Distributed library management system based on the blockchain technology.
|
|
|
- Nathaniel Garrett
- 9 years ago
- Views:
Transcription
1 Distributed library management system based on the blockchain technology. Atos IT Challenge Blockchain Submitted by: Juan Cabello B.Sc. [email protected] Technische Universität Berlin Gerrit Janßen B.Sc. gerrit.janssen@ mailbox.tu-berlin.de Technische Universität Berlin Alexander Mühle B.Sc. alexander.n.muehle@ campus.tu-berlin.de Technische Universität Berlin
2 Executive Summary LibChain envisions modernised procedures to borrow books from libraries. Leveraging the blockchain technology, patrons can lend library books directly to other patrons without bringing it back to the library first. Such transactions can be made regardless of the registration library, as long as the patrons are registered with a participating library. Furthermore, the system supports interlibrary borrowing procedures. Taking into account that LibChain aims to extend current library services, implementing such a system allows a more comfortable and efficient way for patrons to interact with the libraries ecosystem. Motivation In our modern digitalised world, retrieving information is much easier and quicker than ever before. Even though information can be retrieved from various sources, it remains important to provide a reliable source of knowledge which libraries fulfill. Libraries have been slow to adopt newer technologies in their services. Borrowing a book, for instance, maintains the same procedure from decades ago in which all borrowed books must return to the library before they can be borrowed again. Moreover, often cooperation between libraries lacks, which results in multiple registrations from patrons to borrow books from different libraries. Patrons, as well as libraries, can benefit from a system that makes such procedures easier and quicker. To this end, the blockchain technology offers a transparent management of resources that libraries can use to deliver such system in a safe and convenient way. Because of the blockchain there is no need for a central authority for two parties to have a trustful transaction. In Germany alone there are approximately 10 thousand libraries with a catalogue of over 375 million different items in a variety of formats of which books are the majority [3]. In Europe there are approximately 1.8 billion different items and worldwide there are almost 2.5 billion [4]. Libraries fulfill an important task: In a free and enlightened society, they enable people to acquire knowledge by themselves and offer them the opportunity of forming an opinion of their own. That is why our society commits to spending great amounts of money on the upkeep of libraries and their inventory. In 2015 German libraries spent about 433 million euros alone for the preservation and extension of the libraries stock [3]. However, there is a big problem: having books on a shelf makes no sense on its own. It is important that libraries encourage and entice people to make use of their service. One of the obstacles to realising that vision is the way libraries have historically been structured. The libraries ecosystem is decentrally organised with each library having its own administration and to the best of our knowledge there are no 1
3 common lending systems. Therefore partnerships amongst libraries tend to be complex. We propose a solution to remove bureaucratic obstacles for both the users and providers of library services. To lower these bureaucratic barriers we present a decentralised lending system on a blockchain that easily integrates into existing systems. According to Crosby et al. [2], the blockchain stands for transparency, upholds a trustworthy system on which nobody trusts each other nor shall, and runs completely decentralised on a peer-to-peer network. In the proposed solution libraries could easily participate in a secure and transparent lending system, in which transactions are stored on a common shared blockchain alongside a book catalogue from all cooperating libraries. For the user it would be possible to find and borrow, as well as transfer books and their associated liability without needing to strictly bring it back to the library, thus in a much more convenient way. Example: To understand the idea of the proposed solution let us consider that Alice wants to borrow a book from library A (LibA) and she is registered with library B (LibB). LibA and LibB cooperate through our system. LibA can, without knowing Alice s real identity, trust her request and verify the entitlement of the action. Therefore, Alice can proceed to borrow the book with the loan s transaction being stored on the blockchain. After a week, Bob, who is registered with library C (LibC), wants to borrow the same book Alice currently has. Bob can contact Alice through the system without knowing Alice s real identity to ask whether she could give him the book. As Alice does not need it anymore, she can use the system to make a transaction on the blockchain to transfer the loan with its obligations to Bob. She can meet and give the book directly to Bob without bringing it back to the library. Thanks to the blockchain, the libraries are able to verify and identify the current holder of the books at any given time. Libraries and mobile services In a survey conducted in 2012 by Pew Internet several findings related to young adults in the United States (ages 16-29) and library s usage underline the importance of mobile services in libraries. Among the participating young adults 65% owned a smartphone and 18% visited a public library s website or accessed library resources in a period of 12 months. Moreover, 42% of the young adults stated that they would very likely use a cell app to access library services and 44% stated that libraries should move most library services online [6]. 2
4 In 2016, a more recent survey has been conducted by the same research project with similar results and more detailed information on the usage of the library s websites and mobile apps. The library s websites or mobile apps saw an increase on its usage, as now 27% of the participants accessed the library and 58% of those searched a library s catalogue [5]. 1 Boopsie, the world leading company that develops mobile library apps, has served 4,000 libraries worldwide and 500,000 unique users per month. These numbers are important to remark the widespread usage of library apps, even if they have to download a different app from each library. To the best of our knowledge, a solution, similar to Boopsie s apps but with blockchain technology, has not been proposed before, as trustworthy instances were hard to confirm. Since one of the blockchain s principles is to establish a platform in which no trust is needed, the libraries can now lend books and still keep control over the possession of the books. Another advantage of this blockchain s principle for users that had borrowed a book from a library is that they lend it to another user of participating libraries. In a too decentralised system such as the libraries ecosystem the blockchain will not make the ecosystem centralised, but rather securely decentralised with a shared database. Furthermore, the adoption of library mobile apps is a promising opportunity for libraries since the apps can be easily integrated into the libraries ecosystem and as no existing services need to be replaced. The main usage of library apps focuses on assistance or extension of existing services. Hence LibChain is designed to operate alongside the existing library services to allow an easy integration and early benefits from the advantages. LibChain LibChain s vision embraces an establishment of a libraries ecosystem that share a book s database and in which every user, regardless of registration s library, can borrow, reserve, and request books from any participant library or from any user that borrowed a book from a cooperating library. The core idea behind LibChain from a technical standpoint is to represent individual books and loans from libraries with so called coloured coins. Coloured coins are used to represent real world assets by addresses in the 2 blockchain and applications. Companies like Everledger have successfully used them to track real world assets such as diamonds, artwork and other high value fraud targets in a permanent, decentralised fashion. In addition, metadata can be stored within a coloured coin. In LibChain, this metadata could contain information about how often the book can be passed on
5 between users, the loan period and the home library of the book. By adding 3 LibChain on top of an existing blockchain technology like Ethereum, we can use smart contracts that will act as decentralised applications in our system. 4 To communicate between the different actors in the system the Whisper protocol will be used. The Whisper protocol gives us signed and encrypted messaging that enables secure communications between parties in our system. The transaction keys are used to address users and topics will be assigned to further filter requests and invoke the appropriate response. Having a transparent and permanent record of the books usage can be advantageous for publicly funded libraries that have to be accountable for their expenditures; the publicly funded libraries make up 47% of libraries in the world [4]. Since all valid transactions of books would be written on the blockchain, they would be open to the public. This is an advantage in that it can allow easier oversight from the public, but at the same time the privacy of the users of the libraries would need to be upheld. According to the consumer barometer by Google [1], mobile users do care about privacy protection which implies that for a better acceptance of the system privacy must be taken into account. To avoid disclosing personal information without neglecting transparency, on each user s transaction a new key-pair needs to be generated. Therefore, this key-pair needs to be known to the library in which the user is registered, to keep track of their books and avoid any fraudulent users to steal the books. In LibChain s architecture there are 2 main actors: libraries and users. Both communicate with the blockchain : (1) users to look up for a book and store their transactions and (2) libraries to look up for current holder of books. We map the typical library use cases to the blockchain to provide innovative features in a comfortable and secure manner. Furthermore, the blockchain must run on top of the existing system. For libraries this means that any existing system can be kept and LibChain will integrate as another layer on top of it. This will help libraries deploy LibChain and make it more feasible for libraries to choose LibChain rather than per 4
6 replacing an already proven system altogether. This also implies that to borrow books no extra registration must be explicitly made. Especially due to potential concerns that some users may refuse to use the software, either because of the absence of a mobile device or disagreement with the software. Thus the libraries will be able to create one-use accounts managed by the system. The registration for willing participants is only required while signing up to the system. Outlook: The idea of having blockchain secured library transactions can be moved even further to support digital content like ebooks, scientific publications or any other media. This enables a more precise accounting because instead of having expensive flat-rate contracts with the digital publishers a pay-per-loan model can be implemented. Such a model would decrease the costs since the number of necessary digital copies can be easily derived by the stored transactions in the blockchain and future contracts can adapt to that. In the following subsections we demonstrate the blockchain transactions that are invoked when books are loaned by the users. User to User loan In the following we will look at some user to user book exchange scenarios. In the first step the student Bob wants to receive a book from his fellow TU Berlin student Alice and sends a request to his home library. In this request the user needs to specify the specific book ID of the book he wants to receive as well as authenticating himself as a valid user to his library. Additionally he includes a key in the request that will act as wallet for the book. 5
7 Once the library (Lib A) receives the request it reads the owner/home library of the book from the metadata saved in the coloured coin. This is information publicly available in the blockchain. Should the library that is processing the request not be the home library of the book, it would have to then forward the request to that library. In this case Lib B will act as the owner of the book. Lib B will then respond with either an OK to signal that the book can be passed on to a new user or reject the request which will terminate the process. Lib B will also have to save the information that someone from the foreign library will hold the book. If the registration library (LibA) of Alice gets the OK from the book s home library (LibB) it will then ping the wallet that currently holds the book in this case Alice. Alice can now decide whether she wants to pass on the book to the wallet that was included in the ping or reject it. Library to User loan Currently the process has been designed in a way that library to user borrowing works essentially analogue to user to user book exchanges. 6
8 The library Lib A looks up the owner of the book in the blockchain and also checks the availability of it through the transaction information in the blockchain. If it controls the wallet that the book is currently in and confirms the loan request it can send the book coin to the requester Alice. In doing so the library saves the transaction key as a link with the user ID. This is to ensure that the library knows the true identity of the user in case he is overdue or the book gets damaged. Project Plan The development of the LibChain project will be split into 4 workpackages, each with a principal task and secondary features. Workpackage 1: Requirements and overall architecture The first workpackage contains a system requirements analysis and will be about establishing the basic infrastructure. The main features of the first workpackage are: Create the clients that will connect with the private ethereum blockchain Define data structure of the coloured coins to represent books and include needed parameters to implement library features, i.e loan period, amount of allowed user-to-user exchanges and the home library Build the infrastructure needed to deploy a private ethereum blockchain Workpackage 2: Basic system implementation In the second workpackage the first functionality of the system will be implemented. The tasks of this workpackage are: 7
9 Implementing the library-to-user and user-to-user loan Implementing the block chain features, i.e sending tokens, reading from metadata Creating distinct library and user clients Workpackage 3: GUI The third workpackage focuses on the Graphical User Interface. Its tasks comprise: Create GUI to enable clients to use library functions Create GUI to allow libraries to add/remove books and retrieve data about users and books. Workpackage 4: Edge-Cases and Presentation The last workpackage focuses on edge-cases, improvements of performance, and user documentation. These are the currently recognised edge-cases: Borrowing from any library Passing on books to users from any library Reserving books References [1] Consumer Barometer From Google. Consumerbarometer.com. N.p., Web. 23 Nov [2] Crosby, Michael et al. Blockchain Technology. Berkeley: Sutardja Center for Entrepreneurship & Technology, Web. 23 Nov [3] Foltin, Ira. "Bibliotheksportal: Daten 2015". Bibliotheksportal.de. N.p., Web. 24 Nov [4] Hackett, Teresa. Global Library Statistics. International Federation of Library Associations and Institutions, Web. 24 Nov [5] Horrigan, John B., Lee Rainie, and Dana Page. Libraries Pew Research Center, Web. 23 Nov [6] Zickuhr, Kathryn, Lee Rainie, and Kristen Purcell. Younger Americans' Library Habits And Expectations. Pew Research Center s Internet & American Life Project, Web. 23 Nov
PayPal Money Habits Study Global
PayPal Money Habits Study Global Research Findings September 1, 2015 Contents Introduction 3 Methodology 4 Research Findings 5 Data Sources 18 2 Introduction Between friends and family, money lending,
State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009
State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN January 2010 December 2012 DECEMBER 31, 2009 Florida Department of State State Library and Archives of Florida 850.245.6750 http://dlis.dos.state.fl.us/recordsmanagers
Position Statement. Blockchain based Identity Management
Position Statement Blockchain based Identity Management May 31 st 2016 Contents Page 1 Personal Background 3 2 Directions in Blockchain Based Identity Management Solutions 3 3 Aim and Objectives Error!
Su Ning: Online verification of citizens identity information in China
Su Ning: Online verification of citizens identity information in China Remarks by Mr Su Ning, Deputy Governor of the People s Bank of China, at the press conference on the inauguration of the Online Verification
COMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE
Privacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
Measurabl, Inc. Attn: Measurabl Support 1014 W Washington St, San Diego CA, 92103 +1 619.719.1716
Measurabl, Inc. ( Company ) is committed to protecting your privacy. We have prepared this Privacy Policy to describe to you our practices regarding the Personal Data (as defined below) we collect from
Recommendations for the PIA. Process for Enterprise Services Bus. Development
Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by
Masaryk University Library Rules
MU Directive No. 11/2014 Masaryk University Library Rules (as amended effective as of October 1, 2014) Pursuant to Section 10, paragraph 1 of Act No. 111/1998 Coll., On universities and on amendments to
THIRD REGIONAL TRAINING WORKSHOP ON TAXATION. Brasilia, Brazil, December 3 5, 2002. Topic 4
THIRD REGIONAL TRAINING WORKSHOP ON TAXATION Brasilia, Brazil, December 3 5, 2002 Topic 4 INFORMATION TECHNOLOGY IN SUPPORT OF THE TAX ADMINISTRATION FUNCTIONS AND TAXPAYER ASSISTANCE Nelson Gutierrez
Context-aware Library Management System using Augmented Reality
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 923-929 International Research Publication House http://www.irphouse.com Context-aware Library
MASSIF: A Promising Solution to Enhance Olympic Games IT Security
MAnagementof Security information and events in Service InFrastructures MASSIF: A Promising Solution to Enhance Olympic Games IT Security 7th ICGS3 / 4th e-democracy Joint Conferences 2011 August 25 th
BRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues
ESRC Research Data Policy
ESRC Research Data Policy Introduction... 2 Definitions... 2 ESRC Research Data Policy Principles... 3 Principle 1... 3 Principle 2... 3 Principle 3... 3 Principle 4... 3 Principle 5... 3 Principle 6...
Inquiry into Microeconomic Reform in Western Australia. by the Economic Regulation Authority. Submission by the. State Library of Western Australia
Inquiry into Microeconomic Reform in Western Australia by the Economic Regulation Authority Submission by the State Library of Western Australia September 2013 State Library of Western Australia 1 Background
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
Building a BYOD Strategy For Education
A CBTS White Paper Building a BYOD Strategy For Education Chris Burns Marketing Director, CBTS 8/1/2012 www.cbts.cinbell.com Overview the BYOD Trend in Education Bring Your Own Device (BYOD) is one of
Knowledge, Content and Library Management Solution
Knowledge, Content and Library Management Solution Value to You 1 2 3 4 5 Satisfy information on demand expectations Promote the value of your library to management Reinforce your library s position as
Last Updated: June 2013
Society of Petroleum Engineers Privacy Policy Statement Last Updated: June 2013 This Privacy Policy tells you about the information the Society of Petroleum Engineers (SPE) gathers about you and how we
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
Leonardo Hotels Group Page 1
Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes
Brainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
E-learning and Student Management System: toward an integrated and consistent learning process
E-learning and Student Management System: toward an integrated and consistent learning process Matteo Bertazzo 1, Franca Fiumana 2 1 CINECA, Information and Knowledge Management Services Department, via
Local Government Records Management Benchmarking Report
Local Government Records Management Benchmarking Report January 2014 An independent, comparative assessment of records management services in Local Government. Executive Summary Votar Partners were engaged
WHAT INFORMATION IS COLLECTED AT MOTOROLA.COM.VN AND/OR MOTOROLA.VN AND HOW IS IT PROCESSED AND USED?
MOTOROLA PRIVACY POLICY This Privacy Statement ( Policy ) is subject to change at Motorola s discretion. If we decide to change this Policy, we will post the amended Policy on this website so you will
Security of Real-time Communication on the Web (WebRTC)
Security of Real-time Communication on the Web (WebRTC) Lieven Desmet, KU Leuven Martin Johns, SAP AG Abstract With the introduction of WebRTC, real-time communication on the Web, both web technology and
ING Public Key Infrastructure Technical Certificate Policy
ING Public Key Infrastructure Technical Certificate Policy Version 5.1 - May 2010 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Of this document can be obtained via the ING
A STUDY ON USAGE OF MOBILE APPS AS A IMPACTFUL TOOL OF MARKETING
A STUDY ON USAGE OF MOBILE APPS AS A IMPACTFUL TOOL OF MARKETING Dr. Deepali Bhatnagar Assistant Professor, Amity University, Rajasthan ABSTRACT: Mobile marketing perform two ways or multiple way communication
THE KEY TO THE UNCASHED CHECKS DILEMMA: AUTOMATIC ROLLOVER IRAs
THE KEY TO THE UNCASHED CHECKS DILEMMA: AUTOMATIC ROLLOVER IRAs OVERVIEW When an employee retires or terminates employment, he is generally entitled to a distribution of his retirement account from the
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
Erasmus for Young Entrepreneurs Registration guide for new entrepreneurs
Erasmus for Young Entrepreneurs Registration guide for new entrepreneurs Erasmus for Young Entrepreneurs Support Office co/eurochambres 1 Table of contents Table of contents... 2 Background and purpose
Transnet Registration Authority Charter
Registration Authority Charter Version 3.0 is applicable from Effective Date Inyanda House 21 Wellington Road Parktown, 2193 Phone +27 (0)11 544 9368 Fax +27 (0)11 544 9599 Website: http://www.transnet.co.za/
7 great reasons to choose ABE. ABE progression route. What happens to our alumni? Our qualifications. Business Management. Where can you study?
02 Contents Contents 02 04 05 06 07 08 12 16 18 20 22 23 Welcome 7 great reasons to choose ABE ABE progression route What happens to our alumni? Our qualifications Business Management Where can you study?
Position Paper Ecommerce Europe. E-Payments 2012
Position Paper Ecommerce Europe E-Payments 2012 Contents Introduction: Ecommerce Europe 3 1. Payments from the merchants perspective 5 2. Market outlook 6 3. Card-based payments and related fraud issues
Blockchain and Smart Contracts Joe Guagliardo
Blockchain and Smart Contracts Joe Guagliardo Partner and Vice Chair, Technology Practice Group The [financial services] industry has a once-ina-generation opportunity to reimagine and modernize its infrastructure
Microsoft Exchange ActiveSync Administrator s Guide
Microsoft Exchange ActiveSync Administrator s Guide Copyright 2005 palmone, Inc. All rights reserved. palmone, HotSync, Treo, VersaMail, and Palm OS are among the trademarks or registered trademarks owned
Support to Reading Groups
Support to Reading Groups Purpose: To set out the basis on which stock is supplied to Reading Groups and to outline other forms of support offered. Libraries & Information will support Reading Groups by
1. Definitions The following definitions are, both in the singular and in the plural, used in these terms and conditions payment methods Buckaroo:
Conditions Paymenttypes Buckaroo version 7.4 01-12-2014 Page 1 of 7 Specific Terms and Conditions per Payment Method This document contains the terms and conditions that Buckaroo and Payment Service Owners
C2 Financial Corporation Anti Money Laundering Program and Suspicious Activity Reporting (AML Program)
C2 Financial Corporation Anti Money Laundering Program and Suspicious Activity Reporting (AML Program) Purpose: This program is being established and implemented by C2 Financial Corporation (C2) as an
Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs
Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs CHALLENGE Logistics networks across the world depend on millions of returnable transport items (RTIs) to keep goods
Chargelytics Consulting
Chargelytics Consulting Case Study: Understanding the Impacts of Consumer Authentication on Approved Transactions 1 CardinalComerce Chargelytics Consulting Table of Contents: Table of Contents. 1 Executive
Using Credit Strategies Wisely in Retirement Planning.
Using Credit Strategies Wisely in Retirement Planning. Prepared by. Lawrence Katz, Regional Private Banking Manager. Todd Barfield, Regional Private Banking Manager. In this white paper. 1 Meeting capital
FLASH DELIVERY SERVICE
Privacy Policy FLASH DELIVERY SERVICE is Committed to Protecting Your Privacy Protecting our customers' privacy is an important priority at FLASH DELIVERY SERVICE and we are committed to maintaining strong
CLOUD COMPUTING: WHAT YOU SHOULD KNOW
CLOUD COMPUTING: WHAT YOU SHOULD KNOW There is hardly a topic creating more of a buzz in software industry, than the Cloud. Cloud computing is a dramatic shift in the way we think about providing computing
MOBILE ACCESS & AFRICA FROG LEAPING THROUGH THE DESKTOP
MOBILE ACCESS & AFRICA FROG LEAPING THROUGH THE DESKTOP A paper presented by Martin M. Mbui Systems Administrator National Council for Law Reporting (Kenya Law) at the Law via Internet held in Capetown,
The challenges of becoming a Trusted Digital Repository
The challenges of becoming a Trusted Digital Repository Annemieke de Jong is Preservation Officer at the Netherlands Institute for Sound and Vision (NISV) in Hilversum. She is responsible for setting out
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
Establish spending policies that account for the needs of employees, and then enforce them strictly.
Newsletter : Cost Containment Specialists Article 14 April 2010 Summary Controlling indirect spending should now be a top priority for CFOs. Although there are a range of tools and techniques available,
Whitepaper on identity solutions for mobile devices
Whitepaper on identity solutions for mobile devices How software and hardware features of modern mobile devices can improve the security and user experience of your software Author: Jonas Lindstrøm The
Resolution on Consumer Protection in Cloud Computing
DOC NO: INFOSOC 46-11 DATE ISSUED: JUNE 2011 Resolution on Consumer Protection in Cloud Computing Consumers, businesses and governments are increasingly using cloud computing services to store and share
OpenText Tempo Social
o c t o b e r 2 0 1 1 OpenText Tempo Social Paving the road towards a more social business A social business is one that weaves a social fabric into all of its business processes to help build stronger
Securing the future of mobile services. SIMalliance Open Mobile API. An Introduction v2.0. Security, Identity, Mobility
1 An Introduction v2.0 September 2015 Document History 2 Version Date Editor Remarks 1.0 06/04/2011 OMAPI Working Group Public release 2.0 27/09/2015 OMAPI Working Group Public release Copyright 2015 SIMalliance
Guide to cash flow management
Guide to cash flow management Cash flow management What is cash flow management? For a business to be successful, good cash flow management is crucial. Cash flow is the primary indicator of a business
Axway API Portal. Putting APIs first for your developer ecosystem
Axway API Portal Putting APIs first for your developer ecosystem To fully embrace an API-first strategy, it s no longer enough to simply develop and deploy APIs. Organizations need broad API management
STANDARDS FOR AGENTS AND AGENT BASED SYSTEMS (FIPA)
Course Number: SENG 609.22 Session: Fall, 2003 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Tutorial Report STANDARDS FOR AGENTS AND AGENT
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
The Financial Impact of Cross-border Student Mob ility on the Economy of the Host Country Commissioned by Contact persons Authors
Executive Summary The Financial Impact of Cross-border Student Mobility on the Economy of the Host Country Commissioned by German Academic Exchange Service (Deutscher Akademischer Austauschdienst e.v.,
Crypho Security Whitepaper
Crypho Security Whitepaper Crypho AS Crypho is an end-to-end encrypted enterprise messenger and file-sharing application. It achieves strong privacy and security using well-known, battle-tested encryption
Qlik UKI Consulting Services Catalogue
Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction
THE STATE OF THE New ECONOMY
THE STATE OF THE New Zealand DIGITAL ECONOMY October 2012 CONTENTs EXECUTIVE SUMMARY 2 EXPANDING THE DIGITAL ECONOMY 3 THE PROMISE OF THE DIGITAL ECONOMY 5 CLOUD COMPUTING: THE BENEFIT OF NEW TECHNOLOGIES
Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview
Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at [email protected] 1 Table of Contents 1.
The Department for Business, Innovation and Skills IMA Action Plan PRIORITY RECOMMENDATIONS
PRIORITY RECOMMENDATIONS R1 BIS to elevate the profile of information risk in support of KIM strategy aims for the protection, management and exploitation of information. This would be supported by: Establishing
Together the 190,000 businesses we represent employ nearly 7 million people, about one third of the private sector-employed workforce.
The Role of Online Platforms The Confederation of British Industry The CBI is the UK s premier business lobbying organisation, and is a confederation of 140 trade associations, representing mostly smaller
Interoperable Mobile Payment A Requirements-Based Architecture
Interoperable Mobile Payment A Requirements-Based Architecture Dr. Manfred Männle Encorus Technologies GmbH; product management Payment Platform Summary: Existing payment methods like cash and debit/credit
Invigorate Your Mobile Commerce Strategy with Low-Cost Payment Steering
Invigorate Your Mobile Commerce Strategy with Low-Cost Payment Steering By: Theresa Ward Director, First Data 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this
Ethics Everywhere Jones Lang LaSalle Incorporated Annual Report for Calendar Year 2013 Program
Ethics Everywhere Jones Lang LaSalle Incorporated Annual Report for Calendar Year 2013 Program Introduction JLL is committed to a corporate culture that embraces and promotes strong principles of business
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
Sales Training Programme. Module 8. Closing the sale workbook
Sales Training Programme. Module 8. Closing the sale workbook Workbook 8. Closing the sale Introduction This workbook is designed to be used along with the podcast on closing the sale. It is a self learning
Terms and Conditions For Online-Payments
Terms and Conditions For Online-Payments The Terms and Conditions contained herein shall apply to any person ( User ) using the services of Karnataka Examination Authority for making payment for Common
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Closing The Sale. What actually happens during the sales process is that the salesperson:
Closing The Sale Closing The Sale By Sean McPheat, Managing Director Of The Sales Training Consultancy Closing the sale is not a skill that can be learned in isolation from the rest of the sales process.
Federal Trade Commission Sharing Economy Workshop Project No. P15-1200. New York City Taxi & Limousine Commission Public Comment
Meera Joshi Commissioner [email protected] 33 Beaver Street 22nd Floor New York, NY 10004 Federal Trade Commission Sharing Economy Workshop Project No. P15-1200 New York City Taxi & Limousine
How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants
How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
TIME AND MONEY. The Role of Volunteering in Philanthropy RESEARCH INSIGHTS. Key findings. Among Fidelity Charitable donors in 2014:
TIME AND MONEY The Role of Volunteering in Philanthropy RESEARCH INSIGHTS A 2014 survey explored the current volunteering activity of Fidelity Charitable donors across charitable sectors. The survey investigated
By email to: [email protected]. ISA qualifying investments: Consultation on including peer-to-peer loans
ISA Peer to Peer Consultation Pensions and Savings Team HM Treasury 1 Horse Guards Road London SW1A 2HQ By email to: [email protected] 12 December 2014 Dear Sirs, ISA qualifying
Terms and Conditions For Online-Payments
Terms and Conditions For Online-Payments The Terms and Conditions contained herein shall apply to any person ( User ) using the services of Haryana State Technical Education Society (HSTES) for making
BSI TR-03108-1: Secure E-Mail Transport. Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails
BSI TR-03108-1: Secure E-Mail Transport Requirements for E-Mail Service Providers (EMSP) regarding a secure Transport of E-Mails Version: 1.0 Date: 05/12/2016 Document history Version Date Editor Description
Healthcare, transportation,
Smart IT Argus456 Dreamstime.com From Data to Decisions: A Value Chain for Big Data H. Gilbert Miller and Peter Mork, Noblis Healthcare, transportation, finance, energy and resource conservation, environmental
Licensing guidelines for the innovaphone PBX (V12r1)
guidelines for the innovaphone PBX (V12r1) Page 1 guidelines for the innovaphone PBX (V12r1) The innovaphone PBX is a powerful and sophisticated VoIP telephone system for use in professional business environments.
