Management of Biometric Data in a Distributed Internet Environment
|
|
- Hilary Ford
- 6 years ago
- Views:
Transcription
1 Submission to: IEEE/IFIP IM 2007, Application Sessions, May 21-25, 2007, München, Germany Management of Biometric Data in a Distributed Internet Environment B. Stiller 1,2, T. Bocek 1, P. Ming 1, F. Eyermann 3, J. Sauerland 3, J. Angrabeit 4, M. Völkl 5, J.-C. Tylka 5 1 University of Zürich, Department of Informatics IFI, Zürich, Switzerland 2 ETH Zürich, Computer Engineering and Networks Lab TIK, Zürich, Switzerland 3 University of Federal Armed Forces, Information Systems Lab IIS, Munich, Germany 4 Codecasters, Niedermoosen, Germany 5 Biometronix GmbH, Munich, Germany This application track paper describes the key technology advances achieved through a component-based design process, meeting right on track all key requirements of management systems for biometric data, such as data protection acts, flexible user and device handling, installation, and operation functions, and grouping functionality for users and devices according to dedicated office environmental needs. 1
2 Outline Introduction Motivation and Project Goals BioLANCC (Biometric Local Area Network Control Center) Scenario Architecture BioLANCC Implementation JBioDC Components, Java SE, Java EE Screenshots Key Features and Conclusions The key technology advances have been implemented in an application called BioLANCC. BioLANCC (Biometric Local Area Network Control Center) is a component based application and highly modular. Another key technology is the new Java-based biometric interface JBioDC, which will be discussed together with BioLANCC. 2
3 Motivation Integrated access control for buildings, function rooms, laboratories for personnel Traditionally use of hard keys Drawbacks of traditional approaches: Large overhead: Employee turnover Loss of keys Change of room access rights The use of biometric data to enable a personalized access control to resources, typically rooms, software packages, or systems, emerges due to a number of advantages. Those include a fine-grained tailored control, avoiding the problem of lost keys, or providing for customized access schedules for resources and persons. 3
4 Authentication Options Authentication by Personal Characteristics/ Biometric Properties Knowledge Physical Ownership Static Dynamic Head Hand -Iris -Face -Teeth -Other - Finger Print - Line of Hand -Other - Signature -Voice -Gesture -Other -PIN - Password - Slogan -Other -Key - Smart Card - Slogan - Certificate of Authority Authentication may be performed by a number of different means. While knowledge and ownership describe the traditional measures, the use of personal characteristics, typically termed biometric properties, becomes much more realistic in its broad and widespread use. Technology has emerged, prices of biometric devices are decreasing, and the Internet as a means of world-wide communications across domains, serves as a transport medium of access control data and its supervision. 4
5 BioLANCC Existing solutions for biometric access management No integration of other manufacturers Single platform solution Lock-In Future use for any resource access control intended BioLANCC Administration software for Biometric data / devices Access management Presence control Single, distributed, networked, platform-independent, userfriendly management application While multiple remote biometric devices are integrated across potentially arbitrary distances, BioLANCC is logically central management application. However, access to BioLANCC can be distributed, which allows remote administration. Existing applications for managing biometric data (VeriAdmin, FingerLAN) do only offer management for a particular manufacturer and cannot be combined with devices from different manufacture. Thus, integration is not possible with current biometric management application. While local access control systems using biometrics are available today, e.g., in support of a single room access, mainly by applying finger print scanners, the interconnection of multiple of such local systems into a centralized management system has been developed partially in vendor-dependent systems. Thus, to cover a wide range of physical distances, e.g., for rooms scattered across a campus or many users located in different company offices around the world, and to cope with a large number of different biometric devices, such as finger print, iris, or face scanners, a new, flexible, and distributed approach became necessary. Therefore, the communication based on Internet protocols serves as a bridge for the physical distance and a suitable as well as new control center manages the biometric data as well as user-specific and device-dependent management data. 5
6 Overall BioLANCC Project Goals Device-independent Integration of devices from different manufacturers Support for many DBs Hibernate: Object/relational mapping MySQL, PostgreSQL, Oracle,... Platform-independent Windows, Mac OS X, Linux, Solaris,... Open standards-based TCP/IP Documented interfaces Integration into existing applications The new management application development termed BioLANCC (Biometric Local Area Network Control Center) determines an important step beyond current management software packages for biometric devices, data, and users. This approach undertaken marks a revolution in biometric administration software due to a number of reasons. Firstly, the TCP/IP-based networked collection and distribution of access control details of manifold biometric devices provides for a location-independent and device-unspecific integrative system. Multi-biometric support is enabled by BioLANCC through the integration of different biometric data into a single, per user-oriented and per device-driven management application. Secondly, the use of object relational mapping libraries allow for a wide range of databases. In combination with the documented interfaces, external data sources from existing applications can be integrated. 6
7 BioLANCC Scenario The remote scenario envisions a world-wide interconnection of access rules, associated to humans and users, where BioLANCC serves as the communication bus and exchange point for access control, supervising, and enrollment data. The example presented shows three locations, which operate independently, and use a single BioLANCC system to maintain all personnel and visitor access data. The grouping concept of locations (biometric devices) and users is highly flexible for subgroups, overlaps, and monitoring groups. 7
8 BioLANCC Architecture User, Operator, Administrator View (Swing / HTML) Controller Model PostgreSQL... Hibernate Log4j JBioDC User Hand Gesture Finger p. Face Iris Other MySQL Java 1.5 Operating System, e.g., Linux, Windows, MacOS, Solaris Additionally, the BioLANCC control center has been designed as a fully platformindependent management application, running on operating systems such as Windows 2000/XP, Linux, various Unix, MacOS, Sun Solaris 10, and others. These possibilities have been achieved due to a standardized architecture using the Java platform, which is combined with a flexible and time-driven access rights and device management scheme for users and devices. In support of the data storage for user and device data, BioLANCC integrates Hibernate and supports common SQL databases, e.g., MySQL, HypersonicSQL, Oracle, Microsoft SQL Server, DB2, Sybase, SAP DB, or PostgreSQL. Various new biometric devices can be integrated via the open interface JBioDC (Java-based Biometric Device Connectivity). 8
9 Component-based Architecture Model View Controller Data exchange with Java Persistence Framework (Entity beans with Hibernate) Java SE 5 with a swing GUI Java EE 5 with facelets for HTML rendering Interfaces For other management applications Interfaces for all kinds of biometric devices (JBioDC) Scalability BioLANCC logically centralized growing devices = growing resource usage Access is distributed / Java EE for scalability BioLANCC uses the MVC pattern for the core components. The model is backed with the Java persistence framework using the Hibernate implementation. The view is split into a Java SE version and a Java EE version. The application server for the Java EE version is JBoss. BioLANCC uses many new features of Java 5 such as generics or annotations. One key feature that makes BioLANCC flexible is the definition of interfaces to allow other applications to communicate. Report and user information can be stored / provided by any data source as long as it conforms to the interface defined in BioLANCC. Scalability is an important requirement. As BioLANCC is logically centralized and the default setup does not consider scalability issues explicitly, the Java EE framework has be used to increase scalability by distributing components. 9
10 JBioDC Java Biometric Device Connectivity High level abstraction layer for biometric devices BioAPI / JBioAPI: low and high level abstraction Interface definition 5 interfaces abstract base device functionalities (Connection, Storage, Smart card, Enrollment, Access schedule) 1 interface for biometric data handling (Template) Not a protocol definition Key features of JBioDC Integrate heterogeneous devices Unified biometric device administration JBioDC stands for Java Biometric Device Connectivity and it is a high level API for communicating with biometric devices. In contrast to BioAPI and its wrapper JBioAPI which defines low an high level interfaces, JBioDC has a reduced set of interfaces. It is important to mention that JBioDC is not a standard, but future work focus on submitting JBioDC as a JSR. JBioDC consists of 5 interfaces. The only mandatory is Connection due to the different nature of biometric devices. In contrast to SNMP which also defines a protocol, JBioDC only defines an interface. One major problem is that no standardized biometric templates exist. Every vendor uses its own format and converting is often not possible. Therefore, the interface Template has only 2 mandatory fields: UserID and TemplateID and everything else is optional. 10
11 Key BioLANCC Features Summary A Java-based access rights management system Platform independency (Java) IP-based communications between centralized user data server and multiple remote biometric devices An open device architecture with manufacturer-independent hardware interfaces (JBioDC) A set of configurable reporting features (including CSV export) An open data base interface (Hibernate) Secure communication (SSL/TLS) Finally, all events and actions performed at access control devices and within the management application are traced and tracked within BioLANCC to offer a powerful reporting and maintenance functionality. Besides a CSV-based export functionality a number of interfaces for a time management and reporting system have been integrated as well. 11
12 Screenshots BioLANCC has been implemented with ease of use in mind. To achieve this goal, intensive usability tests have been conducted and the result has enhanced the appearance and the user experience. 12
13 Conclusions Highly flexible and distributed biometric management system First system world-wide independent of devices (JBioDC) and OS (Java) Lower costs instead of physical key handling No loss of keys and no sharing of personal resources Target Markets SMEs (few devices, small number of resources/doors) Industry (many devices, many locations world-wide) In summary, the BioLANCC management application for biometric data provides the first world-wide platform-independent system in support of multiple biometric devices, flexible user and devices grouping, integration, and installation, and a TCP/IP-based network connectivity for resources across the world. BioLANCC is still under development, but it has already been deployed multiple times. 13
14 Thank you for your attention! Questions? 14
Building the Enterprise
Building the Enterprise The Tools of Java Enterprise Edition 2003-2007 DevelopIntelligence LLC Presentation Topics In this presentation, we will discuss: Overview of Java EE Java EE Platform Java EE Development
More informationSCRIPT: An Architecture for IPFIX Data Distribution
SCRIPT Public Workshop January 20, 2010, Zurich, Switzerland SCRIPT: An Architecture for IPFIX Data Distribution Peter Racz Communication Systems Group CSG Department of Informatics IFI University of Zürich
More informationDeveloping Applications with Java EE 6 on WebLogic Server 12c
Developing Applications with Java EE 6 on WebLogic Server 12c Duration: 5 Days What you will learn The Developing Applications with Java EE 6 on WebLogic Server 12c course teaches you the skills you need
More informationCisco Unified Presence 8.0
Cisco Unified Presence 8.0 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time from any workspace.
More informationIntroduction to MySQL. Database Systems
Introduction to MySQL Database Systems 1 Agenda Bureaucracy Database architecture overview SSH Tunneling Intro to MySQL Comments on homework 2 Homework #1 Submission date is on the website.. (No late arrivals
More informationAn Open Source Java Framework for Biometric Web Authentication based on BioAPI
An Open Source Java Framework for Biometric Web Authentication based on BioAPI Elisardo González Agulla, Enrique Otero Muras, José Luis Alba Castro, and Carmen García Mateo Department of Signal Theory
More informationFingerprint Security and Access Tracking System
Fingerprint Security and Access Tracking System Samuel Tebbs IT Innovation Centre, University of Birmingham 08/09/2017 Fingerprint Security and Access Tracking Contents Introduction Requirements Security
More informationIntroduction to Cisco UCS Central
Introducing Cisco UCS Central, page 1 Introducing Cisco UCS Central Cisco UCS Central provides scalable management solution for growing Cisco UCS environment. Cisco UCS Central simplifies the management
More informationEnhydra Shark. What is Enhydra Shark? Table of Contents
Table of Contents What is Enhydra Shark?... 1 StartingShark...2 ConfiguringShark...2 Setting "enginename" parameter...3 Setting kernel behaviour in the case of unsatisfied split conditions... 4 Setting
More informationHow To Get Database Schema In Java Using >>>CLICK HERE<<<
How To Get Database Schema In Java Using Eclipse Pdf Go To Table Of Contents Search, PDF, Comments EclipseLink is suitable for use with a wide range of Java Enterprise Edition (Java to a relational database
More informationDatabase code in PL-SQL PL-SQL was used for the database code. It is ready to use on any Oracle platform, running under Linux, Windows or Solaris.
Alkindi Software Technology Introduction Alkindi designed a state of the art collaborative filtering system to work well for both largeand small-scale systems. This document serves as an overview of how
More informationRensselaer and UWCalendar2 an institute-wide open-source Java events calendar. Communication & Collaboration Technologies
Rensselaer and UWCalendar2 an institute-wide open-source Java events calendar Communication & Collaboration Technologies Rensselaer Polytechnic Institute June 21, 2004 1 Who We Are Mike Douglass - Senior
More informationopen source community experience distilled
Java EE 6 Development with NetBeans 7 Develop professional enterprise Java EE applications quickly and easily with this popular IDE David R. Heffelfinger [ open source community experience distilled PUBLISHING
More informationOracle - Developing Applications for the Java EE 7 Platform Ed 1 (Training On Demand)
Oracle - Developing Applications for the Java EE 7 Platform Ed 1 (Training On Demand) Code: URL: D101074GC10 View Online The Developing Applications for the Java EE 7 Platform training teaches you how
More informationSysgem Enterprise Manager
Sysgem Enterprise Manager Sysgem Enterprise Manager (SEM) The Sysgem Enterprise Manager (SEM) provides companies of all sizes with a simple, powerful tool for managing IT, auditing security, administering
More informationJava EE Application Assembly & Deployment Packaging Applications, Java EE modules. Model View Controller (MVC)2 Architecture & Packaging EJB Module
Java Platform, Enterprise Edition 5 (Java EE 5) Core Java EE Java EE 5 Platform Overview Java EE Platform Distributed Multi tiered Applications Java EE Web & Business Components Java EE Containers services
More informationMeeting the requirements of PCI DSS 3.2 standard to user authentication
Meeting the requirements of PCI DSS 3.2 standard to user authentication Using the Indeed Identity products for authentication In April 2016, the new PCI DSS 3.2 version was adopted. Some of this version
More informationFusion Registry 9 SDMX Data and Metadata Management System
Registry 9 Data and Management System Registry 9 is a complete and fully integrated statistical data and metadata management system using. Whether you require a metadata repository supporting a highperformance
More informationIntroduction to MySQL. Database Systems
Introduction to MySQL Database Systems 1 Agenda Bureaucracy Database architecture overview Buzzwords SSH Tunneling Intro to MySQL Comments on homework 2 Homework #1 Submission date is on the website..
More information1Z Oracle. Java Enterprise Edition 5 Enterprise Architect Certified Master
Oracle 1Z0-864 Java Enterprise Edition 5 Enterprise Architect Certified Master Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-864 Answer: A, C QUESTION: 226 Your company is bidding
More informationSPEC Enterprise Java Benchmarks State of the Art and Future Directions
SPEC Enterprise Java Benchmarks State of the Art and Future Directions Samuel Kounev Release Manager, SPEC Java Subcommittee Chair, SPECjms Working Group Kai Sachs SPECjms2007 Lead Developer Databases
More informationHP0-J20. HP Storage Essentials SRM Enterprise Edition.
HP HP0-J20 HP Storage Essentials SRM Enterprise Edition http://killexams.com/exam-detail/hp0-j20 QUESTION: 53 Which operating system is supported for SAP Adaptive Computing Controller (ACC) in HP Storage
More informationProduct Data Sheet: Ignition 8 Industrial Application Platform. A Whole New View
Product Data Sheet: Ignition 8 Industrial Application Platform A Whole New View With the powerful tools, web technologies, and next-generation visualization system we re building in Ignition 8, you ll
More informationSUN Sun Certified Enterprise Architect for J2EE 5. Download Full Version :
SUN 310-052 Sun Certified Enterprise Architect for J2EE 5 Download Full Version : http://killexams.com/pass4sure/exam-detail/310-052 combination of ANSI SQL-99 syntax coupled with some company-specific
More informationOracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (
Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.1) E12692-06 July 2009 This document outlines the certified hardware and software configurations for Oracle Business
More informationWhat is it? What does it do?
JBoss Enterprise Application Platform What is it? JBoss Enterprise Application Platform is the industryleading platform for next-generation enterprise Java applications. It provides a stable, open source
More informationApica ZebraTester. Advanced Load Testing Tool and Cloud Platform
Whether Fortune 100 or the next big startup, Apica s bestin-class load testing and test automation platform helps companies ensure their web and mobile services runs with optimal performance. is an enterprise-level
More informationIBM WebSphere Application Server V3.5, Advanced Edition Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit
Software Announcement July 25, 2000 IBM V3.5, Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit Overview WebSphere Application Server V3.5, manages and integrates
More informationOracle Database and Application Solutions
Oracle Database and Application Solutions Overview The success of Oracle s products is based on three principles: Simplify Enterprises must increase the speed of information delivery with Integrated Systems,
More informationUpdate on EZ-Grid. Priya Raghunath University of Houston. PI : Dr Barbara Chapman
Update on EZ-Grid Priya Raghunath University of Houston PI : Dr Barbara Chapman chapman@cs.uh.edu Outline Campus Grid at the University of Houston (UH) Functionality of EZ-Grid Design and Implementation
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationICAT Job Portal. a generic job submission system built on a scientific data catalog. IWSG 2013 ETH, Zurich, Switzerland 3-5 June 2013
ICAT Job Portal a generic job submission system built on a scientific data catalog IWSG 2013 ETH, Zurich, Switzerland 3-5 June 2013 Steve Fisher, Kevin Phipps and Dan Rolfe Rutherford Appleton Laboratory
More informationEnterSpace Data Sheet
EnterSpace 7.0.4.3 Data Sheet ENTERSPACE BUNDLE COMPONENTS Policy Engine The policy engine is the heart of EnterSpace. It evaluates digital access control policies and makes dynamic, real-time decisions
More informationESPRIT Project N Work Package H User Access. Survey
ESPRIT Project N. 25 338 Work Package H User Access Survey ID: User Access V. 1.0 Date: 28.11.97 Author(s): A. Sinderman/ E. Triep, Status: Fast e.v. Reviewer(s): Distribution: Change History Document
More informationType of Classes Nested Classes Inner Classes Local and Anonymous Inner Classes
Java CORE JAVA Core Java Programing (Course Duration: 40 Hours) Introduction to Java What is Java? Why should we use Java? Java Platform Architecture Java Virtual Machine Java Runtime Environment A Simple
More informationOpen ESB v2, Open ESB.next and Project Fuji. Andreas Egloff Lead Architect SOA / Business Integration Sun Microsystems
Open ESB v2, Open ESB.next and Project Fuji Andreas Egloff Lead Architect SOA / Business Integration Sun Microsystems 1 Introduction 2 Project Open ESB Over 600 members and 600,000 downloads CDDL license
More informationYou Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.
April 14, 2016 You Might Know Us As. 2012 2014 2 TierPoint Corporate Overview TierPoint Data Center Footprint* TierPoint Key Statistics Employees: 870 Markets: 24 Data Centers: 38 Total Raised Floor: 599,000
More informationJava Enterprise Edition
Java Enterprise Edition The Big Problem Enterprise Architecture: Critical, large-scale systems Performance Millions of requests per day Concurrency Thousands of users Transactions Large amounts of data
More informationA non-technical, business introduction to OpenCms 6. Alkacon Software GmbH March, 2006
A non-technical, business introduction to OpenCms 6 Alkacon Software GmbH March, 2006 Index Alkacon OpenCms Overview Alkacon OpenCms 6 main features Screenshots of Highlights Reasons for using OpenCms
More informationThe most common type of certificates are public key certificates. Such server has a certificate is a common shorthand for: there exists a certificate
1 2 The most common type of certificates are public key certificates. Such server has a certificate is a common shorthand for: there exists a certificate signed by some certification authority, which certifies
More informationPrototype 1.0 Specification
Prototype 1.0 Specification Javier Ramos Rodríguez Use Case View The prototype 1.0 will implement some basic functionality of the system to check if the technology used is the appropriate one to implement
More informationProduct Data Sheet: TimeBase
Product Data Sheet: Time Series Database is a high performance event-oriented time-series database engine and messaging middleware. is designed explicitly for very fast population and retrieval of massive
More informationExternal Database Requirements
This chapter provides information about how to configure an external database to store information from Cisco Unified Communications Manager IM and Presence Service features. The following IM and Presence
More informationAgenda Time (PT) 8:45 a.m. Event Platform Opening 9:00 a.m. Keynote - Java: Present and Future Java EE 7 Java SE 8 Java Embedded
Virtual Developer Day: Java 2014 May 6 th 9:00 a.m. - 1:00 p.m. PDT / 12:00 p.m. - 4:00 p.m. EDT / 1:00 p.m. 5:00 p.m. BRT Agenda Time (PT) 8:45 a.m. Event Platform Opening 9:00 a.m. Keynote - Java: Present
More informationSentences Installation Guide. Sentences Version 4.0
Sentences Installation Guide Sentences Version 4.0 A publication of Lazysoft Ltd. Web: www.sentences.com Lazysoft Support: support@sentences.com Copyright 2000-2012 Lazysoft Ltd. All rights reserved. The
More informationCoreMax Consulting s Cyber Security Roadmap
CoreMax Consulting s Cyber Security Roadmap What is a Cyber Security Roadmap? The CoreMax consulting cyber security unit has created a simple process to access the unique needs of each client and allows
More information<Insert Picture Here> MySQL Web Reference Architectures Building Massively Scalable Web Infrastructure
MySQL Web Reference Architectures Building Massively Scalable Web Infrastructure Mario Beck (mario.beck@oracle.com) Principal Sales Consultant MySQL Session Agenda Requirements for
More informationExternal Database Requirements
This guide provides information about how to configure an external database for Cisco Unified Communications Manager IM and Presence Service features. The following features require an external database:
More information"Web Age Speaks!" Webinar Series
"Web Age Speaks!" Webinar Series Java EE Patterns Revisited WebAgeSolutions.com 1 Introduction Bibhas Bhattacharya CTO bibhas@webagesolutions.com Web Age Solutions Premier provider of Java & Java EE training
More informationSAP NetWeaver Process Integration 7.1
SAP NetWeaver Process Integration 7.1 Using Integration Processes (ccbpm) in SAP NetWeaver Process Integration 7.1 SAP NetWeaver Regional Implementation Group SAP NetWeaver Product Management December
More informationHIBERNATE MOCK TEST HIBERNATE MOCK TEST IV
http://www.tutorialspoint.com HIBERNATE MOCK TEST Copyright tutorialspoint.com This section presents you various set of Mock Tests related to Hibernate Framework. You can download these sample mock tests
More informationSailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities
SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust
More informationDatabase Visual ARCHITECT 5.2
Visual ARCHITECT 5.2 Access with Object-Oriented Technology Design, generate and maintain database, application persistent layer with innovative technologies What DB-VA Provides? Design Design database
More informationWhat s New in Ignition v7.9
Product Data Sheet: Ignition Industrial Application Platform VERSION 7.9 What s New in Ignition v7.9 See, Maintain, and Manage Your Enterprise with Ease Ignition by Inductive Automation is the industry
More informationWebCenter Interaction 10gR3 Overview
WebCenter Interaction 10gR3 Overview Brian C. Harrison Product Management WebCenter Interaction and Related Products Summary of Key Points AquaLogic Interaction portal has been renamed
More informationJdbc Connection In Java Example For Oracle 10g
Jdbc Connection In Java Example For Oracle 10g Pdf Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names Example of Routing Based on Request Path Prefix. release 10.2.0.3
More informationIBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace
Programming Announcement September 28, 2004 IBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace Overview
More informationLIT Middleware: Design and Implementation of RFID Middleware based on the EPC Network Architecture
LIT Middleware: Design and Implementation of RFID Middleware based on the EPC Network Architecture Ashad Kabir, Bonghee Hong, Wooseok Ryu, Sungwoo Ahn Dept. of Computer Engineering Pusan National University,
More informationIBM Lotus Domino Product Roadmap
IBM Lotus Domino Product Roadmap Your Name Your Title Today s agenda Domino Strategy What s coming in Domino 8? What s planned beyond Domino 8? Lotus Domino Strategy The integrated messaging & collaboration
More informationPandora FMS Welcome to monitoring heaven
Pandora FMS Welcome to monitoring heaven Pandora FMS 4.0 Technical Presentation 2 What is Pandora FMS? 3 What is Pandora FMS? 4 What is Pandora FMS? Pandora FMS (Flexible Monitoring System) is a monitoring
More informationSphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data
Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker
More informationUA-5200 IIoT Communication Server
UA-5200 Series UA-5200 IIoT Communication Server Features OPC UA Server and MQTT Client Service MQTT Broker Inside AM3354, 1 GHz 256 MB RAM and 512 MB Flash Linux kernel 3.2.14 OS Real-Time Capability
More information(a.k.a.uwcalendar) an institute-wide open-source Java events calendar
Bedework 3.0 (a.k.a.uwcalendar) an institute-wide open-source Java events calendar Communications & Middleware Technologies Rensselaer Polytechnic Institute October 26, 2005 1 Who We Are Mike Douglass
More informationASP.NET on zlinux: A New Workload
ASP.NET on zlinux: A New Workload Mike Friesenegger Novell Tuesday, March 1, 2011 Session Number: 8473 Agenda What is Mono? Suggested approach for a Mono proof-of-concept The Mono tools used for a POC
More informationBioPassport TM Enterprise Server
BioPassport TM Enterprise Server The BioPassport Enterprise AD Server is the intelligence behind all of IdentAlink s biometric modules. Password management for a network or application can cost hundreds
More informationF-Interop Online Platform of Interoperability and Performance Tests for the Internet of Things
22 F-Interop Online Platform of Interoperability and Performance Tests for the Internet of Things Sébastien Ziegler 1, Loïc Baron 2, Brecht Vermeulen 3 and Serge Fdida 2 1 Mandat International, Switzerland
More informationDeploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform
Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,
More informationRemote power and console management in large datacenters
Remote power and console management in large datacenters A Horváth IT department, CERN, CH-1211 Genève 23, Switzerland E-mail: Andras.Horvath@cern.ch Abstract. Today s datacenters are often built of a
More informationFlex2SQL. Contents. Mertech s ISAM to SQL Database Connectivity (ISDBC) Drivers For DataFlex
MERTECH DATA SYSTEMS, INC. 18503 Pines Boulevard, Suite 312 Pembroke Pines, Florida 33029 USA Tel: (954)585-9016 Fax: (866)228-1213 www.mertechdata.com Contents Overview Product Fact Sheet Interaction
More informationASP.NET on zlinux: A New Workload
ASP.NET on zlinux: A New Workload Mike Friesenegger (mikef@novell.com) Novell August 3, 2010 7202 Agenda What is Mono? Suggested approach for a Mono proof-of-concept Preparing the POC environment (The
More informationSEM-BPS Enhancements. Product Management BI
SEM-BPS Enhancements Product Management BI Roadmap Integration of master and transactional data Excel integration Access to plan data via web Integration to operational systems via retractors Process monitoring
More informationAnalytics with IMS and QMF
Analytics with IMS and QMF Steve Mink Worldwide z System Analytics Client Success mink@us.ibm.com March 2015 * IMS Technical Symposium 2015 QMF for z/os 11 QMF for z/os is a visual business intelligence
More informationADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day
ADM960 SAP NetWeaver Application Server Security. COURSE OUTLINE Course Version: 15 Course Duration: 5 Day SAP Copyrights and Trademarks 2015 SAP SE. All rights reserved. No part of this publication may
More informationPROVIDING YOU LOG INFRASTRUCTURE LOG COLLECTION SOLUTIONS TO BUILD A SECURE, FLEXIBLE AND RELIABLE
PROVIDING YOU LOG COLLECTION SOLUTIONS TO BUILD A SECURE, FLEXIBLE AND RELIABLE LOG INFRASTRUCTURE 01 ENTERPRISE EDITION NXLOG KEY FEATURES: DO YOU NEED TO COLLECT LOG DATA OF YOUR EVENTS? NXLOG ENTERPRISE
More informationDatabase Explorer Quickstart
Database Explorer Quickstart Last Revision: Outline 1. Preface 2. Requirements 3. Introduction 4. Creating a Database Connection 1. Configuring a JDBC Driver 2. Creating a Connection Profile 3. Opening
More informationNEW FEATURES ENTIREX OCTOBER. Juergen Lind, Dir. Product Management November 2017
ENTIREX 10.1 2017 OCTOBER NEW FEATURES Juergen Lind, Dir. Product Management November 2017 Software AG provides no commitment to deliver any of the features described herein, and reserves the right to
More informationOverview. Introducing Cisco UCS Central. This chapter includes the following sections: Introducing Cisco UCS Central, page 1
This chapter includes the following sections: Introducing Cisco UCS Central, page 1 Introducing Cisco UCS Central Cisco UCS Central provides scalable management solution for growing Cisco UCS environment.
More informationForeScout CounterACT. Configuration Guide. Version 3.4
ForeScout CounterACT Open Integration Module: Data Exchange Version 3.4 Table of Contents About the Data Exchange Module... 4 About Support for Dual Stack Environments... 4 Requirements... 4 CounterACT
More informationSAP Automation (BC-FES-AIT)
HELP.BCFESRFC Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission
More informationOverview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT
DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor
More informationPractical Aspects of CTI WSN Testbed
Practical Aspects of CTI WSN Testbed Dpt. of Computer Engineering and Informatics, University of Patras, Greece Research Academic Computer Technology Institute (CTI), Patras, Greece 2nd PROSENSE Meeting
More informationCisco Integration Platform
Data Sheet Cisco Integration Platform The Cisco Integration Platform fuels new business agility and innovation by linking data and services from any application - inside the enterprise and out. Product
More informationJava Card Technology-based Corporate Card Solutions
Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives
More informationA non-technical, business introduction to OpenCms 7. Alkacon Software GmbH August, 2007
A non-technical, business introduction to OpenCms 7 Alkacon Software GmbH August, 2007 Index Alkacon OpenCms Overview Alkacon OpenCms 7 main features Screenshots of Highlights Reasons for using OpenCms
More informationSAS ODBC Driver. Overview: SAS ODBC Driver. What Is ODBC? CHAPTER 1
1 CHAPTER 1 SAS ODBC Driver Overview: SAS ODBC Driver 1 What Is ODBC? 1 What Is the SAS ODBC Driver? 2 Types of Data Accessed with the SAS ODBC Driver 3 Understanding SAS 4 SAS Data Sets 4 Unicode UTF-8
More informationCisco Configuration Engine 2.0
Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes
More informationBiometrics. Overview of Authentication
May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication
More informationUpgrade to Webtrends Analytics 8.5: Best Practices
Technical Best Practices 8.5 Software Upgrade Upgrade to Webtrends Analytics 8.5: Best Practices Version 4 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.
More informationBedework 3.0 (a.k.a. UWCalendar)
Bedework 3.0 (a.k.a. UWCalendar) an institute-wide open-source Java events calendar Communications & Middleware Technologies Rensselaer Polytechnic Institute December 5, 2005 1 Who We Are Mike Douglass
More informationCertification Authority
Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying
More informationIBM iseries Models 800 and 810 for small to medium enterprises
Multi-platform management, exceptional price performance IBM iseries Models 800 and 810 for small to medium enterprises Highlights Simple, centralised Simple Windows ** Integration for management of multiple
More informationProgress DataDirect For Business Intelligence And Analytics Vendors
Progress DataDirect For Business Intelligence And Analytics Vendors DATA SHEET FEATURES: Direction connection to a variety of SaaS and on-premises data sources via Progress DataDirect Hybrid Data Pipeline
More informationHitachi Converged Platform for Oracle
Hitachi Converged Platform for Oracle Manfred Drozd, Benchware Ltd. Sponsored by Hitachi Data Systems Corporation Introduction Because of their obvious advantages, engineered platforms are becoming increasingly
More informationJVA-163. Enterprise JavaBeans
JVA-163. Enterprise JavaBeans Version 3.0.2 This course gives the experienced Java developer a thorough grounding in Enterprise JavaBeans -- the Java EE standard for scalable, secure, and transactional
More informationAdvanced Biometric Access Control Training Course # :
Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationAbout Database Adapters
About Database Adapters Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 820 5069 07/08/08 Copyright 2007 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054
More informationUnleash the Power of Secure, Real-Time Collaboration
White Paper Unleash the Power of Secure, Real-Time Collaboration This paper includes security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support Center and Cisco
More informationPostgreSQL and REST API s The Easy Way
Migration and Developer Productivity Solutions PostgreSQL and REST API s The Easy Way Charles Finley, Transformix Computer Corporation http://modernization.xformix.com/resources/articles/ 1 PostgresOpen
More informationDeveloping ASP.Net MVC 4 Web Application
Developing ASP.Net MVC 4 Web Application About this Course In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools and technologies. The focus will
More information