Size: px
Start display at page:

Download ""

Transcription

1 Cisco Self Defending Networks Schutz v o n Stun d e 0 a n! Michael Schwäm m lein I n t er n et wo r k in g C o n s u lt an t C is co Sy s t em s G m b H 1 1

2 Agenda Einfüh r u ng in S e c u r it y S D N S t r a t e g ie S D N D ie näc h s t e P h a s e : S t u nd e 0 S e c u r it y M a na g e m e nt Z u s a m m e nfa s s u ng 2 2

3 Einfüh ru ng in S e c u rit y 3 3

4 E i nf üh r u ng i n S ec u r i t y D a s J a hr i m Rück b l i ck : Wür m e r, V i r e n, Sp a m,. Wür m e r, Wür m e r, u nd no c h m e h r Wür m e r B l a s t e S a p h e S a s s e M y D o o m, u d g a e B a e r, r, r, nd ie nz nd D a s e ig e ne S y s t e m a l s Wa ffe E-m a il A nh a ng a l s Türöffne r für Würm e r u nd V ire n A ng r iff a u f d ie Wir t s c h a ft M y D o o m V iru s l e g t d ie G e s c h äft s p ro z e s s e l a h m (S C O, D e u t s c h e P o s t, ) 4 4

5 E i nf üh r u ng i n S ec u r i t y Se cur i ty ha t s i ch g e än d e r t I n d e n g u t e n a l t e n Ta g e n S e c u rit y w a r w ic h t ig, a b e r (re l a t iv ) e infa c h F ire w a l l s w a re n d ie b e k a nnt e n We rk z e u g e P e rim e t e r D e fe ns e w a r d ie w ic h t ig s t e S t ra t e g ie S e c u rit y A nfo rd e ru ng e n w u rd e n a l s B a rrie re für d e n Eins a t z v ie l e r A p p l ik a t io ne n a ng e s e h e n S e c u rit y d a s u ng e l ie b t e K ind v s. 5 5

6 E i nf üh r u ng i n S ec u r i t y Se cur i ty ha t s i ch g e än d e r t Und j e t z t S e c u ri t y i s t de r H a u p t g e da nk e für a l l e B e t e i l i g t e n B e dro h u ng e n s i nd v i e l k o mp l e x e r g e w o rde n S i c h e e i t s s y s t e s e w e s e l i c h e l l i g e e s e i rh me müs n nt i nt nt r n D e fe ns e in D e p t h i s t di e w i c h t i g s t e S t ra t e g i e g e w o rde n S e c u ri t y g i l t i nz w i s c h e n a l s G ru nda nfo rde ru ng i n de r E nt w i c k l u ng v o n A p p l i k a t i o ne n v s. 6 6

7 M a E v o l u t i o n der S i c h er h ei t s anf o r der u ngen VV ee rg aa ng ee nh ee it NN oo tt ww ee nd ig ee M a ßna hh mm ee n Reaktiv A u to matis c h, P r o aktiv, E in z elp r o d u kte P r o d u ktp o s itio n ier u n g I n teg r ier t üb er alle S c h ic h ten Lös u n g s d es ig n / M n g. S ec. S er vic e Üb b ee rr gg rr ee ii ff ee nn dd ee rr Lös s un gg ss aa nn ss aa tz Se ll f f DD ee ff ee nn dd ii nn g g NN ee tw oo rr kk 7 7

8 S D N S t ra t e g ie 8 8

9 S el f D ef endi ng N et w o r k S t r at egi e I N T E G RA T E D S E C U RI T Y Secure C onnectiv ity T h rea t D ef ens e T rus t & I dentity A u to mated, P r o ac tive II nn itiative AA n n in itiative zz uu r r VV er to bb es d d rr amatic ss er uu nn g g ally dd er NN etz imp ww er rr kf o o ve äh th ig keiten e nn etw,, oo BB rr ed k s rr ooab hh uility u nn gg en zz u u er to ken id nnen en tif,, y zy z, u, u pp ver rr even hh in t, dd er an n n d d uu nn d d ss ic h h ddad er ap nn eu t to en th rrss eats itu atio n n an zz uu pp as ss en A D V A N C E D S E C U RI T Y T E C H N O LO G I E S Endpoint Security A ppl ica tion F irew a l l SSL V P N N etw ork A nom a l y D etection S Y S T E M LE V E L S O LU T I O N S Endpoints + N etw + P ol icies Serv ices P a rtners h ips ork s 9 9

10 C i s co s I n te g r i e r te s N e tzw e r k s i che r he i ts s y s te m Threat Defense Defend the Edge: Integrated Network FW+IPS Detects and Prevents External Attacks P r o tec t the I nter i o r : C atal y s t Integrated Sec u ri ty Pro tects Ag ai nst I nternal Attacks G u a r d the Endp o i nts : C i s c o Sec u ri ty A gent ( C SA ) Pro tects H o sts Ag ai nst I nf ecti o n I nter net I ntr a net Trust and I de nti ty V er i fy the U s er a nd Dev i c e: Identi ty -B as ed Networki ng/ NA C C o ntro l W h o / W h at H as Access Si Si S e c ure C o m m. S u r T r a p o r M V o i C o i ec e the ns t: IPSec VPN SSL VPN PL S Pro tects Data/ ce nf denti ali ty 10 10

11 5 E i g e n s c h a f t e n e i n e s S e l f -D e f e n d i n g N e t w o r k s K o n tr o lle d er E n d p u n kte an h an d d er P o lic y N etw o r k A dm i s s i o n C o ntr o l, I denti ty B a s ed N etw o r k S er v i c es, S S L Dev i c e P r o tec ti o n S c h u tz d er N etz w er kko mp o n en ten C o o l P l a P o l i c i A u u r C P U M o r y T l s i c P r o k o l l ntr ne ng, to -S ec e, em hr es ho di ng, her e to e F lex ib le u n d S ic h er e V er b in d u n g en Dy na m i c M u l ti p o i nt V P N, V L A N D y n amis c h er D aten au s tau s c h E lemen te ein z eln er N etfl o w, N etw o r k B a s ed A p p l i c a ti o n R ec o gni ti o n (N B A R ), Dy na m i c I ntr u s i o n P r o tec ti o n, T hr ea t R es p o ns e, A r e Y o u T her e? A u to matis c h e Reaktio n au f B ed r o h u n g en C i s c o S u r i A N o r k A m a l y o i v N I ec ty gent, etw no Detec ti n (R er hea d), DS 11 11

12 SDN Di e näc h s t e P h a s e 12 12

13 O Stän d i g k l e i n e r w e r d e n d e R e a k ti o n s f e n s te r Vu l nerab V iel i tyi D i s c ov ered P EPatc PI h Is s u ed Patc E h ExI p l oi t Is s u ed Pu b l i s h ed Inc i dent Ex p l oi t c c u Pu rs b l i s h ed Inc i dent O c c u rs O p e rati o n S l o t (#vulnerability & resources) B l as ter: 2 5 N ach i : Wenn Sl am m er: d 1 er 8 0 E x p l o i t v o w r i deem w o lp l en a t c S h i e d a en u f tv r io t t r f a l l v er h i nd er n, N imd s el b a: s t3 3 1 T ag e b ei m a x i m a l er A ns t r eng u ng? Day-Zero Attack 13 13

14 D a y Z e r o Sc h u tz C is c o d ef in ier t H o s t-b as ed I n tr u s io n P r even tio n als d ie F äh ig keit, D ay z er o malic io u s C o d es o h n e N eu ko n f ig u r atio n o d er U p d ates z u s to p p en C S A h at d ie w eltw eit b es te au f g ez eic h n ete U n ter b in d u n g vo n Z er o D ay ex p lo its, Wür mer n, u n d V ir en üb er d ie letz ten 4 J ah r e: C o de R ed, N i m da (a l l e 5 ex p l o i ts ), P enta go ne (G o nner ) S i r c a m, Deb p l o i t, S Q L S na k e, B u gb ea r, S Q L S l a m m er, S o B i g, B l a s ter / W el c hi a, F i z z er M y Do o m, B a gl e, S a s s er, J P EG b r o w s er ex p l o i t (M S ), R P C - DC O M ex p l o i t (M S ), B u ffer O v er fl o w i n W o r k s ta ti o n s er v i c e (M S ) I nter net Ex p l o r er C o m m a nd Ex ec u ti o n V u l ner a b i l i ty K ein e N eu ko n f ig u r atio n d er C S A D ef au lt E in s tellu n g en o d er U p d ates z u d en C S A B in ar ies s in d d af ür n ötig 14 14

15 C i s c o Se c u r i ty A g e n t ( C SA ) R e g e l b a s i e r te s V e r f a h r e n, Z e r o U p d a te R e g e l b a s i e r e n d ( w h i t e l i s t ) K E I N E S i g n a t u r -U p d a t e s n o t w e n d i g Z e n t r a l e I n s t a l l a t i o n u n d L i z e n s i e r u n g Erstes Auftreten T i m eli ne C C S S A g g esc esc h h ütz ütz tt D D a a y y -Z -Z ero ero P P ro ro tec tec ti ti o o n 15 15

16 CSA: m e h r f a c h e Si c h e r h e i t s -F u n k t i o n a l i t ät e n P e r s o n a l F i r e w a l l S y s t e m H a r d e n i n g A p p l i c a t i o n P o l i c y E n f o r c e m H o s t b a s e d I D S / I P S M a l i c i o u s C o d e P r o t e c t i o n F i l e I n t e g r i t y e n t 16 16

17 C i s c o Se c u r i ty A g e n t ( C SA ) Regelbasierender S c h u t z v o r A ngrif f en 1. L earn ab ou t th e s y s tem 2. T ry i ng v ari ou s v u l nerab i l i ti es Sc h nel l e Änderu ng Ständi ge SIG -U p dates T ei l wei s e u ngenau gegenüb er neu en A ngri ffen T arget 3. C reate b ac kdoors 4. Ex tend attac k to oth er s y s tem s 5. D os, get i nform ati on Sc h adens p otenti al Ändern s i c h s eh r l angs am Ins p i rati on für C SA 17 17

18 W i e d e r C SA A n g i f f e s to p p t A lle A n g r if f e müs s en b es timmte V er h alten s w eis en f o lg en u m er f o lg r eic h z u s ein : Der A n g ri f f c o d e m u s s i n d er Z i el -C P U a u s g ef üh rt w erd en B u f f er o v erf l o w, ex ec u t e s h el l s c ri p t s, d o w n l o a d u n d ex ec u t e c o d e, u.a. D a es n u r ein e b eg r en z te Z ah l vo n Weg en in ein S y s tem vo m N etz w er k au s g ib t, w er d en ein e o d er meh r er e d ies er V er h alten s w eis en vo n d en A n g r if f en ver w en d et D ie Üb er w ac h u n g u n d K o n tr o lle d ies es S c h lüs s elver h alten s läß t d en C S A A n g r if f e b lo c kier en Weil alle A n g r if f e d ie g leic h en w eg e b en u tz en müs s en, is t d er C S A s eh r ef f ektiv b eim S to p p en vo n b ekan n ten u n d u n b ekan n ten ( D ay Z er o ) A n g r if f en 18 18

19 C SA - I N C O R E A r c h i te c tu r e Der C i s c o S ec u ri t y A g en t c h ec k t d i e S y s t em a u f ru f e u n d en t s c h ei d et m i t a l l o w / d en y R eg el n, o b d er A u f ru f g es t a t t et i s t o d er n i c h t. Di es e T ec h o l o g i e h ei ßt I N C O R E I N C O RE I N t erc ep t C O rrel a t e Ru l es En g i n e Z ero U p d a t e A rc h i t ek t u r K ei n e S i g n a t u ren n o t w en i g u m ei n en A n g ri f f erf o l g rei c h a b z u w eh ren! 19 19

20 C G C SA - V e r te i l u n g d e r P o l i c i e s üb e r P U L L - A n s a tz eneri eru ng der A gent K i ts Ins tal l ati on der K i ts ( m i t Z erti fi kat) C S AM CA Agent Kits R egi s tri eru ng u nd PU L L der Pol i c y v i a SSL SSL Agent CA SSL CA CA CA CA Agent Agent Agent Agent 20 20

21 Netzwerk: O u tb rea k P rev en ti o n S erv i c e Adressiert den w ic h tig sten T eil ein es L eb en sz y k l u ses v o n V iren u n d Würm ern : O u tb rea k P rev en tio n Sehr s c hn el l R ea k t i o n a u f n eu e Au sb rüc h e w irk t g eg en b eides: Würm er u n d V iren S y stem -l ev el An sa tz : C isc o I n fra stru k tu r üb erg reifen d G a u K o n l l l l a n n P o l y M w r s s g r b en e tro e der in sta tio ein er eu en ic Automatic mode an ual mode ith comp eh en iv e con tr ol ov er ev en ts an d ex cep tion on a dev ices or oup as is E rw eiteru n g der C isc o S el f-d efen din g N etw o rk I n itia tiv e 21 21

22 O O O O O O O u tb rea k P rev en ti o n S erv i c e Schnelle R ea k t i o n a u f neu e V i r en u nd Wür m er Die ein z el n en B es t a n d t eil e: TrendLabs w el t w ei t es real -t i m e M o ni t o ri ng u nd S i g nat u renent w i c k l u ng st eam S o ft w are: C i sc o I nc i dent C o nt ro l S erv er ( I C S ) H i l fsm i t t el für di e A dm i ni st rat i o n u nd das A u sro l l en v o n V i ren u nd Würm ern bez o g enen Lösu ng en Z i el si nd N et z w erk g erät e, di e di esen S erv i c e z u r V erfüg u ng st el l en T r end L a b s O u t b r e a k & t h r e a t i n f o r m a t i o n h r e a t l e v e l e t a i l e d d e s c r i p t i o n y p i c a l i m p a c t / v e c t o r s e c o m m e n d e d O P T D T R ACL P o l i c y / e x c e p t i o n s M a n u a l o r a u t o m a t i c F u l l c o n t r o l : D e v i c e s, g r o u p s, e t c. R e c o m m e n d e d o r m o d i f i e d O P ACL Ca t a l y s t I P S B l a d e M a l w a r e O u tb r ea k! t= 0 P ACL P S i g P AC L t= 3 0 m i n m a x / 1 5 ty p Cisco Incident Contr ol S er v er ( ICS ) P ACL P S i g P S i g t= m i n m a x / 6 0 ty p Ca t a l y s t R o u t e r I P S S e r i e s R o u t e r I P S i n S o f t w a r e AS A I P S B l a d e 22 22

23 Outbreak Prevention Service Service T y p en Zwei L ev el v o n O P S S er v ic e b a s ier en d a u f d en F u n k t io n a l it ät en d es en t s p r ec h en en G er ät es L ev el I S o l u tio n : O P AC L a u f I O S dev ic es O u k P n L ( O P L ) w n a l b v o n 3 0 m. ( ~ 1 5 p. ) n a c h l c h v o n T a b p u b l tb rea rev en tio AC AC ird in erh in ty ein em festg estel ten Au sb ru den ren dl s iz iert Z iel g eräte: R o u ters, S w itc h es O P AC L E x a m p l es: W O R M _ M S B L A S T. A ( T CP P or t ) : deny tcp a ny a ny eq W O R M _ N A CH I. A ( ICM P ) : deny icm p a ny a ny W O R M _ B A G L E. B ( T CP / U D P P or t ) : deny tcp a ny a ny eq , deny u dp a ny a ny eq

24 Outbreak Prevention Service Service T y p en L ev el I I S o l u tio n : O P AC L + O P S ig a u f I P S dev ic es O u k P n L ( O P L ) w n a l b v o n 3 0 m. ( ~ 1 5 p. ) n a c h l c h v o n T a b p u b l tb rea rev en tio AC AC ird in erh in ty ein em festg estel ten Au sb ru den ren dl s iz iert O P AC L w ird en tfern t u n d du rc h ein e O u tb rea k P rev en tio n S ig n a tu r ( O P S ig ) ersetz t. T y p isc h erw eise in n erh a l b v o n c a M in u ten n a c h Au sb ru c h Z iel e der S ig n a tu r: a l l e I P S -en a b l ed G eräte: I P S series sen so rs, I D S M 2 für C a t6 K, I O S R o u ters m it S ec u rity I m a g e ( S W I P S ) 24 24

25 Outbreak Prevention Service M a n a g em en t & M o n it o rin g S u p p o r t in C S -M A R S S y s l o g c l ien t s u p p o r t f o r u s e wit h o t h er r ep o r t in g t o o l s 25 25

26 CONVERGED MANAGEMENT, MONITORING, AND RES P ONS E Security Management

27 Management, Monitoring & P l anu ng Geringe K o m p l ex ität Device Managem ent SS yy stem Managem ent Integriertes, ww eb -b aa sierend es MM aa na gem ent A ll ll -in-o ne KK oo nf igu ra tio n FF W W,, IP S S,, VV PP N N,, AA V V RR ea ll -tim e mm oo nito ring to oo ll s Cisco Device Manager Meh rere PP rod uu kk te integriert in einem Managem ent HH oh e SS kk al ierb ark eit Cisco SS ecu rity Manager Monitoring and Mitigation Mu ll ti-p ll atform EE vent Managem ent and RR esp onse AA uu sgek ll ügel te KK orrel ation Cisco SS ecu rity MA RR SS CiscoW ork s SS II MS AA uu dd iting Üb erp rüfu ng dd er SS ecu rity KK onform ität dd es GG erätes nach II nd uu strie b est pp ractices uu nd RR egu ll arien Cisco SS ecu rity AA uu dd itor 27 27

28 C is c o D ev ic e Manager Integriert, W eb -b a s iertes M a na gem ent u nd M o nito ring Managem ent u nd Monitoring d er Cisco Lösu ngen V ol l e U nterstütz u ng für d ie K onfigu ration von: - A ccess control - A p p l ication secu rity - A nti-x & attack svcs - V P N p ol icies - R ou ting - A A A u nd m eh r U nterstütz t Monitoring von: - S y sl og ( real -tim e) - Connections - T h rou gh p u t - S y stem statu s & m eh r

29 C is co Security M anag em ent Suite S ec u rity M a na ger D ev ic e C entric P o l ic y V iew 29 29

30 C is co Security M anag em ent Suite S ec u rity M a na ger M a p C entric V iew B iet et m u l t i-l a y er m a p B iet et G er ät e R ep l ik a t io n O p er a t io n a l e F ea t u r es Config roll back D e p loy A u f r u f a n d er er T o o l s V P N bu ild e r Dep l o y m ent Device Settings V P N F ir ew a l l I P S O th er R u le s t able D e v ice s e t t ings 30 30

31 W S el f -D ef end ing N etw ork E v ent G eneratoren A t t a c k er V i ru s o rm User S c r ip t K id d ie Z om b ie / DDoS 31 31

32 Defense-I n-dep th = Höh er e K o m p l ex i tät I nfected H ost Log/ A l ert 32 32

33 A u f gab e d es S ec -A d min: F irew al l u nd N I D S L ogs S wit c h L o g s F ir ewa l l L o g s R o u t er L o g s I P S L o g s 33 33

34 C is c o Mitigation and R es p ons e S y s tem ( MA R S ) N u t z u n g d er v o r h a n d en en N et z wer k in f r a s t r u k t u r z u r S ic h er h eit s a n a l y s e D a t en k o r r el l ier u n g im k o m p l et t en N et z N I D S, F ire w all, R ou t e r, S w it ch e s, CS A S y s S N M P, R D E P, S D E E, N e t F, E p e v e log, low nd oint nt logs S c h n el l e L o k a l is ier u n g v o n A n g r if f en u n d E in l eit u n g v o n G eg en m a ßn a h m en K ey F ea t u r es M e ld e t S e cu rit y incidents bas ie re nd au f D ev ice m essa g es, ev ents, u nd sessio ns I w e e h d e T d s t e ncidents rd n grap is ch in r op ologie arge llt G e ge nm aßnah m e n au f L 2 p ort s u nd L 3 G e rät e n S kalie rbarke it au ch in kom p le x e re n U m ge bu nge n 34 34

35 CS-M A R S: W i e e s f u n k t i o n i e r t? S c h n el l es E r f a s s en v o n u n t er s c h ied l ic h en D a t en : d a t a f l o ws, l o g s, a l er t s, t o p o l o g y D y n a m is c h e R ed u z ier u n g, K o r r el ier u n g u n d Üb er p r üf u n g V is u a l is ier u n g d er p r io r is ier t en, r ea l en V o r f äl l en a u f d er N et z wer k -T o p o l o g iek a r t e A u t o m a t is c h es z en t r a l e I n v es t ig a t io n, A u d it in g u n d R ep o r t in g V h d t u n d s t o p p t A n g r f d u r c h s o g. E n f o r c t d er in er if e em en ev ic es ContextCorrelation S u rev ec tor A naly s is Network, Fw, NAT, Netflow Capture NAT, CVE, Anomaly, Rule Correlate VA, Fw, Sw, Rule Validate Drill-Down Visualize, Prioritize, Investigate Logs, Alerts, Traffic flow Leveraged Mitigation A u tom itig ate Rapid Query, Audit, Report 35 35

36 CS-M A R S: Üb e r s i c h t u n d K o n t r o l l e 36 36

37 CS-M A R S: D a t e n k o r r e l i e r u n g Genaue Darstellung des Angriffsweges H o s t A P o r t S c a n s T a r g e t X, f o l l o w e d b y H o s t A B u f f e r O v e r f l o w A t t a c k t o T a r g e t X W h e r e X i s v u l n e r a b l e t o A t t a c k, f o l l o w e d b y T a r g e t X e x e c u t e s p a s s w o r d a t t a c k o n T a r g e t Y 37 37

38 C S -MA R S : E inl eitu ng v on G egenmaßnah men Nutzung d e r A b w e h r m ögl i c h e i te n i nne r h a l b d e s Ne tzw e r k s Graphische D arstel l u n g path. Geg en m aßn ahm en w erd en au f d em N etz w erk g erät d u rchg ef ührt. d es L ay er 2 3 attack S wit c h C isco M A R S k o n f ig u riert Geg en m aßn ahm en R o u t er F ir ewa l l ] 38 38

39 CONVERGED MANAGEMENT, MONITORING, AND RES P ONS E Zusammenfassung

40 Se c u r i t y i s t n i c h t o p t i o n a l! Security Optional Security als Sch w A d d -On ierig e I nteg ration N ich t K os tenef f ek tiv K eine K onz entration auf d ie G es ch äf ts proz es s e Security als T eil eines Sys tem s Security is t eing eb aut I ntellig ente Z us am m enarb eit A b g es tim m t auf d ie G es ch äf ts proz es s e 40 40

41 41 41

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ). PROCEDIMIENTO DE RECUPERACION Y COPIAS DE SEGURIDAD DEL CORTAFUEGOS LINUX P ar a p od e r re c u p e ra r nu e s t r o c o rt a f u e go s an t e un d es a s t r e ( r ot u r a d e l di s c o o d e l a

More information

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct H ig h L e v e l O v e r v iew S te p h a n M a rt in S e n io r S y s te m A rc h i te ct OPEN XCHANGE Architecture Overview A ge nda D es ig n G o als A rc h i te ct u re O ve rv i ew S c a l a b ili

More information

G ri d m on i tori n g w i th N A G I O S (*) (*) Work in collaboration with P. Lo Re, G. S av a and G. T ortone WP3-I CHEP 2000, N F N 10.02.2000 M e e t i n g, N a p l e s, 29.1 1.20 0 2 R o b e r 1

More information

Enterprise Data Center A c h itec tu re Consorzio Operativo Gruppo MPS Case S t u d y : P r o g et t o D i sast er R ec o v er y Milano, 7 Febbraio 2006 1 Il G r u p p o M P S L a B a n c a M o n t e d

More information

m Future of learning Zehn J a hr e N et A c a d ei n E r f o l g s p r o g r a m Cisco E x p o 2 0 0 7 2 6. J u n i 2 0 0 7, M e sse W ie n C. D or n in g e r, b m u k k 1/ 12 P r e n t t z d e r p u t

More information

Application Note: Cisco A S A - Ce r t if ica t e T o S S L V P N Con n e ct ion P r of il e Overview: T h i s a p p l i ca ti o n n o te e x p l a i n s h o w to co n f i g u r e th e A S A to a cco m

More information

Der Bologna- P roz es s u nd d i e S t aat s ex am Stefan Bienefeld i na Service-St el l e B o l o g n a d er H R K Sem in a r D er B o l o g n a P ro z es s U m s et z u n g u n d M it g es t a l t u

More information

W Cisco Kompetanse eek end 2 0 0 8 SMB = Store Mu ll ii gg hh eter! Nina Gullerud ng ulleru@ c is c o. c o m 1 Vår E n t e r p r i s e e r f a r i n g... 2 S m å o g M e llo m s t o r e B e d r i f t e

More information

Device I n s t r u m en t a t io n E x a m p l es : I P S L A s & N et F l o w Presented by Emmanuel Tychon Techni cal M ark eti ng Eng i neer TU D resden, J anuary 1 7 th 2 0 0 7 1. C is co I O S I P

More information

First A S E M R e c to rs C o n f e re n c e : A sia E u ro p e H ig h e r E d u c a tio n L e a d e rsh ip D ia l o g u e Fre ie U n iv e rsitä t, B e rl in O c to b e r 2 7-2 9 2 0 0 8 G p A G e e a

More information

EM EA. D is trib u te d D e n ia l O f S e rv ic e

EM EA. D is trib u te d D e n ia l O f S e rv ic e EM EA S e c u rity D e p lo y m e n t F o ru m D e n ia l o f S e rv ic e U p d a te P e te r P ro v a rt C o n s u ltin g S E p p ro v a rt@ c is c o.c o m 1 A g e n d a T h re a t U p d a te IO S Es

More information

IronPort Gateway Security Products The Leader in Communication Security Reiner Baumann IronPort Systems The Principles of Industry Leadership A n a l y s t L e a d e r s h i p R e c o g n i z e d a s t

More information

PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB

PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB M IPCC EXPRESS Product Solution (IPCC - IP Co n t a c t Ce n t e r ) E i n f ü h r u n g Ü b e r h u nd e r t M il l io ne n N u t ze r - P r o g no s e n zu f o l g e w e r d e n e s in d ie s e m J ah

More information

Campus Sustainability Assessment and Related Literature

Campus Sustainability Assessment and Related Literature Campus Sustainability Assessment and Related Literature An Annotated Bibliography and Resource Guide Andrew Nixon February 2002 Campus Sustainability Assessment Review Project Telephone: (616) 387-5626

More information

W Regional Cooperation in the Field of A u tom otiv e E ngineering in S ty ria Dr. Peter Riedler 2 9.1 1.2 0 1 1 i e n GmbH Graz B u s ines s S trategy S ty ria 2 0 2 0 H is tory 1 9 9 4 1 9 9 5 1 9 9

More information

ACE-1/onearm #show service-policy client-vips

ACE-1/onearm #show service-policy client-vips M A C E E x a m Basic Load Balancing Using O ne A r m M ode w it h S ou r ce N A T on t h e C isco A p p licat ion C ont r ol E ngine Goal Configure b a s ic l oa d b a l a nc ing (L a y er 3 ) w h ere

More information

SCO TT G LEA SO N D EM O Z G EB R E-

SCO TT G LEA SO N D EM O Z G EB R E- SCO TT G LEA SO N D EM O Z G EB R E- EG Z IA B H ER e d it o r s N ) LICA TIO N S A N D M ETH O D S t DVD N CLUDED C o n t e n Ls Pr e fa c e x v G l o b a l N a v i g a t i o n Sa t e llit e S y s t e

More information

e Videobewaking ov er I P Marty K n o p e rt 1 A l l m z u l l b t g r u m a k h w k h w k z a l z r E p r m a r k t t c m a r k t Video vision: e vor en va n video en in de na ij e oek om st eb ik en

More information

Data Center end users for 40G/100G and market dy nami c s for 40G/100G on S M F Adam Carter Ci s c o 1 W Now that 40GbE is part of the IEEE 802.3ba there will be a wid er array of applic ation s that will

More information

Positioning 40 and 100 GbE in data center inter-sw itch l ink ap p l ications and 40GbE PM D recom m endations Adam Carter, Cisco Al essan dro B arb ieri, Cisco 1 m Data Center inter-s w itc h l ink ap

More information

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner í d : r ' " B o m m 1 E x p e r i e n c e L : i i n g S e c u r it y. 1-1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his g u id e å ] - ew i c h P e t e r M u la e n PACKT ' TAÞ$Æo

More information

SIV for VoiceXM 3.0: a n g u a g e a n d A p p l ica t ion D es ig n C on s id era t ion s Ken Rehor C i s c o S y s t em s, I nc. krehor@cisco.com March 05, 2009 G VoiceXM Application Architecture PSTN

More information

IT-S i c h e r h e i t Stephan Meier s m eier@ c is c o. c o m 1 The Evolution d er Z iele Vom H ob b y i s t e n z u m P r of e s s i on a l T hreats b ec o m ing inc reas ing l y d if f ic u l t to d

More information

The Business Case for D om aink ey s I d ent ified M ail Andy Spillane V ic e P r es ident, Y ah o o! M February 13, 2006 ail 1 Fighting Spam & Email Abuse R eq uir es a M ulti-fac eted Appr o ac h DomainKeys

More information

C o a t i a n P u b l i c D e b tm a n a g e m e n t a n d C h a l l e n g e s o f M a k e t D e v e l o p m e n t Z a g e bo 8 t h A p i l 2 0 1 1 h t t pdd w w wp i j fp h D p u b l i c2 d e b td S t

More information

M Fast forward into th e fu tu re Accelerating b u s ines s o p p o rtu nity and natio nal p ro s p erity Viktor Kovacs anaging D irecto r H u ngary & Ad riatic R egio n C h a n g e t h e w o r l d» O

More information

How To Know If You Are A Good Or Bad Person

How To Know If You Are A Good Or Bad Person QuesCom I P -T E L E F O N I E & G S M -G A T E W A Y S Robert Urban D i rec tor I nternati onal S al es Agenda Üb e r Q u e s C o m K u n d e n M a r k t üb e r s i c h t Q u e s c o m Lös u n g Q u e

More information

Video og IP TV - h v or da n p هv ir k es n et t v er k en e? t t a d A c c o u n t M a n a g S P / T o m S m t Ole-P et er R s er elec eg en 1 Hva gjorde vi u t en T V.... 2 2 0 0 m il l s am t idige

More information

FORT WAYNE COMMUNITY SCHOOLS 12 00 SOUTH CLINTON STREET FORT WAYNE, IN 468 02 6:02 p.m. Ma r c h 2 3, 2 015 OFFICIAL P ROCEED ING S Ro l l Ca l l e a r d o f h o o l u e e o f t h e r t y m m u t y h o

More information

SCHOOL PESTICIDE SAFETY AN D IN TEG R ATED PEST M AN AG EM EN T Statutes put into law by the Louisiana Department of Agriculture & Forestry to ensure the safety and well-being of children and school personnel

More information

I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y

I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y and KB rl iak s iol mi a, hme t a ro cp hm a5 a 2k p0r0o 9f i,e ls hv oa nr t ds eu rmv oedye l o nf dae cr

More information

Unit 16 : Software Development Standards O b jec t ive T o p r o v id e a gu ide on ho w t o ac h iev e so f t wa r e p r o cess improvement through the use of software and systems engineering standards.

More information

UNDERSTANDING FLOW PROCESSING WITHIN THE CISCO ACE M ODULE Application de liv e r y pr odu cts can distr ib u te tr af f ic to applications and w e b se r v ice s u sing v ar y ing le v e ls of application

More information

Collaboration in Public H e alth be tw e e n U niv e rs ity of H e id e lbe rg and U niv e rs ity of D ar e s S alaam How t h e c oop e r a t i on e m e r g e d Informal c ont ac t s from e arly 1 9

More information

A n d r e w S P o m e r a n tz, M D

A n d r e w S P o m e r a n tz, M D T e le h e a lth in V A : B r in g in g h e a lth c a r e to th e u n d e r s e r v e d in c lin ic a n d h o m e A n d r e w S P o m e r a n tz, M D N a tio n a l M e n ta l H e a lth D ir e c to r f

More information

M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. M P L S /V P N S e c u rity M ic h a e l B e h rin g e r < m b e h rin g @ c is c o.c o m > M b e h rin g - M P L S S e c u rity 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h

More information

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 T e le c o m m u n ic a t io n s a n d th e C h a n g in g G e o g r a p h ie s o f K n o w le d g e T r a n s m is s io n in th e L a te

More information

AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D.

AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D. AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981 P. A. V a le s, Ph.D. SYNOPSIS Two in d ep en d en t tre a tm e n t g ro u p s, p a r t ic ip

More information

G S e r v i c i o C i s c o S m a r t C a r e u ي a d e l L a b o r a t o r i o d e D e m o s t r a c i n R ل p i d a V e r s i n d e l S e r v i c i o C i s c o S m a r t C a r e : 1 4 ع l t i m a A c

More information

M Mobile Based Clinical Decision Support System Bhudeb Chakravarti & Dr. Suman Bhusan Bhattacharyya Provider & Public Health Group, VBU-HL P S aty am C om puter S ervices L im ited Bhudeb_ C hak ravarti@

More information

W h a t is m e tro e th e rn e t

W h a t is m e tro e th e rn e t 110 tv c h a n n e ls to 10 0 0 0 0 u s e rs U lf V in n e ra s C is c o S y s te m s 2 0 0 2, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h a t is m e tro e th e rn e t O b je c tiv

More information

CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. CIS CO S Y S T E M S A c c e s s T e c h n o lo g y T e le c o m /IT Co n n e c tiv ity W o rk s h o p G u ille rm o A g u irre, Cis c o Ch ile g m o.a g u irre @ c is c o.c o m S e s s io n N u m b e

More information

Bonn Declaration on Regional Cooperation in Quality Assurance in Higher Education Adopted on 20 June 2007 during the Conference Enhancing Quality Across Borders R egional Cooperation in Quality Assurance

More information

1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1.

1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1. 1. O b l a s t r o z v o j s p o l k a S U U K 1. 1. Z v y š o v á n í k v a l i f i k a c e Š k o l e n í o S t u d e n t s k á u n i e U n i v e r z i t y K a r l o v y ( d á l e j e n S U U K ) z í

More information

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management The EU D a t a G r i d D a t a M a n a g em en t (EDG release 1.4.x) T h e Eu ro p ean Dat agri d P ro j ec t T eam http://www.e u - d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d b y th e

More information

COMTECH 2005 Dresden Ci sc o I P - Tel efo ni e i n der P ra x i s Dirk E b e rh a rd t I n t e rn e t w o rkin g C o n s u l t a n t 1 Aktuelle M a r ktz a h len Kundenzahl s t ei g t w ei t er an 28,000+

More information

Emerging Security T h rea ts Maurizio Taffone m t affone@ c is c o. c om P rod uc t Manag er S ec urit y E urop ean Mark et s 1 Agenda Trends in Motivation E x ist ing t h rea t s a nd L e s s ons f r

More information

w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 -

w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 - E ffic a c y o f S e le c tiv e M y e lo id L in e a g e L e u c o c y te D e p le tio n in P y o d e r m a G a n g re n o su m a n d P so r ia sis A sso c ia te d w ith In fla m m a to r y B o w e l D

More information

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years Claim#:021914-174 Initials: J.T. Last4SSN: 6996 DOB: 5/3/1970 Crime Date: 4/30/2013 Status: Claim is currently under review. Decision expected within 7 days Claim#:041715-334 Initials: M.S. Last4SSN: 2957

More information

Practice Writing the Letter A

Practice Writing the Letter A Aa Practice Writing the Letter A A a A a Write a in the blank to finish each word. c t re h d Write A in the blank to finish each word. nn US ndy Bb Practice Writing the Letter B B b B l P b Write b in

More information

Internationalization strategy of the SEPT Program Design of market-oriented training and ed u c ation p rod u c ts Utz D o r n b e r g e r ( Un i v e r s i ty o f L e i p zi g ) & N g u y e n T h i T h

More information

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m Symposium on Public Transportation in Indian Cities with Special focus on Bus Rapid Transit (BRT) System New Delhi 20-21 Jan 2010 B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g

More information

B rn m e d s rlig e b e h o v... 3 k o n o m i... 6. S s k e n d e tils k u d o g k o n o m is k frip la d s... 7 F o r ld re b e ta lin g...

B rn m e d s rlig e b e h o v... 3 k o n o m i... 6. S s k e n d e tils k u d o g k o n o m is k frip la d s... 7 F o r ld re b e ta lin g... V e lf rd s s e k re ta ria te t S a g s n r. 1 4 3 4 1 5 B re v id. 9 9 3 9 7 4 R e f. S O T H D ir. tlf. 4 6 3 1 4 0 0 9 s o fie t@ ro s k ild e.d k G o d k e n d e ls e s k rite rie r fo r p riv a tin

More information

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process Improvement Understanding, Modelling and Improving the Software Process Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process improvement Understanding existing processes

More information

proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->

proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters-> Overview of the New S ec u rity M od el WP6 Meeting V I D t G R I D C o nf er enc e B r c el o ne, 1 2-1 5 M y 2 0 0 3 Overview focus is on VOMS C A d e t il s r e in D 7. 6 Se cur it y D e sig n proxy

More information

T c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB 06 013-0009 0 M /V. ja a r.

T c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB 06 013-0009 0 M /V. ja a r. D a t a b a n k m r in g R a p p o r t M Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r I d e n t if ic a t ie v a n d e m S e c t o r BJB V o lg n r. 06 013-0009 0 V o o r z ie n in g N ie u w la

More information

R e t r o f i t o f t C i r u n i s g e C o n t r o l

R e t r o f i t o f t C i r u n i s g e C o n t r o l R e t r o f i t o f t C i r u n i s g e C o n t r o l VB Sprinter D e s c r i p t i o n T h i s r e t r o f i t c o n s i s t s o f i n s t a l l i n g a c r u i s e c o n t r o l s wi t c h k i t i n

More information

Erfa rin g fra b y g g in g a v

Erfa rin g fra b y g g in g a v Erfa rin g fra b y g g in g a v m u ltim e d ia s y s te m e r Eirik M a u s e irik.m a u s @ n r.n o N R o g Im e d ia N o rs k R e g n e s e n tra l fo rs k n in g s in s titu tt in n e n a n v e n d

More information

Middagserie Eschatologie Oosterparkkerk, Amsterdam, December 2007

Middagserie Eschatologie Oosterparkkerk, Amsterdam, December 2007 Amserdam m Middagserie Eschalgie Oserparkkerk, Amserdam, December 2007 Onderweg na a r rgen Serie kerkdiensen ver chriselijke ekm sverw a ching f escha lg ie A m s e r d a m D e c e m b e r 2 0 0 7 V r

More information

/* ------------------------------------------------------------------------------------

/* ------------------------------------------------------------------------------------ Pr o g r a m v a r e fo r tr a fik k b e r e g n in g e r b a s e r t p å b a s is k u r v e m e to d e n n M a tr ix * x M a tr ix E s ta lp h a B e ta ; n M a tr ix * z M a tr ix ; g e n M a tr ix X

More information

How To Be A Successful Thai

How To Be A Successful Thai D The Joint Master of Science eg ree C ou rse in V eterinary P u b l ic H eal th ( MScVPH), F U -C MU Dr. L e rt ra k S ri k i t j a k a rn R e g i o n a l C e n t re f o r V e t e ri n a ry P u b l i

More information

Cisco Security Agent (CSA) CSA je v í c eúčelo v ý s o f t w a r o v ý ná s t r o j, k t er ý lze p o už í t k v ynuc ení r ů zný c h b ezp ečno s t ní c h p o li t i k. CSA a na lyzuje c h o v á ní a

More information

CORSO AVANZATO DI NEGOZIAZIONE Un laboratorio intensivo per lo sviluppo e la pratic a d elle c apac ità neg oz iali Scotwork Italia S.r.l. C op y rig h t 2 0 0 6 1 O I m p l t l t z o l N o z n n l h l

More information

Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage

Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage CAS Loss Reserve Seminar 23 Session 3 Private Passenger Automobile Insurance Frank Cacchione Carlos Ariza September 8, 23 Today

More information

BLADE 12th Generation. Rafał Olszewski. Łukasz Matras

BLADE 12th Generation. Rafał Olszewski. Łukasz Matras BLADE 12th Generation Rafał Olszewski Łukasz Matras Jugowice, 15-11-2012 Gl o b a l M a r k e t i n g Dell PowerEdge M-Series Blade Server Portfolio M-Series Blades couple powerful computing capabilities

More information

Put the human back in Human Resources.

Put the human back in Human Resources. Put the human back in Human Resources A Co m p l et e Hu m a n Ca p i t a l Ma n a g em en t So l u t i o n t h a t em p o w er s HR p r o f essi o n a l s t o m eet t h ei r co r p o r a t e o b j ect

More information

J a re k G a w o r, J o e B e s te r, M a th e m a tic s & C o m p u te r. C o m p u ta tio n In s titu te,

J a re k G a w o r, J o e B e s te r, M a th e m a tic s & C o m p u te r. C o m p u ta tio n In s titu te, 1 4 th IE E E In te r n a tio n a l S y m p o s iu m o n H ig h P e r fo r m a n c e D is tr ib u te d C o m p u tin g (H P D C -1 4 ), R e s e a rc h T ria n g le P a rk, N C, 2 4-2 7 J u ly 2 0 0 5.

More information

Bewährte Six Sigma Tools in der Praxis

Bewährte Six Sigma Tools in der Praxis Frankfurt School of Finance & Management 2. ProcessLab-Workshop 03.2.2008, 8h Bewährte Six Sigma Tools in der Praxis A. Raab BB Certified GE Commercial Finance Agenda Intro Teaser Vortrag Break Out Sessions

More information

Future Trends in Airline Pricing, Yield. March 13, 2013

Future Trends in Airline Pricing, Yield. March 13, 2013 Future Trends in Airline Pricing, Yield Management, &AncillaryFees March 13, 2013 THE OPPORTUNITY IS NOW FOR CORPORATE TRAVEL MANAGEMENT BUT FIRST: YOU HAVE TO KNOCK DOWN BARRIERS! but it won t hurt much!

More information

How to Subnet a Network How to use this paper Absolute Beginner: Read all Sections 1-4 N eed a q uick rev iew : Read Sections 2-4 J ust need a little h elp : Read Section 4 P a r t I : F o r t h e I P

More information

JCUT-3030/6090/1212/1218/1325/1530

JCUT-3030/6090/1212/1218/1325/1530 JCUT CNC ROUTER/CNC WOODWORKING MACHINE JCUT-3030/6090/1212/1218/1325/1530 RZNC-0501 Users Guide Chapter I Characteristic 1. Totally independent from PC platform; 2. Directly read files from U Disk; 3.

More information

Overview of Spellings on www.spellzoo.co.uk

Overview of Spellings on www.spellzoo.co.uk Overview of Spellings on www.spellzoo.co.uk Year 1 Set 1: CVC words Set 2: CVC and CCVC words Set 3: CVC, CCVC and CCVCC words Set 4: Words containing 'ch', 'sh', 'th' and 'wh' Set 5: Words ending in 'll',

More information

Online Department Stores. What are we searching for?

Online Department Stores. What are we searching for? Online Department Stores What are we searching for? 2 3 CONTENTS Table of contents 02 Table of contents 03 Search 06 Fashion vs. footwear 04 A few key pieces 08 About SimilarWeb Stepping up the Competition

More information

CUSTOMER INFORMATION SECURITY AWARENESS TRAINING

CUSTOMER INFORMATION SECURITY AWARENESS TRAINING CUSTOMER INFORMATION SECURITY AWARENESS TRAINING IN T RO DUCT ION T h i s c o u r s e i s d e s i g n e d to p r o v i d e yo u w i t h t h e k n o w l e d g e to p r o t e c t y o u r p e r s o n a l

More information

CREATE SHAPE VISUALIZE

CREATE SHAPE VISUALIZE SHAPE VISUALIZE B I M E q u i t y BIM Workflow Guide SHAPE VISUALIZE Introduction We o e to t e r t ook i t e BIM Workflow erie I t e o owi ter we wi o er e eryt i eeded or you to ter t e i o re ti i d

More information

The SmartView Tracker

The SmartView Tracker CHAPTER 5 S m a r tv ie w T r a c k e r In This Chapter The Need for Tracking p ag e 8 9 The C heck P oint S olu tion for Tracking p ag e 9 0 Tracking C onsiderations p ag e 9 6 Tracking C onfigu ration

More information

Ontwikkelingen van R o u ter N etwer ken Fred Rabouw 1 3-t i e r R o u t e r N e t w e r k e n. Core: forwarden van grote h oeveel h eden data. D i s tri b u ti e: Cl as s i fi c eren en fi l teren A c

More information

T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility

T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility V. Ravi Ans human Indian Ins titute of Manag ement B ang alore Rajes h Chakrabarti Indian S chool of Bus ines

More information

IntИg r a ti o n d e s s o l u ti o ns IB M e t C i s c o : C o l l a b o r a ti o n e t C o m m u ni c a ti o ns U ni f i Иe s ( U C 2 ) Mathieu in tr at Sales Business ev elop ent anag er om unic at

More information

Opis przedmiotu zamówienia - zakres czynności Usługi sprzątania obiektów Gdyńskiego Centrum Sportu

Opis przedmiotu zamówienia - zakres czynności Usługi sprzątania obiektów Gdyńskiego Centrum Sportu O p i s p r z e d m i o t u z a m ó w i e n i a - z a k r e s c z y n n o c i f U s ł u i s p r z» t a n i a o b i e k t ó w G d y s k i e C eo n t r u m S p o r t us I S t a d i o n p i ł k a r s k i

More information

C + + a G iriş 2. K o n tro l y a p ıla rı if/e ls e b re a k co n tin u e g o to sw itc h D ö n g ü le r w h ile d o -w h ile fo r

C + + a G iriş 2. K o n tro l y a p ıla rı if/e ls e b re a k co n tin u e g o to sw itc h D ö n g ü le r w h ile d o -w h ile fo r C + + a G iriş 2 K o n tro l y a p ıla rı if/e ls e b re a k co n tin u e g o to sw itc h D ö n g ü le r w h ile d o -w h ile fo r F o n k s iy o n la r N e d ir? N a s ıl k u lla n ılır? P ro to tip v

More information

C e r t ifie d Se c u r e W e b

C e r t ifie d Se c u r e W e b C r t ifi d S c u r W b Z r t ifizi r t Sic h r h it im W b 1 D l gat s N ic o las M ay n c o u r t, C EO, D r am lab T c h n o lo gi s A G M ar c -A n d r é B c k, C o n su lt an t, D r am lab T c h n

More information

G d y n i a U s ł u g a r e j e s t r a c j i i p o m i a r u c z a s u u c z e s t n i k ó w i m p r e z s p o r t o w y c h G d y s k i e g o O r o d k a S p o r t u i R e k r e a c j i w r o k u 2 0

More information

Vom prozessorientierten Wissensmanagement zum intelligenten Engineering-Portal

Vom prozessorientierten Wissensmanagement zum intelligenten Engineering-Portal Vom prozessorientierten Wissensmanagement zum intelligenten Engineering-Portal Praxisbericht aus der Entwicklung von Hochauftriebsystemen für Verkehrsflugzeuge KnowTech Stuttgart, 24.-25.10.2012 Thomas

More information

O s OAM Requirements for 40/100 GE Eth ernet AI S? Gary Nicholl C is co S ys t e m I E E E 8 0 2. 3 b a T as k F orce M arch 1 8, 2 0 0 8 rlan d o, F L 1 O O O O Background E t h e r n e t i s r a p i

More information

d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o

d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o P o s t a w y s p o і e c z e t s t w a w o b e c o s у b n i e p e і n o s p r a w n y c h z e s z c z e g у l n y m u w z g lb d n i e n i e m o s у b z z e s p o і e m D o w n a T h e a t t i t uodf

More information

Intralogistics Solutions Little space. Plenty of room. - Innovative packaging producer relies on the combination of planning know-how and modern

Intralogistics Solutions Little space. Plenty of room. - Innovative packaging producer relies on the combination of planning know-how and modern Intralogistics Solutions Little space. Plenty of room. - Innovative packaging producer relies on the combination of planning know-how and modern technology for efficient logistics. Philipp Hoops, Rhea

More information

III Bienal de Autismo Página 1 / 43

III Bienal de Autismo Página 1 / 43 III Bienal de Autismo Página 1 / 43 A Direcção da APPDA N ort e dá -v os as B oas V in das à I I I B ien al de Au t is m q u e es t a corres p on da à s v os s as ex p ect at iv as com o t em a em deb

More information

M Official Bologna S e m inar Joint d e gr e e s- A H allm ar k of t h e E u r op e an H igh e r E d u cat ion A r e a? R e s u l t s o f q u e s t i o n n a i r e s e n t t o B o l o g n a F o l l o w

More information

Üb e r s e t z u n g d e r N e t A c a d C u r r i c u l a Carsten Johnson c arsj ohn@ c i sc o. c om 1 NetAcad C u r r i cu l a i m Üb er s etz u n g s p r o z es s W w d s u w W S v W k h m h I T E s

More information

Cisco Connected Real Estate Lead the Experience Can Habib Vertical Sales Manager C entral & E astern E u ro p e 1 yy Trends Shaping the Future of Buildings PP oo pp uu ll at io n GG rr oo ww tt hh Doubled

More information

HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES

HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES Department Suffix Organization Academic Affairs and Dean of Faculty, VP AA 1100 Admissions (Undergraduate) AD 1330 Advanced Ceramics, Colorado Center for--ccac

More information

od e r D ie E v olution im D a ta C e n te r.. a uc h ( od e r g e ra d e? ) m it " S tora g e ov e r I P "! $ # % " & +, ' ' % ( *)

od e r D ie E v olution im D a ta C e n te r.. a uc h ( od e r g e ra d e? ) m it  S tora g e ov e r I P ! $ # %  & +, ' ' % ( *) Multiprotokoll-S w itc h e D ie Z ukun f t im N e tz w e rk DECUS LUG Hamburg November 2004 HB T GmbH Regional Channel Account Manager K ai B ielf eld t # ",+ ' *) ' ( od e r D ie E v olution im D a ta

More information

<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"

<?xml version=1.0 encoding=utf-8?> <soapenv:envelope xmlns:soapenv=http://schemas.xmlsoap.org/soap/envelope/ Applicazioni Java W S con Ax is sistema di tr ac c iab il ità ag r o al imen tar e Ing. Mario G.C.A. Cimino M.G.C.A.Cimino, Applicazioni Java-W S con Ax is, D ipar t ime nt o d i I ng e g ne r ia d e ll

More information

MPLS VPN (RFC2547bis) Seminar P c h i u p c h i. i u p c h i @ c i s c c Umberto os mberto@ os t os o. om Umberto P os c h i 1 MPLS What i t I s N o t an d What I t I s MPLS IS NOT a mechanism that allows

More information

3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4.

3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4. C i s c o P r o f i l e C o n t a c t s & F e e d b a c k H e l p Cisc o SM B Sup p ort Assist ant Configure ASA/PIX as Easy VPN Server or Client H om e > W ork W it h M y Sec urit y D ev ic es > Cisc

More information

Cisco Self-D efen d in g N et w Adaptive Threat Defense or k Latest Product Announcements 1 N ew Secu r it y Ch a llen g es E d g e F i r e w a l l i n g I n t r u s i o n & W o r m M i t i g a t i o n

More information

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security

UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop

More information

Open Source Software Open Standards

Open Source Software Open Standards after and there's Open Source Software Open Standards Open Content Jan Willem Broekema e- government From open to closed source software Hardware was limited to few models, if more than one Business models

More information

az 1995. évi L X V. tv. 28. -á ra figyelem m el 20. sz á m ú UTASÍTÁSA B u d a p e s t, 1 9 6 7. é v i jú liu s hó 2 8 -á n.

az 1995. évi L X V. tv. 28. -á ra figyelem m el 20. sz á m ú UTASÍTÁSA B u d a p e s t, 1 9 6 7. é v i jú liu s hó 2 8 -á n. BELÜGYMINISZTÉRIUM SZOLGÁLATI HASZNÁLATRA! 1 0-2 4 /2 0 /1 9 6 7. A M I N Ő S Í T É S M E G S Z Ű N T az 1995. évi L X V. tv. 28. -á ra figyelem m el A MAGYAR NÉPKÖZTÁRSASÁG BELÜGYMINISZTERHELYETTESÉNEK

More information