Information Technology Support for Open Source Intelligence Analysis & Production

Size: px
Start display at page:

Download "Information Technology Support for Open Source Intelligence Analysis & Production"

Transcription

1 Information Technology Support for Open Source Intelligence Analysis & Production Stephen J. Andriole Drexel University 3gI

2 Outline of Presentation * The Range of Information Technologies * The Underexploitation of Information Technology -- Especially for Open Source Analysis * Technologies with Special Promise * Investment Strategies 382-

3 The Range of Information Technologies omputerized Libraries * omputer-based Analytical Methodology * omputer-mediated onferencing * omputer-supported ooperative Work * Data Extraction & onversion Software * Expert Database Systems; Database Machines * Expert Inference-Making Systems * FAX, , Voice Mail, EDI, ISDN a MIS/DSS/EIS * Hypertext/Hypermedia * LANs, WANs * Optical Storage Technologies Multi-Processing Architectures * Expert Query Languages * AD, AM, ASE * Adaptive, Intelligent UI * Speech I/O * Biological Emulators... *Adapted from Straub & Wetherbe 393

4 The Underexploitation of IT * Long Neglect of Analysis Vs. ollection * Short on Analytical Process Modeling * Short on Exploitation of Open Sources * I&W Experiences ** UPI, FBIS ** NN * Synthesis * Short on OS Structure & Tendency Analysis * Limited Application of omputer-based Analytical Methods * Sub-Optimal Staffing & Training * The ult of the "Artist" Vs. the "Engineer" * Organizational onstraints to Horizontal & Vertical Analyses 3g9

5 Technologies with Special Promise * Low-Level Intelligent Inference-Making Systems * Hybrid, "ompetitive" alculators * Multimedia 3tg-

6 Low-Level Intelligent Inference-Making Systems * Bounded Vs. Unbounded Problems * Reallocation of Intelligence Analysis Tasks from Humans to omputer-based Systems * Rearrangement of Tasks According to Relative Strengths of Organic & Electronic Systems * Quasi- & Fully-Automated Inference Models * Fact, Knowledge Builders * "Anticipatory Modeling" * Open Source "Feeders" * Scenario Forward Generation, Play-Back, Play * Simple ase-based Reasoning... 38gt

7 Hybrid, "ompetitive" alculators * Simultaneous Use of Alternative Qualitative & Quantitative Methods in "Analytical Shoot-Outs" * Multiple alculations from Similar Data, Information & Knowledge Structures * Full Use of Methodological Spectrum * heck on Methodological Bias * Resource & onstraints Sensitive 3f1

8 \ I / ) ;:t r3l B; I zld- Z2

9 Multimedia * "The Interface is the System" * Form Over/& ontent? * Style Over/& Substance? * Feeling Good Vs. Performing Well * Useful Integration of Sound, Graphics, Video, Text in Flexible Search Structures * Inspection of Data, Information, Knowledge, Hypotheses and Inferences Visually & Interactively * Speed, Efficiency & ommunication: Bridging the Gap Among ollection, Analysis & Production * "Seeing" Threats, "Feeling" Opportunities: reative, Flexible Inspection of Multi-Form Data, Information & Knowledge... 38g

10 rs'. T-.] '.,,_ --. -t 4Z~lhW YhEYW~U i#4^.x - <n Lu rm Uw (1 I</ I k,agiftlm o i I o a3 E 8 * c), > O a' / / 9 z F 1,- a IiT ;VXIXP; = L. V t _ L- <n (r > o Z S ) c h 3 =91;PI~P~X G, _: «)2 (/., 1; 3E Z < N o >O s _ c I I I-, -. 4,7 ) - - o) c - - I- D cm) O D cm I a, o -- _Hr RE E5 ES gz Z ;W c wwassnp, I X to ac. ap 2cO. giac, O c.o.. N S E IZ 4b ( 4 Q I*- l- ^1 z S b Jo L ~. L~~N \. X aw a)~ b D 39 - O.. -»a 8-5 *- ) c2s s. a 5 u oc 'Q6 *»»» *z^t *> bew A,d w&> rz I 1 / z'., I Z -) Of \.1 -. < OO6 Ur) -. f <1 :_t g O ~ E 3 I If ys -' c I E O 25 I (3 Ik- cn. 3 -J 6. "~L_ 3qo

11 Investment Strategies * Redress the Investment Balance Between ollection & Analysis * From Baroque to Ikea * onscious Recruiting of IT & Methodologically Literate * Joint Ventures with Public ollection & Reporting Organizations * Try a Little, Buy a Little Approach to T&E * "OSIA" (Open Source Intelligence Agency) * Exploitation of Information Technology Via ommercial-off-the-shelf (OTS) Applications Software * Life as a Nike ommercial... 3fI

12 So What Do We Do? * Exploit the Actual apabilities of Information Technology *- Leapfrog the Stuff that Never Worked, Like Abductive/ Inductive Knowledge-Based Systems, Light Pens & Track Balls o- Run Like Hell from the Fads, Like Biological Emulators for Ultra-Real Time Intelligence Analysis & Production, omputer-supported ooperative Work & Biocybernetic Estimators * Launch an Intelligence Analysis & Production Requirements Analysis to Baseline What We Need & What is Technologically Feasible * Develop Metrics to Monitor & Measure Impact * Stop Hiring "Artists" & Go With More Hackers & yberpunks * Model, Invest in & Influence the Open Source World... 3qz

13 FIRST INTERNATIONAL SYMPOSIUM: NATIONAL SEURITY & NATIONAL OMPETITIVENESS: OPEN SOURE SOLUTIONS Proceedings, Volume II - Link Page Previous Information Technology Support for Open Source Intelligence Analysis & Production Next Privatization of Intelligence & Development of Human Intelligence Return to Electronic Index Page

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar Course Outline CISM - Certified Information Security Manager 22 Mar 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

A backward glance and a forward view

A backward glance and a forward view Arm Limited is a subsidiary of A backward glance and a forward view Ian Thornton, Head of Investor Relations Tokyo 18 May 2018 Arm update A Backward Glance: Progress in 2017 Financials Investments / hiring

More information

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: Operating System Security (Windows 2008 Server) COURSE NUMBER: CIST-0254 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE

More information

Advanced IT Risk, Security management and Cybercrime Prevention

Advanced IT Risk, Security management and Cybercrime Prevention Advanced IT Risk, Security management and Cybercrime Prevention Course Goal and Objectives Information technology has created a new category of criminality, as cybercrime offers hackers and other tech-savvy

More information

Global Voice Recognition Market for Smartphones

Global Voice Recognition Market for Smartphones Global Voice Recognition Market for Smartphones 2015-2019 Global Voice Recognition Market for Smartphones 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research

More information

Cognitive Principles and Reasoning Clusters in Multinomial Process Tree: A Case Study for Human Syllogistic Reasoning

Cognitive Principles and Reasoning Clusters in Multinomial Process Tree: A Case Study for Human Syllogistic Reasoning ognitive Principles and Reasoning lusters in Multinomial Process Tree: A ase Study for Human Syllogistic Reasoning Orianne Bargain Technische Universität Dresden April 11, 2018 Table of ontents Preliminaries

More information

CompTIA Project+ (2009 Edition) Certification Examination Objectives

CompTIA Project+ (2009 Edition) Certification Examination Objectives CompTIA Project+ (2009 Edition) Certification Examination Objectives DRAFT INTRODUCTION The Project + examination is designed for business professionals involved with projects. This exam will certify that

More information

CPSC 444 Project Milestone III: Prototyping & Experiment Design Feb 6, 2018

CPSC 444 Project Milestone III: Prototyping & Experiment Design Feb 6, 2018 CPSC 444 Project Milestone III: Prototyping & Experiment Design Feb 6, 2018 OVERVIEW... 2 SUMMARY OF MILESTONE III DELIVERABLES... 2 1. Blog Update #3 - Low-fidelity Prototyping & Cognitive Walkthrough,

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

customer welcome pack here to help you get started

customer welcome pack here to help you get started customer welcome pack here to help you get started Welcome to Browsealoud Congratulations and welcome to Browsealoud! By adding speech, reading and translation support to your site, your content is more

More information

Concepts of Usability. Usability Testing. Usability concept ISO/IS What is context? What is context? What is usability? How to measure it?

Concepts of Usability. Usability Testing. Usability concept ISO/IS What is context? What is context? What is usability? How to measure it? Concepts of Usability Usability Testing What is usability? How to measure it? Fang Chen ISO/IS 9241 Usability concept The extent to which a product can be used by specified users to achieve specified goals

More information

Secure VPNs for Enterprise Networks

Secure VPNs for Enterprise Networks Secure Virtual Private Networks for Enterprise February 1999 Secure VPNs for Enterprise Networks This document provides an overview of Virtual Private Network (VPN) concepts using the. Benefits of using

More information

SQ&SD IT ISOM DT ADB TCN

SQ&SD IT ISOM DT ADB TCN MSc in Information Systems ( See Sheet2 for a list of acronyms of courses ) Areas and topics Courses Core Courses (Modules, Subjects) ITHS ISOM DT ADB TCN SQ&SD IT DS KBS MS LEA PWP RMT Elective Courses

More information

At a Glance. Introducing Security Metrics

At a Glance. Introducing Security Metrics At a Glance PART I Introducing Security Metrics 1 What Is a Security Metric?... 3 2 Designing Effective Security Metrics... 25 3 Understanding Data... 55 Case Study 1: In Search of Enterprise Metrics...

More information

Chapter 08. Consideration of Internal Control in an Information Technology Environment. McGraw-Hill/Irwin

Chapter 08. Consideration of Internal Control in an Information Technology Environment. McGraw-Hill/Irwin Chapter 08 Consideration of Internal Control in an Information Technology Environment McGraw-Hill/Irwin Copyright 2012 by The McGraw-Hill Companies, Inc. All rights reserved. Nature of IT Based Systems

More information

Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting

Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting Integrated Consortium of Laboratory Networks (ICLN) Brief to the NPDN National Meeting January 30, 2007 1 Agenda ICLN Background Information Network Coordinating Group Accomplishments Responsible Federal

More information

Graduation Check Off Sheet, Electrical Engineering, Year (Class of 2022)

Graduation Check Off Sheet, Electrical Engineering, Year (Class of 2022) Graduation heck Off Sheet, Electrical, Year 2018-2019 (lass of 2022) Student: Advis: 1. Total credit hours 124 3. Overall GPA 2.0 2. Passing grade in all courses 4. Department GPA 2.0 Required ourses (enter

More information

LINUX Developers Conference, Cologne, 9/6/2002. M. Finkenzeller A. Kirstädter. Siemens AG, Corporate Technology Munich, Germany

LINUX Developers Conference, Cologne, 9/6/2002. M. Finkenzeller A. Kirstädter. Siemens AG, Corporate Technology Munich, Germany LINUX Developers Conference, Cologne, 9/6/2002 Voxilla Phone M. Finkenzeller A. Kirstädter Siemens AG, Corporate Technology Munich, Germany michael.finkenzeller@siemens.com Contents introduction Voice-over-IP

More information

An Evaluation of Autotuning Techniques for the Compiler Optimization Problems

An Evaluation of Autotuning Techniques for the Compiler Optimization Problems An Evaluation of Autotuning Techniques for the Compiler Optimization Problems Amir Hossein Ashouri, Gianluca Palermo and Cristina Silvano Politecnico di Milano, Milan, Italy {amirhossein.ashouri,ginaluca.palermo,cristina.silvano}@polimi.it

More information

VoIP Testing with IxChariot

VoIP Testing with IxChariot VoIP Testing with IxChariot Contents 1. VoIP Testing with IxChariot... 1 1.1 Key Facts... 1 2. Determine Voice Quality Deterioration with Increasing Application Traffic Load... 1 2.1 Objective and Setup...

More information

A Case for the 3 rd Radio. Robin Jellum / Director, Technical Marketing

A Case for the 3 rd Radio. Robin Jellum / Director, Technical Marketing A Case for the 3 rd Radio Robin Jellum / Director, Technical Marketing Increasing Demands on WiFi Networks Risk & Complexity Bandwidth Security Threats Devices Performance Users Resources Gap IT Team IT

More information

SCOPELINKS DIGITAL MARKETING AGENCY SIMPLICITY ISN T SIMPLE

SCOPELINKS DIGITAL MARKETING AGENCY SIMPLICITY ISN T SIMPLE S SCOPELINKS DIGITAL MARKETING AGENCY S SIMPLICITY ISN T SIMPLE ABOUT US ScopeLinks was founded in 2014 and has grown to be Egypt premier website design and online marketing company We are located in Egypt

More information

SUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J

SUGGESTED SOLUTION IPCC MAY 2017EXAM. Test Code - I M J SUGGESTED SOLUTION IPCC MAY 2017EXAM INFORMATION TECHNOLOGY Test Code - I M J 7 1 2 1 BRANCH - (MULTIPLE) (Date : 20.11.2016) Head Office : Shraddha, 3 rd Floor, Near Chinai College, Andheri (E), Mumbai

More information

Outline. Linear Programming (LP): Principles and Concepts. Need for Optimization to Get the Best Solution. Linear Programming

Outline. Linear Programming (LP): Principles and Concepts. Need for Optimization to Get the Best Solution. Linear Programming Outline Linear Programming (LP): Principles and oncepts Motivation enoît hachuat Key Geometric Interpretation McMaster University Department of hemical Engineering 3 LP Standard Form

More information

Importance of last mile interoperability

Importance of last mile interoperability 1st International Workshop on Community Networks and FTTH/P/x Importance of last mile interoperability Eric Lynskey October 16, 2003 Outline Conformance and interoperability Ethernet experiences Ethernet

More information

ISDN TEST EQUIPMENT ISDN. aurora Duet. Hand Held Testing for Primary & Basic Rate ISDN TREND COMMUNICATIONS

ISDN TEST EQUIPMENT ISDN. aurora Duet. Hand Held Testing for Primary & Basic Rate ISDN TREND COMMUNICATIONS ISDN TEST EQUIPMENT aurora Duet ISDN Hand Held Testing for Primary & Basic Rate ISDN TREND COMMUNICATIONS aurora Duet The aurora Duet has been designed to provide the ISDN engineer with the right tool

More information

Understanding Networking Fundamentals

Understanding Networking Fundamentals Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation

More information

Applying ISO/IEC Quality Model to Quality Requirements Engineering on Critical Software

Applying ISO/IEC Quality Model to Quality Requirements Engineering on Critical Software Applying ISO/IEC 9126-1 Quality Model to Quality Engineering on Critical Motoei AZUMA Department of Industrial and Management Systems Engineering School of Science and Engineering Waseda University azuma@azuma.mgmt.waseda.ac.jp

More information

Hybrid 2.0 In search of the holy grail

Hybrid 2.0 In search of the holy grail Hybrid 2.0 In search of the holy grail A Talk for OWASP BeNeLux by Roger Thornton Founder/CTO Fortify Software Inc 2008 All Right Reserved Fortify Software Inc. 2 Before we Begin: Expectations Objectives

More information

Course Outline. Department of Computing Science Faculty of Science. COMP 3450 Human Computer Interaction Design (3,1,0) Fall 2015

Course Outline. Department of Computing Science Faculty of Science. COMP 3450 Human Computer Interaction Design (3,1,0) Fall 2015 Course Outline Department of Computing Science Faculty of Science COMP 3450 Human Computer Interaction Design (3,1,0) Fall 2015 Instructor: Office: Phone/Voice Mail: E-Mail: Course Description Students

More information

Requirements and Design Overview

Requirements and Design Overview Requirements and Design Overview Robert B. France Colorado State University Robert B. France O-1 Why do we model? Enhance understanding and communication Provide structure for problem solving Furnish abstractions

More information

Human-Computer Interaction Design Studio

Human-Computer Interaction Design Studio stanford hci group / cs247 Design Human-Computer Interaction Design Studio Evaluate Prototype 6February 2012 http://cs247.stanford.edu Getting it right the first time is hard Need to make quick turns around

More information

Campus Network Design

Campus Network Design Design Principles Campus Network Design 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Design Principles Task in Network Design Plan phase

More information

Course Outline. Pearson Cisco: CCNA Routing and Switching (ICND ) Official Cert Guide. 28 Jun 2018

Course Outline. Pearson Cisco: CCNA Routing and Switching (ICND ) Official Cert Guide.  28 Jun 2018 Course Outline Pearson Cisco: CCNA Routing and Switching (ICND2 200-105) Official Cert Guide 28 Jun 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

I give you the opportunity to learn from my experience on how to work professionally as a,

I give you the opportunity to learn from my experience on how to work professionally as a, ABOUT ME Hi! My name is Irfan and I am a well experienced multimedia design professional for over 13 years of work experience working as a Communication Visual Designer with leading Gaming, Broadcasting

More information

Case Study Demand Center of Excellence for a Fortune 50 Company

Case Study Demand Center of Excellence for a Fortune 50 Company Deliverables Activities Case Study Demand Center of Excellence for a Fortune 50 Company edynamic closely partnered with a Fortune 50 Company, combining edynamic s expertise in strategy, planning and execution,

More information

ISACA Arizona May 2016 Chapter Meeting

ISACA Arizona May 2016 Chapter Meeting ISACA Arizona May 2016 Chapter Meeting Suzanne Farr / Carlos A. Villalba Agenda Introduction Preliminary questions CCM Preliminaries Definition Benefits Challenges Beyond Templates Questions 1 Background

More information

Business Driven Data Communications

Business Driven Data Communications Business Driven Data Communications Michael S. Gendron PEARSON Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal

More information

Interaction Design and Implementation for Multimodal Mobile Semantic Web Interfaces

Interaction Design and Implementation for Multimodal Mobile Semantic Web Interfaces HCI International, Beijing, China, 27th July 2007 Interaction Design and Implementation for Multimodal Mobile Semantic Web Interfaces Daniel Sonntag German Research Center for Artificial Intelligence 66123

More information

Changing the Economics of Lossless Full Packet Capture Enabling Real-time Visibility

Changing the Economics of Lossless Full Packet Capture Enabling Real-time Visibility Executive Summary: Changing the Economics of Lossless Full Packet Capture Enabling Real-time Visibility March 2017 All questions and enquiries regarding this white paper should be directed to: Dan Cybulski

More information

Avancier Methods (AM) Infrastructure technology architecture diagrams

Avancier Methods (AM) Infrastructure technology architecture diagrams Methods (AM) Infrastructure technology architecture diagrams Includes some ArchiMate diagrams, copyright The Open Group, All Rights Reserved. ArchiMate is a registered trademark of The Open Group. It is

More information

Deployment Scenarios

Deployment Scenarios This chapter describes and shows some typical deployment scenarios for the Cisco 860, Cisco 880, and Cisco 890 series Intergrated Services Routers (ISRs): About the, page 1 Enterprise Small Branch, page

More information

The Importance of Tracking Internal Communications HOW ORGANIZATIONS BENEFIT FROM ANALYTICS

The Importance of Tracking Internal  Communications HOW ORGANIZATIONS BENEFIT FROM  ANALYTICS The Importance of Tracking Internal Email Communications HOW ORGANIZATIONS BENEFIT FROM EMAIL ANALYTICS Why is it important to measure internal emails in large companies? Although internal communicators

More information

Lecture 13 Prototyping

Lecture 13 Prototyping Lecture 13 Prototyping Mark Woehrer CS 3053 - Human-Computer Interaction Computer Science Department Oklahoma University Spring 2007 [Taken from Stanford CS147 with permission] Learning Goals Understand

More information

Cisco Certified Design Associate. Course Outline. Cisco Certified Design Associate. 09 Oct

Cisco Certified Design Associate. Course Outline. Cisco Certified Design Associate. 09 Oct Course Outline Cisco Certified Design Associate 09 Oct 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

The Business of Security in the Cloud

The Business of Security in the Cloud The Business of Security in the Cloud Dr. Pamela Fusco Vice President Industry Solutions Solutionary Inc. CISSP, CISM, CHSIII, IAM, NSA/CSS Adjunct Faculty Promises Promises The promise of cloud computing

More information

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents

Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents Understanding Cybersecurity Talent Needs Findings From Surveys of Business Executives and College Presidents BHEF_Report_mk_050817_ms Acknowledgements This report is supported primarily by a grant from

More information

Deduplication of Hospital Data using Genetic Programming

Deduplication of Hospital Data using Genetic Programming Deduplication of Hospital Data using Genetic Programming P. Gujar Department of computer engineering Thakur college of engineering and Technology, Kandiwali, Maharashtra, India Priyanka Desai Department

More information

Chapter 5: Vulnerability Analysis

Chapter 5: Vulnerability Analysis Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we

More information

Internationally Recognised Courses Affordable Courses Job Guarantee

Internationally Recognised Courses Affordable Courses Job Guarantee Career prospects in Hardware & Networking courses in India. Nearly a decade ago, computer hardware and networking was not considered as a very lucrative career option in India but currently, IT, Computer

More information

IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment

IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment Leslie Rosenberg THIS IDC MARKETSCAPE EXCERPT FEATURES: CISCO IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape

More information

SWEBOK. The Emerging Consensus on the Software Engineering Body of Knowledge. A. Abran, NSERC Ottawa, February 18, 2002

SWEBOK. The Emerging Consensus on the Software Engineering Body of Knowledge. A. Abran, NSERC Ottawa, February 18, 2002 SWEBOK The Emerging Consensus on the Software Engineering Body of Knowledge A. Abran, P. Bourque,, R. Dupuis, J. W. Moore, L. Tripp NSERC Ottawa, February 18, 2002 ÉTS 1 Corporate Support by: Project managed

More information

Oracle Exadata X7. Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer

Oracle Exadata X7. Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer Oracle Exadata X7 Uwe Kirchhoff Oracle ACS - Delivery Senior Principal Service Delivery Engineer 05.12.2017 Oracle Engineered Systems ZFS Backup Appliance Zero Data Loss Recovery Appliance Exadata Database

More information

Financial Reporting and Analysis

Financial Reporting and Analysis Financial Reporting and Analysis Study guidance for the 15 th Edition of the recommended text The information below indicates which parts of the recommended text, Financial Accounting and Reporting 15

More information

NADAR SARASWATHI COLLEGE OF ENGINEERING & TECHNOLOGY

NADAR SARASWATHI COLLEGE OF ENGINEERING & TECHNOLOGY NADAR SARASWATHI COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EIGHTH SEMESTER QUESTION BANK CS6008 -HUMAN COMPUTER INTERACTION UNIT I FOUNDATIONS OF HCI The Human:

More information

Converged Communication Networks

Converged Communication Networks Converged Communication Networks Dr. Associate Professor Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai - 400076 girishs@ee.iitb.ac.in Outline Convergence in core

More information

Document Number. Huawei AR G3 Enterprise Router Channel Sales Guide. Issue V1.0. Date HUAWEI TECHNOLOGIES CO., LTD.

Document Number. Huawei AR G3 Enterprise Router Channel Sales Guide. Issue V1.0. Date HUAWEI TECHNOLOGIES CO., LTD. Document Number Huawei AR G3 Enterprise Router Channel Sales Guide Issue V1.0 Date 2014-8-18 HUAWEI TECHNOLOGIES CO., LTD. Content 1 AR G3 PRODUCT POSITIONING... 3 1.1 MARKET OVERVIEW... 3 1.2 AR G3 SERIES

More information

DeIC 2016 conference IT- og Netværksudfordringer på Campus. Thomas Laurids Pedersen Cisco Danmark AS

DeIC 2016 conference IT- og Netværksudfordringer på Campus. Thomas Laurids Pedersen Cisco Danmark AS DeIC 2016 conference IT- og Netværksudfordringer på Campus Thomas Laurids Pedersen Cisco Danmark AS Agenda Why would AU IT engage with Cisco for a strategic roadmap How are Cisco working with such an engagement

More information

EAGLE EYE MC. 1. Introduction

EAGLE EYE MC. 1. Introduction 1. Introduction Worldwide explosion of communication technologies creates a significant challenge for law enforcement agencies, national security organizations and enterprise security responsible for battling

More information

Secure Development Processes

Secure Development Processes Secure Development Processes SecAppDev2009 What s the problem? Writing secure software is tough Newcomers often are overwhelmed Fear of making mistakes can hinder Tend to delve into security superficially

More information

Metro Ethernet Design and Engineering for CO

Metro Ethernet Design and Engineering for CO Hands-On Metro Ethernet Design and Engineering for CO Designing Carrier Networks that Deliver Metro Ethernet Services Course Description Carriers have offered connectivity services based on traditional

More information

MPLS Networks: Design and Routing Functions

MPLS Networks: Design and Routing Functions MPLS Networks: Design and Routing Functions Course Description This course provides an understanding of how MPLS works its advantages and limitations and how it can be deployed to provide effective services

More information

Knowledge Organiser Digital Information Technology. Year 10: Unit 1, User Interface, Learning Aim A, B & C

Knowledge Organiser Digital Information Technology. Year 10: Unit 1, User Interface, Learning Aim A, B & C Knowledge Organiser Digital Information Technology Year 10: Unit 1, User Interface, Learning Aim A, B & C Enquiry Questions A1 What is a user interface? What is a user interface and how do they vary across

More information

Luca Cittadini, Roma Tre University Stefano Vissicchio, UCLouvain Benoit Donnet, Université de Liege

Luca Cittadini, Roma Tre University Stefano Vissicchio, UCLouvain Benoit Donnet, Université de Liege Luca Cittadini, Roma Tre University Stefano Vissicchio, UCLouvain Benoit Donnet, Université de Liege BGP glues the Internet Border Gateway Protocol (BGP) Autonomous System (AS) Some BGP data are public

More information

Searching for Expertise

Searching for Expertise Searching for Expertise Toine Bogers Royal School of Library & Information Science University of Copenhagen IVA/CCC seminar April 24, 2013 Outline Introduction Expertise databases Expertise seeking tasks

More information

Mobility+ Computing Deployment and Management. Course Outline. Mobility+ Computing Deployment and Management. 07 Apr

Mobility+ Computing Deployment and Management. Course Outline. Mobility+ Computing Deployment and Management. 07 Apr Course Outline Mobility+ Computing Deployment and Management 07 Apr 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

A model of information searching behaviour to facilitate end-user support in KOS-enhanced systems

A model of information searching behaviour to facilitate end-user support in KOS-enhanced systems A model of information searching behaviour to facilitate end-user support in KOS-enhanced systems Dorothee Blocks Hypermedia Research Unit School of Computing University of Glamorgan, UK NKOS workshop

More information

RealMedia Streaming Performance on an IEEE b Wireless LAN

RealMedia Streaming Performance on an IEEE b Wireless LAN RealMedia Streaming Performance on an IEEE 802.11b Wireless LAN T. Huang and C. Williamson Proceedings of IASTED Wireless and Optical Communications (WOC) Conference Banff, AB, Canada, July 2002 Presented

More information

Adobe Marketing Cloud Bloodhound for Windows 2.2

Adobe Marketing Cloud Bloodhound for Windows 2.2 Adobe Marketing Cloud Bloodhound for Windows 2.2 Contents Bloodhound 2.2 for Windows...3 Getting Started...4 Configure Devices to Send Hits to Bloodhound...5 Enable SSL...6 View Hits...7 Last updated 5/1/2017

More information

Gaining Insights into Multicore Cache Partitioning: Bridging the Gap between Simulation and Real Systems

Gaining Insights into Multicore Cache Partitioning: Bridging the Gap between Simulation and Real Systems Gaining Insights into Multicore Cache Partitioning: Bridging the Gap between Simulation and Real Systems 1 Presented by Hadeel Alabandi Introduction and Motivation 2 A serious issue to the effective utilization

More information

LO N LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) 04 Apr 2018

LO N LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs)  04 Apr 2018 Course Outline LO CompTIA Network (Course & Labs) 04 Apr 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs) ( Add-On ) 15 Jul 2018

LO CompTIA Network (Course & Labs) Course Outline. LO CompTIA Network (Course & Labs)  ( Add-On ) 15 Jul 2018 Course Outline LO CompTIA Network (Course & Labs) 15 Jul 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Improving QoS of VoIP over Wireless Networks (IQ-VW)

Improving QoS of VoIP over Wireless Networks (IQ-VW) Improving QoS of VoIP over Wireless Networks (IQ-VW) Mona Habib & Nirmala Bulusu CS522 12/09/2002 1 Agenda Voice over IP (VoIP): Why? VoIP Protocols: H.323 and SIP Quality of Service (QoS) Wireless Networks

More information

Hands-On VPLS: Virtual Private LAN Service

Hands-On VPLS: Virtual Private LAN Service Hands-On Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However, the cost of operating separate networks to provide each of

More information

Cooperative Memory Management in Embedded Systems

Cooperative Memory Management in Embedded Systems ooperative Memory Management in Embedded Systems, Philip Taffner, hristoph Erhardt, hris7an Dietrich, Michael S7lkerich Department of omputer Science 4 Distributed Systems and Opera7ng Systems 1 2 Motivation

More information

Green Treatment Center

Green Treatment Center Green Treatment Center IT Strategic Goals and Objectives: 2017-2019 Technology Plan The Department s IT strategies for the next four years are grounded in legislative and regulatory drivers that inform

More information

Maximizing the Value of Unlicensed Spectrum Carrier Wi-Fi, Multi-Mode and LTE-U

Maximizing the Value of Unlicensed Spectrum Carrier Wi-Fi, Multi-Mode and LTE-U Maximizing the Value of Unlicensed Spectrum Carrier Wi-Fi, Multi-Mode and LTE-U Small Cells & Carrier Wi-Fi Americas November 3, 2015 Todd Mersch, Founder & Executive Vice President Sales & Marketing manage

More information

SYSTEM ADMINISTRATOR JOB DESCRIPTION

SYSTEM ADMINISTRATOR JOB DESCRIPTION Department: IT Reports To: IT Director Classification: Exempt Salary Grade: 9 ($43,201.60-$62,899.20) Summary Under the direction of the IT Director, this position will ensure quality and responsive services

More information

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1

Cisco Troubleshooting Cisco Wireless Enterprise Networks WITSHOOT v1.1 Course Overview Provides students information to troubleshoot Cisco wireless networks. The course provides guidelines for troubleshooting Wi-Fi architectures of Cisco wireless components. Who Should Attend

More information

Qualitative Data Analysis Software. A workshop for staff & students School of Psychology Makerere University

Qualitative Data Analysis Software. A workshop for staff & students School of Psychology Makerere University Qualitative Data Analysis Software A workshop for staff & students School of Psychology Makerere University (PhD) January 27, 2016 Outline for the workshop CAQDAS NVivo Overview Practice 2 CAQDAS Before

More information

Optimal algorithms for middleware

Optimal algorithms for middleware Optimal aggregation algorithms for middleware S856 Fall 2005 Presentation Weihan Wang w23wang@uwaterloo.ca November 23, 2005 About the paper Ronald Fagin, IBM Research Amnon Lotem, Maryland Moni Naor,

More information

Adobe Dreamweaver CS5

Adobe Dreamweaver CS5 Adobe Dreamweaver CS5 Introduction Web Site Development and Adobe Dreamweaver CS5 Objectives Describe the Internet, the Web, and their associated terms Specify the difference between a Web page and a Web

More information

Small is the New Big: Data Analytics on the Edge

Small is the New Big: Data Analytics on the Edge Small is the New Big: Data Analytics on the Edge An overview of processors and algorithms for deep learning techniques on the edge Dr. Abhay Samant VP Engineering, Hiller Measurements Adjunct Faculty,

More information

ICP DAS IOP760AM FAQ. FAQ Version ICP DAS Co., Ltd

ICP DAS IOP760AM FAQ. FAQ Version ICP DAS Co., Ltd ICP DAS IOP760AM FAQ FAQ Version.0 ICP DAS Co., Ltd. 08-- Table of Contents Q: How do I connect IOP760AM without Wi-Fi router?... Q: The roaming interval is not stable. How to make it better?... Q: How

More information

Name of Faculty: (theory) (Practical) Discipline: EE Semester: 6th subject: es-ii Lesson plan Duration: 15 weeks (jan 2018 to april 2018)

Name of Faculty: (theory) (Practical) Discipline: EE Semester: 6th subject: es-ii Lesson plan Duration: 15 weeks (jan 2018 to april 2018) Name of Faculty: (theory) (Practical) Discipline: EE Semester: 6th subject: es-ii Lesson plan Duration: 1 weeks (jan 018 to april 018) theory week No. lecture no. 1 1 3 1. Oral Practice i) Mock interview

More information

Distributed Diagnosis of Failures in a Three Tier E-Commerce System. Motivation

Distributed Diagnosis of Failures in a Three Tier E-Commerce System. Motivation Distributed Diagnosis of Failures in a Three Tier E-ommerce System Gunjan Khanna, Ignacio Laguna, Fahad A. Arshad, and Saurabh agchi Dependable omputing Systems Lab (DSL) School of Electrical and omputer

More information

IP Telephony. Operator Framework Technology Framework Quality of Voice over IP Threats and Opportunities

IP Telephony. Operator Framework Technology Framework Quality of Voice over IP Threats and Opportunities IP Telephony Operator Framework Technology Framework Quality of Voice over IP Threats and Opportunities Raimo.Kantola@hut.fi http://keskus.hut.fi/tutkimus/ipana/paperit 1 Conclusions IP Telephony together

More information

E-Commerce Systems. Outline of the Talk. Who am I? (continued) Who am I? 2016/2/19. Spring 2016, Room #E74 Tuesday 1:20pm 4:10pm

E-Commerce Systems. Outline of the Talk. Who am I? (continued) Who am I? 2016/2/19. Spring 2016, Room #E74 Tuesday 1:20pm 4:10pm Spring 2016, Room #E74 Tuesday 1:20pm 4:10pm Course Overview and Introduction Outline of the Talk Introduction to Dr. Chien-Hua Tsai( 蔡建華 ) Goals of the course Course requirements Administrative details

More information

Course Outline. CWTS Certified Wireless Technology Specialist. CWTS Certified Wireless Technology Specialist

Course Outline. CWTS Certified Wireless Technology Specialist.   CWTS Certified Wireless Technology Specialist Course Outline CWTS 2013 - Certified Wireless Technology Specialist 22 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert

More information

Cisco 3: Advanced Routing & Switching

Cisco 3: Advanced Routing & Switching Western Technical College 10150130 Cisco 3: Advanced Routing & Switching Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 This

More information

Attacks Against Websites 3 The OWASP Top 10. Tom Chothia Computer Security, Lecture 14

Attacks Against Websites 3 The OWASP Top 10. Tom Chothia Computer Security, Lecture 14 Attacks Against Websites 3 The OWASP Top 10 Tom Chothia Computer Security, Lecture 14 OWASP top 10. The Open Web Application Security Project Open public effort to improve web security: Many useful documents.

More information

Systemic Analyser in Network Threats

Systemic Analyser in Network Threats Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication

More information

The zero-touch customer experience. Ericsson Consumer & IndustryLab, May 2018

The zero-touch customer experience. Ericsson Consumer & IndustryLab, May 2018 The zero-touch customer experience Ericsson Consumer & IndustryLab, May 2018 Ericsson Methodology Sweden Quantitative research Online interviews with smartphone users aged 16 and above in Brazil, China,

More information

Detecting breach. There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017

Detecting breach. There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017 Feeling lucky? Detecting breach There are only two types of organisations in the world... Terry Greer-King Director, Cyber security, UK & Africa May 2017 Industry average is 100 days to detect a breach,

More information

Prototyping for usability engineering

Prototyping for usability engineering analysis of stakeholders, field studies ANALYZE Problem scenarios claims about current practice Prototyping for usability engineering metaphors, information technology, HCI theory, guidelines DESIGN Activity

More information

ESFRI Strategic Roadmap & RI Long-term sustainability an EC overview

ESFRI Strategic Roadmap & RI Long-term sustainability an EC overview ESFRI Strategic Roadmap & RI Long-term sustainability an EC overview Margarida Ribeiro European Commission DG Research & B.4 - Research Infrastructure Research and What is ESFRI? An informal body composed

More information

IBM s approach. Ease of Use. Total user experience. UCD Principles - IBM. What is the distinction between ease of use and UCD? Total User Experience

IBM s approach. Ease of Use. Total user experience. UCD Principles - IBM. What is the distinction between ease of use and UCD? Total User Experience IBM s approach Total user experiences Ease of Use Total User Experience through Principles Processes and Tools Total User Experience Everything the user sees, hears, and touches Get Order Unpack Find Install

More information

WebRTC Gateway. Real-time communications in all browsers

WebRTC Gateway. Real-time communications in all browsers WebRTC Gateway Real-time communications in all browsers WebRTC Gateway & Web Communicator End-to-end Solution for real time communications. Bridging the gap between the Web and Telco worlds. Helping Telecom

More information