TRUSTED ARCHIVE OVERVIEW
|
|
- Hannah Lambert
- 8 years ago
- Views:
Transcription
1 TRUSTED ARCHIVE OVERVIEW
2 ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES Enterprise communications have experienced explosive growth driven by the continuous shift to digital workflows and the pervasive use of social media, mobile and web channels for customer engagement. As increasingly complex record-keeping requirements are introduced by legal authorities, staying compliant across all communication channels continues to be a challenge for enterprises. One of the main components of compliance is record keeping, the process of ensuring that data is accessible in an archive for future use. To preserve the integrity of archived data, a mechanism must be in place to guarantee that data is not corrupted or lost. This mechanism is reconciliation, i.e., the process of establishing consistency among data from a source to a target store and vice versa. Reconciliation ensures that a set of records is authentic and correct versus a golden copy, i.e., that they match in digital signatures (e.g., checksums, fingerprints) and in record counts. The process must be efficient to be able to handle the hundreds of terabytes of data and hundreds of millions of records typically found in a compliance archive. The challenge is to find or develop a mechanism that both detects discrepancies in large datasets in a space- and time-efficient way and offers a means of resolving such discrepancies in a timely manner. The figure on the next page describes the Bloomberg Vault reconciliation process. This process employs a sophisticated data sequence and hash tree (Merkle Tree) technology to efficiently compare and synchronize a range of data objects between client and cloud.
3 The Bloomberg Vault Reconciliation Process WITHIN CLIENT 7 WITHIN CLOUD 4 COMPARE ROOT NODE COMPARE SUB-NODES 3 RETRANSMIT MISSING DATA 2 6 DATA 1 DATA 5 ARCHIVE 1. Transmit Data data local to the client is transmitted to the cloud-based archive and ingested and stored there. 2. Determine Range a range of data determined by count or time threshold is selected from the local store by the client to be reconciled with the cloud. 3. Create Sequence client uses the embedded sequence in the objects in the data range, i.e., brings the objects into a deterministic order. 4. Calculate Hash Tree a hash signature is calculated for each object. The hash signatures are used as leaf nodes to generate a tree of hashes. 5. Retrieve Data the cloud retrieves the objects for a given data range from its archive. 6. Determine Range, Use Sequence and Retrieve Data the cloud performs the same sequencing and hash tree calculation tasks as described in steps The Reconciliation Process starts with a comparison of the root value of the hash trees generated for a given data range. A match for a data range digitally certifies that the corresponding dataset is the same between client and cloud. If the values don t match, the process recursively traverses the hash tree to find the corrupted objects, i.e., those for which the hash signatures don t match. These objects are retransmitted in a subsequent step. TRUSTED ARCHIVE OVERVIEW 2
4 Bloomberg Vault reconciliation uses an efficient protocol between a client and the cloud-based archive to execute the reconciliation process. The protocol is implemented by a client component that runs as part of an enterprise communication or collaboration service and by a hosted service offered as part of Bloomberg s cloud. Clients that participate in the reconciliation process maintain a copy of all data that needs to be reconciled. This local copy can be a file share, a mail server inbox or a local store of a SMTP server; it is often called the golden copy. The size of the golden copy depends on the resiliency requirements of the customer, but once the data has been reconciled, it can be destroyed and the space reused. The example below depicts implementation and protocol using Microsoft Exchange Server and a plugin. Reconciliation Client Plugin in Exchange maintains the hash values and sequence numbers for all communications that are transmitted to the cloud for archiving purposes. At the end of a configurable time (e.g., end of day), the Plugin starts the reconciliation process for the range of data transmitted. The first step is to sequence the hash values for each of the individual s in the data range to be reconciled. After all s have been sequenced, digital signatures and the hash tree are generated, and the Plugin sends a Start Reconciliation message to the cloud service. The cloud service, once it receives the Start Reconciliation message, retrieves all messages that have been ingested, stored and indexed on behalf of the client for a given data range. It performs the same sequencing and hash tree generation as the Plugin and notifies the Plugin when it is ready to reconcile for a given data range. After the Start Reconciliation steps are completed, the Client Plugin and Hosted Service exchange hash tree nodes within a reconciliation process that efficiently compares data between the two systems. The process either digitally certifies that the transmission was correct the root hash nodes match or it progresses until the corrupted or missing messages are identified. Implementation and Protocol Example MICROSOFT EXCHANGE SERVER BLOOMBERG VAULT Reconciliation Client Plugin PROTOCOL ENGINE RECONCILIATION ENGINE Reconciliation Protocol Start Reconciliation Data Range Get Node Hash Reconciliation Service PROTOCOL ENGINE RECONCILIATION ENGINE Data Management Search Reporting Analytics HASH TREE GENERATOR Node Hash Value HASH TREE GENERATOR SEQUENCE GENERATOR ARCHIVING Stop Reconciliation Purge Records or Retransmit SEQUENCE GENERATOR RANGE GENERATOR Storage LOCAL STORE ADMIN Ingestion TRUSTED ARCHIVE OVERVIEW 3
5 Based on its configuration, the process either alerts the operator to the error condition or starts a retransmission of the missing or corrupted data. At the end of a successful reconciliation process, the client Plugin can safely remove all data stored locally. We have used the Trusted Archive technology to secure the ingestion of hundreds of terabytes of client data; it has proven invaluable in maintaining our 24x7 operation with automatic endto-end reconciliation and in helping our customers stay compliant. We can build a hash tree at a rate of about 2,840 documents/second on each side (enterprise and cloud); the actual tree comparison across a private line takes less than 10 seconds, including wire delay. For a typical dataset (500,000 messages across 2 machines at 3,000 messages/ second), the reconciliation process takes under 100 seconds. This compares favorably with the typical process employed in the industry, i.e., to transfer counts, IDs and fingerprints to the archive and loop over the stored objects to compare them a process, that, at best, takes days to complete and involves manual steps. TAKE THE NEXT STEP Learn more about Bloomberg Vault and archive reconciliation at massive scale using Merkel Trees. Contact us at , vaultsales@bloomberg.net or call your regional representative to schedule a personalized demonstration. = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = BEIJING FRANKFURT LONDON NEW YORK SÃO PAULO SYDNEY DUBAI HONG KONG MUMBAI SAN FRANCISCO SINGAPORE TOKYO bloomberg.com/vault The data included in these materials are for illustrative purposes only Bloomberg L.P. All rights reserved. S DIG
NFORMATION ONTROL OUR BLOOMBERG VAULT. An Enterprise Solutions Offering
> > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > BLOOMBERG VAULT An Enterprise Solutions Offering ONTROL OUR NFORMATION
More informationTRADE ORDER MANAGEMENT SOLUTIONS (TOMS) A Bloomberg Trading Solutions Offering BE AGILE
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> TRADE ORDER MANAGEMENT SOLUTIONS (TOMS) A Bloomberg Trading Solutions Offering BE AGILE EXPAND YOUR REACH Bloomberg Trading Solutions
More informationASSET AND INVESTMENT MANAGER (AIM) A Bloomberg Trading Solutions Offering BE AGILE
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> ASSET AND INVESTMENT MANAGER (AIM) A Bloomberg Trading Solutions Offering BE AGILE EXPAND YOUR REACH Bloomberg Trading Solutions delivers
More informationSELL-SIDE EXECUTION & ORDER MANAGEMENT SOLUTIONS (SSEOMS) A Bloomberg Trading Solutions Offering BE AGILE
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> SELL-SIDE EXECUTION & ORDER MANAGEMENT SOLUTIONS (SSEOMS) A Bloomberg Trading Solutions Offering BE AGILE EXPAND YOUR REACH Bloomberg
More informationASSET AND INVESTMENT MANAGER (AIM) A Bloomberg Trading Solutions Offering AIM OPERATIONS AUTOMATE THE POST-TRADE PROCESS
A Bloomberg Trading Solutions Offering ASSET AND INVESTMENT MANAGER (AIM) AIM OPERATIONS AUTOMATE THE POST-TRADE PROCESS Bloomberg AIM Operations Investment managers frequently operate dispa rate and costly
More informationENTERPRISE SOLUTIONS PTIMIZE UTURE
ENTERPRISE SOLUTIONS PTIMIZE HE UTURE CONTENTS 03 BLOOMBERG ENTERPRISE PRODUCTS & SOLUTIONS 04 WHY BLOOMBERG EPS NOW? 05 OPTIMIZE DESKTOP, DATA FEEDS AND DISTRIBUTION-RELATED COSTS 07 STRATEGIC WORKFLOW-BASED
More informationTHE VALUE OF TRUSTED DATA. How Asset Managers Use Technology To Turn Data Into Actionable Insight
THE VALUE OF TRUSTED DATA How Asset Managers Use Technology To Turn Data Into Actionable Insight THE VALUE OF TRUSTED DATA HOW ASSET MANAGERS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT Faced with
More informationSMARTER GOVERNANCE. Capitalizing on enterprise data gives firms a head start on building and sustaining stronger, more strategic governance
How financial services firms use technology to turn data into actionable insight SMARTER GOVERNANCE Capitalizing on enterprise data gives firms a head start on building and sustaining stronger, more strategic
More informationMORE EFFICIENT WORKFLOW
HOW FINANCIAL SERVICES FIRMS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT MORE EFFICIENT WORKFLOW The desire to capitalize on data is leading firms to streamline workflow through expert collaboration
More information>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> HEDGE FUNDS. A Bloomberg Professional Service Offering NITIATIVE
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> HEDGE FUNDS A Bloomberg Professional Service Offering AKE HE NITIATIVE THE UNPARALLELED HEDGE FUND PLATFORM ////////////////////////////////////////
More informationThe Evolution of Media Workflows
The Evolution of Media Workflows 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com,
More informationTRADING SOLUTIONS CONNECTIVITY & INTEGRATION (TSCI) A Bloomberg Trading Solutions Offering BE AGILE
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> TRADING SOLUTIONS CONNECTIVITY & INTEGRATION (TSCI) A Bloomberg Trading Solutions Offering BE AGILE EXPAND YOUR REACH Bloomberg Trading
More informationGET MORE VALUE FROM DATA
HOW FINANCIAL SERVICES FIRMS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT GET MORE VALUE FROM DATA Data capitalization helps firms extract more value from data and technology to gain five critical
More informationEE ALL IDES A GLOBAL NETWORK OF FINANCIAL INFORMATION, BUSINESS INTELLIGENCE, PEOPLE AND IDEAS
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> A GLOBAL NETWORK OF FINANCIAL INFORMATION, BUSINESS INTELLIGENCE, PEOPLE AND IDEAS EE ALL IDES WELCOME / / / / / / / / / / / / / / / / / / / / /
More informationEXECUTION MANAGEMENT SYSTEM
EXECUTION MANAGEMENT SYSTEM Bloomberg s Execution Management System, EMSX, is a sophisticated, broker-neutral trading tool that allows you to route seamlessly to nearly 2,000 broker-dealer destinations,
More informationGSX Monitor & Analyzer for Exchange On premise. Performance, Reporting, Management
GSX Monitor & Analyzer for Exchange On premise Performance, Reporting, Management 1 About GSX Solutions Founded in 1996, Headquartered in Switzerland Offices in USA, UK, France, Switzerland, China 600
More informationFor over 25 years, OpenText Cloud Fax Services has. OpenText Cloud Fax Services. The Market Leader in Cloud Fax Technology
OpenText Cloud Fax Services The Market Leader in Cloud Fax Technology For over 25 years, OpenText Cloud Fax Services has helped many companies go paperless with solutions that integrate with both email
More informationTHE VALUE OF TRUSTED DATA
How financial services firms use technology to turn data into actionable insight THE VALUE OF TRUSTED DATA Faced with greater challenges and an expectation to do more with less, buy-side firms are figuring
More informationAWS for M&E. Bhavik Vyas / bhavikv@amazon.com Amazon Web Services M&E Partner Eco-System Manager DEG Up in the Clouds May 2015
AWS for M&E Bhavik Vyas / bhavikv@amazon.com Amazon Web Services M&E Partner Eco-System Manager DEG Up in the Clouds May 2015 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied,
More informationSymantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
More informationMANAGE RISK WITH CONFIDENCE
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> ENTERPRISE RISK Bloomberg Trading Solutions MANAGE RISK WITH CONFIDENCE >>>>> SHARPEN YOUR VIEW Managing risk is more critical than ever. And more
More informationEASIER COMPLIANCE. Regulation-ready data and advanced technology are helping firms get out from under an increasingly heavy regulatory burden
HOW FINANCIAL SERVICES FIRMS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT EASIER COMPLIANCE Regulation-ready data and advanced technology are helping firms get out from under an increasingly heavy
More informationHow To Use Syncplicity Panorama On A Mobile Device
On the Radar: Syncplicity Panorama New mobile content access tools for modern business work styles Publication Date: 11 Mar 2015 Product code: IT0021-000064 Richard Edwards Summary Catalyst The typical
More informationPeer-to-peer data storage software Specification and source code
GLORIA is funded by the European Union 7th Framework Programme (FP7/2007-2013) under grant agreement n 283783 Specification and source code CODE: DEL-050 VERSION: 01 DATE: November 28 th, 2012 Authors:
More informationCA Message Manager. Benefits. Overview. CA Advantage
PRODUCT BRIEF: CA MESSAGE MANAGER CA Message Manager THE PROACTIVE MANAGEMENT OF EMAIL AND INSTANT MESSAGES IS INTEGRAL TO THE OVERALL STRATEGY OF INFORMATION GOVERNANCE. THERE ARE MANY COMPLEX CHALLENGES
More informationMastering entity data with the LEM
ENTERPRISE Solutions HOW FINANCIAL SERVICES FIRMS USE TECHNOLOGY TO TURN DATA INTO ACTIONABLE INSIGHT Mastering entity data with the LEM Thought leaders believe that building an LEM could help firms gain
More informationSolutions That Drive Decisions
PARTNER WITH A LEADER / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /
More informationDocument control for sensitive company information and large complex projects.
Data sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control for sensitive
More informationSimple Storage Service (S3)
Simple Storage Service (S3) Amazon S3 is storage for the Internet. It is designed to make web-scale computing easier for developers. Amazon S3 provides a simple web services interface that can be used
More informationMigrate from Exchange Public Folders to Business Productivity Online Standard Suite
Migrate from Exchange Public Folders to Business Productivity Online Standard Suite White Paper Microsoft Corporation Published: July 2009 Information in this document, including URL and other Internet
More informationEnterprise Content Management Suite 11g
Introducing Oracle Enterprise Content Management Suite 11g Roberto Nogueras g Senior Principal Instructor Oracle Ibérica Agenda Enterprise Content t Management (ECM)
More informationConfiguring Email Notification for Business Glossary
Configuring Email Notification for Business Glossary 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording
More informationThe evolution of data archiving
The evolution of data archiving 1 1 How archiving needs to change for the modern enterprise Today s enterprises are buried by data, and this problem is being exacerbated by the unfettered growth of unstructured
More informationBLOOMBERG ENTERPRISE SOLUTIONS NSIDE DATA OVERNANCE T WFIC 2013
BLOOMBERG ENTERPRISE SOLUTIONS NSIDE DATA OVERNANCE T WFIC 2013 EVENT SUMMARY The World Financial Information Conference (WFIC) is the only global event that focuses on financial data sourcing, compliance
More information3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.
THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance
More informationElectronic Document and Record Compliance for the Life Sciences
Electronic Document and Record Compliance for the Life Sciences Kiran Thakrar, SoluSoft Inc. SoluSoft, Inc. 300 Willow Street South North Andover, MA 01845 Website: www.solu-soft.com Email: solusoftsales@solu-soft.com
More informationPremise vs. Hosted Contact Center: Total Cost of Ownership Analysis
vs. Contact Center: Total Cost of Ownership Analysis A White Paper Sponsored By TABLE OF CONTENTS Introduction... 3 TCO Analysis... 4 Background... 4 Systems and Applications... 4 Implementation... 4 Maintenance
More informationCMT Self-Service Archive Migrator 1.2.5.3. Release Notes
CMT Self-Service Archive Migrator 1.2.5.3 Release Notes September 2015 Table of Contents What s New in Version 1.2.5.3... 3 Release Notes 1.2.5.3... 3 Previous Updates... 3 About Binary Tree... 5 CMT SELF-SERVICE
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationNetwork Security Essentials:
Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal
More informationCloud. Hosted Exchange Administration Manual
Cloud Hosted Exchange Administration Manual Table of Contents Table of Contents... 1 Table of Figures... 4 1 Preface... 6 2 Telesystem Hosted Exchange Administrative Portal... 7 3 Hosted Exchange Service...
More informationEnabling Cloud Architecture for Globally Distributed Applications
The increasingly on demand nature of enterprise and consumer services is driving more companies to execute business processes in real-time and give users information in a more realtime, self-service manner.
More informationNetIQ Identity Manager
NetIQ Identity Manager Security Guide December 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON
More informationThe Data Center of the Future: Creating New Jobs in Europe
The Data Center of the Future: Creating New Jobs in Europe New data centers will create hundreds of thousands of new jobs for Europe by 2020. But there is work to be done to capture this opportunity fully.
More informationHosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
More informationOpenText Fax Servers and Microsoft Office 365
OpenText Fax Servers and Microsoft Office 365 Integrating Fax with Office 365 E N T E R P R I S E I N F O R M A T I O N M A N A G E M E N T 1 Abstract Cloud-based information technologies promise a number
More informationCloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
More informationService Organization Controls 3 Report
Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security and Availability For the Period April 1, 2015 September 30, 2015 Ernst & Young LLP Suite 1600 560 Mission
More informationCash, risk, trade execution, lifecycle management and accounting in a fully integrated treasury workflow
BLOOMBERG TREASURY & A Bloomberg Professional Service Offering Cash, risk, trade execution, lifecycle management and accounting in a fully integrated treasury workflow SEE THE COMPLETE PICTURE // 02 TRM
More informationGFI White Paper: GFI FaxMaker and HIPAA compliance
GFI White Paper: GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax
More informationCONSULTING SERVICES Business & technology consulting and managed services
CONSULTING SERVICES Business & technology consulting and managed services SUNGARD CONSULTING SERVICES Leveraging global delivery to help drive operational efficiency while reducing IT cost Companies face
More informationVirtualization in Enterprise Environment. Krisztian Egi
Virtualization in Enterprise Environment Krisztian Egi Session Outline Virtualization technology overview Challenges in enterprise environment Q & A 2 Virtualization technology overview What s virtualization
More informationAddressing Enterprise Needs with a Software Defined Network Platform
Addressing Enterprise Needs with a Software Defined Network Platform Dynamic, customizable approach meets customer demand Date: December 2015 Author: Mike Sapien Ovum view Enterprise customers have virtualized
More informationStarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users
StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.
More information>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> BLOOMBERG. A Bloomberg Professional Service Offering FOR EDUCATION
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> BLOOMBERG A Bloomberg Professional Service Offering FOR EDUCATION Bloomberg for Education brings the pace and challenge
More informationRightFax Internet Connector Frequently Asked Questions
RightFax Internet Connector Frequently Asked Questions What is the RightFax Internet Connector? The RightFax Internet Connector is a connector within RightFax 10.5 which provides an Internet connection
More informationArchitecture for ACSI33 email security requirements. Implementation using janusseal and Clearswift MIMEsweeper
Implementation using janusseal and Clearswift MIMEsweeper Greg Colla July 2005 This paper outlines the changes in the security policy for email within Australian Government agencies, specifically the email
More informationOn the Radar: Pulse Secure
Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure
More informationGFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options
GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options An overview of how GFI FAXmaker works, and how to deploy it This white paper describes the different ways in
More informationService Organization Controls 3 Report
Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security For the Period April 1, 2013 March 31, 2014 Ernst & Young LLP Suite 1600 560 Mission Street San Francisco,
More informationConfiguration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.
Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them
More informationKenneth Schwartz Nielsen Global Channel Manager
Kenneth Schwartz Nielsen Global Channel Manager The Email-Manager philosophy Email is a dominant factor in the way businesses interact with their customers An email is normally perceived as a personal
More informationF root anycast: What, why and how. João Damas ISC
F root anycast: What, why and how João Damas ISC Overview What is a root server? What is F? What is anycast? F root anycast. Why? How does ISC do it? What is f.root-servers.net? One the Internet s official
More informationOn the Radar: Tamr. Applying machine learning to integrating Big Data. Publication Date: Sept. 2014 Product code: IT0014-002934.
Applying machine learning to integrating Big Data Publication Date: Sept. 2014 Product code: IT0014-002934 Tony Baer Summary Catalyst Traditional data integration approaches may not scale for Big Data.
More informationEnterprise Vault 10 Feature Briefing
Enterprise Vault 10 Feature Briefing Nirvanix Cloud Storage This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the
More informationHow Exclaimer Mail Archiver Works
How Exclaimer Mail Archiver Works www.exclaimer.com How Exclaimer Mail Archiver Works In this document, you ll learn how email is archived, stored and searched by Exclaimer Mail Archiver. We ll look at
More informationA Control Framework for e-invoicing
A Control Framework for e-invoicing White Paper by TWIST Dematerialisation of paper invoices and purchase orders may unleash greater efficiencies and cost savings in the order to pay process. Led by Steven
More informationCSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
More informationAIIM & ASSUREON AN ASSUREON BRIEF
SOLUTIONBRIEF AIIM & ASSUREON AN ASSUREON BRIEF AIIM (Association for Information and Image Management) is the global community of information professionals. Their mission is to help organizations thrive
More informationA Network Monitoring System with a Peer-to-Peer Architecture
A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The
More informationOne trusted platform. All your project information.
One trusted platform. All your project information. The most trusted and widely used online collaboration platform for engineering and construction projects. New York City Hall Reconstruction New York
More informationVeritas Enterprise Vault.cloud for Microsoft Office 365
TM Veritas Enterprise Vault.cloud for Microsoft Office 365 Assume control over your information ecosystem Benefits at a glance Satisfies email retention requirements by journaling an immutable copy of
More informationData Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT
More informationSymantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
More informationCustomized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
More informationGILE BLOOMBERG TRADING SOLUTIONS
> > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > BLOOMBERG TRADING SOLUTIONS E GILE ABOUT BLOOMBERG Bloomberg is the world
More informationFinancial services perspectives on the role and real impact of cloud
Financial services perspectives on the role and real impact of cloud Executive Summary Ovum has recently concluded an independent and in-depth survey of 400 senior CIOs within financial services institutions
More informationMeeting Management Solution. Technology and Security Overview. 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702
Meeting Management Solution Technology and Security Overview 10012 N. Dale Mabry Hwy Suite 115 Tampa, FL 33618 800-274-5624 Ext 702 Technology SaaS Software as a Service is offered as well. Client may
More informationOnline Learning 2.0: The Technologies and Trends Revolutionizing the Classroom
50 Years of Growth, Innovation and Leadership Online Learning 2.0: The Technologies and Trends Revolutionizing the Classroom Sponsored by www.frost.com Frost & Sullivan Online Learning 2.0: The Technologies
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationThe Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
More informationComputer Organization
Computer Organization and Architecture Designing for Performance Ninth Edition William Stallings International Edition contributions by R. Mohan National Institute of Technology, Tiruchirappalli PEARSON
More informationDesktop Virtualization for the Banking Industry. Resilient Desktop Virtualization for Bank Branches. A Briefing Paper
Desktop Virtualization for the Banking Industry Resilient Desktop Virtualization for Bank Branches A Briefing Paper September 2012 1 Contents Introduction VERDE Cloud Branch for Branch Office Management
More informationREGULATORY & ACCOUNTING PRODUCTS THE NEW FAIR VALUE ACCOUNTING STANDARDS AND DISCLOSURE REQUIREMENTS
REGULATORY & ACCOUNTING PRODUCTS THE NEW FAIR VALUE ACCOUNTING STANDARDS AND DISCLOSURE REQUIREMENTS THE NEW FAIR VALUE ACCOUNTING STANDARDS AND DISCLOSURE REQUIREMENTS 2 Specific Accounting Requirements
More informationOpportunities for Action. Shared Services in Operations and IT: Additional Complexity or Real Synergies?
Opportunities for Action Shared Services in Operations and IT: Additional Complexity or Real Synergies? Shared Services in Operations and IT: Additional Complexity or Real Synergies? In recent years, many
More informationCOLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL
PAYMENT CARD INDUSTRY COMPLIANCE (PCI) Effective June 1, 2011 Page 1 of 6 (1) Definitions a. Payment Card Industry Data Security Standards (PCI-DSS): A set of standards established by the Payment Card
More informationHow Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
More informationMerkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan Karthikeyan.Bhargavan@inria.fr April 7, 2015 Modern distributed systems spread their databases across a large number
More informationBEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE
BEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE 1 1EDI Source: BEYOND THE INITIAL CONNECTION WHAT THE CHANGING B2B EXCHANGE ENVIRONMENT MEANS TO YOU. For anyone in charge of automating
More informationIBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
More informationSecurity Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
More informationAVANTGARD RECEIVABLES GETPAID Enterprise Edition
AVANTGARD RECEIVABLES GETPAID Enterprise Edition Comprehensive Order-to-Cash Management AvantGard Receivables GETPAID drives automation, workflow and collaboration across the order-to-cash cycle, with
More informationEOH Cloud Services - EOH Cloud Backup - Server
EOH Cloud Services - EOH Cloud Backup - Server EOH Cloud Backup - Server Page 1 EOH Cloud Backup - Server Reliable backup and recovery is critical in today s information-driven business. Besides the sheer
More informationProcesso Civile Telematico (On-line Civil Trial)
Processo Civile Telematico (On-line Civil Trial) By Giulio Borsari Italian Ministry of Justice IT Department via Crescenzio 7/c Rome Phone +39 051 4200210 (alt. +39 06 68620209) Fax +39 051 4200200 giulio.borsari@giustizia.it
More informationGSX Monitor & Analyzer When end-users performance Matters! GSX Solutions 2014
GSX Monitor & Analyzer When end-users performance Matters! GSX Solutions 2014 1 About GSX Solutions! Founded 1996, Headquartered in Switzerland! Offices in USA, UK, France, Switzerland, China! Indirect
More informationEE 7376: Introduction to Computer Networks. Homework #3: Network Security, Email, Web, DNS, and Network Management. Maximum Points: 60
EE 7376: Introduction to Computer Networks Homework #3: Network Security, Email, Web, DNS, and Network Management Maximum Points: 60 1. Network security attacks that have to do with eavesdropping on, or
More informationThe Quality of Internet Service: AT&T s Global IP Network Performance Measurements
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing
More informationRemote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
More informationDefine your goals, we ll do the rest
SUB-FUNDS OF GOLDMAN SACHS FUNDS, SICAV Define your goals, we ll do the rest The GS Wealthbuilder Multi-Asset Portfolios can help you achieve your goals, whether you are looking to preserve, enhance or
More information