UNIK Measurable Security for the Internet of Things L1 Introduction
|
|
- Andra Harris
- 7 years ago
- Views:
Transcription
1 UNIK Measurabe Security for the Internet of Things L1 Introduction György Kámán, Mnemonic/CCIS/UNIK gyorgy@unik.no Josef No UiO/UNIK josef@unik.no #IoTSec, #IoTSecNO
2 Overview Expectations Lecture overview Exam Topic introduction Expected outcome: security impact of components and subsystems, and perform a muti-metrics anaysis to estabish the system security Anayse appication goa versus system security and suggest improvements Describe appication-driven security and estabish chaenges of sensor-driven systems Provide industria exampes, e.g. Smart Grid and automatic meter readings Estabish appication-driven security goas as we as the semantics of your system Generate matrices to describe the UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 2
3 UNIK4750: Lecture pan 21Jan - L1: Introduction 28Jan - L2: Internet of Things 4Feb - L3: Security of IoT- Paper seection 11Feb - L4: Smart Grid, Automatic Meter Readings (AMR) 18Feb - L5: Service impications on functiona requirements 25Feb - vinterferie 3Mar - L6: Technoogy mapping 10Mar - L7: Paper anaysis with min presentation 17Mar - L8: Practica impementation of ontoogies 24Mar - Easter Hoidays 31Mar - L9: Logica binding - industria exampe - possibe guest ecture 7Apr - L10: Muti-Metrics Method for measurabe Security 14Apr - L11: Muti-Metrics Weighting of an AMR sub-system 21Apr - L12: System Security and Privacy anaysis 28Apr - L13: Phenomena "intrusiondetection", possibe guest ecture 5May - Kristi Himmefart - fridag 12May - L14: Rea word exampes - IoTSec infrastructure 19May - L15: Rea word IoT service evauation group work 26May - Exam UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 3
4 How come these guys didn t think of security?... and the Internet 1973 Kjeer Steve Crocker The buiding where the Internet (Arpanet) came to Europe in June 1973 Jon Poste 1972 Vinton Cerf Source: UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 4
5 The threat dimension Hoande (FR), Merke (DE) had their mobie being monitored «and we beieve it is not happening in Norway? [source: [source: Süddeutsche Zeitung, 18Dec2014] UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 5
6 L1 - L3: Introduction to se This first part wi provide the introduction into the Internet of Things (Lecture 1 - L2), with industria exampes Smart Grid and automatic meter system (AMS) Smart Homes with sensors Wireess System upgrade of cars The part wi further address potentia security threats (L3), as exampe for the future smart grid. Smart grid with prosumers UNIK4750, Measurabe Security for IoT - #IoTSec various contro mechanisms attack scenarios critica infrastructure Jan 2016, György Kámán, Josef No 6
7 Knowedge and coaboration space - #IoTSec, #IoTSecNO «Open Word Gjøvik Kjeer Oso Haden Approach» everything that is not decared cosed is open UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 7
8 Internet of Things Security UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 8
9 L4-L6 Security and Privacy chaenges Exampe: automatic meter reading (AMR) and -system (AMS) Mapping from functiona requirements towards mapping into technoogy. Exampe: transation of privacy requirements - can somebody see from my meter reading if I'm at home - towards technoogy parameters ike how often are vaues read and pubished. Smart Meter Internet UNIK4750, Measurabe Security for IoT - #IoTSec [source: seminarsony.com] Jan 2016, György Kámán, Josef No 9
10 L6-L8 Machine-readabe descriptions Describe a system based on security attributes Introduction to the Semantic Web Ontoogies Web-Protégé Rues & Reasoning make decisions UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 10
11 L7 - Paper presentation Methodoogy: Seect (or search) for scientific papers Present the paper Discuss issues which you find interesting Outcome Learn to read (and criticise) scientific iterature UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 11
12 L9-L12: Muti-Metrics method System consists of sub-systems consists of components security privacy criticaity dependabiity Computer anaysis idea good accep. critica faiure UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 12
13 L13 - L15 Rea Word Exampes Rea word exampes taken from industry, e.g. Smart Meter biing, controing Your own anaysis seect system of choice perform an anaysis suggest: group work Smart Meter [source: seminarsony.com] UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 13
14 UNIK4750 exam The fina grade is based on a portfoio assessment (40%) questions to the group work topics of the course an ora exam (60%). In the case of many students, the fina exam may be hed as a written exam; this wi be decided eary in the semester. Portfoio your paper presentation group work Ora exam expain your group work UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 14
15 Internet of Things Heading toward a fuy connected word In a more focused way, in this course we speak about industria internet of things The substantia difference is, that these systems have a physica dimension Considered as the next industria revoution Automation to a new connectivity eve the internet is coming to automation Main chaenges: how to join the physica and the ogica word, how to achieve interoperabiity in a heterogeneous and conservative industry? UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 15
16 Internet as we know it Inteigence in the end nodes Best effort traffic Infrastructure = network equipment Operated by IT or teecom No direct physica dimension Mosty buit to serve human-generated traffic QoS: best effort, adopted to the human consumer: 10s of ms of drop is not a probem, stabe deay is accepted, majority of appications are bursty Reaction time in 0.5-1s range Stochastic à services do expoit this (ike Erang-B formua for capacity estimation or ossy compression in neary everything) UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 16
17 Automation as we know it Centraized inteigence Traditionay operated as isands by operations Direct connection with the physica word Is made for information gathering and processing by machines Has a ag of approx years (one generation of devices) Sti a current question: coisions on Ethernet, what happens if one has to share infrastructure with others, how to operate a ink with ong step-out distance Economic press eads to adoption of internet-based services which require a paradigm change Mine (Boiden) ABB robots UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 17
18 Typica traditiona industria network UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 18
19 Merging these two Internet is the infrastructure sensor, actuator, controer not on the same physica network any more dissoves the automation system in the internet Automation processes run over an unknown communication infrastructure Network communication gets physica impact Automation meets rea internet-type depoyment Aready happening The rea vaue of IoT: data. Coud and big data wi enabe new services UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 19
20 Interesting chaenges Architecture: physica impact, end-to-end resource reservation, discovery, safety, security and privacy Governance, interoperabiity, standardization Managing risk in a system with impact on both ogica and physica eve Provide QoS over a best effort infrastructure with a price pressure Aggregation of data: here ies the added vaue, enabes nove services and higher efficiency Distribution of inteigence: make the automation system more internet-ike: inteigence in the endnodes. Support it with the recent it trends of coud and big data. Chaenge for traditiona automation mindset. Open architectura mode Security concerns are a critica barrier for wide scae adoption of IoT See when IT has arrived to the phone industry. Or when IT has arrived into teco backhau. IT is arriving to automation. UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 20
21 IoT services Enabed by wide scae data gathering Monitoring of massive systems Rea-time insight to processes Observation of systems Performance measurement and optimization Proactive and predictive methods To serve the automation goas, the services provided must be: scaabe, distributed, have a rea reference to the phyisica word (e.g. time), must ensure security and privacy of the users Just using existing security soutions is not eading to secure IoT depoyments Composed by IT, operations and the IoT enabed objects * Foowing sides are from the presentation of Mikhai Kader, DSE, Cisco, presented on the ITU Workshop on ICT Security Standardization for Deveoping Countries UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 21
22 Connected Rai Operations * PASSENGER SECURITY In-station and onboard safety Visibiity into key events ROUTE OPTIMIZATION Enhanced Customer Service Increased efficiency Coision avoidance Fue savings CRITICAL SENSING Transform data to actionabe inteigence Proactive maintenance Accident avoidance Cost savings, improved safety, superior service UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 22
23 Smart City * CONNECTED TRAFFIC SIGNALS Reduced congestion Improved emergency services response times Lower fue usage PARKING AND LIGHTING Increased efficiency Power and cost savings New revenue opportunities CITY SERVICES Efficient service deivery Increased revenues Enhanced environmenta monitoring capabiities UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 23
24 The Connected Car * WIRELESS ROUTER Onine entertainment Mapping, dynamic re-routing, safety and security CONNECTED SENSORS Transform data to actionabe inteigence Enabe proactive maintenance Coision avoidance Fue efficiency URBAN CONNECTIVITY Reduced congestion Increased efficiency Safety (hazard avoidance) UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 24
25 IoT Expands Security Needs * Increased Attack Surface Threat Diversity Impact and Risk Remediation Protocos Compiance and Reguation Converged, Managed Network Resiience at Scae Security Distributed Inteigence Appication Enabement UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 25
26 IT/OT Converged Security Mode * IT DMZ OT Enterprise Network Demiitarized Zone Supervisory Coud Network Security Appication Contro Identity Services Secure Access Automation & Contro Config Mgmt UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 26
27 IT and OT are Inherenty Different * IT OT Connectivity: Any-to-Any Network Posture: Confidentiaity, Integrity, Avaiabiity (CIA) Security Soutions: Cybersecurity; Data Protection Response to Attacks: Quarantine/Shutdown to Mitigate Connectivity: Hierarchica Network Posture: Avaiabiity, Integrity, Confidentiaity (AIC) Security Soutions: Physica Access Contro; Safety Response to Attacks: Non-stop Operations/Mission Critica Never Stop, Even if Breached UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 27
28 What Can Breach IoT Networks? What can t? Biions of connected devices Secure and insecure ocations Security may or may not be buit in Life cyce mismatch between IT and automation devices Instaed base Cash between IT and OT, IT has to accept the traffic Any node on your network can potentiay provide access to the core UNIK4750, Measurabe Security for IoT - #IoTSec Jan 2016, György Kámán, Josef No 28
29 L1 Concusions Overview over ectures Expanation of portfoio and exam Introduction to topic bocks Discussion [Source: Monique Morrow, Cisco] UNIK4750 #IoTSecNO Jan 2016, György Kámán, Josef No 29
SAP Business Analytics. Services & Solutions for the Metals and Mining Industry
SAP Business Anaytics Services & Soutions for the Metas and Mining Industry Niche Business Anaytics Soutions & Services SAP Soutions SAP Business Inteigence Enterprise Data warehousing Reporting & Dashboards
More informationBite-Size Steps to ITIL Success
7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can
More informationIntroduction the pressure for efficiency the Estates opportunity
Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary
More informationSELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci
SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise
More informationProgram Management Seminar
Program Management Seminar Program Management Seminar The word s best management schoos are noted for their superior program execution, high eves of customer satisfaction, and continuous program improvements.
More informationApplication and Desktop Virtualization
Appication and Desktop Virtuaization Content 1) Why Appication and Desktop Virtuaization 2) Some terms reated to vapp and vdesktop 3) Appication and Desktop Deivery 4) Appication Virtuaization 5)- Type
More informationIntegrating Risk into your Plant Lifecycle A next generation software architecture for risk based
Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV
More informationRicoh Healthcare. Process Optimized. Healthcare Simplified.
Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove
More informationNetwork/Communicational Vulnerability
Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security
More informationSoftware Quality - Getting Right Metrics, Getting Metrics Right
Software Quaity - Getting Right Metrics, Getting Metrics Right How to set the right performance metrics and then benchmark it for continuous improvement? Whie metrics are important means to quantify performance
More informationL I C E N S I N G G U I D E
O R A C L E H Y P E R I O N E N T E R P R I S E P E R F O R M A N C E M A N A G E M E N T S Y S T E M L I C E N S I N G G U I D E EPM System Licensing Guide Copyright 2009, Orace and/or its affiiates.
More informationWe are XMA and Viglen.
alearn with Microsoft 16pp 21.07_Layout 1 22/12/2014 10:49 Page 1 FRONT COVER alearn with Microsoft We are XMA and Vigen. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow
More informationIT Governance Principles & Key Metrics
IT Governance Principes & Key Metrics Smawood Maike & Associates, Inc. 9393 W. 110th Street 51 Corporate Woods, Suite 500 Overand Park, KS 66210 Office: 913-451-6790 Good governance processes that moves
More informationTeamwork. Abstract. 2.1 Overview
2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and
More informationMICROSOFT DYNAMICS CRM
biztech TM MICROSOFT DYNAMICS CRM Experienced professionas, proven toos and methodoogies, tempates, acceerators and vertica specific soutions maximizing the vaue of your Customer Reationships Competency
More informationASSET MANAGEMENT OUR APPROACH
ASSET MANAGEMENT OUR APPROACH CONTENTS FOREWORD 3 INTRODUCTION 4 ASSET MANAGEMENT? 6 THE NEED FOR CHANGE 6 KEY PRINCIPLES 7 APPENDIX 1 19 GLOSSARY 20 2 FOREWORD Few things affect our customers ives as
More informationModeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web
4 th Internationa conference on Information Systems, Logistics and Suppy Chain Quebec City August 26-29, 2012 Modeing a Scenario-based Distribution Network Design Probem in a Physica Internet-enabed open
More informationHow To Get Acedo With Microsoft.Com
alearn with Microsoft We are XMA. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow us @WeareXMA Introduction Use our 'steps to alearn' framework to ensure you cover a bases...
More informationSafety Simplified TERZETTO PHARMA METRICS PVT. LTD., Contact Safety Organisation
Safety Simpified TERZETTO PHARMA METRICS PVT. LTD., Contact Safety Organisation Specific soutions to monitor the safety of the drugs a over the gobe About us We provide specific soutions to monitor the
More information3.3 SOFTWARE RISK MANAGEMENT (SRM)
93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce
More informationAn Integrated Data Management Framework of Wireless Sensor Network
An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan
More informationInformatica PowerCenter
Brochure Informatica PowerCenter Benefits Support better business decisions with the right information at the right time Acceerate projects in days vs. months with improved staff productivity and coaboration
More informationCapability Development Grant. Build business capabilities to sharpen your competitive edge
Capabiity Deveopment Grant Buid business capabiities to sharpen your competitive edge 1 Buid up your business with the Capabiity Deveopment Grant The Capabiity Deveopment Grant (CDG) is a financia assistance
More informationeg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No
More informationChapter 3: e-business Integration Patterns
Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?
More informationCognizant Interactive. Digital Marketing & Analytics(DMA) Practice. 2012, Cognizant
Cognizant Interactive Digita Marketing & Anaytics(DMA) Practice 2012, Cognizant About DMA group Cognizant Interactive provides innovative soutions for design, content, earning, digita marketing and anaytics
More informationTechnology and Consulting - Newsletter 1. IBM. July 2013
Technoogy and Consuting - Newsetter Juy 2013 Wecome to Latitude Executive Consuting s atest newsetter, reviewing recent marketpace activity. The newsetter focuses on the Technoogy and Consuting sectors,
More informationTackling Data Security and Privacy Challenges for the Internet of Things. Dave Raggett W3C Tuesday, 14 th June 2016 IoT TechExpo, Berlin
Tacking Data Security and Privacy Chaenges for the Internet of Things Dave Raggett W3C Tuesday, 14 th June 2016 IoT TechExpo, Berin The Promise of the Internet of Things Services that are enriched through
More informationOverview of Health and Safety in China
Overview of Heath and Safety in China Hongyuan Wei 1, Leping Dang 1, and Mark Hoye 2 1 Schoo of Chemica Engineering, Tianjin University, Tianjin 300072, P R China, E-mai: david.wei@tju.edu.cn 2 AstraZeneca
More informationWith the arrival of Java 2 Micro Edition (J2ME) and its industry
Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting
More informationThe definition of insanity is doing the same thing over and over again and expecting different results
insurance services Sma Business Insurance a market opportunity being missed Einstein may not have known much about insurance, but if you appy his definition to the way existing brands are deveoping their
More informationWireless communication solutions. mobilise I track I protect
Wireess communication soutions mobiise I track I protect The Keyine promise focuses on deivery and resuts Keyine has been engaged by our cient Taecom to assist with the promotion of their products through
More informationCI/SfB Ro8. (Aq) September 2012. The new advanced toughened glass. Pilkington Pyroclear Fire-resistant Glass
CI/SfB Ro8 (Aq) September 2012 The new advanced toughened gass Pikington Pyrocear Fire-resistant Gass Pikington Pyrocear, fire-resistant screens in the façade: a typica containment appication for integrity
More informationAdvance PLM Software Solutions for Complex Business Processes
Advance PLM Software Soutions for Compex Business Processes Abstract As customers word-wide camour for more technoogicay rich products, be it a car, or a smartphone, manufacturers are having to contend
More informationRicoh Legal. ediscovery and Document Solutions. Powerful document services provide your best defense.
Ricoh Lega ediscovery and Document Soutions Powerfu document services provide your best defense. Our peope have aways been at the heart of our vaue proposition: our experience in your industry, commitment
More informationHybrid Interface Solutions for next Generation Wireless Access Infrastructure
tec. Connectivity & Networks Voker Sorhage Hybrid Interface Soutions for next Generation Wireess Access Infrastructure Broadband wireess communication wi revoutionize every aspect of peope s ives by enabing
More informationArt of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0
IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks
More informationWHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization
Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the
More informationgdoc Core Cross-platform document conversion, optimization and manipulation technology
Patform gdoc Core Cross-patform document conversion, optimization and manipuation technoogy gdoc Core gdoc Core technoogy forms part of a new generation of word-cass eectronic document soutions from Goba
More informationLearning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning
Monitoring and Evauation Unit Learning from evauations Processes and instruments used by GIZ as a earning organisation and their contribution to interorganisationa earning Contents 1.3Learning from evauations
More informationIBM Security QRadar SIEM
IBM Security QRadar SIEM Boost threat protection and compiance with an integrated investigative reporting system Highights Integrate og management and network threat protection technoogies within a common
More informationLecture 7 Datalink Ethernet, Home. Datalink Layer Architectures
Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441
More informationA Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements
A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,
More informationStrengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India
Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Technica Brief October 2012 Context India faces critica human resources (HR) chaenges in the heath sector,
More informationThe BBC s management of its Digital Media Initiative
The BBC s management of its Digita Media Initiative Report by the Comptroer and Auditor Genera presented to the BBC Trust s Finance and Compiance Committee, 13 January 2011 Department for Cuture, Media
More informationIntroduction: 8x8 Referral Rewards Program
June 2014 Introduction: 8x8 Referra Rewards Program Presented by 8x8, Inc. 2009 NASDAQ-LISTED: EGHT Agenda Introduction to 8x8 Virtua Office phone system Virtua Contact Center Referra Rewards Program Rewards
More informationendorsed programmes With our expertise and unique flexible approach NOCN will work with you to develop a product that achieves results.
endorsed programmes With our expertise and unique fexibe approach NOCN wi work with you to deveop a product that achieves resuts. NOCN is a eading reguated UK awarding organisation that has been creating
More informationDriving Accountability Through Disciplined Planning with Hyperion Planning and Essbase
THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP summer 2012 Driving Accountabiity Through Discipined Panning with Hyperion Panning and Essbase Introduction to Master Data and Master Data
More informationSABRe B2.1: Design & Development. Supplier Briefing Pack.
SABRe B2.1: Design & Deveopment. Suppier Briefing Pack. 2013 Ros-Royce pc The information in this document is the property of Ros-Royce pc and may not be copied or communicated to a third party, or used
More informationOnline Media Information
Onine Media Information www.sciencedirect.com The vita daiy source for 16 miion researchers and scientists around the gobe 70 miion pageviews each month Broad advertising product portfoio SciVerse ScienceDirect:
More informationBig Data projects and use cases. Claus Samuelsen IBM Analytics, Europe csa@dk.ibm.com
Big projects and use cases Caus Samuesen IBM Anaytics, Europe csa@dk.ibm.com IBM Sofware Overview of BigInsights IBM BigInsights Scientist Free Quick Start (non production): IBM Open Patform BigInsights
More informationInfrastructure for Business
Infrastructure for Business The IoD Member Broadband Survey Infrastructure for Business 2013 #5 The IoD Member Broadband Survey The IoD Member Broadband Survey Written by: Corin Tayor, Senior Economic
More informationOrder-to-Cash Processes
TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes
More informationB S. Cloud-EBS ACCESS INFOTECH (P) LTD. Incubating Ideas To Optimize Your Business Process. Business Tracking Tool
Incubating Ideas To Optimize Your Business Process E B S Coud-EBS Business Tracking Too ENTERPRISE BUSINESS SUITE SAAS ERP SERVICES DATABASE ADMINISTRATION MANAGED IT SOLUTIONS CUSTOMIZED SOFTWARE SOLUTION
More informationChapter 2 Developing a Sustainable Supply Chain Strategy
Chapter 2 Deveoping a Sustainabe Suppy Chain Strategy Bakan Cetinkaya Learning Goas. By reading this chapter you wi: Know the basics of competitive strategy and suppy chain strategy and understand their
More informationProfessional Kingston
Professiona Kingston Organisationa and workforce deveopment soutions n Facuty of Business and Law Aways improving 0/1 Contents Wecome 2 Why Kingston? 4 Course portfoio 6 Course detais 8 Work-based earning
More informationEDS-Unigraphics MIS DataBroker Architecture
EDS-Unigraphics MIS DataBroker Architecture Jeff Greiner Bob Woodridge October 9,1996 Topics UG/MIS Probem Domain Requirements for New Architecture Seection of Java Deveoping Java Based Intranet Soutions
More informationLeadership & Management Certificate Programs
MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J
More informationFigure 1. A Simple Centrifugal Speed Governor.
ENGINE SPEED CONTROL Peter Westead and Mark Readman, contro systems principes.co.uk ABSTRACT: This is one of a series of white papers on systems modeing, anaysis and contro, prepared by Contro Systems
More informationTeach yourself Android application development - Part I: Creating Android products
Teach yoursef Android appication deveopment - Part I: Creating Android products Page 1 of 7 Part of the EE Times Network A Artices Products Course TechPaper Webinars Login Register Wecome, Guest HOME DESIGN
More informationThe eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without
More informationYOUR GUIDE SAVING 30 % up to. on your print. Think Smart. Think OKI
YOUR GUIDE SAVING to 30 % up to on your print & documentcosts Think Smart. Think OKI Most businesses have the systems in pace to keep a tight contro on their overheads, however, in an increasingy competitive
More informationThe growth of online Internet services during the past decade has
IEEE DS Onine, Voume 2, Number 4 Designing an Adaptive CORBA Load Baancing Service Using TAO Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet
More informationMCITP. Duration:- 6 Months. 1. 70-680 Windows 7
MCITP Duration:- 6 Months 1. 70-680 Windows 7 Instaing, Upgrading, and Migrating to Windows 7 Describe the key features, editions, and hardware requirements of Windows 7 Perform a cean instaation of Windows
More informationTMI ING Guide to Financial Supply Chain Optimisation 29. Creating Opportunities for Competitive Advantage. Section Four: Supply Chain Finance
TMI171 ING info pat :Info pat.qxt 19/12/2008 17:02 Page 29 ING Guide to Financia Suppy Chain Optimisation Creating Opportunities for Competitive Advantage Section Four: Suppy Chain Finance Introduction
More informationThe guaranteed selection. For certainty in uncertain times
The guaranteed seection For certainty in uncertain times Making the right investment choice If you can t afford to take a ot of risk with your money it can be hard to find the right investment, especiay
More informationQualifications, professional development and probation
UCU Continuing Professiona Deveopment Quaifications, professiona deveopment and probation Initia training and further education teaching quaifications Since September 2007 a newy appointed FE ecturers,
More informationCreating INFINIT Career Opportunities
Network Consutation and Integration Network Consutation and Integration System Integration System Integration Information Systems (IS) Outsourcing Information Systems (IS) Outsourcing Creating INFINIT
More informationAvaya Remote Feature Activation (RFA) User Guide
Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document
More informationCERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society
CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision
More informationHuman Capital & Human Resources Certificate Programs
MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J
More informationUndergraduate Studies in. Education and International Development
Undergraduate Studies in Education and Internationa Deveopment Wecome Wecome to the Schoo of Education and Lifeong Learning at Aberystwyth University. Over 100 years ago, Aberystwyth was the first university
More informationEnergy Performance Certificate
Energy Performance Certificate Sampe EPC TheDomesticEnergyAssessorcom Dweing type: Date of assessment: Date of certificate: Reference number: Tota foor area: Mid-terrace house 09 June 2007 31 August 2007
More informationChapter 2 Traditional Software Development
Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,
More informationApplying Constraints Management to Product Development
Appying Constraints Management to Product Deveopment An intensive summit and working session with Dr. Ei Godratt and eading impementers on synchronizing resources, projects, and pipeines in highy compex
More informationVendor Performance Measurement Using Fuzzy Logic Controller
The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer
More informationCloud Meets Contact Center: From Zero to Hero in 14 Days!
June 2013 Coud Meets Contact Center: From Zero to Hero in 14 Days! By Heather J. Donney, PMP, HDI & ITIL v2f/v3f Certified HDI Certified Instructor 2013 NASDAQ-LISTED: EGHT Meet The Presenter Heather Donney,
More informationPlanning your OpenStack Cloud. Tom Fifield tom@openstack.org @TomFifield
Panning your OpenStack Coud Tom Fified tom@openstack.org @TomFified Introduction Software Engineering Partice Physics Buiding Couds OpenStack Community Manager Much of this presentation is based on the
More informationManifold Technology. ----------------------------------------------------- made in Germany
Manifod Technoogy. ----------------------------------------------------- made in Germany I EVERYTHING UNDER CONTROL. Manifod Technoogy BEULCO heating and cooing manifods made of high-quaity brass ensure
More informationTurning our experience into your expertise. Medical devices training
Turning our experience into your expertise Medica devices training A eading training academy. Annuay we train in excess of 4000 peope. More than 70% of the top 100 medica device companies were trained
More informationAvaya Aura Call Center Elite Multichannel Overview
Avaya Aura Ca Center Eite Mutichanne Overview Reease 6.2.3/6.2.5 March 2013 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was
More informationLADDER SAFETY Table of Contents
Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3
More informationThe Internet of Things... Hype or not?
The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune
More informationLexmark ESF Applications Guide
Lexmark ESF Appications Guide Hep your customers bring out the fu potentia of their Lexmark soutions-enabed singe-function and mutifunction printers Lexmark Appications have been designed to hep businesses
More informationCONFERENCE SPONSORSHIP OPPORTUNITIES. Invest in Conference Sponsorship.
CONFERENCE SPONSORSHIP OPPORTUNITIES Invest in Conference Sponsorship. Why Sponsor a Conference Board Event? The Conference Board is renowned for its abiity to bring together top executives and thought
More informationManagement Accounting
Management Accounting Course Text Professiona, Practica, Proven www.accountingtechniciansireand.ie Tabe of Contents FOREWORD...v SYLLABUS: MANAGEMENT ACCOUNTING...vii PART 1 INTRODUCTION Chapter 1: Introduction
More informationMigrating and Managing Dynamic, Non-Textua Content
Considering Dynamic, Non-Textua Content when Migrating Digita Asset Management Systems Aya Stein; University of Iinois at Urbana-Champaign; Urbana, Iinois USA Santi Thompson; University of Houston; Houston,
More informationHow To Deiver Resuts
Message We sha make every effort to strengthen the community buiding programme which serves to foster among the peope of Hong Kong a sense of beonging and mutua care. We wi continue to impement the District
More informationMARKETING INFORMATION SYSTEM (MIS)
LESSON 4 MARKETING INFORMATION SYSTEM (MIS) CONTENTS 4.0 Aims and Objectives 4.1 Introduction 4.2 MIS 4.2.1 Database 4.2.2 Interna Records 4.2.3 Externa Sources 4.3 Computer Networks and Internet 4.4 Data
More informationTelco Business Process Transformation using Agile Lean Six Sigma and Frameworx components: focus on the core engineering aspects with a case study
IJCSI Internationa Journa of Computer Science Issues, Vo. 10, Issue 1, No 1, January 2013 www.ijcsi.org 37 Teco Business Process Transformation using Agie Lean Six Sigma and Frameworx components: focus
More informationSTRATEGIC PLAN 2012-2016
STRATEGIC PLAN 2012-2016 CIT Bishopstown CIT Cork Schoo of Music CIT Crawford Coege of Art & Design Nationa Maritime Coege of Ireand Our Institute STRATEGIC PLAN 2012-2016 Cork Institute of Technoogy (CIT)
More informationSecure Network Coding with a Cost Criterion
Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu
More informationMeasuring operational risk in financial institutions
Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and
More informationOracle Enterprise Performance Management System. Licensing Guide Release 11.1.2.4
Orace Enterprise Performance Management System Licensing Guide Reease 11.1.2.4 EPM System Licensing Guide, 11.1.2.4 Copyright 2013, 2015, Orace and/or its affiiates. A rights reserved. Authors: EPM Information
More informationAdvanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger
Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server
More informationRAVE NOTICES FOR OUR CEO AND PRINCIPAL CONSULTANT
1 RAVE NOTICES FOR OUR CEO AND PRINCIPAL CONSULTANT CONTENTS Company Profie 1 Mission Statement 2 How We Differ from Others 3 Our Consuting and Training Services 4 CEO and Principa Consutant 5 Our Approach
More informationSummary of HDMA Presentation for July 26 Public Meeting Regarding Bar Code Labeling Requirements
- - Summary of HDMA Presentation for Juy 26 Pubic Meeting Regarding Bar Code Labeing Requirements The HDMA speaker woud be Robert Schwartz, current HDMA Chairman of the Board and Presideht of the Barnes
More informationInternet of Things, Privacy, and Novel Services
Norstella årsmøte, 30Mar2016 Internet of Things, Privacy, and Novel Services How can we teach Sensors to talk Norwegian Josef Noll, Olaf Owe, Christian Johansen 1 University of Oslo/UNIK & IFI ConSeRNS,
More informationVirtual trunk simulation
Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne
More informationCSCI 8260 Spring 2016. Computer Network Attacks and Defenses. Syllabus. Prof. Roberto Perdisci perdisci@cs.uga.edu
CSCI 8260 Spring 2016 Computer Network Attacks and Defenses Syabus Prof. Roberto Perdisci perdisci@cs.uga.edu Who is this course for? Open to graduate students ony Students who compete this course successfuy
More information