Anti Fraud Services Founding Member Associate Member of..
|
|
- Jasmin Lawrence
- 6 years ago
- Views:
Transcription
1 Ati Fraud Services Foudig Member Associate Member of..
2 Ati Fraud Overview BTS prides itself o its developmet ad deploymet of its Ati-Fraud services. Its Fraud prevetio services provide a seamless fraud solutio by combiig early detectio of fraud activities ad real-time blockig of traffic to maximize rapid respose. It reuires prior aalysis to systematically moitor customer activity, busiess relatioships ad o-et trasactios or processes. Whe suspicious traffic is detected ad meets the thresholds established, the system will dyamically cofigure the SBC to stop or degrade the traffic withi miutes. The real-time detectio protects reveue losses by collectig data o a rage of actioable metrics which is stored i a database. This iformatio is aalyzed to provide real-time feed of curret threats ad traffic patters. The process geerates alarms, otificatios, historical aalysis, real-time traffic reports ad segmeted data for greater precise measuremets. It s time to fight fraud together BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 2
3 Detectio & Prevetio Platform BTS Fraud Detectio Services provides operators a strategic advatage eeded to stop mobile fraud. Our experiece ad prove results to stop SIM Box fraud ad other mobile fraud techiues, has provided BTS with a soudig track record & experiece for customers to realize the assurace of a secure etwork. Operators worldwide are experiecig reveue loss, high customer chur ad degraded customer uality of experiece due to advaces i mobile fraud. BTS platform combats the followig fraud techiues: SIM Box Elimiatio Iteratioal Reveue Share Fraud (IRSF) Prepaid Chargig Abuse Iter-Market Bypass Fraud Tromboig (Reverse Bypass Fraud) These fraud actios decrease customer chur rate & geerates immediate reveue icrease whe a fraud operatio is shut dow BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 3
4 Security Services Telecoms Fraud prevetio services reuires prior aalysis to systematically moitor customer activity, busiess relatioships ad o-et trasactios or processes. BTS is recogized worldwide for its leadership i the fight agaist fraud i the telecoms sector. Wherever BTS s ati-fraud service has bee implemeted, the discoectio of fraudulet lies traslates ito a icrease i the volume of legal calls ad a subseuet icrease i reveues for local operators ad govermets. I a cocise approach combiig iovative detectio techologies ad multilateral collaboratio, BTS s Fraud Maagemet Departmet works closely with all stakeholders to couter curret ad ew fraudulet patters. Network Security Audit Patter aalysis Risk Idex creatio Classificatio i traffic flows Real-Time Traffic Aalisys Call Batteries with itelliget routig CDR exchage program SIMbox locatio BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 4
5 Network Security Audit BTS has ivested i Research ad Developmet kow-how i creatig the prevetive tools ad services eeded to idetify ad combat these fraudulet practices. The Network Security Audit helps Wholesale Fraud Maagers to face the challeges icludig FAS (False Aswer Supervisio) Bypass, Arbitrage, Traffic Pumpig, Tromboig ad more. It also assists the Wholesale Fraud Maagemet uit whe hadlig disputes betwee carriers resultig from fraud which reuires access to detail traffic iformatio. Through BTS s Network Security Audit, a process of o-itrusive auditig most of which is doe without the eed for MNO s techical staff or facility access. BTS will review ad aalyze the customer s etwork security profile. BTS will traslate the complex techical data ito clear busiess risk statemets, eable the leadership team to make the appropriate busiess decisios ad follow GSMA stadard etwork security. Phase 1: Short Aalysis Iitial Network Security Profile Assessmet & Report Phase 2: Coect with Network Departmet Techical Review & Advaced Network Security Audit Phase 3: O-goig Audits ad Veificatios Verificatio Audit & Security Risk Mitigatios BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 5
6 BTS Ati-Fraud Alarms Alarms soud whe icreases i traffic volumes to destiatios outside the customer s ormal traffic patter are detected. Alarms soud whe detectio of a 10% icrease i call duratio from calls received by customer is reached. Alarms soud whe o average whe more tha 10% of a customer s call experieces a 50% icrease withi the hour over the average ACD measuremet. ANI s DNI Criteria Whe repeated ANI appears with low ASR comig from the same supplier. Whe ANI ad/or DNI umbers are repeated more tha 4 times i a hour with a duratio higher tha 8 miutes. Duplicated calls usig the same umber for origiatio ad termiatio of a call. ANIs & DNIs registerig more tha 60 miutes withi a 3 hour period. Supplier Detectio Alarm Warig System Suppliers registerig higher statistics over pre-defied parameters for a give destiatio as compared to others. Suppliers that cotiuously are repeat offeders to the aalysis metioed above. BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 6
7 A robocall is a self-geerated phoe call that uses a computerized autodialer to deliver a pre-recorded message, as if from a robot. BTS has: Access to hudreds of suppliers. Market itelligece to kow where the traffic is. Pricig aalysis of suspicious routes to sell below market price. Usig this iformatio, test systems are cofigured to detect illegal routes. Robocall Detectio Calls ca be geerated to a BTS gateway istalled o the cliet facilities. The customer must provide the SIM cards to BTS for testig. BTS will geerate calls to the cliet SIM cards. BTS will preset daily reports ad aalysis about the geerated calls. Geerated calls from the cliet will be routed to the destiy etwork via BTS. CDRs Exchage to the cliet etwork. Use of market itelligece to idetify the origi of this fraudulet traffic. BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 7
8 CDRs exchage: Robocall Detectio (Phases) BTS ca provide all CDRs calls to the cliet etwork i a secure FTP (SFTP) o a daily basis for the customer to cotrast with their records ad idetify illegal calls. Alteratively, the customer ca provide all (atioal ad iteratioal) BTS daily CDRs ad idetify which of the calls that passed through the etwork of BTS were illegal. Phase 1: Traffic Geeratio Batteries geeratio calls via TeleCop Dyamic routig alteratig carriers Geerated traffics i differet backgrouds Usig LCR for routig calls battery Phase 2: Maual Call Dialig Creatig a tuel for geeratio of maual calls Calls ca be geerated by the cliet, simulatig origi USA / Spai ad accessig all termiatio offers. Phase 3: Data Collectio Aalysis Collectio of geerated calls, CDRs of all tests. CDRs delivery to the cliet for his aalysis.. Iformatio Aalysis ANI ad / or Route / Carrier / Natioal or Iteratioal Reports delivery about geerated traffic, carriers used, rates offered BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved 8
9 Real-Time Traffic Aalysis BTS has developed prove skills i idetifyig solutios that help combat fraud worldwide. Together after cosultatio, solutios are customized to fit the mobile phoe operators uiue reuiremets i order to attai the highest customer satisfactio. BTS has extesive experiece workig with PTT s, MO s, MVNO s, Carriers ad govermets combatig the fraud ecosystem. ANALYZE We work with MNOs to support Call Data Records (CDRs) data collectio ad provide aalysis usig CDRs ad Test Call detectios. Gather data Look for patters Calculate locatio estimate BTS provides optioal data collectio DEFFINE PATTERN Several idicators are cosidered as iputs to the classificatio algorithm A ad B umbers ALOC ad ASR Date ad time of the calls IP media address Codecs Call hold (for 3-way callig) BLOCK Calls ca be routed to recordigs, dowgrade uality or block callers Provide fidigs to authorities to support takedow. Ivestigatio report Authority cosultatio Authorities shutdow fraud operatios BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 9
10 SIM BOX Locatio More tha 60% of iteratioal calls termiate o mobile etworks. Ed to ed VoIP calls accouts for more tha 20% of global voice traffic of witch 70% of iteratioal VoIP calls are estimated to be routed via SIM boxes. The BTS SIM Box Locator service aims to detect the fraud related MSISDNs ad prevet them from beig used for further bypass activity. By cotractig to the BTS SIM Box Locator service, oe is able to detect, defed ad deter bypass activity. The detectio is doe by usig a sophisticated test call applicatio which ca simulate iteratioal calls from aroud the world. The results are traced via a probe istalled i the cliet s etwork ad immediate aalysis of results is reported back to the cliet. The cliet ca defed itself from the MSISDNs idetified o its etwork by blockig them thus prevetig them from cotiued use for bypass activities. We help customers to idetify SIM Boxes termiatig traffic to the etwork illegally via fixed, mobile etwork callig cards or through VoIP routes. The service is desiged to cotiuously moitor the fraudulet actios ad will adapt detectio methods to evetually deter SIM box operatios. The Real Time Detectio solutio idetifies SIM boxes o a real time basis ad shares relevat records effectively, so that oe ca cut correspodig SIM cards immediately. Guaratees stop of reveue losses with very limited iput from cliets staff SIM boxes are detected withi miutes ad reported i real time BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 10
11 Cotact Us MIAMI - USA 2620 SW 27 Aveue. FL Tel MADRID - SPAIN Serrao, º 85 2º Derecha Tel ZARAGOZA - SPAIN Josefa Amar y Borbo 10, P 3º Tel ROME ITALY Via Ippolito Nievo, Rome Tel SINGAPORE 11 Collyer Quay, Level 17, #1728, Tel BUENOS AIRES - ARGENTINA Pacheco de Melo 2095, P 4º C1126AAE CABA Tel Marketig@bts.io BTS Ati Fraud Presetatio 2016 Copyright 2015 BTS - Busiess Telecommuicatios Services.Ic, All rights reserved. 11
12 Thak you
Customer Portal Quick Reference User Guide
Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is
More informationMindmapping: A General Purpose (Test) Planning Tool
W8 Test Strategy, Plaig, Metrics Wedesday, May 2d, 2018 1:45 PM Midmappig: A Geeral Purpose (Test) Plaig Tool Preseted by: Bob Gale Zeergy Techologies Brought to you by: 350 Corporate Way, Suite 400, Orage
More informationData Warehousing. Paper
Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial
More informationMANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR
FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationSystem and Software Architecture Description (SSAD)
System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality
More informationMOTIF XF Extension Owner s Manual
MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus
More informationAnti-addiction System Development Based on Android Smartphone. Xiafu Pan
3rd Iteratioal Coferece o Materials Egieerig, Maufacturig Techology ad Cotrol (ICMEMTC 2016) Ati-addictio System Developmet Based o Adroid Smartphoe Xiafu Pa Haia Vocatioal College of Political Sciece
More informationBGP Attributes and Path Selection. ISP Training Workshops
BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics
More information9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence
_9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to
More informationCOSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1
COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,
More informationBuilding Your Security Operations Center and Taking it to the Next Level
Buildig Your Security Operatios Ceter ad Takig it to the Next Level Abstract IT threats cotiue to evolve ad become more evasive, bleded, ad persistet, with attackers dig resourceful ways to avoid detectio
More informationSession Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)
F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The
More informationComplete Security Solutions with the Latest Technology and Law Enforcement Experienced Personnel.
Complete Security Solutios with the Latest Techology ad Law Eforcemet Experieced Persoel www.smartsecuritypros.com ( 3 0 1 ) 9 5 5-9 7 8 2 SPECIAL FEATURES Our Remote Guard VSaaS video surveillace equipmet
More information150 Internet Exchange Points And Beyond!
150 Iteret Exchage Poits Ad Beyod! HKNOG 2018 Hog Kog Walt Wolly, Director Itercoectio Strategy Hurricae Electric AS6939 Who is Walt Wolly? Hurricae Electric AS6939 4 years Amazo AS16509 4 years Director
More informationSecurity Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team
Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper
More informationTable 2 GSM, UMTS and LTE Coverage Levels
6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1
More informationWhat are Information Systems?
Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),
More informationInnovative. Pharma-Tech Process Services is a high-energy, schedule-driven, technical service provider. Our innovative consulting services cover
Iovative S o l u t i o s Pharma-Tech Process Services is a high-eergy, schedule-drive, techical service provider. Our iovative cosultig services cover Commissioig, Validatio ad Costructio Period Services
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationDATA MINING II - 1DL460
DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,
More informationEDICOM has an undertaking with clients to comply with three key variables that guarantee the service quality:
EDICOM, Service Level Agreemet Terms ad Coditios www.edicomgroup.com EDICOM has a udertakig with cliets to comply with three key variables that guaratee the service quality: AVAILABILITY of the EDICOM
More information27 Refraction, Dispersion, Internal Reflection
Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet
More informationFirewall and IDS. TELE3119: Week8
Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad
More informationThe Implementation of the National Probation Service Information Systems Strategy
Home Office The Implemetatio of the Natioal Probatio Service Iformatio Systems Strategy REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 401 Sessio 2000-2001: 26 April 2001 LONDON: The Statioery Office
More informationData Protection: Your Choice Is Simple PARTNER LOGO
Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected
More informationBaan Tools User Management
Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio
More information100 Internet Exchange Points And Beyond!
100 Iteret Exchage Poits Ad Beyod! April 2016 LACNIC 25 Havaa Cuba Walt Wolly, Director Itercoectio Strategy Hurricae Electric AS6939 Who is Walt Wolly? Hurricae Electric AS6939 2 years Amazo AS16509 4
More informationIntroduction to OSPF. ISP Training Workshops
Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged
More informationUsing the Keyboard. Using the Wireless Keyboard. > Using the Keyboard
1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries
More informationIntelligent Systems in Retail. Powered by Windows Embedded
Itelliget i Retail Powered by Widows Embedded Coect with customers o their terms Today, a thrivig retail eterprise is likely to be a distributed eterprise sourcig ad sellig ew goods i a icreasig umber
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationSCAN INSPECT TRACK SOLVE
SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More informationSecurity and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms
Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationCA Top Secret r14 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 26 Ehaced Data Models: Itroductio to Active, Temporal, Spatial, Multimedia, ad Deductive Databases Copyright 2016 Ramez Elmasri ad Shamkat B.
More informationKeywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency
Volume 3, Issue 9, September 2013 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com Couplig Evaluator to Ehace
More informationChapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig
More informationCMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationFIRST-QUARTER 2017 REVENUES
PRESS RELEASE Paris, May 18, 2017 FIRST-QUARTER 2017 REVENUES First-quarter reveues up almost 7% to 1,224 millio 300,000 ew ladlie ad mobile subscribers durig the quarter Frace's leadig recruiter of mobile
More information% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998
Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado
More informationImage Segmentation EEE 508
Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.
More informationSTRATEGIC. alliances & Services
STRATEGIC alliaces & Services Chesterto is a leadig iteratioal maufacturer of idustrial fluid sealig systems, advaced polymer composites, cleaers, lubricats ad idustrial speciality products. Sice 1884
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationContinuity Logic Frontline Live
September 2015 Cotiuity Logic Frotlie Live Iovatig User Experiece for Busiess Cotiuity SOLUTIONPERSPECTIVE Goverace, Risk Maagemet & Compliace Isight Cotiuity Logic Frotlie Live Iovatio i User Experiece
More informationExtending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis
Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de
More informationTHIRD-QUARTER 2017 REVENUES
PRESS RELEASE Paris, November 16, 2017 THIRD-QUARTER 2017 REVENUES Reveues up 6.6% year o year for the first ie moths of 2017, comig i at 3,710 millio 250,000 ew mobile subscribers durig the quarter the
More informationStructuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software
Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued
More informationApplication Notes for configuring Agent AG Headsets from Corporate Telecommunications with Avaya one-x Communicator using a USB 2.0 Chord Issue 1.
Avaya Solutio & Iteroperability Test Lab Applicatio Notes for cofigurig Aget AG Headsets from Corporate Telecommuicatios with Avaya oe-x Commuicator usig a USB 2.0 Chord Issue 1.0 Abstract These Applicatio
More informationSwitching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1
Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)
More informationLecture 7 7 Refraction and Snell s Law Reading Assignment: Read Kipnis Chapter 4 Refraction of Light, Section III, IV
Lecture 7 7 Refractio ad Sell s Law Readig Assigmet: Read Kipis Chapter 4 Refractio of Light, Sectio III, IV 7. History I Eglish-speakig coutries, the law of refractio is kow as Sell s Law, after the Dutch
More informationUniversity of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani
Uiversity of North Carolia at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS Overview Itroductio History of smart cards Types of smart cards Categories of smart cards Smart Card Stadards SLE4442
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationAvid Interplay Bundle
Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers
More informationBasic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.
5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator
More informationWindows Server 2008 R2 networking
Chapter3 Widows Server 2008 R2 etworkig Orgaizatios large ad small deped o computer etworks to operate their busiesses. Employees require aywhere access to data, while cliets ad busiess parters demad ehaced
More informationOracle Process Manufacturing
Oracle Process Maufacturig Product Developmet Recipe API User s Guide Release 11i Part No. A97387-04 Jauary 2005 Oracle Process Maufacturig Product Developmet Recipe API User s Guide, Release 11i Part
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationLoop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation
eea les-sig-bricks 1 Loop Emulatio Service Protocols over ATM Eea LES-SIG-Bricks is a complete implemetatio of the Loop Emulatio Service usig AAL2 stadard (AF-VMOA-0145.000) protocols. Eea LES-SIG-Bricks
More informationTransforming Railroad Asset Management: Going Smart with Predictive Maintenance
Trasformig Railroad Asset Maagemet: Goig Smart with Predictive Maiteace Abstract As oe of the most asset-itesive idustries i the world, the rail idustry ivests early 20% of its reveue i asset maiteace
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More informationChapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings
Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee
More informationPanel for Adobe Premiere Pro CC Partner Solution
Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationDid you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV.
Easy Fit CCTV Rage Did you kow that houses with CCTV are 90% less likely to be burgled? Itroducig the ew Easy Fit rage of CCTV. Whether it s your home or your busiess, havig extra security ca help you
More informationPayMobile. Features Overview
PayMobile Features Overview PayMobile Features & Services Subscriber Beefits Immediate oboardig, coveiet ed-user experiece, stimulatio Aget Maagemet Beefits Structure your sales force, supervise, act,
More informationGoing Mobile with. SYSPRO Espresso
Goig Mobile with SYSPRO Espresso SYSPRO Espresso offers the opportuity for you to brig your busiess ito the 21 st Cetury, takig advatage of mobile techology. www.syspro.com Ulock the world with SYSPRO
More informationHow Asigra Cloud Backup Protects Your Network
Recovery is Everythig How Asigra Cloud Backup Protects Your Network Preseted by: Cloud Backup for Healthcare Asigra Advatages Key Asigra Cloud Backup Features Protectio for your Whole Network The 3 Levels
More informationEE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control
EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationn Explore virtualization concepts n Become familiar with cloud concepts
Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to
More informationEvaluation scheme for Tracking in AMI
A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:
More informationChapter 3 DB-Gateways
Prof. Dr.-Ig. Stefa Deßloch AG Heterogee Iformatiossysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@iformatik.ui-kl.de Chapter 3 DB-Gateways Outlie Couplig DBMS ad programmig laguages approaches requiremets
More informationShielding Enterprises from Evolving Cyber Attacks with a Digital Security Framework
Shieldig Eterprises from Evolvig Cyber Attacks with a Digital Security Framework Abstract As the IT ladscape evolves, cyber threat actors also mature i respose developig ew techiques to compromise the
More informationTHIRD-QUARTER 2016 REVENUES
PRESS RELEASE Paris, November 16, 2016 THIRD-QUARTER 2016 REVENUES Some 400,000 ew ladlie ad mobile subscribers durig the quarter Free was oce agai Frace's leadig recruiter of mobile subscribers, with
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationBAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8
BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject
More informationOracle Server. What s New in this Release? Release Notes
Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s
More informationDISTRIBUTED ALGORITHM FOR MULTI-AGENT ENVIRONMENT
Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 20, Volume 4, No. 2, pp. 59-525 DISTRIBUTED ALGORITHM FOR MULTI-AGENT ENVIRONMENT Maish Arora & M. Syamala Devi 2 Traditioal
More informationGE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III
GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-
More informationBEA WebLogic Commerce Server. Registration and User Processing Package
BEA WebLogic Commerce Server Registratio ad User Processig Package BEA WebLogic Commerce Server 3.2 Documet Editio 3.2 December 2000 Copyright Copyright 2000 BEA Systems, Ic. All Rights Reserved. Restricted
More information1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES
Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess ad icreasigly more distributed workforce, remote ad brach staff demad access
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationState of Mobile Payments. Tom Zalewski Aikon Consulting Dallas, TX
State of Mobile Paymets Tom Zalewski Aiko Cosultig Dallas, TX Ageda Mobile Paymets, The ad Now Itroductio of NFC for Mobile Paymets Some Key Fidigs Requiremets ad Resultig Ecosystem Provisioig ad Life
More information% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995
Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza
More informationChapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3
More informationGoals of this Lecture Activity Diagram Example
Goals of this Lecture Activity Diagram Example Object-Orieted Aalysis ad Desig - Fall 998 Preset a example activity diagram Ð Relate to requiremets, use cases, ad class diagrams Also, respod to a questio
More informationOutline. A Probabilistic Deduplication, Record Linkage and Geocoding System. Data cleaning and standardisation (2)
Outlie A Probabilistic Deduplicatio, Record Likage ad Geocodig System Peter Christe ad Tim Churches Data Miig Group, Australia Natioal Uiversity Cetre for Epidemiology ad Research, New South Wales Departmet
More informationGetting the Most out of IoT with an Effective Data Lifecycle Management Strategy
Gettig the Most out of IoT with a Effective Data Lifecycle Maagemet Strategy Abstract The Iteret of Thigs (IoT) is a rapidly evolvig techology, ad like ay other techology, it ca pose challeges with respect
More information1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES
Formoreiformatio,pleasecal877.449.0458,oremailusatSales@CorporateArmor.com. Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationStrengthening Privacy Protection with the European General Data Protection Regulation
Stregtheig Privacy Protectio with the Europea Geeral Data Protectio Regulatio Abstract The expoetial growth of digital data has led to a substatial icrease i data breaches. To meet the privacy cocers of
More information