Industrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen

Size: px
Start display at page:

Download "Industrial information system security Part 3 Standards for securing industrial automation systems Martin Naedele, Dick Oyen"

Transcription

1 Tutoril Industril informtion system security Prt 3 Stndrds for securing industril utomtion systems Mrtin Nedele, Dick Oyen Prt 2 of this three-prt tutoril on informtion system security in industril networks explined the different types of mlwre nd suggested how n utomtion system could be defended ginst them. This finl instllment looks t vrious inititives tht hve been strted over the lst couple of yers by different groups to crete stndrds nd other forms of guidnce to secure industril utomtion systems. An overview of number of those inititives nd their work products is presented, nd the pproch tken by IEC TC65 WG10 to produce technicl blueprints for securing certin control system scenrios is explined. 4/

2 Industril informtion system security Tutoril Currently there is flood of informtion vilble on informtion system security in generl. On top of this, there re some utomtion vendor white ppers tht explin certin spects of locking down their systems. However, there is serious lck of imprtil nd esily ccessible guidnce on how to systemticlly secure utomtion nd control systems ginst electronic ttcks. There is no doubt tht stndrds in this re would be very beneficil for both utomtion users nd utomtion vendors, thus enbling them to: Estimte the effort required to implement, mintin, nd operte security mechnisms nd processes. Specify the security objectives for their plnt nd the security functionlities nd mesures tht hve to be provided by vendors nd system integrtors. Compre the thret coverge nd cost of offered security solutions. Implement nd operte cost efficient security mechnisms cross multiple plnts nd loctions in the enterprise. Be sure tht their defense ginst IT-bsed threts corresponds to stte-of-the-rt solutions. Vendors nd system integrtors will be ble to: Anticipte security requirements nd develop corresponding functionlity. Crete security rchitectures tht my be reused cross multiple projects nd customers. This reduces costs in proposl writing, engineering, nd the purchsing of third prty security devices nd pplictions. Mjor stndrdiztion inititives The following survey of industril security stndrdiztion inititives is dpted from [1] nd [2]. ISA S99 The intention of the ISA (Instrumenttion, Systems, nd Automtion Society) Committee SP99, Mnufcturing nd Control Systems Security 1) is to crete guidnce documents nd stndrd (S99) on introducing IT security to existing industril control nd utomtion systems. ISA is entitled to produce stndrds for the process industry with ntionl vlidity in the US. Mny ISA stndrds re used interntionlly s best prctices or, such s S88 nd S95, dopted s interntionl stndrds. Stndrds outlining how to systemticlly secure utomtion nd control systems ginst electronic ttcks would be very beneficil for both utomtion users nd utomtion vendors. SP99 strted its work in As first step, it produced two technicl reports tht were published in spring The first report Security Technologies for Mnufcturing nd Control Systems [3] is comprehensive survey of wht is stte-of-the-rt in security technologies nd mechnisms, with comments on their pplicbility for the plnt floor. It covers: uthentiction nd uthoriztion; filtering/blocking/ccess control; encryption nd dt vlidtion; udit, mesurement, monitoring, nd detection; operting systems nd softwre; nd physicl security. Ech technology is evluted with regrd to the following questions: Addressed security vulnerbilities; typicl deployment; known weknesses; use in n utomtion environment; future directions; recommendtions; nd references. The second report Integrting Electronic Security into the Mnufcturing nd Control Systems Environment [4] presents recommendtions for security rchitecture nd describes the dministrtive issues nd processes for introducing security mngement system in industril plnts. The pproch in this report is inspired by ISO/IEC [5]. It contins sections on developing security progrm, policies, risk ssessment, udits nd testing, developing, selecting, nd procuring, countermesures, s well s exmples for policies nd forms. Since the summer of 2004 SP99 hs been working on the S99 stndrd. S99 focuses on: Retrofitting security mechnisms in existing plnts with commercilly vilble components without ctully prescribing specific rchitecture. The processes to operte the underlying mngement system nd dministrtive processes. The ctul security rchitecture nd processes will likely be customized for specific plnts. IAONA The Industril Automtion Open Networking Allince (IAONA) is n interest group of industril communiction system users nd mnufcturers. Its Joint Technicl Working Group Security 2) hs developed Security Dt Sheet which is intended to serve s templte for utomtion system nd Tble 1 Secutity inititives CIDX ( ) cretes procedurl security guidnce for the chemicl industry. Its work is ligned with ISA SP99. CIDX is mostly ctive in North Americ. NAMUR ( provides guidnce on secure usge of networking technology for the process industry. NAMUR is mostly ctive in Germny/Europe. NERC ( ) is the North Americn self-regultion uthority for power utilities. Complince with NERC 1200 nd successor CIP stndrds on security mngement with their strong focus on processes nd documenttion is compulsory for North Americn power utilities. CIGRE ( the Interntionl Council on Lrge Electric Systems ddresses IT security considertions in number of its working groups. PCSRF ( ), the Process Control Security Requirements Forum, promotes security certifiction of future control system components ccording to ISO/IEC ( Common Criteri ). It is driven by the US Ntionl Institute of Stndrds nd Technology, the US ntionl ISO/IEC certifiction uthority. PCSF ( ), the Process Control System Forum, ws estblished 2004 s met-inititive to promote informtion shring between ll the other inititives on the topic. 70 4/2005

3 Industril informtion system security Tutoril device vendors to document the security nd communiction relted fetures nd requirements of their individul products. This informtion cn serve s vluble input for the utomtion security rchitect s he designs nd configures the necessry security mechnisms for the plnt. The benefit of such Security Dt Sheet is tht it collects, t single loction, concise security relevnt informtion tht is otherwise often hrd to obtin from vendor literture. IEC In erly 2004 the IEC Technicl Sub- Committee 65C (Digitl Communictions), through its working group WG13 (Cyber Security), strted to ddress security issues - within the IEC stndrd for field buses nd other industril communiction networks. These issues re outlined in new prt 4 entitled Digitl dt communictions for mesurement nd control Profiles for secure communictions in industril networks. Wht becme evident during this work ws tht security issues in the utomtion system cnnot be solved by protecting communiction lone nd by looking only t the field level. Insted, the working group strted to specify stte-of-the-rt secure reliztions of certin common utomtion networking scenrios, such s dil-up remote ccess. These descriptions, clled requirement sets, contin product independent specifiction of technicl mechnisms in the context of best-prctice security rchitecture, s well s guidnce on the configurtion nd opertion of these mechnisms. The pproch is described in greter detil below. Consequently, the work of the group ws moved to TC65 WG10 to lign the ctul nd necessry work with the IEC committee mndte. The completed stndrd IEC 62443, entitled Security for industril process mesurement nd control Network nd system security is expected in The finl voting for interntionl vlidity will tke plce during the first hlf of Some other security inititives re briefly described in Tble 1. Security mngement on the plnt floor ccording to ISA S99 The ISA SP99 technicl report TR [3], Security Technologies for Mnufcturing nd Control Systems provides guidnce on the pplicbility of brod nd inclusive rnge of security technologies. Its dvice comes from the combined experience of security experts from utomtion system vendors nd users. As the informtion presented is nlyticl in 1 Cyber Security Mngement System. Pln 1. Importnce of Cyber Security in Business 2. Scope of Cyber Security Mngement System 3. Security Policy 4. Orgniztionl Security 5. Personnel Security 6. Physicl nd Environmentl Security Do 7. Risk Identifiction, Clssifiction, nd Assessment 8. Risk Mngement nd Implementtion 9. Incident Plnning nd Response 10. Communictions, Opertions, nd Chnge Mngement 11. Access Control 12. Informtion nd Document Mngement 13. System Development nd Mintennce 14. Stff Trining nd Security Awreness 15. Complince Check 16. Business Continuity Pln 17. Monitoring nd ing CSMS Act 18. Mintining nd Implementing Improvements nture, it is not normtive stndrd ginst which complince cn be mesured. The reder determines the pplicbility of the informtion to the specific cse. It is n excellent document for those strting to determine security mesures nd those with experience. TR continues to be updted but its content will not be covered by the S99 stndrds. As of October of this yer, drfts of two of the four prts of the S99 stndrd re lmost redy for public review. Prt 1 defines terms nd describes the models used in discussing security in utomtion systems. Prt 2 dvises how cyber-security mngement system (CSMS) cn be estblished. There re 18 key elements in CSMS which re structured in life cycle tht is constntly repeted through four phses: Pln, Do, Check, nd Act. The CSMS is provided by the Chemicl Industry Dt Exchnge (CiDX) [7], which dpts the four phses of the British Stndrd BS :2002 [6] to utomtion systems nd defines the 18 key elements. The CSMS nd its elements re shown in 1. Its cyclic nture is implicit in step 18 in which the security progrm itself is modified ccording to lessons lerned in the course of the preceding elements. Pln phse: Security plnning begins with mking business cse so tht top mngement cn set cler top-level policy tht mndtes the security progrm. Orgniztionl Security is plnned nd this tkes into ccount ll of the deprtments nd people tht re involved with the control system. It identifies roles nd estblishes responsibilities reltive to security. Security reltes to people: those who hve ssets to protect, those who re expected to protect them, nd those who might compromise those ssets. Personnel Security defines personnel policies to estimte nd mintin the trustworthiness of those who re given greter ccess to the ssets. Physicl nd Environmentl Security must lso be plnned. Cyber security is 4/

4 Industril informtion system security Tutoril bsed on n ssumption tht there re substntil (not bsolute) brriers ginst physicl ttck. Security risks re identified, clssified, nd ssessed in the plnning phse. Detiled instructions bout how to do this is provided in S99 nd the mteril tht it references. Do phse Risk ssessment leds directly into the Do Phse. Using the risk ssessment, security resources cn be efficiently pplied to rel vulnerbilities. Procedures re estblished tht pln the response to potentil incidents. Response plnning must include when it becomes necessry to notify government officils of significnt thret to the community. Overll mngement policies nd procedures re estblished to cover communictions, system opertions, nd chnge mngement. Access control defines the privileges tht ccompny specific roles. It lso defines the procedures tht limit people s ccess to ctivities nd informtion to which they re privileged. Authentiction mens re determined which will ensure tht prticulr user (person or softwre) hs the necessry ccess uthoriztion. Informtion nd Document Mngement identifies the security clssifiction of dt nd specifies sfegurds. Security issues of developing nd mintining the system re lso hndled by policies nd procedures. Stff must be trined in the relevnt security procedures nd ll personnel should undertke regulr refresher courses on generl security precutions. Complince of deprtments nd personnel to the security policies nd procedures must be mesured through continuous monitoring, nd periodiclly, through udits. Complince must lso tke into ccount externl requirements such s those of customers, contrctul prtners, nd regultory gencies. Check phse The Check Phse includes developing Business Continuity Pln nd following it. This pln estblishes how the compny will operte through incidents tht result in serious dmge, plnt outge, nd possibly community ctstrophe. The lessons lerned from the CSMS ctivities re reviewed in the Check Phse. Act phse As the CSMS is cyclic process, the security progrm is revised ccording to the review in the Check Phse. S99 Prt 2 provides more detils s well s 19 steps for estblishing 2 Modulr security rchitecture. Ech cn be mpped to certin components of the utomtion system nd its network. ECI SED Stndlone device IRA Remote ccess client (e.g. mintennce) IOC Remote control center (e.g. bckup, or different plnt) Semi-public network (e.g. enterprise network) Public network (e.g. Internet) PSM PEC Service lptop CNH Control center/hmi ULCC Control network (control center upper level) ACI Appliction servers Control servers LLCC Control network (control center lower level) utomtion cell utomtion cell AFD controller controller FC Control network (field level) 72 4/2005

5 Industril informtion system security Tutoril CSMS. Prt 3 ims t providing guidnce on how to operte the CSMS. Technicl security rchitecture bsed on IEC IEC minly ddresses on system level technicl spects of the security rchitecture, nd thus compliments product oriented inititives like IAONA, nd process guidnce provided by SP99 nd NERC. With the ongoing stndrdiztion efforts for Industril IT security processes nd rchitectures, plnt mngers hve rel chnce to implement stte-of-the-rt nd cost-efficient informtion system security. The bsic ide of the IEC pproch is tht of modulr security rchitecture. Ech module corresponds to certin usge or communiction scenrio nd cn be mpped to certin components of the utomtion system nd its network 2. Ech module is represented by requirement set specified in the stndrd. Some of the requirements, s well s the physicl or logicl components they refer to, re common to multiple modules. Security rchitecture modules cn nd should be combined to suit the specific usge nd thret sitution of n utomtion system. The stndrd will provide guidnce on the priority of modules for situtions where complete implementtion of the stndrd is not possible due to budget limittions for initil implementtion nd ongoing mintennce. The requirements will be formulted in wy tht cn be used s the bsis for Requests for Proposls (RFPs) for dt communiction stndrds, nd offers, s well s security udits. They Footnotes 1) 2) should, t the sme time, llow for different technicl solutions. One gol is tht it will be possible to meet the requirements of the stndrd using products nd technologies tht re commercilly vilble tody. The requirements cn lso be pplied to current nd legcy systems nd they cn be scled down for systems where n nlysis hs indicted they represent low risk for both the enterprise nd society. The working group foresees the following modules: Enterprise control net interconnect (ECI): ECI defines the security rchitecture for non-rel-time dtflow between control network nd n enterprise network, preferbly unidirectionl out of the control network. Interctive remote ccess (IRA): IRA detils the security rchitecture needed so tht prts of the control system cn be ccessed remotely (ie, vi telephone dilup or Internet) for perhps engineering or expert dignosis. Inter control center connect (ICC): ICC describes how communictions between fixed control centers over public networks cn be secured. Stnd-lone embedded device (SED): SED outlines the security requirements for n utomtion device tht is not contined in security zone nd for which full-blown security perimeter would not be cost efficient, eg, pole-top Intelligent Electronic Device (IED). Portble engineering computer (PEC): PEC detils how control system cn be protected ginst threts originting from portble computers tht my be moved bck nd forth between public networks nd the control system Portble storge medi (PSM): An utomtion system my be exposed to mlwre infections through storge medi like memory sticks or CDs. PSM explins how this cn be prevented. Automtion cell interconnect (ACI): ACI outlines the security rchitecture required for protected communiction between utomtion cells within control network. Upper Level Control center (ULCC): Prt of control network is connected to opertor worksttions, historins, ppliction servers nd connectivity servers. ULCC dtils network oriented security mechnisms specific to this prt. Lower Level Control center (LLCC): LLCC outlines network oriented security mechnisms in the prt of the control network connected to controllers nd PLCs. Field Control (FC): FC outlines network oriented security mechnisms in the prt of the control network connected to field devices. Control network host (CNH): CNH explins how utomtion worksttions nd servers for opertions nd engineering cn be secured ginst ttcks from insiders nd mlwre, for exmple. Automtion field device (AFD): AFD explins how field devices nd embedded controllers cn be secured. Ech module describes: use cse to which it pplies; threts tht re ddressed or not ddressed; the underlying ssumptions; the requirements; nd the prty (utomtion vendor, system integrtor, or plnt owner) responsible for meeting ech of the requirements. The core prt of ech module is the requirement set nd it contins between 20 nd 50 requirements, depending on the module. Ech requirement consists of normtive sttement, optionlly including scle-down lterntives, rtionle, nd in mny cses one or more ppliction notes. The rtionle is n essentil element, s it enbles the reder to mke n informed decision bout the importnce nd pplicbility of the requirement. The ppliction notes provide technicl guidnce on how the requirement could be relized. The IEC stndrd describes the wht nd why of the security rchitecture, but the how is specific to n individul site nd system nd is therefore left to the engineering judgment of the plnt experts nd the utomtion/it integrtor. Summry With the ongoing stndrdiztion efforts for Industril IT security processes nd rchitectures, specific to control nd utomtion systems, plnts mngers now hve rel chnce to 4/

6 The corporte technicl journl 1 / 2005 The corporte technicl journl 2 / 2005 The corporte technicl journl 3 / 2005 The corporte technicl journl 4 / 2005 Industril informtion system security Tutoril INDEX 2005 implement stte-of-the-rt nd costefficient informtion system security. The stndrdiztion inititives described bove hve so fr been chrcterized by generl recognition tht prgmtic solutions re needed to serve the industry, s well s very constructive collbortion mong utomtion vendors nd end users so tht this objective is chieved. is mjor contributor to vrious security stndrdiztion inititives. The compny offers products nd solutions tht re complint to evolving stndrds, nd provides ssistnce to its customers in pplying these stndrds to specific plnts nd sites. Mrtin Nedele Switzerlnd, Corporte Reserch mrtin.nedele@ch.bb.com Pioneering spirits A revolution in high dc current mesurement pge 6 Tem-mtes: MultiMove functionlity herlds new er in robot pplictions pge 26 Best innovtions 2004 pge 43 1/2005: Pioneering spirits A revolution in high dc current mesurement 6 Form nd Function 11 The perfect cst 14 DryQ Dry nd silent 17 PSGurd contributes to UCTE grid reconnection 22 Tem-mtes 26 Instnt comfort 30 Stisfction gurnteed 33 Pnormic projection 37 Digging into the rchives 40 Best innovtions Don t touch: s new pssive voltge indictor 52 Wireless Ad-hoc networks 54 Autonomic computing 55 Sustinbility Sustinbility is n essentil prt of s business pge 6 Beting the greenhouse effect with emissions trding pge 14 Sfety mngement in process industries the pproch pge 51 3/2005: Sustinbility Sustinbility in 6 Helthy, sfe nd productive 10 Emissions trding 14 SF 6 technology 20 Energy efficiency 22 Networking 28 Not on my wtch 31 Lener, fitter, smrter 36 HVDC 42 Sfety mngement in process industries: Prt 1 47 Prt 2 51 Energy efficiency Green shipping 54 The turbochrger 58 Boosting supply 63 Cut nd dry 66 Unplugged but connected Prt Industril informtion system security Prt 2 74 Dick Oyen US, Corporte Reserch dick.oyen@us.bb.com References [1] Nedele, M.: Stndrdizing Industril IT Security A First Look t the IEC pproch, 10th IEEE Interntionl Conference on Emerging Technologies nd Fctory Automtion (ETFA 05), Ctni, September 2005 [2] Dzung, D., Nedele, M., von Hoff, T., Crevtin, M.: Security for industril communiction systems, Proceedings of the IEEE, Vol. 93 (6), June 2005, pp [3] ISA SP99: Security Technologies for Mnufcturing nd Control Systems, Instrumenttion, Systems, nd Automtion Society, ISA-TR , Mrch 2004, [4] ISA SP99: Integrting Electronic Security into the Mnufcturing nd Control Systems Environment, Instrumenttion, Systems, nd Automtion Society, ISA-TR , April 2004, [5] ISO: Informtion technology Code of prctice for informtion security mngement, ISO/IEC 17799:2000, December 2000, [6] British Stndrds Orgniztion: Informtion security mngement systems Specifiction with guidnce for use, BS :2002, September 2002 [7] Chemicl Industry Dt Exchnge (CiDX): Guidnce for Addressing Cybersecurity in the Chemicl Sector, Version 2.0, December University nd industry coopertion Turning Europe into dynmic nd competitive knowledge-bsed economy pge 6 The importnce of working together with industry: university viewpoints pge 22 Looking hed: The future of power system control pge 35 2/2005: University nd industry coopertion Closing the gp 6 Welcome to our world 10 The MIT experience 14 Leders of tomorrow 18 University co-opertion 22 City of lerning 29 Let s work together 32 Looking hed 35 Vlue for money 39 Root cuse 44 Predictble ssembly 49 Hot stuff 55 Grids united 59 Simulted relity 62 Industril informtion system security Prt 1 66 Innovtion the DNA of business Best innovtions 2005 pge 15 Power lines tht don t spoil the lndscpe pge 25 The mgnetic stbilizer tht sves on zinc pge 60 4/2005: Innovtion The DNA of business Looking bck to look forwrd 6 Fruits of innovtion 9 Best innovtions Grid flexibility 21 Light nd invisible 25 Convergence in the control room 30 Powerful nd stble 33 High voltge ssembly 36 Breking to the front 39 Ironing out resonnces 42 Age is no issue 47 The process copper 51 Control loops: plesure or plgue? 55 Stbilizing influence 60 Live(ly) neighbours 64 Unplugged but connected Prt 2 65 Industril informtion system security Prt /2005

Corporate Compliance vs. Enterprise-Wide Risk Management

Corporate Compliance vs. Enterprise-Wide Risk Management Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Electrical Engineering

Electrical Engineering Electricl Engineering R Wherever Energy Flows or Goods re Produced Our Electricl Engineering Group provides electricl design nd consulting services to electric & gs utilities, oil & gs pipelines, refineries,

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

Recognition Scheme Forensic Science Content Within Educational Programmes

Recognition Scheme Forensic Science Content Within Educational Programmes Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems

More information

The 8 Essential Layers of Small-Business IT Security

The 8 Essential Layers of Small-Business IT Security The 8 Essentil Lyers of Smll-Business IT Security While there is no technology tht cn gurntee your network is truly impenetrble, you cn significntly reduce your risk by deploying multiple lyers of defense.

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

File Storage Guidelines Intended Usage

File Storage Guidelines Intended Usage Storge 1 Google Cloud 2 Other cloud storge Exmple or Box, Dropbox, Crbonite, idrive File Storge Guidelines Usge Fculty nd student collbortion Specil use cses. When non-lcc employee nd students need ccess

More information

Protection of Critical Information Infrastructure in Korea

Protection of Critical Information Infrastructure in Korea Protection of Criticl Informtion Infrstructure in Kore Kim, Woonyon 2005. 10 Ntionl Security Reserch Institute Contents Ntionl Cyber Security Mngement System Criticl Informtion Infrstructure (CII) Mngement

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory Implementtion Evlution Modeling of Selecting ERP Softwre Bsed on Fuzzy Theory Xukn Xu 1, Ydong Jing 1 nd Zheng Shi 2 1 Informtion Mngement Deprtment, Chngzhou Cmpus, Hohi University, Chngzhou 213022, Jingsu,

More information

Total Data Protection for Sensitive Data Wherever It May Flow

Total Data Protection for Sensitive Data Wherever It May Flow Totl Dt Protection for Sensitive Dt Wherever It My Flow PGP Corportion nd Protegrity protect sensitive dt throughout its lifecycle, while enforcing nd verifying policy requirements for complince. Protegrity

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Blackbaud The Raiser s Edge

Blackbaud The Raiser s Edge Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

E-Commerce Comparison

E-Commerce Comparison www.syroxemedi.co.uk E-Commerce Comprison We pride ourselves in creting innovtive inspired websites tht re designed to sell. Developed over mny yers, our solutions re robust nd relible in opertion, flexible

More information

Innovative and applied research on big data platforms of smart heritage

Innovative and applied research on big data platforms of smart heritage Innovtive nd pplied reserch on big dt pltforms of smrt heritge J. Qiu, J. Li, H. Sun * qiujie@thid.cn lijijun@thid.cn sunhuijio@thid.cn KEY WORDS: Smrt heritge, Big dt, Explntion ABSTRACT: Big dt hs huge

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

Current Topics. Implications for Compliance Organizations. Presentation to the IIB. October, 2015

Current Topics. Implications for Compliance Organizations. Presentation to the IIB. October, 2015 Current Topics Implictions for Complince Orgniztions Presenttion to the IIB October, 2015 This presenttion contins generl informtion only nd Deloitte is not, by mens of this presenttion, rendering ccounting,

More information

Psychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013

Psychological health and safety in the workplace Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 Psychologicl helth nd sfety in the workplce Prevention, CAN/CSA-Z1003-13/BNQ 9700-803/2013 promotion, nd guidnce to stged implementtion This smple udit tool is n nnex of the Ntionl Stndrd of Cnd on Psychologicl

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Application Bundles & Data Plans

Application Bundles & Data Plans Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help

More information

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Chromebook Parent/Student Information

Chromebook Parent/Student Information Chromebook Prent/Student Informtion 1 Receiving Your Chromebook Student Distribution Students will receive their Chromebooks nd cses during school. Students nd prents must sign the School City of Hmmond

More information

Facilitating Rapid Analysis and Decision Making in the Analytical Lab.

Facilitating Rapid Analysis and Decision Making in the Analytical Lab. Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

Assessing authentically in the Graduate Diploma of Education

Assessing authentically in the Graduate Diploma of Education Assessing uthenticlly in the Grdute Diplom of Eduction Dr Mree DinnThompson Dr Ruth Hickey Dr Michelle Lsen WIL Seminr JCU Nov 12 2009 Key ides plnning process tht embeds uthentic ssessment, workintegrted

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

In addition, the following elements form an integral part of the Agency strike prevention plan:

In addition, the following elements form an integral part of the Agency strike prevention plan: UNITED STTES DEPRTMENT OF GRICULTURE Wshington, DC 20250 Federl Grin Inspection Service FGIS Directive 4711.2 6/16/80 STRIKE PREVENTION ND STRIKE CONTINGENCY PLNS I PURPOSE This Instruction: Estlishes

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs TechAdvisory.org SME Reports sponsored by Cybernut Solutions provides outsourced IT support from welth of knowledgeble technicins nd system dministrtors certified

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2 Interntionl Journl of Engineering Reserch & Science (IJOER) ISSN [2395-6992] [Vol-2, Issue-1, Jnury- 2016] Qulity Evlution of Entrepreneur Eduction on Grdute Students Bsed on AHP-fuzzy Comprehensive Evlution

More information

STATE OF MONTANA Developomental Disabilities Program Comprehensive Evaluation Hi-Line Home Programs, Inc Adult Services

STATE OF MONTANA Developomental Disabilities Program Comprehensive Evaluation Hi-Line Home Programs, Inc Adult Services Dtes of Review: FY '09 Evluttor(s): S. Crpenter DESK REVIEW: Accredittion: Acredittion is no longer required by the stte contrct. Significnt Events from the Agency: Developomentl Disbilities Progrm Comprehensive

More information

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:

More information

QUESTIONNAIRE. 1. Your Name: 2. Age-group: Below 25 years 26-35 years. 3. Gender : Male Female. 4. Education : H.S.C or Below H.S.C.

QUESTIONNAIRE. 1. Your Name: 2. Age-group: Below 25 years 26-35 years. 3. Gender : Male Female. 4. Education : H.S.C or Below H.S.C. QUESTIONNAIRE A. PERSONAL DETAILS: 1. Your Nme: 2. Age-group: Below 25 yers 26-35 yers 36-45 yers Over 45 yers 3. Gender : Mle Femle 4. Eduction : H.S.C or Below H.S.C. Grdution Post-Grdution Any other

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Combined Liability Insurance. Information and Communication Technology Proposal form

Combined Liability Insurance. Information and Communication Technology Proposal form Comined Liility Insurnce Informtion nd Communiction Technology Proposl form Comined Liility Insurnce Informtion nd Communiction Technology - Proposl form This proposl form must e completed nd signed y

More information

INJURY MANAGEMENT & REHABILITATION

INJURY MANAGEMENT & REHABILITATION OBJECTIVES To estblish systemtic pproch to injury mngement nd rehbilittion throughout the City immeditely following work relted illness, injury nd disbility. To estblish tht it is the responsibility of

More information

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab. Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER

More information

Understanding Life Cycle Costs How a Northern Pump Saves You Money

Understanding Life Cycle Costs How a Northern Pump Saves You Money Understnding Life Cycle Costs How Nrn Pump Sves You Money Reference: Hydrulic Institute (www.s.g) Introduction Wht Life Cycle Cost (LCC) Clculting Totl LCC LCC Components Wht Life Cycle Cost Life Cycle

More information

According to Webster s, the

According to Webster s, the dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly

More information

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 -

San Mateo County ACCEL Adult-Education College and Career Educational Leadership AB 86 Adult Education Consortium Project Management Plan 24, 2014 - A Sn Mteo County ACCEL Adult-Eduction College nd Creer Eductionl Ledership AB 86 Adult Eduction Consortium Project Mngement Pln - Februry 24, 2014 - This project mngement pln presents ACCEL s process frmework

More information

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007

elearning platforms and consultation service at CU Presented by Judy Lo 31 August 2007 elerning pltforms nd consulttion service t CU Presented by Judy Lo 31 August 2007 Agend The elerning guidelines How elerning cn lower your work burden nd enhnce lerning? The elerning pltforms The elerning

More information

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology

More information

Balanced Scorecard. Linking Strategy to Actions. KPMG Swiss Practice Benchmarking Congress, Bürgenstock May 28 th, 1997, Roger Jaquet

Balanced Scorecard. Linking Strategy to Actions. KPMG Swiss Practice Benchmarking Congress, Bürgenstock May 28 th, 1997, Roger Jaquet Blnced Scorecrd Linking Strtegy to Actions KPMG Swiss Prctice Benchmrking Congress, Bürgenstock My 28 th, 1997, Roger Jquet Contents ❶ Objectives 1 ❶ Wht s the historicl bckground of the BSC? 2-4 ❶ BSC

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

How To Be A Successful Mobile Ppliction And Regression Tester

How To Be A Successful Mobile Ppliction And Regression Tester July/August 2009 Volume 3 SOFTWARE This issue of Softwre Testing delves into mobile ppliction nd regression testing. HOTSPOTS 1 Mobile pplictions nd regression testing p WANT JOB SECURITY? This issue of

More information

Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team

Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team Numercy cross the Curriculum in Key Stges 3 nd 4 Helpful dvice nd suggested resources from the Leicestershire Secondry Mthemtics Tem 1 Contents pge The development of whole school policy 3 A definition

More information

FortiClient (Mac OS X) Release Notes VERSION 5.0.10

FortiClient (Mac OS X) Release Notes VERSION 5.0.10 FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

Your Image through Client Reporting

Your Image through Client Reporting Your Imge through Client Reporting Prtnerships: Logits is n escrow gent, prtner of Softwre editors nd users, to design, control nd preserve ccurte deposits of sources. Contct: For ny dditionl informtion

More information

FDIC Study of Bank Overdraft Programs

FDIC Study of Bank Overdraft Programs FDIC Study of Bnk Overdrft Progrms Federl Deposit Insurnce Corportion November 2008 Executive Summry In 2006, the Federl Deposit Insurnce Corportion (FDIC) initited two-prt study to gther empiricl dt on

More information

How To Find Out What A Librry Is Like

How To Find Out What A Librry Is Like Survey of Web Developers in Acdemic Librries by Ruth Sr Connell Avilble online 8 Februry 2008 A survey ws sent to librry Web designers from rndomly selected institutions to determine the bckground, tools,

More information

ASG Techniques of Adaptivity

ASG Techniques of Adaptivity ASG Techniques of Adptivity Hrld Meyer nd Dominik Kuropk nd Peter Tröger Hsso-Plttner-Institute for IT-Systems-Engineering t the University of Potsdm Prof.-Dr.-Helmert-Strsse 2-3, 14482 Potsdm, Germny

More information

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF)

ENHANCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: AN APPLICATION OF THE ENHANCED CUSTOMER EXPERIENCE FRAMEWORK (ECEF) ENHNCING CUSTOMER EXPERIENCE THROUGH BUSINESS PROCESS IMPROVEMENT: N PPLICTION OF THE ENHNCED CUSTOMER EXPERIENCE FRMEWORK (ECEF) G.J. Both 1, P.S. Kruger 2 & M. de Vries 3 Deprtment of Industril nd Systems

More information

l,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- -

l,l:l.lf.gltf lqf 9!lf+f [egyllg.ncel Builiiing.Resilience to Cliirate Retated nazaros jenchi:66;- - rrsrgfqmrreremrers I Publiction dte: My 2g,Z01S Pilol Progrm tof g_llpqtg Resilience: Building Resilience to Climte Retted Hzrds-AMtS (ppcr: BRCH-AM S) Project ld No.: P1275Ao Vj.nplry of Agriculturl Development

More information

Data quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors

Data quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors Journl of Technology Reserch Dt qulity issues for ccounting informtion systems implementtion: Systems, stkeholders, nd orgniztionl fctors ABSTRACT Hongjing Xu Butler University Qulity informtion is one

More information

2001 Attachment Sequence No. 118

2001 Attachment Sequence No. 118 Form Deprtment of the Tresury Internl Revenue Service Importnt: Return of U.S. Persons With Respect to Certin Foreign Prtnerships Attch to your tx return. See seprte instructions. Informtion furnished

More information

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A Agend Who re we? Wht is Cloud Computing? Drivers nd Adoption Enbling Technologies Cloud Computing in Everydy Life Joe Wong Senior Development Mnger, ICS, IBM Kit Yeung Advisory Softwre Engineer, ICS, IBM

More information

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, o_c 20301-6000

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, o_c 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, o_c 20301-6000 CHIEF INFORMATION OFFICER December 9. 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

PS/GO COMM #1 July 18,2013 MEMORANDUM. Update: Public Safety System Modernization. (1) Fire Station Alerting System (FSA) July 16,2013

PS/GO COMM #1 July 18,2013 MEMORANDUM. Update: Public Safety System Modernization. (1) Fire Station Alerting System (FSA) July 16,2013 PS/GO COMM #1 July 18,213 MEMORANDUM July 16,213 TO: Public Sfety Committee Government Opertions nd Fiscl Policy Committee, FROM: SUBJECT: Updte: Public Sfety System Moderniztion Expectedfor this session:

More information

Department of Electrical and Electronic Engineering Department of Physical Electronics. 1. Program Outline

Department of Electrical and Electronic Engineering Department of Physical Electronics. 1. Program Outline Deprtment of Electricl nd Electronic Engineering Deprtment of Physicl Electronics 1. Progrm Outline Deprtment of Electricl nd Electronic Engineering nd Deprtment of Physicl Electronics collborte closely

More information

Active & Retiree Plan: Trustees of the Milwaukee Roofers Health Fund Coverage Period: 06/01/2015-05/31/2016 Summary of Benefits and Coverage:

Active & Retiree Plan: Trustees of the Milwaukee Roofers Health Fund Coverage Period: 06/01/2015-05/31/2016 Summary of Benefits and Coverage: Summry of Benefits nd Coverge: Wht this Pln Covers & Wht it Costs Coverge for: Single & Fmily Pln Type: NPOS This is only summry. If you wnt more detil bout your coverge nd costs, you cn get the complete

More information

Improving Library Users' Perceived Quality, Satisfaction and Loyalty: An Integrated Measurement and Management System

Improving Library Users' Perceived Quality, Satisfaction and Loyalty: An Integrated Measurement and Management System Improving Librry Users' Perceived Qulity, Stisfction nd Loylty: An Integrted Mesurement nd Mngement System by Anne Mrtensen nd Lrs Gr0nholdt This rticle describes the development nd ppliction of structurl

More information

Any opinions, findings, conclusions, or recommendations expressed in this publication do not necessarily reflect the views of FEMA.

Any opinions, findings, conclusions, or recommendations expressed in this publication do not necessarily reflect the views of FEMA. Any opinions, findings, conclusions, or recommendtions expressed in this publiction do not necessrily reflect views FEMA. Additionlly, neir FEMA or ny its employees mkes ny wrrntee, expressed or implied,

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information