A method for identifying and confirming the use of URL filtering products for censorship
|
|
|
- Dana Rice
- 9 years ago
- Views:
Transcription
1 A method for identifying and confirming the use of URL filtering products for censorship Jakub Dalek, Bennett Haselton, Helmi Noman, Adam Senft, Masashi Crete-Nishihata, Phillipa Gill, Ronald J. Deibert The Citizen Lab, University of Toronto Dept. of Computer Science, Stony Brook University Abstract Products used for managing network traffic and restricting access to Web content represent a dual-use technology. While they were originally designed to improve performance and protect users from inappropriate content, these products are also used to censor Web content by authoritarian regimes around the globe. This dual use has not gone unnoticed, with Western governments placing restrictions on their export. Our contribution is to present a method for identifying installations of URL filtering products and confirming their use for censorship. We first present a methodology for identifying externally visible installations of URL filtering products in ISPs around the globe. Further, we leverage the fact that many of these products accept user-submitted sites for blocking to confirm that a specific URL filtering product is being used for censorship. Using this method, we are able to confirm the use of McAfee SmartFilter in Saudi Arabia and the United Arab Emirates (UAE) and Netsweeper in the UAE and Yemen. Our results show that these products are being used to block a range of content, including oppositional political speech, religious discussion and gay and lesbian material, speech generally protected by international human rights norms. 1. INTRODUCTION URL filtering products, used for managing Web traffic and restricting access to Web content, are extremely common in corporate, educational and ISP networks around the globe. However, these technologies, which were originally designed to improve performance and protect users from malicious or inappropriate content, represent a dual-use technology. Indeed, there have been numerous reports of URL filtering products produced by Western companies being sold in countries with poor human rights records, where they are used for censorship and surveillance [2 5,28,30]. The use of technology developed in North America and Europe against citizens by authoritarian regimes presents many legal and ethical issues. In the past two years, the United Data available at: States [26], Europe [29], and Israel [7] have all taken steps to limit the export of these technologies, in particular to countries under sanctions such as Syria and Iran. Further, as part of the OpenNet Initiative (ONI), we have documented numerous cases of products developed by Western companies being used to limit freedom of speech online via censorship and potentially surveillance [11, 13, 14, 21, 32] over the past ten years. With the stakes so high, it is important that we have techniques for monitoring the use of specific technologies for censorship. These tools can help inform policymakers and even vendors, who may be unaware that their technology is being used for censorship. In 2009, Websense actually withdrew software update support once the ONI informed them that their technology was being used for censorship by the government of Yemen [35]. While our methodologies have sufficed thus far, recent legal implications of our observations beg for repeatable methodologies that produce high confidence results. Challenges of measuring URL filtering deployments. Measuring use of URL filtering products is complicated by the fact that censorship is difficult to observe without vantage points located within the country of interest. Through our involvement in ONI, we have managed to gain access to measurements from within many countries with restrictive filtering regimes. However, performing client-based measurements in some countries is considered too risky (e.g., Cuba, North Korea), thus we cannot claim global coverage. Further, identifying installations of specific URL filtering products requires an understanding of distinct properties of the product under consideration (e.g., relevant HTTP headers) and careful validation to avoid false positives. Finally, even if a given product is installed in a country, it does not necessarily mean it is being used for censorship/surveillance purposes. Our contribution. With these challenges in mind, we sought to design a simple, repeatable, methodology for identifying installations of URL filtering products around the globe. This methodology hinges on the observation that some of these products are actually visible on the global Internet (likely due to inexperienced 1
2 Table 1: Summary of products we consider. Company Headquarters Product description Countries observed Blue Coat [1] Sunnyvale, CA, USA Web proxy (ProxySG) and URL Filter (Web Filter) Burma, Egypt, Kuwait, Qatar, Saudi Arabia, Syria, UAE [14, 32] McAfee SmartFilter [16] Santa Clara, CA, USA Filtering of Web content for enterprises Bahrain, Iran, Kuwait, Oman, Saudi Arabia, Tunisia, UAE [11, 21, 22] Netsweeper [18] Guelph, ON, Canada Netsweeper Content Filtering Qatar, UAE, Yemen [21] Websense [34] San Diego, CA, USA Web proxy gateways including features to monitor for corporate data leakage. Yemen (prior to 2009) [21] network administrators). We came to this observation during initial study of Syria where external facing IP addresses were used to host Blue Coat products [32]. We develop a methodology to enumerate these externally visible IPs and verify that (1) they are hosting the suspected product and (2) the product is indeed used for censorship (when we have access to in-country measurements). Our study highlights the human rights implications of these products and further can provide ground truth for Web proxy fingerprinting (as is done by Netalyzr [12, 17]). Key insights. Our study highlights many properties of URL filters that underscore the importance of studying their use. Specifically, we observe the use of these products in multiple North American ISPs which raises issues about transparency on a global scale and not just in jurisdictions commonly considered in censorship studies ( 3). We further highlight complications in terms of how URL filters are implemented (e.g., inconsistent blocking and use of multiple products) that make characterizing their use challenging ( 4). Finally, we demonstrate our proposed method by confirming the use of Netsweeper and McAfee SmartFilter for censorship of content protected by human rights norms in Qatar, the UAE and Yemen ( 5). Limitations. We note that our methodology for identifying installations of URL filtering products requires that these installations be visible on the global Internet, thus we likely identify installations that are not maintained by a technically sophisticated administrator. Further, we are not robust to products that attempt to evade our detection. Thus, our results should be viewed as presenting a subset of deployments that we are able to identify with high confidence. 2. BACKGROUND 2.1 URL filtering products There are multiple methods that may be used for implementing URL filtering systems. These products usually include a database of pre-categorized URLs, that allow the network operator to configure which categories to block within their network, and the ability to create custom categories for blocking. The products may also include a subscription/update component to push newly categorized URLs to the product s database. Depending on the functionality provided by the product (e.g., whether it proxies all Web traffic), the product may be sold as software to be installed by the administrator or as a stand-alone middlebox in the case of proxies. Table 1 summarizes the products we consider. 2.2 Prior work by the OpenNet Initiative The OpenNet Initiative has studied Internet censorship around the globe for the past decade [11,13,14,21, 32]. Over the course of the project, we began to observe products developed by Western companies used for censorship by repressive regimes, starting with SmartFilter products in Tunisia in By 2010, we had documented extensive use of Western technologies for censorship in the Middle East and North Africa (MENA) region [21]. Table 1 highlights the products we have discovered, as well as the countries where we have located them. Initially, our methods for identifying these products consisted of manual analysis of block pages for company logos/branding and product names in HTTP headers. Over time, however, we observed Western vendors obscure the use of their products, by omitting logos/branding on block pages [21]. In response, we have been developing techniques for automated discovery of these URL filtering products. This paper expands upon our prior efforts by identifying and characterizing installations of URL filtering products globally ( 3) and confirming that these installations are in fact being used for censorship ( 4). The policy impacts of our efforts thus far, have been mixed. In 2009, our identification of Websense in Yemen led to the vendor discontinuing support of their product for the Yemen government [35]. In contrast, Netsweeper stated that is not against their company policies to aid foreign governments in implementing Internet censorship. Finally, we have observed Blue Coat withdraw update support from Syria [32], as a result of legal sanctions against the country [26]. However, the company still plays a role in Internet censorship in many countries around the world, and has even been named an enemy of the Internet by Reporters Without Borders [6]. 2
3 Table 2: Summary of our methodology for identifying URL filtering products. Product Shodan keywords WhatWeb signature Blue Coat proxysg, cfru= Built in detection or Location header contains hostname McAfee SmartFilter mcafee web gateway, url blocked Via-Proxy header or HTML title contains McAfee Web Gateway Netsweeper netsweeper, webadmin, webadmin/, webadmin/deny Built in detection Websense blockpage.cgi, gateway websense Location header redirects to a host on port with parameter ws-session Part of our goal in this study is to present a repeatable methodology for identifying and confirming the use of these products for censorship to inform future discussions with vendors and policy makers. 3. IDENTIFYING URL FILTERS We begin by presenting our methodology for identifying installations of URL filtering products. This methodology leverages our prior experiences to devise a method that can identify multiple types of products worldwide. Table 2 summarizes our methodology. 3.1 Methodology Our methodology leverages the observation that URL filtering products are sometimes configured such that they are visible on the global Internet. Since they are visible on the global Internet, these products can be located via external scans of IP address space. Indeed, our group has previously leveraged network scans to identify Blue Coat installations in Syria [14, 32]. However, scanning the entire IP address space is not practical to identify these products in general. Thus, we leverage the Shodan search engine [27], which indexes the IP addresses of externally visible devices on the Internet. Entries in Shodan consist of an IP address, along with meta-data and HTTP headers observed when the IP address was accessed by the search engine. By manually analyzing results from the ONI tests, we were able to identify commonly appearing keywords and headers for the products we consider (summarized in Table 2). These keywords include HTTP headers observed when the product is used for censorship (e.g., ProxySG for Blue Coat) as well as URLs known to be associated with the management console (e.g., 8080/webadmin for Netsweeper). We search for these keywords, in combination with each of the two letter country-code toplevel domains, to maximize the set of results we obtain from Shodan. The goal of this step is to obtain as many IP addresses of potential installations as possible, and prune false positives in the following step. While we use Shodan as a source of IPs, we note that other sources of IP scans e.g., the 2012 Internet census [10] may also be used. We use the WhatWeb profiling tool [9] to identify Web sites/technologies running on a given IP address. For some products (e.g., Netsweeper) WhatWeb contained a pre-existing signature that we could leverage in our validation, whereas in other cases we had to create signatures based on HTTP headers observed when running the WhatWeb tool on an IP address. Table 2 also summarizes how we identify the various products using WhatWeb. Finally, we use geolocation data from MaxMind [15] and whois data from TeamCymru [31] to map the IP addresses matching WhatWeb signatures to country-level location and autonomous system (AS) number. 3.2 Networks with URL filtering installations Table 3 summarizes the countries and number of ISPs (in brackets) each product was observed in. While ONI tends to focus on installations by national ISPs, our new methodology allows us to uncover URL filtering installations in a wider set of countries and networks. Indeed, we observe Blue Coat in many new countries and regions: South America (Argentina and Chile), Europe (Finland, Sweden), Asia (Philippines, Thailand and Taiwan) and the Middle East (Israel, Lebanon). Further, for the remaining three products all the installations we discover (with the exception of McAfee SmartFilter in Pakistan) were previously unknown. As expected, we observe installations on a diverse range of networks in the US, such as Websense in two Texas utilities networks and Netsweeper installations in educational networks in West Virginia, Oklahoma and Missouri. However, we also observe Netsweeper installations in large ISP networks such as Global Crossing, AT&T, Verizon, and Bell South; and Blue Coat installations in Comcast and Sprint. Interestingly, we also observe an installation of Blue Coat on an IP address registered to the United States Information Systems Command (USAISC). These results highlight the importance of confirming how URL filters are being used, and if they are being used to opaquely censor Internet access for users. In the following section, we present a methodology for confirming that identified URL filters are used for censorship in networks where we have in-country testers. 4. CONFIRMING USE OF URL FILTERS Many of the products we identify play a legitimate 3
4 Table 3: Locations of URL filtering installations Product # Countries # ISPs Country (# of ISPs) Blue Coat UAE (1), Argentina (1), Chile (1), Finland (1), Israel (1), Kuwait (1), Lebanon (1), Philippines (1), Saudi Arabia (4), Sweden (1), Thailand (1), Taiwan (1), USA (1) McAfee SmartFilter Australia (1), Brazil (1), Chile (1), China (1), Germany (3), France (1), Great Britain (1), Japan (2), Mexico (2), Peru (3), Pakistan (1), Taiwan (2), USA (8) Netsweeper Australia (3), Canada (6), Cyprus (1), Great Britain (9), Grenada (1), Greece (1), Indonesia (1), Ireland (2), India (4), Jordan (1), Kuwait (1), Malaysia (1), New Zealand (2), Saudi Arabia (1), Somalia (1), USA (24), Venezuela (1), Yemen (1), South Africa (1) Web Sense 6 7 Belgium (1), Germany (1), Great Britain (1), Thailand (2), Turkey (1), USA (2) role in network management. Thus, when evaluating the human rights implications of these technologies, it is important to validate that they are actually being used to censor Web content. Our method for validation relies on in-country measurements (e.g., either a VPN connection or a collaborator performing tests). 4.1 In-country testing Tests of Web page accessibility are performed using a measurement client that accesses a specified list of URLs in the field ie., the location where censorship is suspected. This client software also triggers the same set of URLs to be accessed from a server in our lab at the University of Toronto (which does not censor the type of content tested). The results of the Web page accesses in the field and lab are compared to determine whether the page was blocked in the field location. The results for a given list of URLs is referred to as a run. For our measurements of URL filtering, we test short lists of URLs that are amenable to manual analysis of results. Further, the products we test tend to use block pages that explicitly state that content has been censored. Thus, we avoid ambiguities such as censorship via dropped packets or TCP resets. 4.2 Methodology Our methodology seeks to answer the question: is the given URL filtering product used for censorship in the measured ISP? Since many URL filters provide a mechanism for users to submit sites that should be blocked, we wondered if we could use this mechanism to confirm the use of a specific URL filter. The basic idea is to test sites (under our control) that are not blocked within the ISP, and then submit a subset of these sites to the appropriate URL filter vendor. After 3-5 days, we retest the sites and observe whether or not the submitted sites are blocked. If they are blocked, it is highly likely that the URL filter under consideration is being used for censorship, and our submission of the sites triggered the blocking. We present case studies that explore the effectiveness of this idea to confirm the use of a variety of products in networks where we have in-country testers. Table 4 summarizes these case studies. 4.3 Case study: McAfee SmartFilter in UAE and Saudi Arabia In 2009, the ONI identified McAfee SmartFilter being used in UAE s national ISP, Etisalat, and in a centralized blocking implementation in Saudi Arabia (effectively used for all ISPs) [23, 24]. We use our proposed methodology to confirm whether these technologies are still deployed in these networks in 2012 and ONI had previously observed Etisalat using Smart- Filter to block content related to anonymizing proxies [24]. Thus, we created a set of 10 domains providing proxy services to test whether SmartFilter was still being used. These domains had the form of two random (non-profane) words registered with the.info top-level domain (e.g., and contained the Glype proxy script [8] as their index page. We first ran measurements in the country to verify that these 10 domains were accessible. We then submitted five of these domains to SmartFilter for blocking. Within a few days we observed that the five submitted sites were blocked on Etisalat, thus confirming that the product was still in use within the country (Table 4). Challenge 1: Access to sites that will be blocked. Our methodology requires access to Web sites that are blocked by the studied ISP. Unlike UAE, we found Web sites classified as proxies by SmartFilter were accessible in Saudi Arabia. This finding indicates that Saudi Arabia is not using the proxy category provided by SmartFilter in their deployment. However, Web sites classified as pornography by SmartFilter are blocked in Saudi Arabia. Thus, we perform a similar experiment as we did for UAE, except that the 10 created domains hosted an adult image found via a Google image search. (The image was only used for the duration of our experiment and then removed.) Using the ISP Bayanat Al-Oula, we verified that the 10 domains were accessible in Saudi Arabia. We then submitted five of the domains to SmartFilter for blocking. After four days, we observed that these five domains were blocked (Table 4). We repeated this methodology on Nournet, also in Saudi Arabia, and Etisalat to confirm SmartFilter is still used within these ISPs in
5 Table 4: Summary of URL filter case studies. Product Country ISP Date Sites submitted Category Sites blocked Confirmed? Blue Coat UAE Etisalat (AS 5384) 4/2013 3/6 Proxy Avoidance 0/3 N Blue Coat Qatar Ooredoo (AS 42298) 4/2013 3/6 Proxy Avoidance 0/3 N McAfee SmartFilter Qatar Ooredoo (AS 42298) 4/2013 5/10 Pornography 0/5 N McAfee SmartFilter Saudi Arabia Bayanat Al-Oula (AS 48237) 9/2012 5/10 Pornography 5/5 Y McAfee SmartFilter Saudi Arabia Nournet (AS 29684) 5/2013 5/10 Pornography 5/5 Y McAfee SmartFilter UAE Etisalat (AS 5384) 9/2012 5/10 Anonymizers 5/5 Y McAfee SmartFilter UAE Etisalat (AS 5384) 4/2013 5/10 Pornography 5/5 Y Netsweeper Qatar Ooredoo (AS 42298) 4/2013 6/12 Proxy anonymizer 0/6 Y a Netsweeper UAE Du (AS 15802) 3/2013 6/12 Proxy anonymizer 5/6 Y Netsweeper Yemen YemenNet (AS 12486) 3/2013 6/12 Proxy anonymizer 6/6 Y a We confirm usage of Netsweeper in Ooredoo based on blocking of Netsweeper test URLs. 4.4 Case study: Netsweeper in Qatar, UAE and Yemen Implementation details of censorship platforms can impact the ability of our method to confirm censorship. For example, we have observed Netsweeper queuing Web sites for categorization once they have been accessed within the country (to expand the set of categorized sites [19]). As a result, once we have validated that our set of URLs is accessible, they may be queued for categorization by Netsweeper, and eventually may be blocked. Thus, it is not possible for us to validate that our sites are accessible prior to submitting a subset of them to be blocked. As a result, we operate on the assumption that none of our sites will be blocked prior to submission. Prior study by the ONI identified Netsweeper used in YemenNet in Yemen [25], and Du, in UAE [24]. Thus, we use these ISPs to test our proposed methodology. We created a list of 12 domains and submitted six of them to Netsweeper s test-a-site service for classification [20]. We then accessed these 12 domains in YemenNet and Du and observed whether the six submitted sites were blocked. In both ISPs, the methodology was successful with 5 of the 6 sites blocked in Du and all six blocked in YemenNet (Table 4). Challenge 2: Inconsistent blocking. Validating censorship in Yemen was complicated by inconsistent blocking. We observed cases where the blocking technology appeared to be temporarily offline within the country. For example, some proxy URLs are accessible on runs where other proxy URLs are blocked, while in later runs the reverse is true for the same set of URLs. Indeed, prior work by the ONI observed a Yemeni ISP using Websense with a limited number of concurrent user licenses. When the number of users exceeded the number of licenses no content would be filtered [25]. Inconsistent blocking means that we need to repeat the tests numerous times and require a larger set of domains for testing (as we cannot be sure that previouslyaccessed sites are not queued for classification). This inconsistency limits the scalability of our approach for validating Netsweeper installations in Yemen. However, we identified another way to validate that Netsweeper is being used for censorship. To help with configuration of the middlebox, Netsweeper provides a Web site for operators to validate that censorship is working within their network by querying a set of 66 category-specific URLs (e.g., netsweeper.com/category/catno/23 for pornography). While this method is only viable in networks where the tool has not been disabled, a manual test of this tool in YemenNet, in January 2013, indicated that five categories were blocked: adult images, phishing, pornography, proxy anonymizers, and search keywords. We further leverage these category URLs to confirm the use of Netsweeper in Ooredoo, a Qatari ISP. 4.5 Case study: Blue Coat in UAE Challenge 3: URL filtering and network management tools used in combination. Some of the products we consider in this study can be used in tandem to achieve the goals of an ISP. For example, software products such as SmartFilter can be configured to run on proxy appliances, such as Blue Coat s ProxySG. We observe this situation in Etisalat in the UAE, where we confirm that the ISP is using SmartFilter for URL filtering ( 4.3). However, we also identified installations of Blue Coat products in Etisalat using our methodology in Section 3. We created a set of test URLs and submitted them to the Proxy avoidance category for filtering by Blue Coat (since we had previously observed proxies blocked using SmartFilter). Upon testing these URLs in Etisalat, we found that none of them were blocked. While it may be the case that the network is using the two vendors to block different types of content, the more likely cause of this discrepancy is Etisalat using SmartFilter for URL filtering atop a Blue Coat proxy which can provide further traffic management capabilities (e.g., policy enforcement, traffic shaping). 4.6 Ethical considerations 5
6 Table 5: Summary of Web content blocked by URL filtering products. Product McAfee SmartFilter Netsweeper UAE Yemen UAE Category AS 5384 AS AS Environment Freedom of expression/media freedom Gay and lesbian Human rights Militants Extremists and separatists Minority faiths Minority rights and ethnic content Political reform Religious conversion, commentary, criticism Foreign relations and military The case studies in the prior sections raise ethical issues concerning use of the interfaces provided by the vendors to submit Web sites. We emphasize that our approach does not harm the intended performance of the URL filter as we do not impact the classification of legitimate Web sites. Further, since the Web sites we submit are under our control, there is no collateral damage to existing sites. Finally, in the use of a pornographic image in Saudi Arabia we took care to remove the image promptly after our tests were done. To limit the testers exposure to the pornographic content, we had them access a benign image file located on the host, rather than the page containing the offensive content. Since our tests indicate that even the benign content on the host was blocked, we conclude that blocking was at the granularity of hostname, thus this method of mitigating user risk does not impact the results. 5. CHARACTERIZING CONTENT BLOCKED BY URL FILTERS Now that we have designed a methodology to identify and confirm the usage of URL filters, we consider the type of content these products are blocking. The types of content found blocked by URL filters was determined by querying lists of URLs through the measurement client ( 4.1). Two lists of URLs were tested in each country; a global list of internationally relevant content which is constant for all countries, and a local list of locally relevant content which is unique for each country tested. Each of the URLs on these lists was assigned to one of 40 content categories (e.g. human rights or gambling ) under four general themes: political, social, Internet tools and conflict/security content. Tests using the measurement client to characterize the type of content censored by URL filtering products were performed within 30 days of the confirmations in Section 4. Manual analysis identified regular expressions corresponding to the vendors block pages and automated analysis identified all URLs which matched a given block page regular expression. Results of these tests, presented in Table 5, show that all products are used to block a wide variety of content. All products tested are used to block oppositional and critical political content, non-pornographic gay and lesbian content, human rights content, independent media, as well as content relating to minority groups, the environment and religious discussion. The blocking of such content contradicts internationally recognized human rights frameworks protecting freedom of expression, such as Article 19 of the Universal Declaration of Human Rights [33]. 6. CONCLUSIONS We have presented a methodology for identifying installations of specific URL filtering products and confirmed their use for censorship in networks with incountry testers. Through our case studies, we have confirmed the use of North American products to block content protected by human rights norms in UAE and Yemen. Future work. While our methodology moves us beyond manual analysis of these products, it still poses many challenges in terms of scalability. Specifically, the methods in Section 4 require that we identify which categories are blocked in each ISP before creating test sites. Further, the these methods also require vantage points in the network being considered. We hope this paper spurs dialog in the network measurement community about how to characterize URL filtering products in a high confidence, yet scalable, way. Indeed, our methodology can provide a useful ground truth for more general identification of transparent proxies (e.g., [12, 17]) to yield a more complete picture of URL filtering deployments. 6
7 7. REFERENCES [1] Blue Coat. [2] B. Elgin. Israel didn t know high-tech gear was sent to Iran, syria-blocks-texts-with-dublin-made-gear.html. [3] B. Elgin and V. Silver. Syria crackdown gets Italy firm s aid with U.S.-Europe spy gear, europe-spy-gear.html. [4] B. Elgin and V. Silver. Syria disrupts text messaging of protesters with made-in-dublin equipment, syria-blocks-texts-with-dublin-made-gear.html. [5] B. Elgin, V. Silver, and A. Katz. Iranian police seizing dissidents get aid of Western companies, [6] Era of the digital merceneries. Reporters Without Borders, [7] J. Ferziger. Israeli lawmaker calls for investigation of Iran equipment sales, [8] Glype proxy script. [9] A. Horton. WhatWeb, [10] Internet census 2012: Port scanning /0 using insecure embedded devices, [11] ONI research profile: Tunisia [12] C. Kreibich, N. Weaver, B. Nechaev, and V. Paxson. Netalyzr: Illuminating the edge network. In The Internet Measurement Conference, [13] M. Marquis-Boire. From Bahrain with love: FinFisher s spy kit exposed? The Citizen Lab, frombahrainwithlove.pdf. [14] M. Marquis-Boire, J. Dalek, S. McKune, M. Carrieri, M. Crete-Nishihata, R. Deibert, S. Khan, H. Noman, J. Scott-Railton, and G. Wiseman. Planet Blue Coat: Mapping global censorship and surveillance tools. The Citizen Lab, uploads/2013/01/planet-blue-coat.pdf. [15] Maxmind. [16] McAfee Web protection. http: // [17] The ICSI Netalyzr. [18] Netsweeper content filtering. [19] Netsweeper by the numbers. what-we-do/netsweeper-by-the-numbers. [20] Netsweeper Test-a-site. [21] H. Noman and J. York. West censoring East: The use of Western technologies by Middle East censors The OpenNet Initiative Bulletin, WestCensoringEast.pdf. [22] ONI research profile: Iran [23] ONI research profile: Saudi arabia [24] ONI research profile: United arab emirates. opennet.net/research/profiles/united-arab-emirates, [25] ONI research profile: Yemen [26] R. Runningen. Obama moves to block technology used by regimes on rebels, [27] Shodan - Computer Search Engine. [28] V. Silver. HP Computers underpin Syria surveillance, [29] V. Silver. European Union bans exports to Syria of systems for monitoring web, phones, [30] V. Silver and B. Elgin. Torture in Bahrain becomes routine with help from Nokia Siemens, [31] IP to ASN Mapping, [32] Behind Blue Coat: Investigations of commercial filtering in Syria and Burma. The Citizen Lab, behindbluecoat.pdf. [33] Universal declaration of human rights: Article 19, [34] Websense. [35] J. York. Websense bars Yemen s government from further software updates, websense-bars-yemens-government-further-software-updates. 7
Global Effective Tax Rates
www.pwc.com/us/nes Global s Global s April 14, 2011 This document has been prepared pursuant to an engagement between PwC and its Client. As to all other parties, it is for general information purposes
Sex, Social Mores and Keyword Filtering: Microsoft Bing in Arabian Countries
Sex, Social Mores and Keyword Filtering: Microsoft Bing in Arabian Countries Helmi Noman authored this report. Jillian York provided editorial and research support. Ronald Deibert, Colin Maclay, Rob Faris
Appendix 1: Full Country Rankings
Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable
Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund
Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000
Sulfuric Acid 2013 World Market Outlook and Forecast up to 2017
Brochure More information from http://www.researchandmarkets.com/reports/2547547/ Sulfuric Acid 2013 World Market Outlook and Forecast up to 2017 Description: Sulfuric Acid 2013 World Market Outlook and
MAUVE GROUP GLOBAL EMPLOYMENT SOLUTIONS PORTFOLIO
MAUVE GROUP GLOBAL SOLUTIONS PORTFOLIO At Mauve Group, we offer a variety of complete employee management services such as Global Employment Solutions (GES), Professional Employment Outsourcing (PEO),
Introducing GlobalStar Travel Management
Introducing GlobalStar Travel Management GlobalStar is a worldwide travel management company owned and managed by local entrepreneurs. In total over 80 market leading enterprises, representing over US$13
World Consumer Income and Expenditure Patterns
World Consumer Income and Expenditure Patterns 2014 14th edi tion Euromonitor International Ltd. 60-61 Britton Street, EC1M 5UX TableTypeID: 30010; ITtableID: 22914 Income Algeria Income Algeria Income
Triple-play subscriptions to rocket to 400 mil.
Triple-play criptions to rocket to 400 mil. Global triple-play criptions will reach 400 million by 2017; up by nearly 300 million on the end-2011 total and up by 380 million on the 2007 total, according
BT Premium Event Call and Web Rate Card
BT Managed Event and BT Self-Managed Event (also referred to as Express, Plus and Premium) Conference Bridge and Call for Booked Audio Conferencing Services will comprise the following for each phone-conference:
Global Education Office University of New Mexico MSC06 3850, Mesa Vista Hall, Rm. 2120 Tel. 505 277 4032, Fax 505 277 1867, geo@unm.
Global Education Office University of New Mexico MSC06 3850, Mesa Vista Hall, Rm. 220 Tel. 505 277 4032, Fax 505 277 867, [email protected] Report on International Students, Scholars and Study Abroad Programs
Consolidated International Banking Statistics in Japan
Total (Transfer Consolidated cross-border claims in all currencies and local claims in non-local currencies Up to and including one year Maturities Over one year up to two years Over two years Public Sector
CMMI for SCAMPI SM Class A Appraisal Results 2011 End-Year Update
CMMI for SCAMPI SM Class A 2011 End-Year Update Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 1 Outline Introduction Current Status Community Trends Organizational Trends
Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise
DATA SHEET Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise Cisco ICM software has traditionally enabled companies to distribute inbound service volume to a variety of termination
Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features
Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,
PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL
WHITE PAPER PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL CERTIFICATE REVOCATION CHECKING ON CISCO IOS SOFTWARE Introduction The support for x.509 digital
The Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost *
The Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost * There has been substantial consolidation among firms in many industries in countries around
2015 Country RepTrak The World s Most Reputable Countries
2015 Country RepTrak The World s Most Reputable Countries July 2015 The World s View on Countries: An Online Study of the Reputation of 55 Countries RepTrak is a registered trademark of Reputation Institute.
Security and Internet Censorship
Security and Internet Censorship Computer Literacy 1 Lecture 24 13/11/2008 Topics Security Hacker Viruses Phishing Firewall Censorship of the Internet 2 Examples Hacking or Cracking Cracking = Subverting
Know the Facts. Aon Hewitt Country Profiles can help: Support a decision to establish or not establish operations in a specific country.
Aon Hewitt Country Profiles Your eguide to employment requirements and practices Profiles for nearly 90 countries worldwide Risk. Reinsurance. Human Resources. Know the Facts Whether you are a newcomer
Logix5000 Clock Update Tool V2.00.36. 12/13/2005 Copyright 2005 Rockwell Automation Inc., All Rights Reserved. 1
Logix5000 Clock Update Tool V2.00.36. 1 Overview Logix5000 Clock Update Tool 1. 1. What is is it? it? 2. 2. How will it it help me? 3. 3. How do do I I use it? it? 4. 4. When can I I get get it? it? 2
CISCO PIX SECURITY APPLIANCE LICENSING
DATA SHEET CISCO PIX SECURITY APPLIANCE LICENSING The market-leading Cisco PIX Security Appliance Series supports a variety of licensing options, enabling businesses to select the capabilities that are
List of tables. I. World Trade Developments
List of tables I. World Trade Developments 1. Overview Table I.1 Growth in the volume of world merchandise exports and production, 2010-2014 39 Table I.2 Growth in the volume of world merchandise trade
NetFlow Feature Acceleration
WHITE PAPER NetFlow Feature Acceleration Feature Description Rapid growth in Internet and intranet deployment and usage has created a major shift in both corporate and consumer computing paradigms. This
Digital TV Research. http://www.marketresearch.com/digital-tv- Research-v3873/ Publisher Sample
Digital TV Research http://www.marketresearch.com/digital-tv- Research-v3873/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am -
The big pay turnaround: Eurozone recovering, emerging markets falter in 2015
The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 Global salary rises up compared to last year But workers in key emerging markets will experience real wage cuts Increase in
Cisco Smart Care Service
Q. What is Cisco Smart Care Service? A. Cisco Smart Care Service is a collaborative, comprehensive network wide service that enables your partner to deliver proactive network monitoring, health checkups,
E-Seminar. Financial Management Internet Business Solution Seminar
E-Seminar Financial Management Internet Business Solution Seminar Financial Management Internet Business Solution Seminar 3 Welcome 4 Objectives 5 Financial Management 6 Financial Management Defined 7
CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK)
DATA SHEET CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK) Cisco Systems IP Phone Services bring the power of the World Wide Web to Cisco IP Phones. An integral part of a Cisco AVVID (Architecture
Global AML Resource Map Over 2000 AML professionals
www.pwc.co.uk Global AML Resource Map Over 2000 AML professionals January 2016 Global AML Resources: Europe France Italy Jersey / Guernsey 8 Ireland 1 Portugal 7 Luxembourg 5 United Kingdom 1 50 11 Spain
YTD 2015-27 CS AWARDS IN AMERICAS
YTD 2015-27 CS AWARDS IN AMERICAS Argentina Bolivia Brazil Frontline Customer Service Team of the Year, All Industries (Bronze) Customer Service Department of the Year, Airlines, Distribution & Transportation
Cisco Global Cloud Index Supplement: Cloud Readiness Regional Details
White Paper Cisco Global Cloud Index Supplement: Cloud Readiness Regional Details What You Will Learn The Cisco Global Cloud Index is an ongoing effort to forecast the growth of global data center and
Culture in the Cockpit Collision or Cooperation?
Culture in the Cockpit Collision or Cooperation? Dr. Nicklas Dahlstrom Human Factors Manager Understanding Safety - The Changing Nature of Safety 1 Lives lost per year How safe is flying? 100 000 10 000
Contact Centers Worldwide
A Contact Centers Worldwide Country Tel.no. Supported lang. Contact Center Albania Algeria 852 665 00 +46 10 71 66160 Angola 89900 +34 91 339 2121 (Port) and Portuguese +34 913394044 +34 913394023 (Por)
Business Phone. Product solutions. Key features
Product solutions Enjoy free calls and significant savings on your business landline bills with from International. Set-up is simple and you don t need to change your existing telephone numbers, plus there
Chapter 4A: World Opinion on Terrorism
1 Pew Global Attitudes Project, Spring 2007 Now I m going to read you a list of things that may be problems in our country. As I read each one, please tell me if you think it is a very big problem, a moderately
Fall 2015 International Student Enrollment
Fall 2015 International Student Enrollment Prepared by The Office of International Affairs Nova Southeastern University Nova Southeastern University International Student Statistics Fall 2015 International
Guidelines for Enforcing Money Judgments Abroad
The article was originally published in International Business Lawyer, Volume 21, Number 11, pages 509-512. The International Business Lawyer is published by the Section on Business Law of the International
Cisco Conference Connection
Data Sheet Cisco Conference Connection Cisco IP Communications a comprehensive system of powerful, enterprise-class solutions including IP telephony, unified communications, IP video/audio conferencing,
I. World trade developments
I. World trade developments The value of world merchandise exports increased by 20 per cent in 2011 while exports of commercial services grew by 11 per cent. Key developments in 2011: a snapshot Trade
Senate Committee: Education and Employment. QUESTION ON NOTICE Budget Estimates 2015-2016
Senate Committee: Education and Employment QUESTION ON NOTICE Budget Estimates 2015-2016 Outcome: Higher Education Research and International Department of Education and Training Question No. SQ15-000549
Region Country AT&T Direct Access Code(s) HelpLine Number. Telstra: 1 800 881 011 Optus: 1 800 551 155
Mondelēz International HelpLine Numbers March 22, 2013 There are many ways to report a concern or suspected misconduct, including discussing it with your supervisor, your supervisor s supervisor, another
A Region by Any Other Name...
A Region by Any Other Name.... Janet Hall Bethany Public Schools, Bethany, Oklahoma [email protected] OVERVIEW: It is often true that a place may be categorized as belonging to more than one region,
Reporting practices for domestic and total debt securities
Last updated: 4 September 2015 Reporting practices for domestic and total debt securities While the BIS debt securities statistics are in principle harmonised with the recommendations in the Handbook on
Carnegie Mellon University Office of International Education Admissions Statistics for Summer and Fall 2010
Carnegie Mellon University Admissions Statistics for and Fall 2010 New International Students and Fall 2010 Undergraduate 208 16.1% Master's 799 61.7% Doctorate 177 13.7% Exchange 80 6.2% 31 2.4% Total
How To Get A New Phone System For Your Business
Cisco Phone Systems Telemarketing Script Cold Call 1. Locate Contact: Name listed Owner General Manager / Office Manager Chief BDM (Business Decision Maker) Note: Avoid talking to IT since this is not
CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER
PRODUCT BULLETIN NO. 2438 CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER NEW FEATURES New features of the Cisco Content Switching
Bangladesh Visa fees for foreign nationals
Bangladesh Visa fees for foreign nationals No. All fees in US $ 1. Afghanistan 5.00 5.00 10.00 2. Albania 2.00 2.00 3.00 3. Algeria 1.00 1.00 2.00 4. Angola 11.00 11.00 22.00 5. Argentina 21.00 21.00 42.00
The VAT & Invoicing Requirements Update March 2012
The VAT & Invoicing Requirements Update March 2012 Indirect taxes are a massive potential expense. For buyers and sellers of goods and services, how invoices are prepared and processed can affect a company's
AACSB International Accreditation and Joint Programs
AACSB International Accreditation and Joint Programs Lucienne Mochel Assistant Vice President for Accreditation Services The AACSB Mission To advance quality management education worldwide through accreditation
Application Notes for VTech 1-Line and 2-Line Analog Hotel Phones with Avaya IP Office 8.1 and Voicemail Pro 8.1 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for VTech 1-Line and 2-Line Analog Hotel Phones with Avaya IP Office 8.1 and Voicemail Pro 8.1 Issue 1.0 Abstract These Application Notes describe
Carnegie Mellon University Office of International Education Admissions Statistics for Summer and Fall 2013
Carnegie Mellon University Admissions Statistics for and Fall 2013 New International Students and Fall 2012 Undergraduate 270 14.3% Master's 1301 68.7% Doctorate 192 10.1% Exchange 99 5.2% 31 1.6% Total
CISCO NETWORK CONNECTIVITY CENTER
DATA SHEET CISCO NETWORK CONNECTIVITY CENTER The Cisco Network Connectivity Center (NCC) delivers end-to-end management across multiple tools, technologies, and silos. From networks and applications to
Global Dynamism Index (GDI) 2013 summary report. Model developed by the Economist Intelligence Unit (EIU)
Global Dynamism Index (GDI) 2013 summary report Model developed by the Economist Intelligence Unit (EIU) What is the Global Dynamism Index (GDI)? the GDI assesses the dynamism of 60 of the world's largest
Mineral Industry Surveys
4 Mineral Industry Surveys For information contact: Robert L. Virta, Asbestos Commodity Specialist U.S. Geological Survey 989 National Center Reston, VA 20192 Telephone: 703-648-7726, Fax: (703) 648-7757
Enterprise Mobility Suite (EMS) Overview
Enterprise Mobility Suite (EMS) Overview Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report using 3+ devices for work Enable my employees
Cisco CNS NetFlow Collection Engine Version 4.0
Data Sheet Cisco CNS NetFlow Collection Engine Version 4.0 Cisco CNS is a suite of intelligence engines that work with device agents to create a programmable network. Cisco CNS extends the management plane
Your Access to a World of Global Connectivity. www.nevigate.net
Your Access to a World of Global Connectivity Agenda Company Background / Profile Our Commitment Coverage Strengths Products Portfolio Deliverables Measurable Benefits Support Company Background Nevigate
The face of consistent global performance
Building safety & security global simplified accounts The face of consistent global performance Delivering enterprise-wide safety and security solutions. With more than 500 offices worldwide Johnson Controls
EMEA BENEFITS BENCHMARKING OFFERING
EMEA BENEFITS BENCHMARKING OFFERING COVERED COUNTRIES SWEDEN FINLAND NORWAY ESTONIA R U S S I A DENMARK LITHUANIA LATVIA IRELAND PORTUGAL U. K. NETHERLANDS POLAND BELARUS GERMANY BELGIUM CZECH REP. UKRAINE
GLOBAL HRMONITOR NEW DIMENSIONS IN ONLINE HR INFORMATION TALENT HEALTH RETIREMENT INVESTMENTS
GLOBAL HRMONITOR NEW DIMENSIONS IN ONLINE HR INFORMATION TALENT HEALTH RETIREMENT INVESTMENTS DISCOVER MERCER S GLOBAL HRMONITOR ABOUT GLOBAL HRMONITOR Mercer s Global HRMonitor is a single-source, web-based
Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment
Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment OVERVIEW Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment Rising medical
Brochure More information from http://www.researchandmarkets.com/reports/1339929/
Brochure More information from http://www.researchandmarkets.com/reports/1339929/ The 2011 World Forecasts of Machine Tools That Remove Material by Laser or Light, Photon, Ultrasonic, Electro-Discharge,
Make the invisible visible! SENSORS WITH EXCELLENT BACKGROUND SUPPRESSION
Make the invisible visible! SENSORS WITH EXCELLENT BACKGROUND SUPPRESSION photoelectric sensors Thanks to its vision for innovation and technological enhancement, Contrinex keeps on setting new standards
Global Media Report. Global Industry Overview
Global Media Report 203 Global Industry Overview McKinsey & Company Global Media Report 203 McKinsey & Company s Global Media and Entertainment Practice Never before has an integrated view across the media
Raveh Ravid & Co. CPA. November 2015
Raveh Ravid & Co. CPA November 2015 About Us Established in 1986 by Abir Raveh, CPA & Itzhak Ravid, CPA 6 Partners, 80 employees Located in Tel Aviv, Israel wide range of professional services highly experienced
Data Modeling & Bureau Scoring Experian for CreditChex
Data Modeling & Bureau Scoring Experian for CreditChex Karachi Nov. 29 th 2007 Experian Decision Analytics Credit Services Help clients with data and services to make business critical decisions in credit
89% 96% 94% 100% 54% Williams 93% financial aid at Williams. completion statistics $44,753 76% class of 2013 average four-year debt: $12,749
financial aid at Average - $, financial aid is comprehensive, covering books, health insurance, study abroad costs, travel, and personal expenses % % % % cost met by average % of with demonstrated need
Customer Support. Superior Service Solutions for Your Laser and Laser Accessories. Superior Reliability & Performance
Customer Support Superior Service Solutions for Your Laser and Laser Accessories Superior Reliability & Performance Optimizing Service Support for our Customers. Increased up-time Focus on core business
Energy Briefing: Global Crude Oil Demand & Supply
Energy Briefing: Global Crude Oil Demand & Supply November 6, 215 Dr. Edward Yardeni 516-972-7683 eyardeni@ Debbie Johnson 48-664-1333 djohnson@ Please visit our sites at www. blog. thinking outside the
Doing Business in Australia and Hong Kong SAR, China
Doing Business in Australia and Hong Kong SAR, China Mikiko Imai Ollison Private Sector Development Specialist Nan Jiang Private Sector Development Specialist Washington, DC October 29, 2013 What does
CISCO MDS 9000 FAMILY PERFORMANCE MANAGEMENT
WHITE PAPER CISCO MDS 9000 FAMILY PERFORMANCE MANAGEMENT As storage area networks (SANs) grow, so do the challenges for monitoring and resolving performance issues. Summary views of networkwide historical
Accuracy counts! SENSORS WITH ANALOG OUTPUT
Accuracy counts! SENSORS WITH ANALOG OUTPUT OTHER APPLICATIONS: KEY ADVANTAGES: Distance measurement Positioning Profile detection Deformation monitoring Vibration monitoring Process monitoring Detection
Carnegie Mellon University Office of International Education Admissions Statistics for Summer and Fall 2015
Carnegie Mellon University Admissions Statistics for and Fall 2015 New International Students and Fall 2015 Undergraduate 344 15.2% Master's 1599 70.6% Doctorate 167 7.4% Exchange 73 3.2% 81 3.6% Total
PANDUIT Physical Layer Infrastructure Management. EMC Smarts Integration Module
PANDUIT Physical Layer Infrastructure Management EMC Smarts Integration Module SM About PANDUIT A World Class Developer PANDUIT is a world class developer and provider of leading edge solutions that help
HP Technology Services HP NonStop Server Support
Reference guide HP Technology Services HP NonStop Server Support HP Global NonStop Solution Center (GNSC) Table of contents Global NonStop Solution Center... 2 Product support for HP NonStop and Neoview
Search Engine Optimization Case Study - Focus-suites.com
Search Engine Optimization Case Study - Focus-suites.com The Challenges: Background: FSPL is Asia's Largest Qualitative Research Solutions Provider with State of the Art Focus Group Suites across major
Dimension Data s Uptime Maintenance Service
Dimension Data s Uptime Maintenance Service The pace of business today simply doesn t allow for downtime. When systems go off-line, productivity drops, time and money go to waste and opportunities are
SUPPLEMENTAL EXECUTIVE RETIREMENT PLANS IN CANADA
HEALTH WEALTH CAREER SUPPLEMENTAL EXECUTIVE RETIREMENT PLANS IN CANADA KEY FINDINGS FROM THE MERCER SERP DATABASE (2014 UPDATE) APRIL 2015 b CONTENTS 1. Introduction...2 2. Highlights of the Mercer SERP
Faster voice/data integration for global mergers and acquisitions
Global agility in technology solutions. sm Faster voice/data integration for global mergers and acquisitions >The InTech Group, Inc. Worldwide in-country technical resources for newly merged companies
CISCO METRO ETHERNET SERVICES AND SUPPORT
SERVICES OVERIVEW CISCO METRO ETHERNET SERVICES AND SUPPORT In the ever-changing communications market, incumbent service providers are looking for ways to grow revenue. One method is to deploy service
FDI performance and potential rankings. Astrit Sulstarova Division on Investment and Enterprise UNCTAD
FDI performance and potential rankings Astrit Sulstarova Division on Investment and Enterprise UNCTAD FDI perfomance index The Inward FDI Performance Index ranks countries by the FDI they receive relative
CNE Progress Chart (CNE Certification Requirements and Test Numbers) (updated 18 October 2000)
Novell Education CNE Progress Chart (CNE Certification Requirements and Test Numbers) (updated 18 October 2000) Prerequisite for all certifications In order to receive a Novell certification the candidate
Emerging Markets Value Stock Fund
SUMMARY PROSPECTUS PRIJX March 1, 2016 T. Rowe Price Emerging Markets Value Stock Fund A fund seeking long-term growth of capital through investments in undervalued stocks of companies in emerging market
Governance, Risk and Compliance Assessment
Governance, Risk and Compliance Assessment Information security is a pervasive business requirement and one that no organisation can afford to get wrong. If it s not handled properly, your business could
Composition of Premium in Life and Non-life Insurance Segments
2012 2nd International Conference on Computer and Software Modeling (ICCSM 2012) IPCSIT vol. 54 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V54.16 Composition of Premium in Life and
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Cisco CNS NetFlow Collection Engine Version 5.0
Data Sheet Cisco CNS NetFlow Collection Engine Version 5.0 Cisco CNS consists of software and appliance-based applications, which support scalable network deployment, configuration, service assurance monitoring,
Field Safety Notice Urgent Medical Device Correction 2955842-03-13-2015-003-C Cloudy Appearance and Potential Tears on System Drapes
Field Safety Notice Urgent Medical Device Correction 2955842-03-13-2015-003-C Cloudy Appearance and Potential Tears on System Drapes Introduction and Reason for Field Action Dear da Vinci Customer, This
How To Manage An Ip Telephony Service For A Business
Enabling organisations to focus on core revenue generating activities Your business needs reliable, flexible and secure communication tools to enable better connectivity and collaboration with your employees,
Dial 00-800-0010, when prompted to enter calling number, enter 800-544-6666 American Samoa 1-800-544-6666 Number can be dialed directly Angola 0199
National Financial Services International Calling Instructions Albania 00-800-0010 Dial 00-800-0010, when prompted to enter American Samoa 1-800-544-6666 Number can be dialed directly Angola 0199 Dial
The World Market for Medical, Surgical, or Laboratory Sterilizers: A 2013 Global Trade Perspective
Brochure More information from http://www.researchandmarkets.com/reports/2389480/ The World Market for Medical, Surgical, or Laboratory Sterilizers: A 2013 Global Trade Perspective Description: This report
International Financial Reporting Standards
International Financial Reporting Standards Of Growing Importance for U.S. Companies Assurance Services there is no longer a choice Three factors may influence your need to consider IFRS. First, many organizations
Dow Jones Titans Indices Methodology
Dow Jones Titans Indices Methodology March 2014 S&P Dow Jones Indices: Index Methodology Table of Contents Introduction 4 Highlights and Index Family 4 Eligibility Criteria and Index Construction 7 Dow
June 2012. Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com
The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise Regional Findings Americas (Latin and South America, Canada, U.S.A.) Europe, Africa, Middle East Asia
Foreign Corrupt Practices Act (FCPA)/Bribery Act Integrity Due-Diligence & Investigations
Foreign Corrupt Practices Act (FCPA)/Bribery Act Integrity Due-Diligence & Investigations Clarity in a complex world www.mintzgroup.com How We Work: Because the reputations of companies and individuals
Cisco IT Data Center and Operations Control Center Tour
Cisco IT Data Center and Operations Control Center Tour Inside the Build Room Page 1 of 8 5. Inside the Build Room Introduction Figure 1. Inside the Build Room Ian: The purpose of the Build room is for
