate consumer segment
WHITE PAPER Telecom industry the expatriate consumer segment Summary The telecom industry, keeping pace with the leaps in this global digital era, is undergoing an immense transformation. It has been affected
More informationIs Your Mobile Application Ready For Business?
Is Your Mobile Application Ready For Business? It is clear that mobile technologies will transform the enterprise. The simple math is that if information and communications are available at any place and
More informationInformation Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
More informationRyerson Digital Media Zone Online Resources Patent Essentials
Maya Medeiros Lawyer, Patent Agent, Trademark Agent T: +1 416.216.4823 maya.medeiros@nortonrosefulbright.com http://www.nortonrosefulbright.com/people/99601/maya- medeiros PATENT ESSENTIALS WHAT IS A PATENT?
More informationPowerKey Conditional Access System Phase 1.0. System Overview. Revision 1.0
PowerKey Conditional Access System Phase 1.0 System Overview Revision 1.0 Scientific-Atlanta, Inc, Unpublished Works of Scientific-Atlanta, Inc. Copyright 1997 Scientific-Atlanta, Inc. All Rights Reserved
More informationINTERNATIONAL BUSINESS PLANNING CHECKLIST. For Development of Overall International Business Plan
INTERNATIONAL BUSINESS PLANNING CHECKLIST For Development of Overall International Business Plan Thomas B. McVey 1 Introduction: The following Checklist is designed to be used by a Company s senior management
More informationVoltage's Encrypted Email
Voltage's Encrypted Email October 2004. Report #471 Ferris Research Product Brief Sponsored by Ferris Research, Inc. 408 Columbus Ave., Suite 1 San Francisco, Calif. 94133, USA Phone: +1 (415) 986-1414
More informationDefinition of Mobile Instant Messaging (MIM) Systems
J son & Partners Consulting Company presents the results of the research Mobile instant messaging systems as a direct threat to SMS. Definition of Mobile Instant Messaging (MIM) Systems MIM (Mobile Instant
More informationOn Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com
On Demand Penetration Testing Applications Networks Compliance www.ivizsecurity.com About iviz Security Information Security company with industry s first on-demand penetration testing solution using unique
More informationa leading UK law firm Technology Big decisions about the future
a leading UK law firm Technology Big decisions about the future 01 Technology Specialists We understand your business because our approach is as focused on the technology as it is the law. A number of
More informationHosted Video in Cloud Computing
Hosted Video in Cloud Computing Future of IP Surveillance Juber Chu CEO, ACTi Corporation May, 2010 1 Agenda What is cloud computing? Market Trend ACTi s Strategy Case Study Why ACTi 2 Cloud! 3 Application
More informatione911 Marketing Plan Executive Abstract
e911 Marketing Plan Medical Intelligence Leader of the mobile tele-security industry Executive Abstract We define our marketing problem to sell the new product Columba 2 facing the mobile tele-security
More informationE-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert
E-Discovery Quagmires An Ounce of Prevention is Worth a Pound of Cure Rebecca Herold, CISSP, CISA, CISM, FLMI Final Draft for February 2007 CSI Alert While updating the two-day seminar Chris Grillo and
More informationRevenue increase of 21% in the first half of 2015
Press release: 2015 First Half Results Igny, August 7, 2015 First half results of 2015 Consolidated Profit & Loss (in M) Revenue increase of 21% in the first half of 2015 From January 1, 2015 to June 30,
More informationISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
More informationmarket development Vincent Poulbere, Senior Consultant
How to Operate The story of SMS SMS global market development By Vincent Poulbere, Ovum Vincent Poulbere, Senior Consultant Vincent Poulbere is a Senior Consultant at Ovum, specialising in radio communications
More informationFlash Storage Solutions For Mobile Network Operators
msystems has been transforming raw flash into smart storage solutions since 1989. From embedded flash drives for millions of mobile handsets to the creation of USB smart drives designed for leading global
More informationSecure access provided to sensitive documents - anytime, anywhere. Quick setup and easy administration of data room, documents and users
Eliminate the Paper Chase V-Rooms Virtual Data Rooms is an Internet-based, on demand hosted service designed to speed the completion of financial transactions which may involve hundreds of participants
More informationMastering the Mobile Challenge
Enterprise Device Enablement Mastering the Mobile Challenge How enterprises and vendors can improve viability, applicability, and security of mobile deployments Introduction Welcome to the post-pc world,
More informationQiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
More informationTranscription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45
Transcription Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage Media Duration: 28:45 Feel free to quote any passage from this interview for your articles. Please reference cloudwards.net
More informationDigital identity: Toward more convenient, more secure online authentication
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
More informationinaccess Networks Microelectronics in Telecom Applications
inaccess Networks Microelectronics in Telecom Applications Christos Georgopoulos, Managing Director, inaccess Networks Member of the Board, Hellenic-SIA November 2007 - Thessaloniki 1 Company Profile Founded
More informationThe Conference Room of Today. Easy & Secure. Instant Meeting
The Conference Room of Today. Easy & Secure. Instant Meeting Instant Meeting - The Conference Room of Today Set up and attend meetings easily - from anywhere and at any time Whether for online meetings,
More informationAT&T Digital Life. Home Security and Automation Service. Overview. Service Innovation EXECUTIVE SUMMARY
Customer Case Study AT&T Digital Life Home Security and Automation Service EXECUTIVE SUMMARY COMPANY OVERVIEW AT&T is the largest telecom services provider in the world and has a wide range of offerings,
More informationElectronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device industries
White Paper No 01 I December 2010 Implementation of 21 CFR Part 11 in the epmotion Software Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device
More informationEuropean Chamber of Commerce BUSINESS & IDEAS FAIR WESTIN SHANGHAI 2 July 2pm 6pm
OFFICIAL SPONSOR OF THE FAIR: ICSME is the one-stop shop for professional support for small and medium-sized enterprises (SMEs) to facilitate market entry and expansion in China: Serviced Offices, Start-up
More informationLocation is Putting Mobile Advertising on the Map
Location is Putting Mobile Advertising on the Map Our History 2008 2009 2003 2007 Nokia acquires Enpocket Nokia acquires NAVTEQ Nokia Interactive Advertising joins NAVTEQ Media Solutions Enpocket launches
More informationcloud computing by Orange séminaire Aristote 17/12/2009
cloud computing by Orange séminaire Aristote 17/12/2009 Orange and the cloud vision and strategy cloud computing - what is it about? cloud computing is a model for enabling convenient on-demand network
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationSpecialist service and maintenance partner for fire, security and integrated building technologies
Specialist service and maintenance partner for fire, security and integrated building technologies Consultancy Engineering Commissioning Service & Support 0800 542 3333 www.reflexsystems.co.uk Why choose
More informationThe Graphosign signature
Environment prot SpA Information Technology Graphosign signature with legal validity Saving in time and money Graphosign signature with legal No risks of signature counterfeiting Online and offline operation
More informationTop Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
More informationIT Requirements for the Eyelation Kiosks
Internet access & power at the kiosk site IT Requirements for the Eyelation Kiosks We prefer a wired network port and standard 120v power outlet at the physical kiosk location for the best speed and reliability.
More informationVirtual Data Room Security 2. Service 3. Simplicity 4. Speed 5. Cost Certainty
Virtual Data Room Transactions are becoming increasingly more complicated. Deals involve numerous participants who need access to an increasing number of documents at all stages of the deal. This creates
More informationTerms and Conditions
Terms and Conditions The following Terms and Conditions define the conditions of use of the website http://www.adbuddiz.com/ (hereinafter the Website ), edited by SAS PURPLE BRAIN, registered at the Paris
More informationSecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
More information2.2 The Security of Electronic Medical Records (EMR) DOH, the Executive Yuan August 19, 2009
Topic 2: Privacy Protection and Ensuring Security of Network Applications or Services 2.2 The Security of Electronic Medical Records (EMR) DOH, the Executive Yuan August 19, 2009 1 Agenda 1. The Vision
More informationThe Power of the Platform
The Power of the Platform Cloud & Hosting Network Mobility 2 Technology Trends Reshaping Business Cloud Computing Amazing s That Change Our World Fast, Widespread Wireless/Wireline IP Networks Powerful
More informationImplement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.
21 CRF 11 Electronic Records and Signatures Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system. By Todd Duell What does Title 21 of the Code of Federal
More informationProspectus. E-Business Enablement: The Future of Professional Photography. Photographer and Consumer Perspectives. Business Drivers & Models
Focused Responsive Credible Visionary Prospectus Headquarters U.S. Libbey Industrial Parkway Weymouth, MA 02189 USA +1 781 616 2100 info@infotrends.com Europe Sceptre House 7-9 Castle Street Luton, Beds
More informationTangoe Investor Overview. September 2012
Tangoe Investor Overview September 2012 Notice to Investors This presentation contains forward-looking statements within the meaning of the U.S. federal securities laws, including, without limitation,
More informationMANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
More informationIP Video Surveillance
IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access
More informationService Provider Licensing Program
Service Provider Licensing Program ABOUT THE SERVICE PROVIDER LICENSING PROGRAM The Service Provider License Agreement (SPLA) under the Service Provider Licensing Program enables an organization to license
More informationHow To Protect Your Data From Being Hacked
Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW
More informationVOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security, and HIPAA Compliance Valerie J.M. Watzlaf, PhD, RHIA, FAHIMA, Sohrab Moeini, MS, and Patti Firouzan, MS, RHIA Department of Health Information
More informationFrance Telecom Orange investor day conquests 2015
France Telecom Orange investor day conquests 2015 France Delphine Ernotte Senior Executive Vice-President, France May 31 st, 2011 1 investor day Conquests 2015 cautionary statement This presentation contains
More informationGuidelines on Digital Forensic Procedures for OLAF Staff
Ref. Ares(2013)3769761-19/12/2013 Guidelines on Digital Forensic Procedures for OLAF Staff 1 January 2014 Introduction The OLAF Guidelines on Digital Forensic Procedures are internal rules which are to
More informationSPONSORED CONTENT THE MARKETER S 2015 HOLIDAY FORECAST
THE MARKETER S 2015 HOLIDAY FORECAST 2015 HOLIDAY FORECAST How Marketers Are Gearing Up Online and Offline The Black Friday-Cyber Monday weekend is the blockbuster sales period for marketers, not just
More informationOffice 365 Adoption & Risk Report
Office 365 Adoption & Risk Report 2016 Q2 Table of Contents INTRODUCTION...2 MICROSOFT S LAND AND EXPAND STRATEGY...3 A DEEPER LOOK AT CONSUMPTION BY APPLICATION AND INDUSTRY...7 INSIDER THREATS AND COMPROMISED
More information