Content Extraction Enhancements For Target Analytics:
|
|
|
- Alexandrina Lane
- 10 years ago
- Views:
Transcription
1 TOP SECRET//COMINT//REL TO USA, FVEY// Content Extraction Enhancements For Target Analytics: SMS Text Messages: A Goldmine to Exploit 9 June, 2011 Presenters: With Work funded by T1221 Center for Content Extraction Performed in Collaboration with I B ^ H ~ r i Center for Content Extraction HHHIHHHHT132 Derived From: NSA/CSSM 1-52 Dated: Declassify On: TOP SECRET//COMINT//REL TO USA, FVEY//
2 SECRET//COMINT//REL TO USA, FVEY// (U) OUTLINE (U) Introduction & Some Statistics (U) Missed Call Messages (U) MilkBone QFD "Demo" (U) Where Next? TOP SECRET//COMINT//REL TO USA, FVEY//
3 UNCLASSIFIED ftg, (U)SMS (Short Message Service) IP' some stats (U) (May 2011): Mobile phone subscriptions have reached 5.3 billion, 77% of the world population. Growth led by China and India. (U) 500 million people accessed mobile internet worldwide in Usage is expected to double in 5 years. 1/2011: 200 million users access Facebook using mobile. (U)(Oct. 2010) Many mobile Web users are mobile-only (rarely use desktop, laptop or tablet to access the Web ). Mobile-only in Egypt is 70%, India 59% and US 25%. Mobile penetration in the developing world is now at 68%, (U) SMS is still king of mobile messaging trillion messages sent in 2010 (200,000 text messages per second) and is expected to exceed 10 trillion in 2013 (1.8 trillion sent in 2007). Most number of texts are sent in the Philippines and US. (U) Mobile phone providers in developing countries increasingly use the mobile phone for health services and banking (International Telecommunications Union) (U) Many mobile web users do not have a bank account (India 57%). Gartner predicts that the number 1 service in 2010 will be money transfer using SMS. Estimate million users and various organizations predict doubling every year estimate 2013 around 5 million user). Initiatives to bank the unbanked. (U) The typical mobile subscriber sends and receives more SMS text messages than telephone calls. The average U.S. mobile customer sent or received 357 text messages in 2008 (a 450% increase over 2006) and placed/received 204 calls. In 2010, the average American teen sent or received 3,339 texts per month, > 6 per hour. (U) 2008 estimate of text message usage among wireless subscribers: Russia - 88%, UK - 76%, China - 72%, Brazil - 60%, USA - 53% UNCLASSIFIED
4 SECRET//COMINT//REL TO USA, FVEY// U) SMS Message Componen (U) SMS Metadata - (U) IMSI: International Mobile Subscriber Identity (most frequent) - (U) MSISDN: Mobile Subscriber Integrated Services Digital Network Number, i.e., phone number - (U) IMEI: International Mobile Equipment Identity - (U) SME: Short Message Entity (entities which can send & receive messages) Content - (U) Typed Text Message (U) User entered (U) System Generated - (U) Useful (personal) [Ham] - (U) Spam TOP SECRET//COMINT//REL TO USA, FVEY//
5 TOP SECRET//COMINT//REL TO USA, FVEY// (U) Why? (U//FOUO) SMS Massage METADATA: MSISDN (phone #) METACONTENT: IMSI (person id) Message Content IMEI (equipment) (S//REL) Metadata + Content of System Generated Text Messages leads to analytic gems => content derived metadata (S//SI//REL) Such gems often are not in current metadata stores and would enhance current analytics: contact chaining, geolocation, alternative identifiers (including DNI & DNR links), travel, finance (S//REL) SMS: Rich data set, high impact. Usage is increasing. Features & Notifications available on mobile phones are increasing > rich data set awaiting exploitation. ~ SECRET//COMINT//REL TO USA, FVEY//
6 SECRET//COMINT//REL TO USA, FVEY// (U) PREFER (U//FOUO) Identifies types of automated messages (U//FOUO) Extracts entities from SMS content daily: (S//REL) Results presented averaged over 30 days (April 2011) - 194,184,810 - sms messages per day (not deduped) - 184,794,279 - DISHFIRE message tags - 188,299,963- PREFER text slice decoded (S//REL) PREFER operational on DISHFIRE servers since January 2008, inserting content derived tags into xml output. First major utilization, SPYDER 2008 for selected content. SECRET//COMINT//REL TO USA, FVEY//
7 SECRET//COMINT//REL TO USA, FVEV//2Ü32Ü1Ü8 (U) How Does PREFER Fi SECRET//SI//REL rx j^j a àiàr\jà Collection Discover t Targets ne DISHFIRE (SMS repository) Extract Useful Information PREFER Extraction: -message recombination -"metadata" from content Follow the Targets Existing Tools/Databases DISHFIRE SPYDER SEDB FASTCOPE Innovations MetaContent QFDs I MILKE SECRET//SI//REL TOP SECRET//COMINT//REL TO USA, FVEY//
8 TOP SECRET//COMINT//REL TO USA, FVEY// (U//FOUO) PREFER Identification & Extraction April 2011 (S//SI//REL) 194 Million Messages Collected by DISHFIRE per Da Including (S//SI//REL) VCARDS -> names+; (113,672 average extracted daily) sometimes DNI link ( ) to DNR (telephony) as well as images (S//SI//REL) Geocoordinates (76,142 daily avg; hex-encoded 1 - Requests by people for route info - Setting up meetings at a location - Tracking information: e.g., (12,809) - Comma Separated Formats (33,020) (S//SI//REL) Missed Calls -> contact chaining (5,058,114) (S//SI//REL) SIM Card Changes IMSI/IMEI links (6,017,901) (S//SI//REL) Roaming information border crossings (1,658,025) (S//SI//REL) Travel (5,314) - Itinerary including multiple flights - Changes: cancellations, reschedules, delays (S//SI//REL) Financial Transactions: - Credit card transactions: correlate credit cards to individuals (61,488) - Money transfers (social networks) - Phone to Phone (630,846) - Track financial information (account activity - bank transaction) (115,480) (S//SI//REL) Passwords (pending): Other Requests? TOP SECRET//CO\nNT//REL TO USA7FVEY//
Summary of DNR and DNI Co-Travel Analytics
Summary of DNR and DNI Co-Travel Analytics S2I5 1 October 2012 Contact information: Table of Contents Table of Contents 2 Introduction 3 Issues and Questions 3 Analytics 5 CHALKFUN 5 DSD Co-Travel Analytic
Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group
Three Ways to Reduce Exposure to Bypass Fraud The Risk Management Group May 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
TORNADO Solution for Telecom Vertical
BIG DATA ANALYTICS & REPORTING TORNADO Solution for Telecom Vertical Overview Last decade has see a rapid growth in wireless and mobile devices such as smart- phones, tablets and netbook is becoming very
Locating Mobile Phones using Signalling System #7. Tobias Engel <[email protected]> twitter: @2b_as
Locating Mobile Phones using Signalling System #7 Tobias Engel twitter: @2b_as What is Signalling System #7? protocol suite used by most telecommunications operators throughout the world
SKYNET: Applying Advanced
TOP SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL?M1 h e SKYNET: Applying Advanced,bfl mm p* iii^bm I IV flhsmp DA U 0 ' a.. *: wm : ^MMMIMWai» 11 by S2I, R6, T12, T14, - Presenters: pres, S2I51, R66F
How To Connect To Iridium.Com From A Cell Phone Or Tablet Device
Wi-Fi connectivity Your smartphone or tablet device MUST be connected via Wi-Fi to Iridium GO! (ex. Iridium-06088 ) in order for the Iridium GO! application to login successfully and operate. Please check
The Evolution of Online Travel. Angelo Rossini Euromonitor International
The Evolution of Online Travel Angelo Rossini Euromonitor International THE ONLINE TRAVEL REVOLUTION THE INTERNET BECOMES MOBILE GEOSOCIAL NETWORKS AND SOLOMO TOWARDS A NEW BUSINESS MODEL EMERGING TRENDS
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
An Aujas White Paper MITIGATING SECURITY RISKS IN USSD-BASED MOBILE PAYMENT APPLICATIONS. By Suhas Desai
An Aujas White Paper MITIGATING SECURITY RISKS IN USSD-BASED MOBILE PAYMENT APPLICATIONS By Suhas Desai CONTENTS Executive Summary The Need for Mobile Application Security 3 USSD-based Mobile Payment Application
(U) Converged Analysis of Smartphone Devices
(U) Converged Analysis of Smartphone Devices Identification/Processing/Tasking All in a day s work Paula Kuruc, NSA May 2010 1 Smartphone Converged mobile devices offering advanced capabilities, often
Toolkit for vulnerability assessment in 3G networks. Kameswari Kotapati The Pennsylvania State University University Park PA 16802
Toolkit for vulnerability assessment in 3G networks Kameswari Kotapati The Pennsylvania State University University Park PA 16802 Contents Motivation Solution Overview Methodology Overview 3G Attack Graph
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
General Presentation. Final Version 2.0
General Presentation Final Version 2.0 Onebip enables merchants to seamlessly monetize digital goods and services to their users on a global scale. Our service provides users with a simple, secure and
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
Agilent Network Monitoring Content Intercept Manager
Agilent Network Monitoring Content Intercept Manager Enabling Lawful Intercept agencies to keep pace with evolving cellular networks CIM is a flexible tool allowing precise and secure lawful interception
Quick Start Guide: ios and Android Iridium GO! App
Quick Start Guide: ios and Android Iridium GO! App Wi-Fi connectivity Your smartphone or tablet device MUST be connected via Wi-Fi to Iridium GO! (ex. Iridium-06088 ) in order for the Iridium GO! application
10 Threats to Successful. Enterprise Endpoint Backup
10 Threats to Successful Enterprise Endpoint Backup Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise in endpoints,
Asset management guidelines
Asset management guidelines 1 IT asset management (ITAM) overview Objective Provide a single, integrated view of agency assets in order to allow agencies to identify the asset location and assess the potential
Email & text message (SMS) relaying using Talk2M
Email & text message (SMS) relaying using Talk2M 1 Introduction This document explains how to configure your ewon in order to send out emails and text messages (SMS) using the Talk2M relay server. 1.1
How To Backup From Your Computer To Your Phone Or Tablet Or Computer
MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise
Cisco Business Edition 3000
Solution Overview Cisco Business Edition 3000 Value, Simplicity, and Essential Features for Small and Medium-Sized Businesses Cisco Business Edition 3000 provides you essential collaboration capabilities
A Characterization of Malicious Android Applications
A Characterization of Malicious Android Applications Lorenzo Gomez Iulian Neamtiu Department of Computer Science and Engineering University of California, Riverside {gomezl,neamtiu}@cs.ucr.edu June 2011
28% Top 10 Endpoint Backup Mistakes And how to avoid them. of corporate data resides exclusively on laptops, smartphones, and tablets
MARCH 2013 Top 10 Endpoint Backup Mistakes And how to avoid them Backing up and protecting sensitive corporate data has become more challenging because of several trends: exponential data growth, the rise
Mobile Device Usage Policy
Mobile Device Usage Policy Version 1.0 1. Introduction...2 2. Responsibilities...2 Line Manager Responsibilities...2 3. Administration and Support of Mobile Devices...3 4. Personal Usage Monitoring...4
Research by the CWT Travel Management Institute
Research by the CWT Travel Management Institute The CWT Travel Management Institute conducts in-depth research and publishes timely reports on managed travel best practices to help companies get the most
Oracle Communications Extension Group: Enterprise Application Guide ORACLE WHITE PAPER AUGUST 2015
Oracle Communications Extension Group: Enterprise Application Guide ORACLE WHITE PAPER AUGUST 2015 Disclaimer The following is intended to outline our general product direction. It is intended for information
Teltonika FM41XX. Configurator v. 1.0
Teltonika FM41XX Configurator v. 1.0 1. First steps Connect Teltonika FM41XX (PIN1 for plus and PIN11 ground ) to the voltage supply 10-30 V as shown below and GPS, GSM antennas. (GSM is long and thin,
Reaching the unbanked through technological innovation. Amjad H. Khan CEO, Bangla Phone Limited
Reaching the unbanked through technological innovation Amjad H. Khan CEO, Bangla Phone Limited What limits financial inclusion in developing countries? Large rural population High illiteracy Low income
Definition of Mobile Instant Messaging (MIM) Systems
J son & Partners Consulting Company presents the results of the research Mobile instant messaging systems as a direct threat to SMS. Definition of Mobile Instant Messaging (MIM) Systems MIM (Mobile Instant
PwC Global Media Outlook 2013-2017
PwC Global Media Outlook 2013-2017 www.pwc.com/outlook Consumer/end-user & advertising spending 5 year historical & 5 year forecast data 50 countries 13 segments Business-to-business Consumer and educational
Global System for Mobile Communication Technology
Global System for Mobile Communication Technology Mobile Device Investigations Program Technical Operations Division DHS - FLETC GSM Technology Global System for Mobile Communication or Groupe Special
Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue
SAP Brief SAP Mobile Services SAP SMS Firewall 365 Objectives Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue Cloud-based managed service helps control messaging abuse Cloud-based
Smaato s Global Trends in Mobile Programmatic 1H 2015
Smaato s Global Trends in Mobile Programmatic 1H 2015 This report is a thorough examination of the billions upon billions of mobile ad impressions served on Smaato s platform during the first half of the
M600 BBC Client Installation overview for BlackBerry Enterprise Server
Prepared by Open SEM/BGME LEIF STYFBERG 2006-06-30 Contents responsible if other than preparer Approved by Date Remarks This document is managed in metadoc. 1(19) M600 BBC Client Installation overview
Connecting your Aiki phone to a network
Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or
The Mobile Problem. Alex Bobotek Co-Chairman, M 3 AAWG October 2012 New Delhi, India
The Mobile Problem Alex Bobotek Co-Chairman, M 3 AAWG October 2012 New Delhi, India M 3 AAWG Workshop: Fighting Spam and Bots EWI, NASSCOM, FICCI 3rd Worldwide Cybersecurity Summit Desired Outcomes 1.
Thanks for choosing Digicel! Quick Access Codes. We ll get you up and running fast!
DIGICEL MINI GUIDE Thanks for choosing Digicel! This guide is designed to give you a quick start to using your Digicel SIM card with your Digicel phone. If you need further assistance, please feel free
SPECIFIC TERMS AND CONDITIONS FOR SINGTEL MOBILE S MOBILE BROADBAND SERVICE
SPECIFIC TERMS AND CONDITIONS FOR SINGTEL MOBILE S MOBILE BROADBAND SERVICE 1. Incorporation by reference In addition to the General Terms, the Specific Terms and Conditions and the Acceptable Use Policy
Testimony of Peter Allgeier President Coalition of Services Industries (CSI)
Testimony of Peter Allgeier President Coalition of Services Industries (CSI) Hearing On International Data Flows: Promoting Digital Trade in the 21st Century House Committee on the Judiciary Subcommittee
Internet, Smartphone & Social Media Usage Statistics
Internet, Smartphone & Social Media Usage Statistics Presented by: RapidValue Solutions Date: 1 st December 2014 RapidValue Solutions Internet Demographics RapidValue Solutions 2 Number of Internet Users
EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server
Application Note EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server Introduction The demand for wireless LAN (WLAN) access to the public IP network is growing rapidly. It is only
SIP Roaming Server Product Overview. Mobile Convergence Technology
SIP Roaming Server Product Overview Mobile Convergence Technology CONNECTING NETW ORKS Roam, Talk and Text (without a Mobile Network) By interworking with existing communications infrastructures, Session
Business Continuity in an Outsourced Environment: Enabling business outcomes and expanding sourcing options
Business Continuity in an Outsourced Environment: Enabling business outcomes and expanding sourcing options Marnix Gillis IBM Distinguished Engineer 32 nd Regional Conference 2013 International Business
Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
Tv & media 2014 italy. Aurelio Severino, Direttore Tv e Media Giovanni Zappelli, Responsabile ConsumerLab
Tv & media 2014 italy Aurelio Severino, Direttore Tv e Media Giovanni Zappelli, Responsabile ConsumerLab Leadership di mercato INFRASTRUTTURE MOBILI OSS&BSS SERVIZI TV AND MEDIA DELIVERY Patents 35,000
USB HSPA Modem. User Manual
USB HSPA Modem User Manual Congratulations on your purchase of this USB HSPA Modem. The readme file helps you surf the Internet, send and receive SMS, manage contacts and use many other functions with
Strategies For Creating Best-In-Class Mobile Apps
Brochure More information from http://www.researchandmarkets.com/reports/2520217/ Strategies For Creating Best-In-Class Mobile Apps Description: This insightful and easy-to-understand report offers you
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
Your customer engagement transformation starts here
Your customer engagement transformation starts here Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Exstream and HP TeamSite
Mobile Money Transfer & Remittances
Mobile Money Transfer & Remittances 2 June 2010, Moscow - Mirpal Conference Mehdi Elhaoussine, Consultant, World Bank Expert Mobile Financial Services 1 Market figures Introduction 200 million people around
GEM90 TrackMe GPS Tracking Application
GEM90 TrackMe GPS Tracking Application Quick Start Guide (Version 1.8 2015) 1. Introduction 1.1. Overview Gem90 TrackMe is a GPS enabled tracking application that is part of the Gem90 product series. Gem90
Verint GI2. Gi2 Features. 2010 Verint Systems Inc. All rights reserved.
Verint GI2 Gi2 Features 2010 Verint Systems Inc. All rights reserved. Channelyser Function The Channelyser allows the user to interrogate the local networks and display the Broadcast information. This
Training Training Sessions Schedule Attempt for General Intelligence Presidency of Saudi Arabia Milan, February 2th 2011
Training Training Sessions Schedule Attempt for General Intelligence Presidency of Saudi Arabia Milan, February 2 th 2011 Part 1: IT Security Fundamentals - 2 - Session 1 Session 1.1:?? Welcome reception
Amazing FACTS About MOBILE Marketing S Z
50!? Amazing FACTS About MOBILE Marketing S Z Brought to you by your friends at Many of these AMAZING FACTS can be found in GO MOBILE, the #1 BEST-SELLING mobile marketing book in America. [http://www.gomobilebook.com]
White Label Mobile AG, Liechtenstein
How it Works Activate your SIM card! Registration Together with your SIM card you have got the link for activation. Kindly enter this in order to register yourself as a user and to http://pilot-call.com/?q=en/activate
Your Blueprint websites Content Management System (CMS).
Your Blueprint websites Content Management System (CMS). Your Blueprint website comes with its own content management system (CMS) so that you can make your site your own. It is simple to use and allows
2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
ACR Triad Site Server Click Once Software System
ACR Triad Site Server Click Once Software System Version 2.5 20 October 2008 User s Guide American College of Radiology 2007 All rights reserved. CONTENTS INTRODUCTION...3 ABOUT TRIAD...3 DEFINITIONS...4
USING MOBILE TECHNOLOGY TO GROW YOUR BUSINESS. Version 3.0
USING MOBILE TECHNOLOGY TO GROW YOUR BUSINESS Version 3.0 13 September 2012 What We Will Cover Today Overview of the Mobile Market SMS QR Codes Location Based Services Native apps Mobile websites Augmented
Security Threats in Prepaid Mobile
Security Threats in Prepaid Mobile 1 Arshiya Begum, 2 Mohammed Tanveer Ali 1 Computer Science Department, King Khalid University, Abha, KSA [email protected] 2 Network Specialist, Computer Science
Online Payment Fraud. IP Intelligence is one of the top five techniques used to detect and prevent online fraud
Online Payment Fraud IP Intelligence is one of the top five techniques used to detect and prevent online fraud Online Payment Fraud 2 Contents IP Intelligence is one of the top five fraud tools 3 Not all
Best Practices: Mobile Roaming
Best Practices: Mobile Roaming Mobile roaming enables consumers to use their mobile phones when travelling abroad or outside of their current network carrier calling area by connecting to partnered provider
Oracle WebCenter Sites Mobility Server Enabling exceptional mobile and tablet web applications and web sites without compromise
Oracle WebCenter Sites Mobility Server Enabling exceptional mobile and tablet web applications and web sites without compromise Mobility Server offers state-of-the-art technology and a comprehensive solution
SANS Institute First Five Quick Wins
#1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only
23. SALES AND MARKETING OF MOBILE TELEPHONY SERVICES 1
NOTE TO READER: This is an extract from the Consolidated Version of General Conditions of Entitlement as at 28 May 2015 and is published by Ofcom for ease of reference. The full set of the latest consolidated
PayEx Merchant Administrator Manual
PayEx Solutions AS Postadresse: Postboks 308 Sentrum 0103 Oslo Besøkadresse: Wergelandsveien 1 Tlf: +47 2203 6000 Faks: +47 2203 6110 [email protected] Org.nr: 981 890 620 Sted: Oslo www.payex.no PayEx
A guide to enterprise mobile device management.
WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an
CounterPath Bria with Oracle TSC Feature Pack. A Solution for Operator and Enterprise (OTT) Service Delivery. Solution Brief. www.counterpath.
CounterPath Bria with Oracle TSC Feature Pack A Solution for Operator and Enterprise (OTT) Service Delivery Solution Brief Internet OTT (over-the-top) changes the way people communicate. Internet OTT services
Deriving Call Data Record Insights through Self Service BI Reporting
Deriving Call Data Record Insights through Self Service BI Reporting The Need for Business Intelligence BI assists corporate managers and decision makers to make relevant, accurate, timely and smart decision
Investec India Digital Media & E-Commerce Building momentum in a rapidly evolving market
Investec India Digital Media & E-Commerce Building momentum in a rapidly evolving market Why India? Demographic Headwinds all point towards colossal growth By 2030, India will be the 3 rd largest economy
NRF 2015 Global Ecommerce: It s a Small World After All
NRF 2015 Global Ecommerce: It s a Small World After All #nrf15 @FitForCommerce @PitneyBowesEcommerce FitForCommerce is a consultancy founded to help online and omnichannel businesses figure out what they
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
IF-MAP Use Cases: Real-Time CMDB, and More
IF-MAP Use Cases: Real-Time CMDB, and More Richard Kagan EVP / General Manager Orchestration Systems Business Unit IF-MAP: A Powerful New Standard IF-MAP = Interface to Metadata Access Points An open protocol
Smart Campus. Creating services WITH and FOR people. Marco Pistore Research Director Fondazione Bruno Kessler Trento Project Manager Smart Campus
Smart Campus Creating services WITH and FOR people Marco Pistore Research Director Fondazione Bruno Kessler Trento Project Manager Smart Campus Das Bild kann zurzeit nicht angezeigt werden. Trento: Smart
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
GeoMarc Spatial DNA for Advanced Geospatial Data Management
GeoMarc Spatial DNA for Advanced Geospatial Data Management Dr. Alex Philp Founder and Manager November 2007 GCS Research Success ESRI Foundation Partner of the Year - 2007 ESRI Business Partner of the
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Consumer Trend Research: Quality, Connection, and Context in TV Viewing
Consumer Trend Research: Quality, Connection, and Context in TV Viewing Five key insights for media professionals into viewing behavior and monetization in a world of digitization and consumer control
Contact Center Discovery Exercise
Contact Center Discovery Exercise Introduction The County is currently planning to implement a new telephone system, based on Voice over IP (VoIP), including a new Contact Center solution. VoIP is a proven
GSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
How digitalisation is changing user experience
How digitalisation is changing user experience Harbo Except for the historical information contained herein, statements in this release which contain words or phrases such as will, aim, will likely result,
Use of C-SIM (R-UIM) in Roaming. 2006 3G CDMA Latin America Regional Conference
Use of C-SIM (R-UIM) in Roaming 2006 3G CDMA Latin America Regional Conference AGENDA 1 C-SIM role in Roaming 2 CSIM for advanced roaming 3 CSIM beyond roaming The C-SIM Card Security PIN = Secret codes
Agilent OSS Wireless QoS Manager
Agilent OSS Wireless QoS Manager The leading-edge solution for wireless-data service assurance New Wireless Challenges To manage today s wireless data services in a manner that ensures top service quality,
Customer Experience Management (OSS focused) MTS Russia implementation
Customer Experience Management (OSS focused) MTS Russia implementation Sergey Bougaev Project Supervisor at Mobile TeleSystems 21 st November 2013 Agenda Goals and challenges: improve customer experience
The Explosion of Mobile Technology; What s the Impact on the Financial Services Industry?
The Explosion of Mobile Technology; What s the Impact on the Financial Services Industry? Presented by: on Financial Services 1 A look at the state of mobile technology in 2012 on Financial Services 2
