UNIK Measurable Security for the Internet of Things L1 Introduction

Size: px
Start display at page:

Download "UNIK Measurable Security for the Internet of Things L1 Introduction"

Transcription

1 UNIK Measurabe Security for the Internet of Things L1 Introduction György Kámán, Mnemonic/CCIS/UNIK gyorgy@unik.no Josef No UiO/UNIK josef@unik.no #IoTSec, #IoTSecNO

2 Overview Expectations Lecture overview Exam Topic introduction Expected outcome: security impact of components and subsystems, and perform a muti-metrics anaysis to estabish the system security Anayse appication goa versus system security and suggest improvements Describe appication-driven security and estabish chaenges of sensor-driven systems Provide industria exampes, e.g. Smart Grid and automatic meter readings Estabish appication-driven security goas as we as the semantics of your system Generate matrices to describe the UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 2

3 UNIK4750: Lecture pan 21Jan - L1: Introduction 28Jan - L2: Internet of Things 4Feb - L3: Security of IoT- Paper seection 11Feb - L4: Smart Grid, Automatic Meter Readings (AMR) 18Feb - L5: Service impications on functiona requirements 25Feb - vinterferie 3Mar - L6: Technoogy mapping 10Mar - L7: Paper anaysis with min presentation 17Mar - L8: Practica impementation of ontoogies 24Mar - Easter Hoidays 31Mar - L9: Logica binding - industria exampe - possibe guest ecture 7Apr - L10: Muti-Metrics Method for measurabe Security 14Apr - L11: Muti-Metrics Weighting of an AMR sub-system 21Apr - L12: System Security and Privacy anaysis 28Apr - L13: Phenomena "intrusiondetection", possibe guest ecture 5May - Kristi Himmefart - fridag 12May - L14: Rea word exampes - IoTSec infrastructure 19May - L15: Rea word IoT service evauation group work 26May - Exam UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 3

4 How come these guys didn t think of security?... and the Internet 1973 Kjeer Steve Crocker The buiding where the Internet (Arpanet) came to Europe in June 1973 Jon Poste 1972 Vinton Cerf Source: UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 4

5 The threat dimension Hoande (FR), Merke (DE) had their mobie being monitored «and we beieve it is not happening in Norway? [source: [source: Süddeutsche Zeitung, 18Dec2014] UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 5

6 L1 - L3: Introduction to se This first part wi provide the introduction into the Internet of Things (Lecture 1 - L2), with industria exampes Smart Grid and automatic meter system (AMS) Smart Homes with sensors Wireess System upgrade of cars The part wi further address potentia security threats (L3), as exampe for the future smart grid. Smart grid with prosumers UNIK4750, Measurabe Security for IoT - #IoTSec various contro mechanisms attack scenarios critica infrastructure Jan 2016, György Kámán, Josef No 6

7 Knowedge and coaboration space - #IoTSec, #IoTSecNO «Open Word Gjøvik Kjeer Oso Haden Approach» everything that is not decared cosed is open UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 7

8 Internet of Things Security UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 8

9 L4-L6 Security and Privacy chaenges Exampe: automatic meter reading (AMR) and -system (AMS) Mapping from functiona requirements towards mapping into technoogy. Exampe: transation of privacy requirements - can somebody see from my meter reading if I'm at home - towards technoogy parameters ike how often are vaues read and pubished. Smart Meter Internet UNIK4750, Measurabe Security for IoT - #IoTSec [source: seminarsony.com] Jan 2016, György Kámán, Josef No 9

10 L6-L8 Machine-readabe descriptions Describe a system based on security attributes Introduction to the Semantic Web Ontoogies Web-Protégé Rues & Reasoning make decisions UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 10

11 L7 - Paper presentation Methodoogy: Seect (or search) for scientific papers Present the paper Discuss issues which you find interesting Outcome Learn to read (and criticise) scientific iterature UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 11

12 L9-L12: Muti-Metrics method System consists of sub-systems consists of components security privacy criticaity dependabiity Computer anaysis idea good accep. critica faiure UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 12

13 L13 - L15 Rea Word Exampes Rea word exampes taken from industry, e.g. Smart Meter biing, controing Your own anaysis seect system of choice perform an anaysis suggest: group work Smart Meter [source: seminarsony.com] UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 13

14 UNIK4750 exam The fina grade is based on a portfoio assessment (40%) questions to the group work topics of the course an ora exam (60%). In the case of many students, the fina exam may be hed as a written exam; this wi be decided eary in the semester. Portfoio your paper presentation group work Ora exam expain your group work UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 14

15 Internet of Things Heading toward a fuy connected word In a more focused way, in this course we speak about industria internet of things The substantia difference is, that these systems have a physica dimension Considered as the next industria revoution Automation to a new connectivity eve the internet is coming to automation Main chaenges: how to join the physica and the ogica word, how to achieve interoperabiity in a heterogeneous and conservative industry? UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 15

16 Internet as we know it Inteigence in the end nodes Best effort traffic Infrastructure = network equipment Operated by IT or teecom No direct physica dimension Mosty buit to serve human-generated traffic QoS: best effort, adopted to the human consumer: 10s of ms of drop is not a probem, stabe deay is accepted, majority of appications are bursty Reaction time in 0.5-1s range Stochastic à services do expoit this (ike Erang-B formua for capacity estimation or ossy compression in neary everything) UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 16

17 Automation as we know it Centraized inteigence Traditionay operated as isands by operations Direct connection with the physica word Is made for information gathering and processing by machines Has a ag of approx years (one generation of devices) Sti a current question: coisions on Ethernet, what happens if one has to share infrastructure with others, how to operate a ink with ong step-out distance Economic press eads to adoption of internet-based services which require a paradigm change Mine (Boiden) ABB robots UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 17

18 Typica traditiona industria network UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 18

19 Merging these two Internet is the infrastructure sensor, actuator, controer not on the same physica network any more dissoves the automation system in the internet Automation processes run over an unknown communication infrastructure Network communication gets physica impact Automation meets rea internet-type depoyment Aready happening The rea vaue of IoT: data. Coud and big data wi enabe new services UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 19

20 Interesting chaenges Architecture: physica impact, end-to-end resource reservation, discovery, safety, security and privacy Governance, interoperabiity, standardization Managing risk in a system with impact on both ogica and physica eve Provide QoS over a best effort infrastructure with a price pressure Aggregation of data: here ies the added vaue, enabes nove services and higher efficiency Distribution of inteigence: make the automation system more internet-ike: inteigence in the endnodes. Support it with the recent it trends of coud and big data. Chaenge for traditiona automation mindset. Open architectura mode Security concerns are a critica barrier for wide scae adoption of IoT See when IT has arrived to the phone industry. Or when IT has arrived into teco backhau. IT is arriving to automation. UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 20

21 IoT services Enabed by wide scae data gathering Monitoring of massive systems Rea-time insight to processes Observation of systems Performance measurement and optimization Proactive and predictive methods To serve the automation goas, the services provided must be: scaabe, distributed, have a rea reference to the phyisica word (e.g. time), must ensure security and privacy of the users Just using existing security soutions is not eading to secure IoT depoyments Composed by IT, operations and the IoT enabed objects * Foowing sides are from the presentation of Mikhai Kader, DSE, Cisco, presented on the ITU Workshop on ICT Security Standardization for Deveoping Countries UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 21

22 Connected Rai Operations * PASSENGER SECURITY In-station and onboard safety Visibiity into key events ROUTE OPTIMIZATION Enhanced Customer Service Increased efficiency Coision avoidance Fue savings CRITICAL SENSING Transform data to actionabe inteigence Proactive maintenance Accident avoidance Cost savings, improved safety, superior service UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 22

23 Smart City * CONNECTED TRAFFIC SIGNALS Reduced congestion Improved emergency services response times Lower fue usage PARKING AND LIGHTING Increased efficiency Power and cost savings New revenue opportunities CITY SERVICES Efficient service deivery Increased revenues Enhanced environmenta monitoring capabiities UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 23

24 The Connected Car * WIRELESS ROUTER Onine entertainment Mapping, dynamic re-routing, safety and security CONNECTED SENSORS Transform data to actionabe inteigence Enabe proactive maintenance Coision avoidance Fue efficiency URBAN CONNECTIVITY Reduced congestion Increased efficiency Safety (hazard avoidance) UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 24

25 IoT Expands Security Needs * Increased Attack Surface Threat Diversity Impact and Risk Remediation Protocos Compiance and Reguation Converged, Managed Network Resiience at Scae Security Distributed Inteigence Appication Enabement UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 25

26 IT/OT Converged Security Mode * IT DMZ OT Enterprise Network Demiitarized Zone Supervisory Coud Network Security Appication Contro Identity Services Secure Access Automation & Contro Config Mgmt UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 26

27 IT and OT are Inherenty Different * IT OT Connectivity: Any-to-Any Network Posture: Confidentiaity, Integrity, Avaiabiity (CIA) Security Soutions: Cybersecurity; Data Protection Response to Attacks: Quarantine/Shutdown to Mitigate Connectivity: Hierarchica Network Posture: Avaiabiity, Integrity, Confidentiaity (AIC) Security Soutions: Physica Access Contro; Safety Response to Attacks: Non-stop Operations/Mission Critica Never Stop, Even if Breached UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 27

28 What Can Breach IoT Networks? What can t? Biions of connected devices Secure and insecure ocations Security may or may not be buit in Life cyce mismatch between IT and automation devices Instaed base Cash between IT and OT, IT has to accept the traffic Any node on your network can potentiay provide access to the core UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 28

29 L1 Concusions Overview over ectures Expanation of portfoio and exam Introduction to topic bocks Discussion [Source: Monique Morrow, Cisco] UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 29

SAP Business Analytics. Services & Solutions for the Metals and Mining Industry

SAP Business Analytics. Services & Solutions for the Metals and Mining Industry SAP Business Anaytics Services & Soutions for the Metas and Mining Industry Niche Business Anaytics Soutions & Services SAP Soutions SAP Business Inteigence Enterprise Data warehousing Reporting & Dashboards

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Program Management Seminar

Program Management Seminar Program Management Seminar Program Management Seminar The word s best management schoos are noted for their superior program execution, high eves of customer satisfaction, and continuous program improvements.

More information

Application and Desktop Virtualization

Application and Desktop Virtualization Appication and Desktop Virtuaization Content 1) Why Appication and Desktop Virtuaization 2) Some terms reated to vapp and vdesktop 3) Appication and Desktop Deivery 4) Appication Virtuaization 5)- Type

More information

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV

More information

Ricoh Healthcare. Process Optimized. Healthcare Simplified.

Ricoh Healthcare. Process Optimized. Healthcare Simplified. Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

Software Quality - Getting Right Metrics, Getting Metrics Right

Software Quality - Getting Right Metrics, Getting Metrics Right Software Quaity - Getting Right Metrics, Getting Metrics Right How to set the right performance metrics and then benchmark it for continuous improvement? Whie metrics are important means to quantify performance

More information

L I C E N S I N G G U I D E

L I C E N S I N G G U I D E O R A C L E H Y P E R I O N E N T E R P R I S E P E R F O R M A N C E M A N A G E M E N T S Y S T E M L I C E N S I N G G U I D E EPM System Licensing Guide Copyright 2009, Orace and/or its affiiates.

More information

We are XMA and Viglen.

We are XMA and Viglen. alearn with Microsoft 16pp 21.07_Layout 1 22/12/2014 10:49 Page 1 FRONT COVER alearn with Microsoft We are XMA and Vigen. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow

More information

IT Governance Principles & Key Metrics

IT Governance Principles & Key Metrics IT Governance Principes & Key Metrics Smawood Maike & Associates, Inc. 9393 W. 110th Street 51 Corporate Woods, Suite 500 Overand Park, KS 66210 Office: 913-451-6790 Good governance processes that moves

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

MICROSOFT DYNAMICS CRM

MICROSOFT DYNAMICS CRM biztech TM MICROSOFT DYNAMICS CRM Experienced professionas, proven toos and methodoogies, tempates, acceerators and vertica specific soutions maximizing the vaue of your Customer Reationships Competency

More information

ASSET MANAGEMENT OUR APPROACH

ASSET MANAGEMENT OUR APPROACH ASSET MANAGEMENT OUR APPROACH CONTENTS FOREWORD 3 INTRODUCTION 4 ASSET MANAGEMENT? 6 THE NEED FOR CHANGE 6 KEY PRINCIPLES 7 APPENDIX 1 19 GLOSSARY 20 2 FOREWORD Few things affect our customers ives as

More information

Modeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web

Modeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web 4 th Internationa conference on Information Systems, Logistics and Suppy Chain Quebec City August 26-29, 2012 Modeing a Scenario-based Distribution Network Design Probem in a Physica Internet-enabed open

More information

How To Get Acedo With Microsoft.Com

How To Get Acedo With Microsoft.Com alearn with Microsoft We are XMA. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow us @WeareXMA Introduction Use our 'steps to alearn' framework to ensure you cover a bases...

More information

Safety Simplified TERZETTO PHARMA METRICS PVT. LTD., Contact Safety Organisation

Safety Simplified TERZETTO PHARMA METRICS PVT. LTD., Contact Safety Organisation Safety Simpified TERZETTO PHARMA METRICS PVT. LTD., Contact Safety Organisation Specific soutions to monitor the safety of the drugs a over the gobe About us We provide specific soutions to monitor the

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

Informatica PowerCenter

Informatica PowerCenter Brochure Informatica PowerCenter Benefits Support better business decisions with the right information at the right time Acceerate projects in days vs. months with improved staff productivity and coaboration

More information

Capability Development Grant. Build business capabilities to sharpen your competitive edge

Capability Development Grant. Build business capabilities to sharpen your competitive edge Capabiity Deveopment Grant Buid business capabiities to sharpen your competitive edge 1 Buid up your business with the Capabiity Deveopment Grant The Capabiity Deveopment Grant (CDG) is a financia assistance

More information

eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Cognizant Interactive. Digital Marketing & Analytics(DMA) Practice. 2012, Cognizant

Cognizant Interactive. Digital Marketing & Analytics(DMA) Practice. 2012, Cognizant Cognizant Interactive Digita Marketing & Anaytics(DMA) Practice 2012, Cognizant About DMA group Cognizant Interactive provides innovative soutions for design, content, earning, digita marketing and anaytics

More information

Technology and Consulting - Newsletter 1. IBM. July 2013

Technology and Consulting - Newsletter 1. IBM. July 2013 Technoogy and Consuting - Newsetter Juy 2013 Wecome to Latitude Executive Consuting s atest newsetter, reviewing recent marketpace activity. The newsetter focuses on the Technoogy and Consuting sectors,

More information

Tackling Data Security and Privacy Challenges for the Internet of Things. Dave Raggett W3C Tuesday, 14 th June 2016 IoT TechExpo, Berlin

Tackling Data Security and Privacy Challenges for the Internet of Things. Dave Raggett W3C Tuesday, 14 th June 2016 IoT TechExpo, Berlin Tacking Data Security and Privacy Chaenges for the Internet of Things Dave Raggett W3C Tuesday, 14 th June 2016 IoT TechExpo, Berin The Promise of the Internet of Things Services that are enriched through

More information

Overview of Health and Safety in China

Overview of Health and Safety in China Overview of Heath and Safety in China Hongyuan Wei 1, Leping Dang 1, and Mark Hoye 2 1 Schoo of Chemica Engineering, Tianjin University, Tianjin 300072, P R China, E-mai: david.wei@tju.edu.cn 2 AstraZeneca

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

The definition of insanity is doing the same thing over and over again and expecting different results

The definition of insanity is doing the same thing over and over again and expecting different results insurance services Sma Business Insurance a market opportunity being missed Einstein may not have known much about insurance, but if you appy his definition to the way existing brands are deveoping their

More information

Wireless communication solutions. mobilise I track I protect

Wireless communication solutions. mobilise I track I protect Wireess communication soutions mobiise I track I protect The Keyine promise focuses on deivery and resuts Keyine has been engaged by our cient Taecom to assist with the promotion of their products through

More information

CI/SfB Ro8. (Aq) September 2012. The new advanced toughened glass. Pilkington Pyroclear Fire-resistant Glass

CI/SfB Ro8. (Aq) September 2012. The new advanced toughened glass. Pilkington Pyroclear Fire-resistant Glass CI/SfB Ro8 (Aq) September 2012 The new advanced toughened gass Pikington Pyrocear Fire-resistant Gass Pikington Pyrocear, fire-resistant screens in the façade: a typica containment appication for integrity

More information

Advance PLM Software Solutions for Complex Business Processes

Advance PLM Software Solutions for Complex Business Processes Advance PLM Software Soutions for Compex Business Processes Abstract As customers word-wide camour for more technoogicay rich products, be it a car, or a smartphone, manufacturers are having to contend

More information

Ricoh Legal. ediscovery and Document Solutions. Powerful document services provide your best defense.

Ricoh Legal. ediscovery and Document Solutions. Powerful document services provide your best defense. Ricoh Lega ediscovery and Document Soutions Powerfu document services provide your best defense. Our peope have aways been at the heart of our vaue proposition: our experience in your industry, commitment

More information

Hybrid Interface Solutions for next Generation Wireless Access Infrastructure

Hybrid Interface Solutions for next Generation Wireless Access Infrastructure tec. Connectivity & Networks Voker Sorhage Hybrid Interface Soutions for next Generation Wireess Access Infrastructure Broadband wireess communication wi revoutionize every aspect of peope s ives by enabing

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

gdoc Core Cross-platform document conversion, optimization and manipulation technology

gdoc Core Cross-platform document conversion, optimization and manipulation technology Patform gdoc Core Cross-patform document conversion, optimization and manipuation technoogy gdoc Core gdoc Core technoogy forms part of a new generation of word-cass eectronic document soutions from Goba

More information

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning Monitoring and Evauation Unit Learning from evauations Processes and instruments used by GIZ as a earning organisation and their contribution to interorganisationa earning Contents 1.3Learning from evauations

More information

IBM Security QRadar SIEM

IBM Security QRadar SIEM IBM Security QRadar SIEM Boost threat protection and compiance with an integrated investigative reporting system Highights Integrate og management and network threat protection technoogies within a common

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India

Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Technica Brief October 2012 Context India faces critica human resources (HR) chaenges in the heath sector,

More information

The BBC s management of its Digital Media Initiative

The BBC s management of its Digital Media Initiative The BBC s management of its Digita Media Initiative Report by the Comptroer and Auditor Genera presented to the BBC Trust s Finance and Compiance Committee, 13 January 2011 Department for Cuture, Media

More information

Introduction: 8x8 Referral Rewards Program

Introduction: 8x8 Referral Rewards Program June 2014 Introduction: 8x8 Referra Rewards Program Presented by 8x8, Inc. 2009 NASDAQ-LISTED: EGHT Agenda Introduction to 8x8 Virtua Office phone system Virtua Contact Center Referra Rewards Program Rewards

More information

endorsed programmes With our expertise and unique flexible approach NOCN will work with you to develop a product that achieves results.

endorsed programmes With our expertise and unique flexible approach NOCN will work with you to develop a product that achieves results. endorsed programmes With our expertise and unique fexibe approach NOCN wi work with you to deveop a product that achieves resuts. NOCN is a eading reguated UK awarding organisation that has been creating

More information

Driving Accountability Through Disciplined Planning with Hyperion Planning and Essbase

Driving Accountability Through Disciplined Planning with Hyperion Planning and Essbase THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP summer 2012 Driving Accountabiity Through Discipined Panning with Hyperion Panning and Essbase Introduction to Master Data and Master Data

More information

SABRe B2.1: Design & Development. Supplier Briefing Pack.

SABRe B2.1: Design & Development. Supplier Briefing Pack. SABRe B2.1: Design & Deveopment. Suppier Briefing Pack. 2013 Ros-Royce pc The information in this document is the property of Ros-Royce pc and may not be copied or communicated to a third party, or used

More information

Online Media Information

Online Media Information Onine Media Information www.sciencedirect.com The vita daiy source for 16 miion researchers and scientists around the gobe 70 miion pageviews each month Broad advertising product portfoio SciVerse ScienceDirect:

More information

Big Data projects and use cases. Claus Samuelsen IBM Analytics, Europe csa@dk.ibm.com

Big Data projects and use cases. Claus Samuelsen IBM Analytics, Europe csa@dk.ibm.com Big projects and use cases Caus Samuesen IBM Anaytics, Europe csa@dk.ibm.com IBM Sofware Overview of BigInsights IBM BigInsights Scientist Free Quick Start (non production): IBM Open Patform BigInsights

More information

Infrastructure for Business

Infrastructure for Business Infrastructure for Business The IoD Member Broadband Survey Infrastructure for Business 2013 #5 The IoD Member Broadband Survey The IoD Member Broadband Survey Written by: Corin Tayor, Senior Economic

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

B S. Cloud-EBS ACCESS INFOTECH (P) LTD. Incubating Ideas To Optimize Your Business Process. Business Tracking Tool

B S. Cloud-EBS ACCESS INFOTECH (P) LTD. Incubating Ideas To Optimize Your Business Process. Business Tracking Tool Incubating Ideas To Optimize Your Business Process E B S Coud-EBS Business Tracking Too ENTERPRISE BUSINESS SUITE SAAS ERP SERVICES DATABASE ADMINISTRATION MANAGED IT SOLUTIONS CUSTOMIZED SOFTWARE SOLUTION

More information

Chapter 2 Developing a Sustainable Supply Chain Strategy

Chapter 2 Developing a Sustainable Supply Chain Strategy Chapter 2 Deveoping a Sustainabe Suppy Chain Strategy Bakan Cetinkaya Learning Goas. By reading this chapter you wi: Know the basics of competitive strategy and suppy chain strategy and understand their

More information

Professional Kingston

Professional Kingston Professiona Kingston Organisationa and workforce deveopment soutions n Facuty of Business and Law Aways improving 0/1 Contents Wecome 2 Why Kingston? 4 Course portfoio 6 Course detais 8 Work-based earning

More information

EDS-Unigraphics MIS DataBroker Architecture

EDS-Unigraphics MIS DataBroker Architecture EDS-Unigraphics MIS DataBroker Architecture Jeff Greiner Bob Woodridge October 9,1996 Topics UG/MIS Probem Domain Requirements for New Architecture Seection of Java Deveoping Java Based Intranet Soutions

More information

Leadership & Management Certificate Programs

Leadership & Management Certificate Programs MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J

More information

Figure 1. A Simple Centrifugal Speed Governor.

Figure 1. A Simple Centrifugal Speed Governor. ENGINE SPEED CONTROL Peter Westead and Mark Readman, contro systems principes.co.uk ABSTRACT: This is one of a series of white papers on systems modeing, anaysis and contro, prepared by Contro Systems

More information

Teach yourself Android application development - Part I: Creating Android products

Teach yourself Android application development - Part I: Creating Android products Teach yoursef Android appication deveopment - Part I: Creating Android products Page 1 of 7 Part of the EE Times Network A Artices Products Course TechPaper Webinars Login Register Wecome, Guest HOME DESIGN

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

YOUR GUIDE SAVING 30 % up to. on your print. Think Smart. Think OKI

YOUR GUIDE SAVING 30 % up to. on your print. Think Smart. Think OKI YOUR GUIDE SAVING to 30 % up to on your print & documentcosts Think Smart. Think OKI Most businesses have the systems in pace to keep a tight contro on their overheads, however, in an increasingy competitive

More information

The growth of online Internet services during the past decade has

The growth of online Internet services during the past decade has IEEE DS Onine, Voume 2, Number 4 Designing an Adaptive CORBA Load Baancing Service Using TAO Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

MCITP. Duration:- 6 Months. 1. 70-680 Windows 7

MCITP. Duration:- 6 Months. 1. 70-680 Windows 7 MCITP Duration:- 6 Months 1. 70-680 Windows 7 Instaing, Upgrading, and Migrating to Windows 7 Describe the key features, editions, and hardware requirements of Windows 7 Perform a cean instaation of Windows

More information

TMI ING Guide to Financial Supply Chain Optimisation 29. Creating Opportunities for Competitive Advantage. Section Four: Supply Chain Finance

TMI ING Guide to Financial Supply Chain Optimisation 29. Creating Opportunities for Competitive Advantage. Section Four: Supply Chain Finance TMI171 ING info pat :Info pat.qxt 19/12/2008 17:02 Page 29 ING Guide to Financia Suppy Chain Optimisation Creating Opportunities for Competitive Advantage Section Four: Suppy Chain Finance Introduction

More information

The guaranteed selection. For certainty in uncertain times

The guaranteed selection. For certainty in uncertain times The guaranteed seection For certainty in uncertain times Making the right investment choice If you can t afford to take a ot of risk with your money it can be hard to find the right investment, especiay

More information

Qualifications, professional development and probation

Qualifications, professional development and probation UCU Continuing Professiona Deveopment Quaifications, professiona deveopment and probation Initia training and further education teaching quaifications Since September 2007 a newy appointed FE ecturers,

More information

Creating INFINIT Career Opportunities

Creating INFINIT Career Opportunities Network Consutation and Integration Network Consutation and Integration System Integration System Integration Information Systems (IS) Outsourcing Information Systems (IS) Outsourcing Creating INFINIT

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

Undergraduate Studies in. Education and International Development

Undergraduate Studies in. Education and International Development Undergraduate Studies in Education and Internationa Deveopment Wecome Wecome to the Schoo of Education and Lifeong Learning at Aberystwyth University. Over 100 years ago, Aberystwyth was the first university

More information

Energy Performance Certificate

Energy Performance Certificate Energy Performance Certificate Sampe EPC TheDomesticEnergyAssessorcom Dweing type: Date of assessment: Date of certificate: Reference number: Tota foor area: Mid-terrace house 09 June 2007 31 August 2007

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

Applying Constraints Management to Product Development

Applying Constraints Management to Product Development Appying Constraints Management to Product Deveopment An intensive summit and working session with Dr. Ei Godratt and eading impementers on synchronizing resources, projects, and pipeines in highy compex

More information

Vendor Performance Measurement Using Fuzzy Logic Controller

Vendor Performance Measurement Using Fuzzy Logic Controller The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer

More information

Cloud Meets Contact Center: From Zero to Hero in 14 Days!

Cloud Meets Contact Center: From Zero to Hero in 14 Days! June 2013 Coud Meets Contact Center: From Zero to Hero in 14 Days! By Heather J. Donney, PMP, HDI & ITIL v2f/v3f Certified HDI Certified Instructor 2013 NASDAQ-LISTED: EGHT Meet The Presenter Heather Donney,

More information

Planning your OpenStack Cloud. Tom Fifield tom@openstack.org @TomFifield

Planning your OpenStack Cloud. Tom Fifield tom@openstack.org @TomFifield Panning your OpenStack Coud Tom Fified tom@openstack.org @TomFified Introduction Software Engineering Partice Physics Buiding Couds OpenStack Community Manager Much of this presentation is based on the

More information

Manifold Technology. ----------------------------------------------------- made in Germany

Manifold Technology. ----------------------------------------------------- made in Germany Manifod Technoogy. ----------------------------------------------------- made in Germany I EVERYTHING UNDER CONTROL. Manifod Technoogy BEULCO heating and cooing manifods made of high-quaity brass ensure

More information

Turning our experience into your expertise. Medical devices training

Turning our experience into your expertise. Medical devices training Turning our experience into your expertise Medica devices training A eading training academy. Annuay we train in excess of 4000 peope. More than 70% of the top 100 medica device companies were trained

More information

Avaya Aura Call Center Elite Multichannel Overview

Avaya Aura Call Center Elite Multichannel Overview Avaya Aura Ca Center Eite Mutichanne Overview Reease 6.2.3/6.2.5 March 2013 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was

More information

LADDER SAFETY Table of Contents

LADDER SAFETY Table of Contents Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3

More information

The Internet of Things... Hype or not?

The Internet of Things... Hype or not? The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune

More information

Lexmark ESF Applications Guide

Lexmark ESF Applications Guide Lexmark ESF Appications Guide Hep your customers bring out the fu potentia of their Lexmark soutions-enabed singe-function and mutifunction printers Lexmark Appications have been designed to hep businesses

More information

CONFERENCE SPONSORSHIP OPPORTUNITIES. Invest in Conference Sponsorship.

CONFERENCE SPONSORSHIP OPPORTUNITIES. Invest in Conference Sponsorship. CONFERENCE SPONSORSHIP OPPORTUNITIES Invest in Conference Sponsorship. Why Sponsor a Conference Board Event? The Conference Board is renowned for its abiity to bring together top executives and thought

More information

Management Accounting

Management Accounting Management Accounting Course Text Professiona, Practica, Proven www.accountingtechniciansireand.ie Tabe of Contents FOREWORD...v SYLLABUS: MANAGEMENT ACCOUNTING...vii PART 1 INTRODUCTION Chapter 1: Introduction

More information

Migrating and Managing Dynamic, Non-Textua Content

Migrating and Managing Dynamic, Non-Textua Content Considering Dynamic, Non-Textua Content when Migrating Digita Asset Management Systems Aya Stein; University of Iinois at Urbana-Champaign; Urbana, Iinois USA Santi Thompson; University of Houston; Houston,

More information

How To Deiver Resuts

How To Deiver Resuts Message We sha make every effort to strengthen the community buiding programme which serves to foster among the peope of Hong Kong a sense of beonging and mutua care. We wi continue to impement the District

More information

MARKETING INFORMATION SYSTEM (MIS)

MARKETING INFORMATION SYSTEM (MIS) LESSON 4 MARKETING INFORMATION SYSTEM (MIS) CONTENTS 4.0 Aims and Objectives 4.1 Introduction 4.2 MIS 4.2.1 Database 4.2.2 Interna Records 4.2.3 Externa Sources 4.3 Computer Networks and Internet 4.4 Data

More information

Telco Business Process Transformation using Agile Lean Six Sigma and Frameworx components: focus on the core engineering aspects with a case study

Telco Business Process Transformation using Agile Lean Six Sigma and Frameworx components: focus on the core engineering aspects with a case study IJCSI Internationa Journa of Computer Science Issues, Vo. 10, Issue 1, No 1, January 2013 www.ijcsi.org 37 Teco Business Process Transformation using Agie Lean Six Sigma and Frameworx components: focus

More information

STRATEGIC PLAN 2012-2016

STRATEGIC PLAN 2012-2016 STRATEGIC PLAN 2012-2016 CIT Bishopstown CIT Cork Schoo of Music CIT Crawford Coege of Art & Design Nationa Maritime Coege of Ireand Our Institute STRATEGIC PLAN 2012-2016 Cork Institute of Technoogy (CIT)

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Measuring operational risk in financial institutions

Measuring operational risk in financial institutions Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and

More information

Oracle Enterprise Performance Management System. Licensing Guide Release 11.1.2.4

Oracle Enterprise Performance Management System. Licensing Guide Release 11.1.2.4 Orace Enterprise Performance Management System Licensing Guide Reease 11.1.2.4 EPM System Licensing Guide, 11.1.2.4 Copyright 2013, 2015, Orace and/or its affiiates. A rights reserved. Authors: EPM Information

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

RAVE NOTICES FOR OUR CEO AND PRINCIPAL CONSULTANT

RAVE NOTICES FOR OUR CEO AND PRINCIPAL CONSULTANT 1 RAVE NOTICES FOR OUR CEO AND PRINCIPAL CONSULTANT CONTENTS Company Profie 1 Mission Statement 2 How We Differ from Others 3 Our Consuting and Training Services 4 CEO and Principa Consutant 5 Our Approach

More information

Summary of HDMA Presentation for July 26 Public Meeting Regarding Bar Code Labeling Requirements

Summary of HDMA Presentation for July 26 Public Meeting Regarding Bar Code Labeling Requirements - - Summary of HDMA Presentation for Juy 26 Pubic Meeting Regarding Bar Code Labeing Requirements The HDMA speaker woud be Robert Schwartz, current HDMA Chairman of the Board and Presideht of the Barnes

More information

Internet of Things, Privacy, and Novel Services

Internet of Things, Privacy, and Novel Services Norstella årsmøte, 30Mar2016 Internet of Things, Privacy, and Novel Services How can we teach Sensors to talk Norwegian Josef Noll, Olaf Owe, Christian Johansen 1 University of Oslo/UNIK & IFI ConSeRNS,

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

CSCI 8260 Spring 2016. Computer Network Attacks and Defenses. Syllabus. Prof. Roberto Perdisci perdisci@cs.uga.edu

CSCI 8260 Spring 2016. Computer Network Attacks and Defenses. Syllabus. Prof. Roberto Perdisci perdisci@cs.uga.edu CSCI 8260 Spring 2016 Computer Network Attacks and Defenses Syabus Prof. Roberto Perdisci perdisci@cs.uga.edu Who is this course for? Open to graduate students ony Students who compete this course successfuy

More information