OPINION PIECE. It s up to the customer to ensure security of the Cloud
|
|
- Ezra Charles
- 8 years ago
- Views:
Transcription
1 OPINION PIECE It up to the cutomer to enure ecurity of the Cloud
2 Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard 4 Privacy 4 Buine continuity 5 Application development 5 Identity 5 Virtualiation 5 Practice firt 5
3 Ye, Cloud computing i likely to create ignificant aving for organiation that chooe to buy oftware, infratructure, or a platform from external vendor on a pay a you go bai. By tapping into the Cloud they can gain fat acce to bet-of-breed buine application or dratically boot their infratructure reource, at negligible cot. So, the Cloud i well worth exploiting. And, indeed, many organiation are. According to an IDG urvey of 100 ecurity executive around the world, upward of 30% of large buinee have ome enterprie application in the Cloud. More than a third of buinee have increaed their ue of Cloud computing in the pat two year. Interetingly, however, two-third of the urveyed organiation do not have a ecurity trategy for Cloud computing. Therein lie the major problem with Cloud computing, becaue ecurity of the Cloud i actually more complex and there are more area of rik than i the cae with traditional IT et-up. Of the rik area, the bigget i that, in the Cloud, the cutomer organiation i not in control of where it data reide, how it i proceed, how it i detroyed, or who ha acce to it. There are way to mitigate that rik, of coure the primary one being to work with a ytem integrator who can manage all the third party ytem and provider on an organiation behalf. However, there an additional twit. Even though the cutomer organiation i not in control of either the technology in the Cloud or the management of that technology, the onu for mitigation of rik till fall on the cutomer organiation. 1
4 Don t outource what you don t undertand Why? Well, for one thing, Cloud provider are not likely to change their ecurity environment on requet. So the cutomer organiation need to undertand it own ecurity requirement up front in order to elect the provider whoe environment bet uit it need. The implication of that i, of coure, that the cutomer organiation need to do an aement of it inherent rik, paint a cenario baed on the required organiational change a well a it appetite for managing additional rik for the ake of buine benefit - and then ue the reult to make ure that it own, internal, ecurity i up to cratch. At the ame time, the aement will how what ecurity the vendor will need to have in place in order to keep the cutomer data afe. Then it a quetion of mapping the organiation ecurity need to vendor capabilitie. But the reponibility for ecurity doen t top there. There are no pecific Cloud computing tandard. IBM, Cico, SAP, EMC and everal other leading technology companie announced in March 2009 that they had created an Open Cloud Manifeto, calling for more conitent ecurity and monitoring of Cloud ervice. But the fact that Amazon.com, Google, and Saleforce.com have not agreed to take part ugget that broad indutry conenu may be ome way off. Microoft alo abtained, charging that IBM wa forcing it agenda. By contrat, the Cloud Security Alliance, whoe aim i to promote the ue of bet practice for providing ecurity aurance within Cloud computing, and provide education on the ue of Cloud computing to help ecure all other form of computing, ha made ome tride in documenting the iue and ome olution. However, the lack of generally accepted tandard mean that cutomer organiation cannot rely on their provider to achieve a baic minimum of ecurity or on an indutry body to regulate Cloud ecurity. That mean that organiation will have to do their own policing of their vendor ecurity. According to an IDG urvey of 100 ecurity executive around the world, upward of 30% of large buinee have ome enterprie application in the Cloud. More than a third of buinee have increaed their ue of Cloud computing in the pat two year. The checklit It a little tougher than one might think, becaue there are, we believe, no fewer than fifteen dicipline, in three overarching group, that have to be covered. The firt grouping cover governance, rik, and compliance and include legal and e-dicovery, compliance and audit, buine continuity and diater recovery, and incident repone, notification, and remediation. The econd grouping addree architecture and operation and incorporate ecurity architecture, information lifecycle management, portability and interoperability, datacentre operation, torage, and virtualiation. Group three addree identity and acce management through key management and encryption, and application ecurity. 2 Mot organiation truggle to acquire and then keep in-houe the broad kill to deal with thee inide their own organiation, let alone at an external provider location.
5 In addition, each of the area i influenced by the characteritic that differentiate Cloud computing from traditional computing model. Thee include abtraction of infratructure, reource democratiation, ervice oriented architecture, elaticity / dynamim of reource, and a utility model of conumption and allocation. The ituation i complicated till further by the fact that the Cloud offer three different ervice delivery model: Infratructure a a Service (IaaS), Platform a a Service (PaaS), and Software a a Service (SaaS) a well a four type of deployment and conumption: Private, public, managed, and hybrid. It i critical to be aware of the tradeoff between extenibility (openne) and ecurity reponibility within the three ervice delivery model. SaaS (Software a a Service) provide leat extenibility and greatet ecurity reponibility taken on by the Cloud provider, with the cutomer ecurity department loing control of: Phyical and logical network barrier Endpoint retriction and management Non-paword authentication Fine grained credential quality control Paword reet procee Real time anomaly detection Event logging By contrat, IaaS (Infratructure a a Service) offer the greatet extenibility with leat amount of ecurity reponibility taken on by the Cloud provider. PaaS (Platform a a Service) lie omewhere in the middle, with extenibility and ecurity feature which mut be leveraged by the cutomer. SaaS and PaaS provider all trumpet the robutne of their ytem, often claiming that ecurity in the Cloud i tighter than in mot enterprie. But the imple fact i that every ecurity ytem that ha ever been breached wa once thought infallible. For example, Google Gmail ervice collaped in Europe in February In 2007, a Saleforce.com taff member wa duped by a phihing attack into revealing paword. And, recently, Amazon EC2 ervice ha been the target of a zombie attack. 3
6 Step toward control The place to tart i with the baic. Getting into technical detail too early will imply obfucate the real iue. In it June 2009 report, Aeing the ecurity rik of Cloud computing, Gartner ay that mart cutomer will ak tough quetion and conider getting a ecurity aement from a neutral third party before committing to a Cloud vendor. Due diligence Abolutely. Perform an extenive, in-depth due diligence on the Cloud provider you would like to have. Contract A i frequently the cae with diruptive technologie, the law lag behind the technology development for Cloud computing. Alo, there the quetion of juridiction. Data may be ecure in one country but not in another. In many cae, uer of Cloud ervice don t know where their information i held. So, organiation need to remember that contract are their key legal enforcement mechanim and mut, therefore, be negotiable to reflect the organiation unique need a well a the dynamic nature of Cloud computing. Plan in the contract negotiation for both an expected and an unexpected termination of the relationhip and for an orderly return or ecure dipoal of aet. In it June 2009 report, Aeing the ecurity rik of Cloud computing, Gartner ay that mart cutomer will ak tough quetion and conider getting a ecurity aement from a neutral third party before committing to a Cloud vendor. E-dicovery Then there the irony of the fact that while Cloud provider are cutodian of primary data aet, their cutomer, who own the data aet, are legally reponible for preerving the data and making it available in legal proceeding (e-dicovery). It i eential, therefore, that cutomer and Cloud provider have a clear mutual undertanding of each other role and reponibilitie related to e-dicovery, including uch activitie a litigation hold, dicovery earche, and the proviion of expert tetimony. Standard In the abence of ecurity tandard pecific to the Cloud, organiation hould enure that their provider comply with, at leat, the SAS70 auditing tandard and ISO27001, which i deigned to provide the foundation for third party audit and implement OECD principle governing ecurity of information and network ytem. In particular, cutomer hould claify data and ytem to undertand compliance requirement. They alo need to undertand data location - pecifically, the copie of data that are made and how they are controlled. And, they mut maintain a right to audit on demand, a regulatory mandate and buine need can change extremely rapidly. Privacy It crucial that the cutomer organiation undertand the privacy retriction inherent in data entruted to it. There i the poibility that the Cloud provider may not be permitted to hold the data without very pecific partner deignation. 4 And, when it come to privacy, it may be eaier for the Cloud provider to demontrate data retention but not data detruction.
7 Buine continuity In term of buine continuity and diater recovery, the technology architecture infratructure of Cloud provider will naturally differ. But they mut all be able to demontrate comprehenive compartmentaliation of ytem, network, management, proviioning, and peronnel. And, of coure, the cutomer own buine continuity plan hould addre the impact and limitation of Cloud computing. Application development For application ecurity, remember that IaaS, PaaS, and SaaS create differing trut boundarie for the oftware development lifecycle and they mut be accounted for during the development, teting, and production deployment of application. Identity Key to managing identitie at Cloud provider i having a robut federated identity management architecture and trategy internal to the organiation. Init that the vendor operate according to federation-enabling tandard uch a SAML, WS-Federation, and Liberty ID-FF. Conider implementing Single Sign-on (SSO) for internal application and then leveraging thi architecture for Cloud application. In addition, Cloud-baed Identity a a Service provider may be a ueful tool for outourcing ome identity management capabilitie and facilitating federated identity management with Cloud provider. Virtualiation Finally, although organiation hould augment virtualied operating ytem with third party ecurity technology to provide layered ecurity control and reduce dependency on the platform provider alone, virtualiation doe offer many ecurity advantage - uch a creating iolated environment and better defined memory pace - which can minimie application intability and implify recovery. Practice firt Perhap the mot baic Cloud ecurity of all i to opt for a private Cloud firt virtualiing the organiation internal operation and uing internal and therefore already authoried peronnel in order to etablih a working Cloud methodology that can then be extrapolated to a public Cloud if and when that hould become neceary. 5
8 Regional Head Office Contact Detail America One Penn Plaza Suite 1600 New York, NY Tel Fax Aia* 6 Temaek Boulevard, #26-01/ 05 Suntec Tower Four Singapore Tel Fax Autralia Harrington Street The Rock, NSW 2000 Autralia Tel +61 (0) Fax +61 (0) Europe Dimenion Data Houe Building 2, Waterfront Buine Park Fleet Road, Fleet Hamphire GU51 3QT United Kingdom Tel +44(0) Fax +44(0) Middle Eat & Africa The Campu 57 Sloane Street Bryanton Sandton, 2191 South Africa Tel +27 (0) Fax +27 (0) *trading a Datacraft Aia Ltd 6
Securing The Cloud With Confidence. Opinion Piece
Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery
More informationSHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationCASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationProject Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationINSIDE REPUTATION BULLETIN
email@inidetory.com.au www.inidetory.com.au +61 (2) 9299 9979 The reputational impact of outourcing overea The global financial crii ha reulted in extra preure on Autralian buinee to tighten their belt.
More informationFour Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations
Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open
More informationRISK MANAGEMENT POLICY
RISK MANAGEMENT POLICY The practice of foreign exchange (FX) rik management i an area thrut into the potlight due to the market volatility that ha prevailed for ome time. A a conequence, many corporation
More informationHow Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal
How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing
More informationLaureate Network Products & Services Copyright 2013 Laureate Education, Inc.
Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate
More informationnaifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS
naifa Member: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS National Aociation of Inurance and Financial Advior Serving America Neigborhood for Over 120 Year Since 1890, NAIFA ha worked to afeguard the
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationProducts and Services
Product and Service With client ranging from mall buinee to Fortune 500 firm, GIS ha vat experience undertanding and delivering on the unique need of a wide range of client. By providing uperior product
More informationREDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
More informationChange Management Plan Blackboard Help Course 24/7
MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen
More informationAPEC Environmental Goods and Services Work Program
APEC Environmental Good and Service In Sydney in 2007 APEC Leader committed, through wide-ranging and ambitiou action, a et out in the Sydney Action Agenda, to enuring the energy need of the economie whilt
More informationAll IT Roads Lead to Data Center Infrastructure Software Charting a Strategic Journey Focused on the Final Destination Delivering Business Value
COVER STORY By Mark L.S. Mullin and Patrick E. Spencer All IT Road Lead to Data Center Infratructure Software Charting a Strategic Journey Focued on the Final Detination Delivering Buine Value T he aying
More informationHow To Prepare For A Mallpox Outbreak
Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged
More informationA Review On Software Testing In SDlC And Testing Tools
www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,
More informationBio-Plex Analysis Software
Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware
More informationMARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Systems)
Guide for Marine Health, Safety, Quality and vironmental Management GUIDE FOR MARINE HEALTH, SAFETY, QUALITY, ENVIRONMENTAL AND ENERGY MANAGEMENT (The ABS Guide for Marine Management Sytem) APRIL 2012
More informationSoftware Engineering Management: strategic choices in a new decade
Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk
More informationLicense & SW Asset Management at CES Design Services
Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More informationRO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds
!111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationSubmission to the Network Rail s Long Term Planning Process London and South East Market Study
Submiion to the Network Rail Long Term Planning Proce London and South Eat Market Study Introduction Thi i the repone of London Luton Airport to Network Rail Long Term Planning Proce (LTPP) mot pecifically
More informationGrowth and Sustainability of Managed Security Services Networks: An Economic Perspective
Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,
More informationGet Here Jeffrey M. Kurtz Client Feedback Evaluation Implementation Extenion/Termination Solution Development Analyi Data Collection Problem Definition Entry & Contracting CORE to all Problem Solving Equilibrium
More informationGrowth and Sustainability of Managed Security Services Networks: An Economic Perspective
Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,
More informationStrategic Plan of the Codex Alimentarius Commission 2014-2019 1
Strategic Plan of the Codex Alimentariu Commiion 2014-2019 1 STRATEGIC PLAN OF THE CODEX ALIMENTARIUS COMMISSION 2014-2019 INTRODUCTION The Codex Alimentariu Commiion (CAC) wa etablihed by the Food and
More informationPediatric Nurse Practitioner Program Pediatric Clinical Nurse Specialist Program Dual Pediatric Nurse Practitioner / Clinical Nurse Specialist Program
Pediatric Nure Practitioner Program Pediatric Clinical Nure Specialit Program Dual Pediatric Nure Practitioner / Clinical Nure Specialit Program UCLA School of Nuring Overview: The Pediatric Nure Practitioner
More informationBrand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.
Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity
More informationwww.brindleytech.com Insurance Solutions
Inurance Solution Agenda 1 2 3 4 5 Buine Value Solution Overview Capabilitie Cutomer Succe Storie Inurance Product in Nut Shell Buine Value Cutomer Buine Value Achieved through Winure Increae Efficiency
More informationFree Enterprise, the Economy and Monetary Policy
Free Enterprie, the Economy and Monetary Policy free (fre) adj. not cont Free enterprie i the freedom of individual and buinee to power of another; at regulation. It enable individual and buinee to create,
More informationyour Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products
Conumer Guarantee Undertanding your Right Conumer Electronic Device, Home Appliance & Home Entertainment Product Voluntary Warranty Guide February 2014 JB Hi-Fi Group Pty Ltd (ABN 37 093 II4 286) The Autralian
More informationPekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T
Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping
More informationProfitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations
Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari
More informationSELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
More informationThe Cash Flow Statement: Problems with the Current Rules
A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention
More informationReturn on Investment and Effort Expenditure in the Software Development Environment
International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar
More information2. METHOD DATA COLLECTION
Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,
More informationIntegration of Independent Applications and EAI Systems using Service Oriented Enterprise Bus and Open System Application Development Standards
I.J. Information Technology and Computer Science, 2013, 07, 1-11 Publihed Online June 2013 in MECS (http://www.mec-pre.org/) DOI: 10.5815/ijitc.2013.07.01 Integration of Independent Application and EAI
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationTRID Technology Implementation
TRID Technology Implementation Jaime Koofky, Managing Attorney, Brady & Koofky PA Cecelia Raine, Co-Chair, Cloing Inight Adviory Board, RealEC Technologie Richard Triplett, CMB, Vice Preident, Director
More informationA Supply Chain Paradox
A Supply Chain Paradox Anon Li The Univerity of Auckland Department of ISOM, Level 4, OGGB, 12, Grafton Rd, Auckland, New Zealand Telephone: +649 3737599 ext. 83730 Fax: +649 3737430 Email: akt.li@auckland.ac.nz
More informationEVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN
International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationTHE CARD DESIGN BOOK A STEP-BY-STEP GUIDE TO CREATING DYNAMIC, EFFECTIVE AND SECURE ID CARDS BONUS SECTION: CARD DESIGN GALLERY.
THE CARD DESIGN ID BOOK A STEP-BY-STEP GUIDE TO CREATING DYNAMIC, EFFECTIVE AND SECURE ID CARDS BONUS SECTION: CARD DESIGN GALLERY Preented by INTRODUCTION CREATING ID CARDS HAS NEVER BEEN EASIER Welcome
More informationImagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006
ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal
More informationSOLID ORGAN PROGRAMS
Blue Ditinction Center for Tranplant Clinical Program Requirement for 2008/2009 Deignation To qualify a a Blue Ditinction Center for Tranplant (), each facility mut atify quality baed election criteria.
More informationDecoding Predictive Marketing AN INTRODUCTORY GUIDE
Decoding Predictive Marketing AN INTRODUCTORY GUIDE ContentING PAGE 3 Introduction to Predictive Marketing PAGE 10 Hidden Inight in CRM and Marketing Automation PAGE 13 Undertanding Predictive Model PAGE
More informationWarehouse Security System based on Embedded System
International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity
More informationPatient Satisfaction Tip Book Improving Patient Perceptions
Patient Satifaction Tip Book Improving Patient Perception How to Ue thi Tip Book 2 Acce and Availability Tip 2 Survey Quetion 1 2 Survey Quetion 2 4 Survey Quetion 3 5 Survey Quetion 4 6 Suggeted Reading
More informationVery special thanks to Wolfgang Gentzsch and Burak Yenier for making the UberCloud HPC Experiment possible.
Digital manufacturing technology and convenient acce to High Performance Computing (HPC) in indutry R&D are eential to increae the quality of our product and the competitivene of our companie. Progre can
More informationProduction Management II. Product Life-Cycle Management II
Production Management II - - Product Life-Cycle Management II Contact: Dipl.-Ing. Wolfgang Boo w.boo@wzl.rwth-aachen.de WZL 53B Raum 507 Tel.: 80-28 469 Objective of the Lecture: Overview of Product-Data-Management-Sytem
More information1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation
Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted
More informationControl Theory based Approach for the Improvement of Integrated Business Process Interoperability
www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development
More informationRequirements Engineering Databases: The Good, The Bad, and The Ugly
New England Databae Day (NEDBDay08) February 4, 2008 Requirement Engineering Databae: The Good, The Bad, and The Ugly Brian Berenbach Siemen Corporate Reearch brian.berenbach@iemen.com 1 Agenda Brief Introduction
More informationSPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :
S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,
More informationPlease read the information that follows before beginning. Incomplete applications will delay the review and approval process.
Certified Manager Certification Application Intruction Completing the Application Congratulation on chooing to purue the Certified Manager (CM ) certification. The application i the tarting point toward
More informationAchieving Quality Through Problem Solving and Process Improvement
Quality Aurance Methodology Refinement Serie Achieving Quality Through Problem Solving and Proce Improvement Second Edition By Lynne Miller Franco Jeanne Newman Gaël Murphy Elizabeth Mariani Quality Aurance
More informationMcAfee Total Protection
McAfee Total Protection Reduce the comlexity and cot of managing ecurity Protect what you value. 06 0 o t 4-- N #4 O VERSI 8 07020 McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054 888.847.8766 www.mcafee.com
More informationBi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationChapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS
Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning
More informationSupport Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.
The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem
More informationQUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES
Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,
More informationDevelopment Progress
H T U SO CA'S I R F A : Y R STO ial c o ca i r f A South ytem: e g ity ecur ing covera ing d it Expan t and lim lity a n u a r q g e f n o ni i e n increa orga ny M nke n-za e g a eth ca H Jei harle M
More informationTRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
More informationUniversidad de Colima Dirección General de Relaciones Internacionales y Cooperación Académica. List of courses taught in English 2016.
Univeridad de Colima Dirección General de Relacione Internacionale y Cooperación Académica. Lit of coure taught in Englih 2016. SCHOOL OF TOURISM. Bachelor in Tourim Management Semeter January - July 2016.
More informationDelivering the Next Generation of Satellite and Terrestrial Communications
Delivering the Next Generation of Satellite and Terretrial Communication Editor Letter Developing new technology i a daunting and neceary tak if companie are to tay competitive in today global communication
More informationMBA 570x Homework 1 Due 9/24/2014 Solution
MA 570x Homework 1 Due 9/24/2014 olution Individual work: 1. Quetion related to Chapter 11, T Why do you think i a fund of fund market for hedge fund, but not for mutual fund? Anwer: Invetor can inexpenively
More informationFinal Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code. Full-time. Length of Programme. Queen s University Belfast
Date of Reviion Date of Previou Reviion Programme Specification (2014-15) A programme pecification i required for any programme on which a tudent may be regitered. All programme of the Univerity are ubject
More informationUNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA
ISSN: 2222990 UNDERSTANDING SCHOOL LEADERSHIP AND MANAGEMENT IN CONTEMPORARY NIGERIA Autin N. Noike The Granada Management Intitute, GranadaSpain Email: Autin_dac@yahoo.com Nkaiobi S. Oguzor ederal College
More informationMobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationApplications of Risk Analysis in Border Security Niyazi Onur Bakir, University of Southern California nbakir@usc.edu
Application of Rik Analyi in Border Security Niyazi Onur Bakir, Univerity of Southern California nbakir@uc.edu 1. Overview... 1. Reearch Accomplihment....1. Security of Incoming Truck to U.S. Southwetern
More informationThank you for attending the MDM for the Enterprise Seminar Series!
Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationSenior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow
Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationTHE EDITORIAL. STRIVE Volume 3 Issue 2 March 2014. Editorial. Book Review. Industry Article
1 Editorial THE EDITORIAL Trying to manage a project without project management i like trying to play a football game without a game plan a rightly aid by K. Tate. Keeping thi in view, we have come up
More informationForest Lake Local Plan
1 Introduction Thi Local Plan contain pecific additional local planning requirement. Where it conflict with the requirement of the City Plan, thi Local Plan prevail. In uing thi Local Plan, reference hould
More informationTips For Success At Mercer
Tip For Succe At Mercer 2008-2009 A Do-It-Yourelf Guide to Effective Study Skill Produced by the Office of Student Affair Welcome to You may be a recent high chool graduate about to tart your very firt
More informationMANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *
MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More informationAll you need to know about becoming an owner-builder. Owner-builder. Application Kit and Information Statement
All you need to know about becoming an owner-builder Owner-builder Application Kit and Information Statement Note: o w n e r - b u i l d e r 3 a p p l i c a t i o n k i t Content Thinking of Building Your
More informationHow To Understand The Hort Term Power Market
Short-term allocation of ga network and ga-electricity input forecloure Miguel Vazquez a,, Michelle Hallack b a Economic Intitute (IE), Federal Univerity of Rio de Janeiro (UFRJ) b Economic Department,
More informationSGROI FINANCIAL. Contact us if you are interested in getting access to our new Client Portal
the SGROI FINANCIAL N E W S L E T T E R INVESTMENTS ANNUITIES ESTATE PLANNING IRA S 401K PLANS 403(b) PLANS ROLLOVERS INSURANCE Sgroi Financial New Client Portal Streamline Information Acce Volume 5 Number
More informationTHE ROLE OF IMPLEMENTATION TOTAL QUALITY MANAGEMENT SYSTEM ON PERFORMANCE IN SAIPA GROUP COMPANIES
THE ROLE OF IMPLEMENTATION TOTAL QUALITY MANAGEMENT SYSTEM ON PERFORMANCE IN SAIPA GROUP COMPANIES Hamid Reza Tabe *1, Hamid reza Rezaeekelidbari 2, Mehrdad Goudarzvand Chegini 3 *1.Department of Management,
More informationNo. 73,122 MODEL FORM OF VERDICT ITEMIZING PERSONAL INJURY DAMAGES (TORT REFORM ACT OF 1986, S 768.77 F.S. 1987)
CORRECTED OPINION No. 73,122 IN RE: STANDARD JURY INSTRUCTIONS (CIVIL CASES 88-2) [March 2, 19891 PER CURIAM. The Florida Supreme Court Committee on Standard Jury Intruction (Civil) ha recommended to thi
More informationCITY OF SAINT PAUL FUNDING & TECHNICAL RESOURCES FOR BUSINESSES
CITY OF SAINT PAUL FUNDING & TECHNICAL RESOURCES FOR BUSINESSES PROGRAM DESCRIPTION ELIGIBILITY CONTACT City of Saint Paul Community Development Block Grant (CDBG) Capital Improvement Program Budget (CIB)
More informationv = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t
Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement
More information