SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits
|
|
- Branden Caldwell
- 5 years ago
- Views:
Transcription
1 SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits
2 ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship logic Data Management Aggregation, linking Cognitive Computing NLP, machine learning Behavioral Analytics Historical, forecasting Cloud Computing Distributed nodes, storage
3 GUIDING DESIGN PRINCIPLES Distributed immutable ledger Used for tracking all events and content Synchronization protocol Real time event based synchronization Inheritance Ensure multi tier inheritance of properties Protocol entity pairs Encapsulate all elements of relationship between two parties Stacking and linking Hyper linking of objects and properties Application container End user application with defined usage Edge applications sync to container Standardized applications that inherit the container and protocol properties Extensible data model Public and private data, event and context Loose coupling Avoid or minimize point to point integration Standards Support for all data and network standards at layer below protocol Interfaces Event, data and security envelope Separation of concerns Encapsulation by function & purpose
4 PLATFORM COMPONENTS Care.Wallet Application container Card Stack Coin Pile Care.Protocol Protocol Pairs Protocol Endpoints Event Ledger Event Handler Identify and Access Management Smart Contract Library Data Model Data Hub Operational Data Store Care.Vault, Care.Cabinet & Care.Record Care.Marketplace Integration layer Distributed Processing nodes Network Topology Manager Open API and services
5 SOLVE.CARE PLATFORM TECHNICAL COMPONENTS
6 SOLVE.CARE ARCHITECTURE Platform is based on event driven architecture Designed to synchronize entities, wallets, cards, coins etc. Requires little to no direct integration Supports integration with 3 rd party systems and entities via loose coupling
7 SOLVE.CARE ARCHITECTURE Solve.Care platform is designed on a hybrid architectural approach Distributed ledger Authorized entity model Event based architecture Stateless transactions Service orientation Loose coupling Stateful relationships Data and protocol encryption
8 SOLVE.CARE ARCHITECTURE Care.Protocol is the foundation for the event based approach Designed to deliver events to all parties to whom event is of interest Entity can read an event By pairing with an entity Subscribing to an event Accessing event ledger Access to events is based on public-private hierarchy Protocol node Paired entity Shared Ledger access All events are stored in blockchain ledger
9 CARE.PROTOCOL.PAIRS Each entity has a 32 digit protocol ID Using the protocol ID, entity registers on the network Forms protocol pairs Two entities form a pair called Care.Protocol.Pair (protocol pair) They sign a contract that binds them to rules of relationship Wallets, cards, coins, endpoints are then governed by pair rules An entity can be part of multiple pairs Protocol pair captures all elements of the relationship Protocol pair definition is kept in blockchain and is contract between parties
10 CARE.PROTOCOL.PAIR DEFINITION Events between the pair Nomenclature Method Timeliness Content accompanying events Format Standards Relationship contracts Rules of relationships Transactional contracts Access contracts Audit contracts Relationship Context Care.Cabinet External data sources Reference data Shared data dictionary Access and delegation Public data Private data Sharing Care.Cabinet Designation, location and access Shared cabinet folders Private cabinet folders
11 CARE.PROTOCOL ENDPOINTS Endpoints are connection points to external systems and entities Endpoints allow for exchange of events without integration Endpoints are SOA integration and service access points Endpoints can be for public use or limited (protocol pair or entity) Endpoints can be configured for different transports SMTP, HTTP, HTTPS, FTP, Web-service, SQL, JMS, others Endpoints can be extended to support new transports Endpoints can inherit and enforce protocol pair contracts Content, format, standards, timeliness, consent etc.
12 PROTOCOL EVENT HIERARCHY Organized into event hierarchy Protocol events published to all nodes Pair events published to all entity pairs of a kind Pair entity events published to specific entity you are paired with Delegated events event authorized for publishing to a delegation (non-pair) Subscribed events events can be read from the distributed ledger directly Primary and multiple secondary tags Access Transaction Control Query-Response Admin Additional event tags can be defined and visible to protocol pair entities
13 CARE.PROTOCOL EVENT TYPES
14 CARE.PROTOCOL EVENT FLOW
15 CARE.WALLET FRAMEWORK Care.Wallet is the end user application container Designed for ease of usage Contains cards and coins Hold user profile and preferences Pairs with other entities (wallets) Publishes local services for cards and coins to access Provides access to device features Creates uniformity of user experience Syncs with Care.Protocol Processes incoming events Enforces access control
16 CARE.WALLET SERVICES Care.Wallet publishes a number of micro services Identity services Protocol services Data services Device services Subscription services Personalization services Services are abstracted for ease to use and compatibility Community and clients can use services to publish smart cards, coins, protocol pairs, endpoints etc.
17 CARE.WALLET SUPPORTS MACHINE LEARNING Care.Wallet captures all necessary data for Care.Cards to use machine learning algorithms Available data (strictly subject to wallet holder permissions) Behavioral Utilization Demographic Access and sharing Device and GIS Data is completely anonymized, all personal, device and identification information is removed Care.Community can use the data to implement machine learning for Care.Cards and protocol pairs
18 CARE.CARD IS A SMART APPLICATION Can be informational and actionable Lives in Care.Wallet Inherits all wallet properties Has access to all wallet services Has 4 edges, 4 corners and 2 sides Is designed to create a uniform user experience Can be grouped and stacked with cards in the wallet Can be linked with cards in other wallets Can be read by other wallets (access control) Can be published to marketplace and subscribed Automatically updated
19 CARE.CARD STRUCTURE Two sides Public Side Private Side Four edges Control: publisher, subscriber, purpose, cost, metadata Security: Encryption, access control, privacy and permissions Intelligence: Context, logic, rules, contracts Sync: Link, stack, group and synchronization parameters Edges can be configured differently for two sides of the card
20 CARE.CARD ACTIONS Four corners can be used to configure user actions for the card Each corner can be associated with following actions Link card to other cards Flip between public and private side Shuffle through a deck of cards Share card with another entity/wallet Control permissions and access Search card or deck Custom action defined by card developer
21 CONSENT CARDS Consent in healthcare has special regulatory and legal meaning Consent cards are a specific type of card, standard in all Care.Wallets Consent cards are designed to manage and store all consents Data capture Receive clinical services Record sharing Behavioral analytics Directives and wills And many more uses Consent cards will be reviewed, published or commented by legal experts Care.Community can easily link appropriate consent card to their Care.Card Solve.Care foundation will invest in and manage consent cards Protect all consumers Enable Care.Community to be compliant with appropriate laws
22 DISTRIBUTED LEDGER TECHNOLOGY (BLOCKCHAIN) Solve.Care platform uses Hyperledger as a framework for building building and managing distributed ledger Permissioned blockchain with a Certificate Authority for granting access to the network Voting-based consensus model for high performance and fault tolerance Endorsement Ordering Validation
23 BLOCKCHAIN BUSINESS NETWORK LAYERS Consensus Layer confirming validity of transactions included into a block Identity Services enables registration of system entities during network setup and operation Smart Contract Layer responsible for transaction processing Data Mart unified interface for accessing data sources Communication Layer enabling communication channels for peer-to-peer message interchange Policy Layer system policy management for consensus, groups and other Gateway provides interaction between multiple blockchains
24 TRANSACTION FLOW Multilateral transaction nature, typical for complex domains is represented as a set of bilateral transactions Set of transactions is determined by smart contract logic Transaction stages Transaction request initiated by a client Signature verification, transaction proposal check, ensure submitted for first time, verification signature and client authorization Verification of proposal responses, comparing proposal responses and execution of endorsement policy Ordering publishing of transaction proposals to the Ordering Service Transaction validation validation of transactions within the block Ledger update channel chain being updated with the block
25 USE OF SMART CONTRACTS Solve.Care platform uses Smart contracts to implement business logic specific to Care.Protocol pairs Pair-specific business logic defined by smart contracts Each smart contract has it s exclusively scoped state, which can t be accesses directly by another smart contract Smart contract can invoke another smart contract in order to access it s state
26 SMART CONTRACTS INTERACTION WITH THE LEDGER
27 PLATFORM SMART CONTRACT LIBRARY Access contracts Data collection and use contracts Privacy and security contracts Consent contracts Compliance contracts Subscription contracts License contracts Permitted use contracts
28 PAIR SMART CONTRACT LIBRARY Insurer <-> Provider Pair Credentialing contracts Pricing contracts Performance contracts Payment contracts Insurer <-> Insured Pair Eligibility contracts Enrollment contracts Utilization contracts Payment contracts
29 CARE.VAULT Care.Vault is internal content repository with ability to link and aggregate payload, structured data and blockchain ledgers Care.Vault is instantiated for a protocol pair and is governed by rules of the pair relationship
30 CARE.VAULT
31 EXTENSIBILITY AND CONFIGURABILITY Data model Entity pairs End points End user application container Container applications Security and access control
32 EXTENSIBLE DATA MODEL Solve.Care data model is a key determinant in achieving a flexible, expandable and evolving platform for benefit administration across the globe The data model follows the decentralized design of the overall solution approach and is expandable by the community The data model is decomposed into protocol pairs, smart cards, tokens and shared entities such as identity and events A true innovation of the Solve.Care data model is that it supports decentralized entities that publish data to remain in sync Each object in Solve.Care has a defined linking and data syncing definition This approach makes it very flexible, powerful and expandable: Protocol pairs encapsulation of pair intelligence and transactions Linking and syncing of pair entities Stacked cards and linked stacks to handle complex data relationships Audit log of every event, transaction and interaction Open, published, expandable and peer approved
33 DATA HUB Data Hub is a data aggregation and integration layer Data Hub offers standardized data services Data quality Data de-duplication Data conversion Data hub is a data switch and not an operational data store Data hub is designed to abstract services independent of underlying stack Can use any data technology that client or community prefers ETL engine DQ engine MDM framework
34 SECURITY AND PRIVACY Encrypted protocol Separately configurable encryption standard for event and content Compliant with VPN, tunneling and data packet encryption Encrypted cards Separately configurable encryption standard for public and private data Encrypted wallet Access control Two factor authentication Non transferable Encrypted cloud backup and restore (optional) Comprehensive audit Events, access, content, users, devices, location Designed to exceed security standards for federal and state agencies
35 ENTITY, EVENT AND CONTENT SECURITY Event security Protocol Pair Entity Event Entity security Access control Protocol ID Pair Type Pair ID Event subscription Event ledger Content security Encryption Public content Private content Delegated content
36 DISTRIBUTED PROCESSING NODES Different types of processing nodes Processing nodes management Authorization Graduation Minimum volume guarantee Service Level Agreements Concept of gas applied to healthcare transactions
37 INNOVATIVE USE OF TECHNOLOGIES Innovative synchronization protocol Linking, stacking, grouping and synchronization of entities and wallets Cutting edge technologies Distributed ledgers, smart contracts, blockchain Domain extensions Ability to inject domain context into protocol, card, coin and wallet Cognitive and learning Behavioral and utilization analytics built into application container Machine learning services Standardized user experience Care.Card behavior is pre-defined and optimized through behavioral analytics Extensibility of protocol, card, coin and wallet Every element of platform is designed to be community extensible and configurable Encapsulated pair relationships Smart contracts enforce relationship rules Embedded capabilities Data management, identity and access management, machine learning & behavioral analytics
38 TECHNICAL GOVERNANCE Platform Architecture Council (PAC) is responsible for overall platform architecture Governs 7 architectural layers Infrastructure Security Blockchain Event Information Component Business Business Component Information Event Blockchain Security Infrastructure
39 PRODUCT MANAGEMENT COUNCIL (PMC) Charter - Responsible for roadmap creation, review, approval and changes Chaired by company CEO and CTO Members Sales Marketing Development Community Support and Dev-ops Professional services, delivery and integration Community representation is nominated via online community forum Meets monthly or as needed
40 PLATFORM ARCHITECTURE COUNCIL (PAC) Charter Platform Architecture Council (PAC) is responsible for the architecture and design of the platform in terms of sustainability, scalability, security, extensibility and ease of usage Function Approve technical design and specification all 7 layers of architecture Conduct market research and proof of concept projects on new technologies Approve adoption of new technologies PAC is chaired by CTO and composed of following representatives: Development Community Support and Dev-ops Professional services, delivery and integration PMC Meets monthly All meeting decisions are published to community
41 LET US REDEFINE CARE, COST AND CONVENIENCE! Contact us at Visit us at
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric
Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems
More informationSentinet for Microsoft Azure SENTINET
Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...
More informationCIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products
CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security
More informationSentinet for Windows Azure VERSION 2.2
Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...
More informationSecurity and Compliance
Security and Compliance Version 1.3 12/9/2016 Hyperfish Security Whitepaper 1 Table of Contents 1 Introduction... 3 2 Hyperfish... 3 2.1 Product Overview... 3 2.2 How it Works... 3 2.3 Modes of Operation...
More information(9A05803) WEB SERVICES (ELECTIVE - III)
1 UNIT III (9A05803) WEB SERVICES (ELECTIVE - III) Web services Architecture: web services architecture and its characteristics, core building blocks of web services, standards and technologies available
More informationOverview SENTINET 3.1
Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7
More informationThe power of Blockchain: Smart Contracts. Foteini Baldimtsi
The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave
More informationNext Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4
Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4
More informationExecutive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation
2017 Executive Summary (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation www.blockchainofthings.com Abstract The Internet of Things (IoT) is not secure and we
More informationOpenIAM Identity and Access Manager Technical Architecture Overview
OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...
More informationIoT security based on the DPK platform
Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury ABSTRACT Public key distribution remains one of the main security weaknesses in many
More informationExam : Implementing Microsoft Azure Infrastructure Solutions
Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationPartner Center: Secure application model
Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including
More informationEnhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network
Enhanced Immutability of Permissioned Blockchain Networks by Tethering Provenance with a Public Blockchain Network Abstract Azeem Ahmed (azeem.ahmed@consensys.net) Jim Zhang (jim.zhang@consensys.net) Permissioned
More informationToken Sale Privacy Policy
Token Sale Privacy Policy PRIVACY POLICY LAST UPDATED ON: [11 SEP 2018] A. OVERVIEW You must read the entirety of this Privacy Policy carefully before making any decision to purchase Tokens. You must also
More informationOpenbankIT: a banking platform for e- money management based on blockchain technology
OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com
More informationStorage Made Easy. SoftLayer
Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on
More informationHealth Data & Blockchain: The New Sharing Frontier. Michael Dillhyon, CCO, Graftworx
Health Data & Blockchain: The New Sharing Frontier Michael Dillhyon, CCO, Graftworx Twitter: @SwissGator Overview Who? Background Why? Enterprise & Consumer Benefit What? (Blockchain of course) Value Prop
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationGLBA Compliance. with O365 Manager Plus.
GLBA Compliance with O365 Manager Plus www.o365managerplus.com About GLBA The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationPrivacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data
Privacy-Enabled NFTs: User-Mintable, Non-Fungible Tokens With Private Off-Chain Data Philip Stehlik Lucas Vogelsang August 8, 2018 1 Abstract Privacy-enabled NFTs (non-fungible tokens) are user-mintable
More informationPrivacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology
2 nd Advanced Workshop on Blockchain, IIT Bombay Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology Sivakumar.P M.Tech (CSE), Sem-III, NIT Trichy Guide:- Dr Kunwar
More informationOn health data architecture design
Subhashis Banerjee Computer Science and Engineering IIT Delhi Law Economics Policy Conference, Delhi November 27, 2018 Why do we need it? Electronic Health Records and individual health. Public health
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationStorage Made Easy. Mirantis
Storage Made Easy Providing an Enterprise File Fabric for Mirantis STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR MIRANTIS The File Fabric is a comprehensive multi-cloud data security solution built on top
More informationDHS Cloud Strategy and Trade Nexus. May 2011
DHS Cloud Strategy and Trade Nexus May 2011 IT Reform @ DHS Federal Plan Departmental Plan IT Reform @ DHS Action Item 1 Complete detailed implementation plans to consolidate 800 data centers by 2015 2
More informationConnected Health Principles
Version 2.1 Table of Contents 1 INTRODUCTION... 1 2 TERMINOLOGY... 1 3 CONNECTED HEALTH PRINCIPLES... 4 3.1 CONNECTED HEALTH FOUNDATION PRINCIPLES...5 3.2 CONNECTED HEALTH ARCHITECTURAL PRINCIPLES... 6
More informationThe Potential for Blockchain to Transform Electronic Health Records ARTICLE TECHNOLOGY. by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw
REPRINT H03I15 PUBLISHED ON HBR.ORG MARCH 03, 2017 ARTICLE TECHNOLOGY The Potential for Blockchain to Transform Electronic Health Records by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw This article
More informationBLOCKCHAIN ARCHITECT Certification. Blockchain Architect
BLOCKCHAIN ARCHITECT Certification Blockchain Architect The Next-Gen IT Academy from Arcitura is dedicated to providing an ever-growing variety of training courses and accreditations in contemporary technologies
More informationMaking Blockchain Real for Business IBM Blockchain Offering
Making Blockchain Real for Business IBM Blockchain Offering Guillaume Hoareau Certified IT Architect Blockchain on IBM z Systems SME V3.5, November 24th Page 1 Linux Foundation s Hyperledger Project Linux
More informationAvanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.
Avanan for G Suite Technical Overview Contents Intro 1 How Avanan Works 2 Email Security for Gmail 3 Data Security for Google Drive 4 Policy Automation 5 Workflows and Notifications 6 Authentication 7
More informationTrustworthy user authentication, authorization, data integrity AND consent management
RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY
More informationOpen mustard seed. Patrick Deegan, Ph.D. ID3
Open mustard seed Patrick Deegan, Ph.D. ID3 OpenSocial FSN (draft) August 8, 2013 Open Mustard Seed (OMS) Introduction The OMS Trustworthy Compute Framework (TCF) extends the core functionality of Personal
More informationNPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic
NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic Hello SLIDE: 2 14 COPYRIGHT November 2017 MARKLOGIC CORPORATION. ALL RIGHTS RESERVED. A QUICK LOOK New Payments Platform Open
More informationUsing Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment
Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Gary Leeming, Chief Technology Officer Connected Health Cities, University of Manchester 1 Connected Health
More informationCertificate Enrollment for the Atlas Platform
Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps
More informationPreserving Data Privacy in the IoT World
MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu
More informationUT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES
ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary
More informationTable of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.
Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationDirect, DirectTrust, and FHIR: A Value Proposition
Direct, DirectTrust, and FHIR: A Value Proposition August 10, 2017 Authors: Grahame Grieve, HL7 Product Director for FHIR; David Kibbe, Luis Maas, Greg Meyer, and Bruce Schreiber, members of the DirectTrust
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationStarflow Token Sale Privacy Policy
Starflow Token Sale Privacy Policy Last Updated: 23 March 2018 Please read this Privacy Policy carefully. By registering your interest to participate in the sale of STAR tokens (the Token Sale ) through
More informationF O U N D A T I O N. OPC Unified Architecture. Specification. Part 1: Concepts. Version 1.00
F O U N D A T I O N Unified Architecture Specification Part 1: Concepts Version 1.00 July 28, 2006 Unified Architecture, Part 1 iii Release 1.00 CONTENTS Page FOREWORD... vi AGREEMENT OF USE... vi 1 Scope...
More informationIBM BigFix Compliance PCI Add-on Version 9.5. Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM
IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM IBM BigFix Compliance PCI Add-on Version 9.5 Payment Card Industry Data Security Standard
More informationBlockchain and Additive Manufacturing
Blockchain and Additive Manufacturing January 10, 2019 Presentation to the South Texas Section, AIChE Lisa M. Smith Chief Corporate Development Officer Data Gumbo Corporation Blockchain Basics Data Gumbo
More informationCA IdentityMinder. Glossary
CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationStorage Made Easy. Providing an Enterprise File Fabric for INVESTOR NEWSLETTER ISSUE N 3
INVESTOR NEWSLETTER ISSUE N 3 Storage Made Easy Providing an Enterprise File Fabric for STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR OPENIO Storage Made Easy (SME) File Fabric is a comprehensive Enterprise
More informationDocument Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.
Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationUNCLASSIFIED. Mimecast UK Archiving Service Description
UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationWEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices
WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices Chris Steel, Ramesh Nagappan, Ray Lai www.coresecuritypatterns.com February 16, 2005 15:25 16:35
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationEXECUTIVE PRODUCT SUMMARY
Enterprise Blockchain Infrastructure For Decentralized Internet EXECUTIVE PRODUCT SUMMARY August 10 th 2018 A product by Contents Opportunity....1 Introduction.... 2 Solution.... 3 Microservices Oriented
More informationCERTIFICATE POLICY CIGNA PKI Certificates
CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...
More informationMaking Privacy Operational
Making Privacy Operational Introduction to the Privacy Management Reference Model John Sabo Director, Global Government relations CA, Inc. and President, ISTPA john.t.sabo@ca.com Michael Willett President,
More informationFujitsu World Tour 2018
Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:
More informationData Use and Reciprocal Support Agreement (DURSA) Overview
Data Use and Reciprocal Support Agreement (DURSA) Overview 1 Steve Gravely, Troutman Sanders LLP Jennifer Rosas, ehealth Exchange Director January 12, 2017 Introduction Steve Gravely Partner and Healthcare
More informationSpeaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec
SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction
More informationTable Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...
Table Of Contents Introduction... 1 Blockchain and Cryptocurrency...1 Stellar (payment network)...2 Internet and its issues...3 LocalXpose... 5 How LocalXpose Actually works?...6 Why to use LocalXpose?...7
More informationManaging Site-to-Site VPNs: The Basics
CHAPTER 23 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationVirtualized Network Services SDN solution for enterprises
Virtualized Network Services SDN solution for enterprises Nuage Networks Virtualized Network Services (VNS) is a fresh approach to business networking that seamlessly links your enterprise s locations
More informationNEUROSEED WHITEPAPER. Version 1.1. May 1, 2018 Contents of the white paper are subject to changes and improvements
WHITEPAPER Version 1.1 May 1, 2018 Contents of the white paper are subject to changes and improvements ABSTRACT The Fourth Industrial revolution brings the implementation of such technologies like Big
More informationTRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model
TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model
More informationIBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, 2017 Integration Guide IBM Note Before using this information and the product it supports, read the information
More informationManaging Site-to-Site VPNs
CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationProviding an Enterprise File Share and Sync Solution for
Storage Made Easy Providing an Enterprise File Share and Sync Solution for Microsoft Azure Storage Storage Made Easy Enterprise File Share and Sync Solution for Microsoft Azure The Storage Made Easy (SME)
More informationAdministration and Data Retention. Best Practices for Systems Management
Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices
More informationData Governance Overview
3 Data Governance Overview Date of Publish: 2018-04-01 http://docs.hortonworks.com Contents Apache Atlas Overview...3 Apache Atlas features...3...4 Apache Atlas Overview Apache Atlas Overview Apache Atlas
More informationManaging Site-to-Site VPNs: The Basics
CHAPTER 21 A virtual private network (VPN) consists of multiple remote peers transmitting private data securely to one another over an unsecured network, such as the Internet. Site-to-site VPNs use tunnels
More informationIBM Advantage: IBM Watson Compare and Comply Element Classification
IBM Advantage: IBM Watson Compare and Comply Element Classification Executive overview... 1 Introducing Watson Compare and Comply... 2 Definitions... 3 Element Classification insights... 4 Sample use cases...
More informationOnlineNIC PRIVACY Policy
OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.
More informationCA Automation Capabilities A Technical Look at Process and Runbook Automation. Tom Kouhsari and AJ Dennis
CA Automation Capabilities A Technical Look at Process and Runbook Automation Tom Kouhsari and AJ Dennis Terms of This Presentation This presentation was based on current information and resource allocations
More informationSecurity In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.
Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property
More informationHong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)
Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative
More informationPAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1
PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationIAM. Shopping Cart. IAM Description PM OM CM IF. CE SC USM Common Web CMS Reporting. Review & Share. Omnichannel Frontend...
PM OM CM IF IAM CE SC USM Common Web CMS Reporting IAM Description The identity & access management (IAM) provides functions such as account information management, role permission management, access control
More informationefolder White Paper: HIPAA Compliance
efolder White Paper: HIPAA Compliance November 2015 Copyright 2015, efolder, Inc. Abstract This paper outlines how companies can use certain efolder services to facilitate HIPAA and HITECH compliance within
More informationBlockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany
Blockchain without Bitcoin Muralidhar Gopinath October 19, 2017 University at Albany What is Blockchain? Contains records (blocks) that are linked (chained) to one another using cryptography Each block
More informationSecurity Overview of the BGI Online Platform
WHITEPAPER 2015 BGI Online All rights reserved Version: Draft v3, April 2015 Security Overview of the BGI Online Platform Data security is, in general, a very important aspect in computing. We put extra
More informationPayThankYou LLC Privacy Policy
PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the
More informationIntroduction to Fabric Composer
Introduction to Fabric Composer Anthony O Dowd odowda@uk.ibm.com @ajodowd 2017 2017 IBM Corporation IBM Corporation Page 1 Contents Concepts & Modelling Applications & Tools Integrating Existing Systems
More informationEdge Computing & Blockchains for Industrial Automation. John Kaldis Athens Information Technology
Edge Computing & Blockchains for Industrial Automation John Kaldis (jkaldis@ait.gr) Athens Information Technology Factory Automation Edge Computing Operating System Reference Implementation (FAR-EDGE)
More informationGlossary of Exchange Network Related Groups
Glossary of Exchange Network Related Groups CDX Central Data Exchange EPA's Central Data Exchange (CDX) is the point of entry on the National Environmental Information Exchange Network (Exchange Network)
More informationSecure Messaging Mobile App Privacy Policy. Privacy Policy Highlights
Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review
More informationKantanMT.com. Security & Infra-Structure Overview
KantanMT.com Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions...
More informationCOURSE 20487B: DEVELOPING WINDOWS AZURE AND WEB SERVICES
ABOUT THIS COURSE In this course, students will learn how to design and develop services that access local and remote data from various data sources. Students will also learn how to develop and deploy
More informationA: PLANNING AND ADMINISTERING SHAREPOINT 2016
ABOUT THIS COURSE This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint 2016 environment. The course teaches you how to deploy, administer, and
More informationRise Technology White Paper
Rise Technology White Paper Posted in White paper by Justin 1. Introduction 1. What is Rise We are Rise, a Lisk-based currency and distributed application platform heavily emphasizing security and ease
More informationPrelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.
Prelude The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. This document will explain methodically, the details of the
More informationCurriculum Guide. ThingWorx
Curriculum Guide ThingWorx Live Classroom Curriculum Guide Introduction to ThingWorx 8 ThingWorx 8 User Interface Development ThingWorx 8 Platform Administration ThingWorx 7.3 Fundamentals Applying Machine
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationExample Azure Implementation for Government Agencies. Indirect tax-filing system. By Alok Jain Azure Customer Advisory Team (AzureCAT)
Example Azure Implementation for Government Agencies Indirect tax-filing system By Alok Jain Azure Customer Advisory Team (AzureCAT) June 2018 Example Azure Implementation for Government Agencies Contents
More informationSecurely Access Services Over AWS PrivateLink. January 2019
Securely Access Services Over AWS PrivateLink January 2019 Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date
More information