Systems Analysis for IP Campaigns. William Betten Medical Technology Director UBM TechInsights December 5, 2012
|
|
|
- Trevor Lyons
- 10 years ago
- Views:
Transcription
1 Systems Analysis for IP Campaigns William Betten Medical Technology Director UBM TechInsights December 5, 2012
2 UBM TechInsights Overview Professional Services Full suite of IP Services, including Patent Portfolio and Asset Management Capabilities, Licensing, Litigation Support, Deposition, Patent Brokerage, Technology Due Diligence, Product/Device Procurement Technical Intelligence Physical analysis of competitors device/product attributes incl. Circuits, Structures, Materials Analysis, Product Teardowns, BoM, IC Costing Business Intelligence Design Trends, Business Landscapes and Profiling, Product Distribution and Sales Data, Regional Sales Assessment.. Software & System Level Analysis Source Code, Algorithm Analysis, System Level Testing State-of-the-Art Laboratories Four world class locations with 340 highly experienced and energetic employees Skilled in the Art of Technology 2 I 2012, UBM LLC
3 Intellectual Property Program Why? Enables achievement of strategic goals Serves as the basis for favorable business deals and enhanced competitive position Diminishes a competitor s business momentum Blocks or delays a competing product s market entry Imposes cost disadvantages on competing products 3 I 2012, UBM LLC
4 White Hat Reverse Engineering (RE) RE is the systematic tear down and analysis of what lies under the hood. RE supports strategy and decision making across the IP lifecycle. RE protects a company s own intellectual property. 4 I 2012, UBM LLC
5 Body of Knowledge: Breadth & Depth Library of Analysis, Reports & Data Subject-matter Expertise & Domain Knowledge IP Knowledge & Tools 5 I 2012, UBM LLC
6 Comprehensive Technical Analysis Patent Review Technology Analysis Systems Analysis Process Analysis Teardown Circuit Analysis 6 I 2012, UBM LLC
7 Our Methodology 1 Patent Assessment 2 Target Assessment 3 Evidence of Use Plan 4 Feasibility Exercise 5 6 Detailed Investigation Results Documentation 7 I 2012, UBM LLC
8 Areas of Analysis Wireless Communication Hardware Electrical Test Static & Dynamic Software Analysis 8 I 2012, UBM LLC
9 Analysis Techniques: The Toolbox System Analysis Techniques Interface and Parameter Extraction Custom application development Bill-of-materials analysis Software Analysis Techniques Firmware extraction, binary code Inspection Static Code Analysis, software disassembly Dynamic analysis, custom test application development Circuit Analysis Techniques Package and PCB routing analysis, component identification IC de-layering & topographic imaging, layout extraction Schematic capture, design analysis, simulation & timing analysis 9 I 2012, UBM LLC Process Analysis Techniques Materials analysis High-magnification imaging and critical dimensions extraction IC design, packaging, cost-to-manufacture estimation
10 Hardware Electrical Test Functional test Waveform Analysis RF & Analog Board & die-level probing Examples: Micro-probing of camera image sensors SSD controller analysis via active bus monitoring Mobile device charging circuit analysis Circuit, waveform, and material analysis on a blood glucose meter 10 I 2012, UBM LLC
11 Software Reverse Engineering What s involved in Software RE? US XXX EP YYY Target Extraction of Software Find Portion of interest (Re)Construction of high(er) level representation Identification of infringing elements 11 I 2012, UBM LLC
12 Software Reverse Engineering Complications Software is a hidden part of the product. Software has a complex branching ability. Software is reconfigurable. Software is a more independent design realm than hardware. 12 I 2012, UBM LLC
13 Systems & Software RE Example Project Goals: Perform a RE study on a magnetic compass app to understand role of sensor data with respect to image orientation If applicable, perform a claims mapping to the app Project Deliverables: Detailed engineering report Claims mapping 13 I 2012, UBM LLC
14 Project Approach Assess patent & develop test plan Acquire smartphone & magnetic field detector app Functional Test Code analysis Client Review Claims Mapping 14 I 2012, UBM LLC
15 Code Analysis: To understand how the application applies the sensor data to calculate orientation of the displayed image Downloaded and unpacked the app and OS framework Disassembled the apps and the rendering frameworks, analyzed the code, and decompiled the disassembled code Created high level diagram of relevant functional elements Results: Operation of the compass and other device motion sensors was determined through RE of the compass app source code & device OS. We were able to conclusively determine whether the claim elements mapped to the application. 15 I 2012, UBM LLC
16 Conclusions Companies that fail to employ a rigorous program to protect their IP rights run the risk of costly litigation, lost revenue, and weakened market share. An effective and proactive IP strategy demands the under-the-hood intelligence that only RE can provide. Systems RE requires a unique blend of complementary skills. 16 I 2012, UBM LLC
17 Questions?? For More Information: Web:
Sample Project List. Software Reverse Engineering
Sample Project List Software Reverse Engineering Automotive Computing Electronic power steering Embedded flash memory Inkjet printer software Laptop computers Laptop computers PC application software Software
How to build a patent sales programme. Art Monk, TechInsights. Yearbook. Building IP value in the 21st century
How to build a patent sales programme Art Monk, TechInsights Yearbook 2015 Building IP value in the 21st century In a connected world, is your patent portfolio performing? Get results with TechInsights
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments
Free and Open-Source Software Diligence in Mergers, Acquisitions, and Investments Andrew J. Hall Fenwick & West LLP April 16, 2013 Linux Foundation Collaboration Summit Presentation Topics Introduction
Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
About Yazata Business Consulting
About Yazata Business Consulting Yazata Consulting is a, full service software consulting company offering web design, application development, software integration, embedded systems design & development,
InvenSense MPU-6515 6-Axis Accelerometer Gyroscope MEMS Motion Sensor
InvenSense MPU-6515 6-Axis Accelerometer Gyroscope MEMS Motion Sensor 1891 Robertson Road, Suite 500, Ottawa, ON K2H 5B7 Canada Tel: 613-829-0414 www.chipworks.com Some of the information in this report
Reverse Engineering: Printed Circuit Boards. Dr. Tarek A. Tutunji Philadelphia University, Jordan
Reverse Engineering: Printed Circuit Boards Dr. Tarek A. Tutunji Philadelphia University, Jordan Reference PCB Reverse Engineering by John Armistead A Rapid Prototyping Methodology for Reverse Engineering
Product Lifecycle Management. Diane Ryan Siemens PLM Software
Product Lifecycle Management Diane Ryan Siemens PLM Software Discussion Topics Challenges in Manufacturing and Lifecycle Maintenance Product Lifecycle Management Communication and Collaboration Standardized
Windows Embedded Security and Surveillance Solutions
Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues
Business Models of Innovation Closed Innovation and Open Innovation (Topic 7 (c))
Business Models of Innovation Closed Innovation and Open Innovation (Topic 7 (c)) NATIONAL WORKSHOP ON INNOVATION PROMOTION AND TECHNOLOGY TRANSFER Belgrade, June 21 and 22, 2011 What is Open Innovation?
Leti Introduction and Overview
Leti Introduction and Overview Leti Day in Tokyo, October 3rd 2012 Laurent Malier 2012 Leti 2012 1 CEA The CEA at a glance Commissariat à l Énergie Atomique et aux Énergies Alternatives is one of the largest
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference
The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC
The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC Introduction The SA601 is a mixed signal device fabricated in 0.18u CMOS.
VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
Modern Market Sensors in Smartphones: State-of-the-art How to make smartphones even more smarter? Conclusions
Smartphone Sensing: What Sensors Would we Like to Have in the Future Smartphones? Dr. Sergey Y. Yurish International Frequency Sensor Association (IFSA), Technology Assistance BCNA 2010, S.L. Barcelona,
Opendiem Training Exercise 1 Opendiem-TRN-0001
Opendiem Training Exercise 1 Revision 5.0.0 Status Initials Date Comment Released RAC 11/12/2010 Updated format and content Exercise 1 - Accessing the Opendiem Server through a Standard Web Browser Introduction
Samsung Galaxy S6 Fingerprint Sensor New Synaptics Design
Samsung Galaxy S6 Fingerprint Sensor New Synaptics Design Second generation Samsung Galaxy fingerprint sensor: same capacitive technology but totally different design For the second time Samsung introduces
Agilent EEsof EDA. www.agilent.com/find/eesof
Agilent EEsof EDA This document is owned by Agilent Technologies, but is no longer kept current and may contain obsolete or inaccurate references. We regret any inconvenience this may cause. For the latest
Qualcomm QCA6174 802.11ac Wi-Fi 2x2 MIMO Combo SoC
Qualcomm QCA6174 Basic Functional Analysis 1891 Robertson Road, Suite 500, Ottawa, ON K2H 5B7 Canada Tel: 613-829-0414 www.chipworks.com Basic Functional Analysis 2 Some of the information in this report
The Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION
VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION Mark J. Norris Vision Inspection Technology, LLC Haverhill, MA [email protected] ABSTRACT Traditional methods of identifying and
Software User Guide UG-461
Software User Guide UG-461 One Technology Way P.O. Box 9106 Norwood, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com ezlinx icoupler Isolated Interface Development Environment
ni.com/vision NI Vision
ni.com/vision NI Vision The NI Vision Approach Integrate NI LabVIEW graphical system design software across the entire NI vision hardware portfolio to create a flexible, open platform that reduces development
1 Introduction 1. 1 Introduction
1 Introduction 1 1 Introduction Software is everywhere. Virtually every complex product manufactured today is controlled by software, and many commercial services are based on software systems. The quality
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
WEB, HYBRID, NATIVE EXPLAINED CRAIG ISAKSON. June 2013 MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER
WEB, HYBRID, NATIVE EXPLAINED June 2013 CRAIG ISAKSON MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER 701.235.5525 888.sundog fax: 701.235.8941 2000 44th St. S Floor 6 Fargo, ND 58103 www.sundoginteractive.com
Bluetooth SMART Advertise-Only Beacon Reference Design
EM MICROELECTRONIC - MARIN SA PRELIMINARY Bluetooth SMART Advertise-Only Beacon Reference Design Features COMPLETE BLE BEACON SYSTEM o EM9301 Bluetooth SMART Controller o EM6819 0.9V Flash Microcontroller
INTELLECTUAL PROPERTY CREDENTIALS. Services Summary Brooks Consulting s intellectual property offerings fall into three main categories:
INTELLECTUAL PROPERTY CREDENTIALS Brooks Consulting LLC provides litigation and management consulting services to small businesses, international conglomerates and law firms of every size. Not just consultants
Visual Programming of Logic, Motion, and Robotics
ADVANCED Motion Controls October 2014 Visual Programming of Logic, Motion, and Robotics Sándor Barta Overview The art of programming consists of mentally translating a workflow into a sequential programming
Adaptive Radio. Cognitive Radio
What are Cognitive Radio and Dynamic Spectrum Access SDR can act as a key enabling technology for a variety of other reconfigurable radio equipments commonly discussed in the advanced wireless market 1.
Medical Technologies. Helbling Technik Innovation, together we do it
Medical Technologies Helbling Technik Innovation, together we do it Innovation, together we do it The world is constantly changing new lifestyles, new desires, new insights and new goals demand effective
Computer Scientist. Conduct research in latest computer and network security technologies for high assurance system security solutions
Computer Scientist Conduct research in latest computer and network security technologies for high assurance system security solutions Develop algorithms, tools and techniques to enhance information assurance
FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS
FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS
PLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING
PLEASE READ BEFORE USING, DOWNLOADING, COPYING OR INSTALLING SUMMARY The use and downloading of the SDK is subject to the signing of the TomTom Mutual NDA for Apps. The TomTom SDK Terms of Use are applicable
IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!
The Bloor Group IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS VENDOR PROFILE The IBM Big Data Landscape IBM can legitimately claim to have been involved in Big Data and to have a much broader
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp
Intel Cyber Security Briefing: Trends, Solutions, and Opportunities Matthew Rosenquist, Cyber Security Strategist, Intel Corp Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION
AMFitzgerald Company Overview
AMFitzgerald Company Overview February 2015 12 th anniversary AMFitzgerald services MEMS Innovation MEMS Solutions Technology Strategy Creation of novel designs and IP Paths to manufacturing and market
Normen & Standards Industrie 4.0 IEEE Standards
Normen & Standards Industrie 4.0 IEEE Standards Stand: Oktober 2015 IEEE 1872 * IEEE 2015 IEEE Standard Ontologies for Robotics and Automation 1872-2015 IEEE 1232.3 * IEEE 1232.3- IEEE Guide for the Use
Ryerson Digital Media Zone Online Resources Patent Essentials
Maya Medeiros Lawyer, Patent Agent, Trademark Agent T: +1 416.216.4823 [email protected] http://www.nortonrosefulbright.com/people/99601/maya- medeiros PATENT ESSENTIALS WHAT IS A PATENT?
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
How To Integrate Software And Systems
September 25, 2014 EFFECTIVE METHODS FOR SOFTWARE AND SYSTEMS INTEGRATION P R E S E N T E D B Y: D R. B O Y D L. S U M M E R S 1 Software Engineer (Quality) Defense and Space The Boeing Company - Seattle,
OWNER S GUIDE OWNER S GUIDE
OWNER S GUIDE A L L D I G I T A L A N D R O I D S M A R T P H O N E Owner s Guide Please read this guide before operating your phone, and keep it for future reference. Important Customer Information Intellectual
A bachelor of science degree in electrical engineering with a cumulative undergraduate GPA of at least 3.0 on a 4.0 scale
What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF
Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries
First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as
Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V.
EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management
An Open Source Software Primer for Lawyers
An Open Source Software Primer for Lawyers July 17, 2014 Presentation to the ABA Open Source Committee, Section of Science & Technology Law Joanne Montague [email protected] Davis Wright Tremaine
Cisco Unified Communications Remote Management Services
Cisco Unified Communications Remote Management Services What You Will Learn Our remote, high-visibility, co-management approach gives you complete ownership and control of your converged network. Cisco
INTELLECTUAL PROPERTY LAW FOR MOBILE TECHNOLOGY DEVELOPERS
INTELLECTUAL PROPERTY LAW FOR MOBILE TECHNOLOGY DEVELOPERS Chapter 2 2012 Hoffman Warnick LLC 1 Chapter II. A Basic IP Framework The purpose of this chapter is to convey a basic IP rights framework that
Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and
Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015
ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS Blackhat USA 2015 About Texplained Texplained [Technology Explained] refers
Motion Sensing with mcube igyro Delivering New Experiences for Motion Gaming and Augmented Reality for Android Mobile Devices
Motion Sensing with mcube igyro Delivering New Experiences for Motion Gaming and Augmented Reality for Android Mobile Devices MAY 2014 Every high-end smartphone and tablet today contains three sensing
Security Through Transparency: An Open Source Approach to Physical Security
Security Through Transparency: An Open Source Approach to Physical Security John Loughlin Stanton Concepts Lebanon, NJ [email protected] Security through obscurity has never been a sensible approach
Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic
Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic Clifford Wolf, Johann Glaser, Florian Schupfer, Jan Haase, Christoph Grimm Computer Technology /99 Overview Ultra-Low-Power
INFORMATION TECHNOLOGY PROGRAM
INFORMATION TECHNOLOGY PROGRAM The School of Information Technology offers a two-year bachelor degree program in Information Technology for students having acquired an advanced vocational certificate.
Classification of Data Center Infrastructure Management (DCIM) Tools
Classification of Infrastructure Management (DCIM) Tools White Paper 104 Revision 3 by Kevin Brown Dennis Bouley > Executive summary Data centers today lack a formal system for classifying infrastructure
Security Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
Evading Android Emulator
Evading Android Emulator Thanasis Petsas [email protected] [email protected] - www.syssec-project.eu 1 What is a Virtual Machine? A software based computer that functions like a physical machine A
Mobile App Proposal 0-000-000-000. - Magazine company- [email protected]. January 12, y. Direct Contact. Email
Mobile App Proposal - Magazine company- January 12, y Direct Contact 0-000-000-000 Email [email protected] TABLE OF CONTENTS 1. Introduction 2. Project Overview & Objectives 3. About Newsboard 4. Analytics
Ivan Zatkovich. Intellectual Property Consulting & Patent Litigation Internet Telecommunications Information Technology
Ivan Zatkovich Intellectual Property Consulting & Patent Litigation Internet Telecommunications Information Technology ecomp Consulting, LLC 1507 Dumont Drive Valrico, FL 33594 813 601 8142 [email protected]
STAGE 1 COMPETENCY STANDARD FOR ENGINEERING ASSOCIATE
STAGE 1 STANDARD FOR ENGINEERING ASSOCIATE ROLE DESCRIPTION THE MATURE ENGINEERING ASSOCIATE The following characterises the senior practice role that the mature, Engineering Associate may be expected
Basic Wireless Infrastructure and Topologies
Basic Wireless Infrastructure and Topologies Developed by Sebastian Buettrich and Alberto Escudero Pascual 1 Goals To be aware of the most common wireless topologies To be able to identify and plan suitable
Paul Spence. CEO, Global Outsourcing. Bank of America Merrill Lynch TMT Conference 2010 London, June 9
Paul Spence CEO, Global Outsourcing Bank of America Merrill Lynch TMT Conference 2010 London, June 9 2010: Three keys to a successful year Growth: accelerate the top line recovery by focusing on 5 key
System-on. on-chip Design Flow. Prof. Jouni Tomberg Tampere University of Technology Institute of Digital and Computer Systems. jouni.tomberg@tut.
System-on on-chip Design Flow Prof. Jouni Tomberg Tampere University of Technology Institute of Digital and Computer Systems [email protected] 26.03.2003 Jouni Tomberg / TUT 1 SoC - How and with whom?
TDMS Test & Data Management Software
Test & Data Management Software TDMS protective relays energy meters transducers power quality CT-VT-PT transformers ground grid circuit breakers batteries surge arresters The Integrated Testing Solution
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
BIG DATA BETWEEN REVOLUTION AND CONFUSION SEBASTIAN LAND - RAPIDMINER GMBH, DORTMUND. 3/23/2015 RapidMiner 1
BIG DATA BETWEEN REVOLUTION AND CONFUSION SEBASTIAN LAND - RAPIDMINER GMBH, DORTMUND 3/23/2015 RapidMiner 1 Don ts Me, too effect Starting a Big Data Project for all costs But without purpose Likely to
ESYST 123 - Residential Wiring
ESYST 123 - Residential Wiring Approval Date: Effective Term: Department: ELECTRONIC SYSTEMS TECHNOLOGY Division: Career Technical Education Units: 4.00 Grading Option: Letter Grade Transferability: CSU
Usage Based Insurance
Usage Based Insurance Saving Money by Helping Modify Driving Behavior Product Code: idrd-14uscwsat-nuse Market: Connected Worlds Destination: U.S. Direction: Automotive Date Created: January 2014 Expert
Development of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
Information Needed for Effective Asset Management
Emerson Reliability Consulting White Paper Information Needed for Effective Asset Management Bruce Hawkins, CMRP Director of Technical Excellence, Emerson Reliability Consulting Effective asset management
Electrics & Electronics
Area of competence Electrics & Electronics Maximum Focus ARRK P+Z Engineering For nearly 50 years, we have providing active product development support to customers from the automotive, aerospace and special
1 st year / 2014-2015/ Principles of Industrial Eng. Chapter -3 -/ Dr. May G. Kassir. Chapter Three
Chapter Three Scheduling, Sequencing and Dispatching 3-1- SCHEDULING Scheduling can be defined as prescribing of when and where each operation necessary to manufacture the product is to be performed. It
NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China
NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China Agenda The Internet of Things ( IoT ): a New and Exciting Application Space A typical IoT application Lighting for Home
Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions
September 2013 Silicon Support & Professional Eng. Services Customer Experience Freescale Provided SW & Solutions Provide Valued Software, Support & Professional Engineering Services, Competitively 2 Customer
I. Introduction. Understanding the Business Objectives
Intellectual Property Due Diligence in Acquisitions Chen Wang, Deputy Chief IP Counsel, E.I. du Pont de Nemours and Company Neil Henderson, Partner, Borden Ladner Gervais LLP Marc Lampert, Student-at-Law,
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
Night Owl 8 channel DVR system with HDMI output, 960H recording and a Free Night Owl Pro App with Owl Scan (No Hard Drive Included)
Night Owl 8 channel DVR system with HDMI output, 960H recording and a Free Night Owl Pro App with Owl Scan (No Hard Drive Included) Night Owl s PE-DVR8 is an advanced 8 channel 960H Security DVR. The DVR
MOTION NO. M2016-01 Contract for Transit Scheduling Software PROPOSED ACTION
MOTION NO. M2016-01 Contract for Transit Scheduling Software MEETING: DATE: TYPE OF ACTION: STAFF CONTACT: Operations and Administration Committee 01/07/2016 Final Action Bonnie Todd, Executive Director
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Improving Service Asset and Configuration Management with CA Process Maps
TECHNOLOGY BRIEF: SERVICE ASSET AND CONFIGURATION MANAGEMENT MAPS Improving Service Asset and Configuration with CA Process Maps Peter Doherty CA TECHNICAL SALES Table of Contents Executive Summary SECTION
ZigBee-2.4-DK 2.4 GHZ ZIGBEE DEVELOPMENT KIT USER S GUIDE. 1. Kit Contents. Figure 1. 2.4 GHz ZigBee Development Kit
2.4 GHZ ZIGBEE DEVELOPMENT KIT USER S GUIDE 1. Kit Contents The 2.4 GHz ZigBee Development Kit contains the following items, shown in Figure 1. 2.4 GHz 802.15.4/ZigBee Target Boards (6) Antennas (6) 9
