Management of Biometric Data in a Distributed Internet Environment

Size: px
Start display at page:

Download "Management of Biometric Data in a Distributed Internet Environment"

Transcription

1 Submission to: IEEE/IFIP IM 2007, Application Sessions, May 21-25, 2007, München, Germany Management of Biometric Data in a Distributed Internet Environment B. Stiller 1,2, T. Bocek 1, P. Ming 1, F. Eyermann 3, J. Sauerland 3, J. Angrabeit 4, M. Völkl 5, J.-C. Tylka 5 1 University of Zürich, Department of Informatics IFI, Zürich, Switzerland 2 ETH Zürich, Computer Engineering and Networks Lab TIK, Zürich, Switzerland 3 University of Federal Armed Forces, Information Systems Lab IIS, Munich, Germany 4 Codecasters, Niedermoosen, Germany 5 Biometronix GmbH, Munich, Germany This application track paper describes the key technology advances achieved through a component-based design process, meeting right on track all key requirements of management systems for biometric data, such as data protection acts, flexible user and device handling, installation, and operation functions, and grouping functionality for users and devices according to dedicated office environmental needs. 1

2 Outline Introduction Motivation and Project Goals BioLANCC (Biometric Local Area Network Control Center) Scenario Architecture BioLANCC Implementation JBioDC Components, Java SE, Java EE Screenshots Key Features and Conclusions The key technology advances have been implemented in an application called BioLANCC. BioLANCC (Biometric Local Area Network Control Center) is a component based application and highly modular. Another key technology is the new Java-based biometric interface JBioDC, which will be discussed together with BioLANCC. 2

3 Motivation Integrated access control for buildings, function rooms, laboratories for personnel Traditionally use of hard keys Drawbacks of traditional approaches: Large overhead: Employee turnover Loss of keys Change of room access rights The use of biometric data to enable a personalized access control to resources, typically rooms, software packages, or systems, emerges due to a number of advantages. Those include a fine-grained tailored control, avoiding the problem of lost keys, or providing for customized access schedules for resources and persons. 3

4 Authentication Options Authentication by Personal Characteristics/ Biometric Properties Knowledge Physical Ownership Static Dynamic Head Hand -Iris -Face -Teeth -Other - Finger Print - Line of Hand -Other - Signature -Voice -Gesture -Other -PIN - Password - Slogan -Other -Key - Smart Card - Slogan - Certificate of Authority Authentication may be performed by a number of different means. While knowledge and ownership describe the traditional measures, the use of personal characteristics, typically termed biometric properties, becomes much more realistic in its broad and widespread use. Technology has emerged, prices of biometric devices are decreasing, and the Internet as a means of world-wide communications across domains, serves as a transport medium of access control data and its supervision. 4

5 BioLANCC Existing solutions for biometric access management No integration of other manufacturers Single platform solution Lock-In Future use for any resource access control intended BioLANCC Administration software for Biometric data / devices Access management Presence control Single, distributed, networked, platform-independent, userfriendly management application While multiple remote biometric devices are integrated across potentially arbitrary distances, BioLANCC is logically central management application. However, access to BioLANCC can be distributed, which allows remote administration. Existing applications for managing biometric data (VeriAdmin, FingerLAN) do only offer management for a particular manufacturer and cannot be combined with devices from different manufacture. Thus, integration is not possible with current biometric management application. While local access control systems using biometrics are available today, e.g., in support of a single room access, mainly by applying finger print scanners, the interconnection of multiple of such local systems into a centralized management system has been developed partially in vendor-dependent systems. Thus, to cover a wide range of physical distances, e.g., for rooms scattered across a campus or many users located in different company offices around the world, and to cope with a large number of different biometric devices, such as finger print, iris, or face scanners, a new, flexible, and distributed approach became necessary. Therefore, the communication based on Internet protocols serves as a bridge for the physical distance and a suitable as well as new control center manages the biometric data as well as user-specific and device-dependent management data. 5

6 Overall BioLANCC Project Goals Device-independent Integration of devices from different manufacturers Support for many DBs Hibernate: Object/relational mapping MySQL, PostgreSQL, Oracle,... Platform-independent Windows, Mac OS X, Linux, Solaris,... Open standards-based TCP/IP Documented interfaces Integration into existing applications The new management application development termed BioLANCC (Biometric Local Area Network Control Center) determines an important step beyond current management software packages for biometric devices, data, and users. This approach undertaken marks a revolution in biometric administration software due to a number of reasons. Firstly, the TCP/IP-based networked collection and distribution of access control details of manifold biometric devices provides for a location-independent and device-unspecific integrative system. Multi-biometric support is enabled by BioLANCC through the integration of different biometric data into a single, per user-oriented and per device-driven management application. Secondly, the use of object relational mapping libraries allow for a wide range of databases. In combination with the documented interfaces, external data sources from existing applications can be integrated. 6

7 BioLANCC Scenario The remote scenario envisions a world-wide interconnection of access rules, associated to humans and users, where BioLANCC serves as the communication bus and exchange point for access control, supervising, and enrollment data. The example presented shows three locations, which operate independently, and use a single BioLANCC system to maintain all personnel and visitor access data. The grouping concept of locations (biometric devices) and users is highly flexible for subgroups, overlaps, and monitoring groups. 7

8 BioLANCC Architecture User, Operator, Administrator View (Swing / HTML) Controller Model PostgreSQL... Hibernate Log4j JBioDC User Hand Gesture Finger p. Face Iris Other MySQL Java 1.5 Operating System, e.g., Linux, Windows, MacOS, Solaris Additionally, the BioLANCC control center has been designed as a fully platformindependent management application, running on operating systems such as Windows 2000/XP, Linux, various Unix, MacOS, Sun Solaris 10, and others. These possibilities have been achieved due to a standardized architecture using the Java platform, which is combined with a flexible and time-driven access rights and device management scheme for users and devices. In support of the data storage for user and device data, BioLANCC integrates Hibernate and supports common SQL databases, e.g., MySQL, HypersonicSQL, Oracle, Microsoft SQL Server, DB2, Sybase, SAP DB, or PostgreSQL. Various new biometric devices can be integrated via the open interface JBioDC (Java-based Biometric Device Connectivity). 8

9 Component-based Architecture Model View Controller Data exchange with Java Persistence Framework (Entity beans with Hibernate) Java SE 5 with a swing GUI Java EE 5 with facelets for HTML rendering Interfaces For other management applications Interfaces for all kinds of biometric devices (JBioDC) Scalability BioLANCC logically centralized growing devices = growing resource usage Access is distributed / Java EE for scalability BioLANCC uses the MVC pattern for the core components. The model is backed with the Java persistence framework using the Hibernate implementation. The view is split into a Java SE version and a Java EE version. The application server for the Java EE version is JBoss. BioLANCC uses many new features of Java 5 such as generics or annotations. One key feature that makes BioLANCC flexible is the definition of interfaces to allow other applications to communicate. Report and user information can be stored / provided by any data source as long as it conforms to the interface defined in BioLANCC. Scalability is an important requirement. As BioLANCC is logically centralized and the default setup does not consider scalability issues explicitly, the Java EE framework has be used to increase scalability by distributing components. 9

10 JBioDC Java Biometric Device Connectivity High level abstraction layer for biometric devices BioAPI / JBioAPI: low and high level abstraction Interface definition 5 interfaces abstract base device functionalities (Connection, Storage, Smart card, Enrollment, Access schedule) 1 interface for biometric data handling (Template) Not a protocol definition Key features of JBioDC Integrate heterogeneous devices Unified biometric device administration JBioDC stands for Java Biometric Device Connectivity and it is a high level API for communicating with biometric devices. In contrast to BioAPI and its wrapper JBioAPI which defines low an high level interfaces, JBioDC has a reduced set of interfaces. It is important to mention that JBioDC is not a standard, but future work focus on submitting JBioDC as a JSR. JBioDC consists of 5 interfaces. The only mandatory is Connection due to the different nature of biometric devices. In contrast to SNMP which also defines a protocol, JBioDC only defines an interface. One major problem is that no standardized biometric templates exist. Every vendor uses its own format and converting is often not possible. Therefore, the interface Template has only 2 mandatory fields: UserID and TemplateID and everything else is optional. 10

11 Key BioLANCC Features Summary A Java-based access rights management system Platform independency (Java) IP-based communications between centralized user data server and multiple remote biometric devices An open device architecture with manufacturer-independent hardware interfaces (JBioDC) A set of configurable reporting features (including CSV export) An open data base interface (Hibernate) Secure communication (SSL/TLS) Finally, all events and actions performed at access control devices and within the management application are traced and tracked within BioLANCC to offer a powerful reporting and maintenance functionality. Besides a CSV-based export functionality a number of interfaces for a time management and reporting system have been integrated as well. 11

12 Screenshots BioLANCC has been implemented with ease of use in mind. To achieve this goal, intensive usability tests have been conducted and the result has enhanced the appearance and the user experience. 12

13 Conclusions Highly flexible and distributed biometric management system First system world-wide independent of devices (JBioDC) and OS (Java) Lower costs instead of physical key handling No loss of keys and no sharing of personal resources Target Markets SMEs (few devices, small number of resources/doors) Industry (many devices, many locations world-wide) In summary, the BioLANCC management application for biometric data provides the first world-wide platform-independent system in support of multiple biometric devices, flexible user and devices grouping, integration, and installation, and a TCP/IP-based network connectivity for resources across the world. BioLANCC is still under development, but it has already been deployed multiple times. 13

14 Thank you for your attention! Questions? 14

Building the Enterprise

Building the Enterprise Building the Enterprise The Tools of Java Enterprise Edition 2003-2007 DevelopIntelligence LLC Presentation Topics In this presentation, we will discuss: Overview of Java EE Java EE Platform Java EE Development

More information

SCRIPT: An Architecture for IPFIX Data Distribution

SCRIPT: An Architecture for IPFIX Data Distribution SCRIPT Public Workshop January 20, 2010, Zurich, Switzerland SCRIPT: An Architecture for IPFIX Data Distribution Peter Racz Communication Systems Group CSG Department of Informatics IFI University of Zürich

More information

Developing Applications with Java EE 6 on WebLogic Server 12c

Developing Applications with Java EE 6 on WebLogic Server 12c Developing Applications with Java EE 6 on WebLogic Server 12c Duration: 5 Days What you will learn The Developing Applications with Java EE 6 on WebLogic Server 12c course teaches you the skills you need

More information

Cisco Unified Presence 8.0

Cisco Unified Presence 8.0 Cisco Unified Presence 8.0 Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time from any workspace.

More information

Introduction to MySQL. Database Systems

Introduction to MySQL. Database Systems Introduction to MySQL Database Systems 1 Agenda Bureaucracy Database architecture overview SSH Tunneling Intro to MySQL Comments on homework 2 Homework #1 Submission date is on the website.. (No late arrivals

More information

An Open Source Java Framework for Biometric Web Authentication based on BioAPI

An Open Source Java Framework for Biometric Web Authentication based on BioAPI An Open Source Java Framework for Biometric Web Authentication based on BioAPI Elisardo González Agulla, Enrique Otero Muras, José Luis Alba Castro, and Carmen García Mateo Department of Signal Theory

More information

Fingerprint Security and Access Tracking System

Fingerprint Security and Access Tracking System Fingerprint Security and Access Tracking System Samuel Tebbs IT Innovation Centre, University of Birmingham 08/09/2017 Fingerprint Security and Access Tracking Contents Introduction Requirements Security

More information

Introduction to Cisco UCS Central

Introduction to Cisco UCS Central Introducing Cisco UCS Central, page 1 Introducing Cisco UCS Central Cisco UCS Central provides scalable management solution for growing Cisco UCS environment. Cisco UCS Central simplifies the management

More information

Enhydra Shark. What is Enhydra Shark? Table of Contents

Enhydra Shark. What is Enhydra Shark? Table of Contents Table of Contents What is Enhydra Shark?... 1 StartingShark...2 ConfiguringShark...2 Setting "enginename" parameter...3 Setting kernel behaviour in the case of unsatisfied split conditions... 4 Setting

More information

How To Get Database Schema In Java Using >>>CLICK HERE<<<

How To Get Database Schema In Java Using >>>CLICK HERE<<< How To Get Database Schema In Java Using Eclipse Pdf Go To Table Of Contents Search, PDF, Comments EclipseLink is suitable for use with a wide range of Java Enterprise Edition (Java to a relational database

More information

Database code in PL-SQL PL-SQL was used for the database code. It is ready to use on any Oracle platform, running under Linux, Windows or Solaris.

Database code in PL-SQL PL-SQL was used for the database code. It is ready to use on any Oracle platform, running under Linux, Windows or Solaris. Alkindi Software Technology Introduction Alkindi designed a state of the art collaborative filtering system to work well for both largeand small-scale systems. This document serves as an overview of how

More information

Rensselaer and UWCalendar2 an institute-wide open-source Java events calendar. Communication & Collaboration Technologies

Rensselaer and UWCalendar2 an institute-wide open-source Java events calendar. Communication & Collaboration Technologies Rensselaer and UWCalendar2 an institute-wide open-source Java events calendar Communication & Collaboration Technologies Rensselaer Polytechnic Institute June 21, 2004 1 Who We Are Mike Douglass - Senior

More information

open source community experience distilled

open source community experience distilled Java EE 6 Development with NetBeans 7 Develop professional enterprise Java EE applications quickly and easily with this popular IDE David R. Heffelfinger [ open source community experience distilled PUBLISHING

More information

Oracle - Developing Applications for the Java EE 7 Platform Ed 1 (Training On Demand)

Oracle - Developing Applications for the Java EE 7 Platform Ed 1 (Training On Demand) Oracle - Developing Applications for the Java EE 7 Platform Ed 1 (Training On Demand) Code: URL: D101074GC10 View Online The Developing Applications for the Java EE 7 Platform training teaches you how

More information

Sysgem Enterprise Manager

Sysgem Enterprise Manager Sysgem Enterprise Manager Sysgem Enterprise Manager (SEM) The Sysgem Enterprise Manager (SEM) provides companies of all sizes with a simple, powerful tool for managing IT, auditing security, administering

More information

Java EE Application Assembly & Deployment Packaging Applications, Java EE modules. Model View Controller (MVC)2 Architecture & Packaging EJB Module

Java EE Application Assembly & Deployment Packaging Applications, Java EE modules. Model View Controller (MVC)2 Architecture & Packaging EJB Module Java Platform, Enterprise Edition 5 (Java EE 5) Core Java EE Java EE 5 Platform Overview Java EE Platform Distributed Multi tiered Applications Java EE Web & Business Components Java EE Containers services

More information

Meeting the requirements of PCI DSS 3.2 standard to user authentication

Meeting the requirements of PCI DSS 3.2 standard to user authentication Meeting the requirements of PCI DSS 3.2 standard to user authentication Using the Indeed Identity products for authentication In April 2016, the new PCI DSS 3.2 version was adopted. Some of this version

More information

Fusion Registry 9 SDMX Data and Metadata Management System

Fusion Registry 9 SDMX Data and Metadata Management System Registry 9 Data and Management System Registry 9 is a complete and fully integrated statistical data and metadata management system using. Whether you require a metadata repository supporting a highperformance

More information

Introduction to MySQL. Database Systems

Introduction to MySQL. Database Systems Introduction to MySQL Database Systems 1 Agenda Bureaucracy Database architecture overview Buzzwords SSH Tunneling Intro to MySQL Comments on homework 2 Homework #1 Submission date is on the website..

More information

1Z Oracle. Java Enterprise Edition 5 Enterprise Architect Certified Master

1Z Oracle. Java Enterprise Edition 5 Enterprise Architect Certified Master Oracle 1Z0-864 Java Enterprise Edition 5 Enterprise Architect Certified Master Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-864 Answer: A, C QUESTION: 226 Your company is bidding

More information

SPEC Enterprise Java Benchmarks State of the Art and Future Directions

SPEC Enterprise Java Benchmarks State of the Art and Future Directions SPEC Enterprise Java Benchmarks State of the Art and Future Directions Samuel Kounev Release Manager, SPEC Java Subcommittee Chair, SPECjms Working Group Kai Sachs SPECjms2007 Lead Developer Databases

More information

HP0-J20. HP Storage Essentials SRM Enterprise Edition.

HP0-J20. HP Storage Essentials SRM Enterprise Edition. HP HP0-J20 HP Storage Essentials SRM Enterprise Edition http://killexams.com/exam-detail/hp0-j20 QUESTION: 53 Which operating system is supported for SAP Adaptive Computing Controller (ACC) in HP Storage

More information

Product Data Sheet: Ignition 8 Industrial Application Platform. A Whole New View

Product Data Sheet: Ignition 8 Industrial Application Platform. A Whole New View Product Data Sheet: Ignition 8 Industrial Application Platform A Whole New View With the powerful tools, web technologies, and next-generation visualization system we re building in Ignition 8, you ll

More information

SUN Sun Certified Enterprise Architect for J2EE 5. Download Full Version :

SUN Sun Certified Enterprise Architect for J2EE 5. Download Full Version : SUN 310-052 Sun Certified Enterprise Architect for J2EE 5 Download Full Version : http://killexams.com/pass4sure/exam-detail/310-052 combination of ANSI SQL-99 syntax coupled with some company-specific

More information

Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (

Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 ( Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.1) E12692-06 July 2009 This document outlines the certified hardware and software configurations for Oracle Business

More information

What is it? What does it do?

What is it? What does it do? JBoss Enterprise Application Platform What is it? JBoss Enterprise Application Platform is the industryleading platform for next-generation enterprise Java applications. It provides a stable, open source

More information

Apica ZebraTester. Advanced Load Testing Tool and Cloud Platform

Apica ZebraTester. Advanced Load Testing Tool and Cloud Platform Whether Fortune 100 or the next big startup, Apica s bestin-class load testing and test automation platform helps companies ensure their web and mobile services runs with optimal performance. is an enterprise-level

More information

IBM WebSphere Application Server V3.5, Advanced Edition Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit

IBM WebSphere Application Server V3.5, Advanced Edition Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit Software Announcement July 25, 2000 IBM V3.5, Expands Platform Support and Leverages the Performance of the Java 2 Software Development Kit Overview WebSphere Application Server V3.5, manages and integrates

More information

Oracle Database and Application Solutions

Oracle Database and Application Solutions Oracle Database and Application Solutions Overview The success of Oracle s products is based on three principles: Simplify Enterprises must increase the speed of information delivery with Integrated Systems,

More information

Update on EZ-Grid. Priya Raghunath University of Houston. PI : Dr Barbara Chapman

Update on EZ-Grid. Priya Raghunath University of Houston. PI : Dr Barbara Chapman Update on EZ-Grid Priya Raghunath University of Houston PI : Dr Barbara Chapman chapman@cs.uh.edu Outline Campus Grid at the University of Houston (UH) Functionality of EZ-Grid Design and Implementation

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

ICAT Job Portal. a generic job submission system built on a scientific data catalog. IWSG 2013 ETH, Zurich, Switzerland 3-5 June 2013

ICAT Job Portal. a generic job submission system built on a scientific data catalog. IWSG 2013 ETH, Zurich, Switzerland 3-5 June 2013 ICAT Job Portal a generic job submission system built on a scientific data catalog IWSG 2013 ETH, Zurich, Switzerland 3-5 June 2013 Steve Fisher, Kevin Phipps and Dan Rolfe Rutherford Appleton Laboratory

More information

EnterSpace Data Sheet

EnterSpace Data Sheet EnterSpace 7.0.4.3 Data Sheet ENTERSPACE BUNDLE COMPONENTS Policy Engine The policy engine is the heart of EnterSpace. It evaluates digital access control policies and makes dynamic, real-time decisions

More information

ESPRIT Project N Work Package H User Access. Survey

ESPRIT Project N Work Package H User Access. Survey ESPRIT Project N. 25 338 Work Package H User Access Survey ID: User Access V. 1.0 Date: 28.11.97 Author(s): A. Sinderman/ E. Triep, Status: Fast e.v. Reviewer(s): Distribution: Change History Document

More information

Type of Classes Nested Classes Inner Classes Local and Anonymous Inner Classes

Type of Classes Nested Classes Inner Classes Local and Anonymous Inner Classes Java CORE JAVA Core Java Programing (Course Duration: 40 Hours) Introduction to Java What is Java? Why should we use Java? Java Platform Architecture Java Virtual Machine Java Runtime Environment A Simple

More information

Open ESB v2, Open ESB.next and Project Fuji. Andreas Egloff Lead Architect SOA / Business Integration Sun Microsystems

Open ESB v2, Open ESB.next and Project Fuji. Andreas Egloff Lead Architect SOA / Business Integration Sun Microsystems Open ESB v2, Open ESB.next and Project Fuji Andreas Egloff Lead Architect SOA / Business Integration Sun Microsystems 1 Introduction 2 Project Open ESB Over 600 members and 600,000 downloads CDDL license

More information

You Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.

You Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved. April 14, 2016 You Might Know Us As. 2012 2014 2 TierPoint Corporate Overview TierPoint Data Center Footprint* TierPoint Key Statistics Employees: 870 Markets: 24 Data Centers: 38 Total Raised Floor: 599,000

More information

Java Enterprise Edition

Java Enterprise Edition Java Enterprise Edition The Big Problem Enterprise Architecture: Critical, large-scale systems Performance Millions of requests per day Concurrency Thousands of users Transactions Large amounts of data

More information

A non-technical, business introduction to OpenCms 6. Alkacon Software GmbH March, 2006

A non-technical, business introduction to OpenCms 6. Alkacon Software GmbH March, 2006 A non-technical, business introduction to OpenCms 6 Alkacon Software GmbH March, 2006 Index Alkacon OpenCms Overview Alkacon OpenCms 6 main features Screenshots of Highlights Reasons for using OpenCms

More information

The most common type of certificates are public key certificates. Such server has a certificate is a common shorthand for: there exists a certificate

The most common type of certificates are public key certificates. Such server has a certificate is a common shorthand for: there exists a certificate 1 2 The most common type of certificates are public key certificates. Such server has a certificate is a common shorthand for: there exists a certificate signed by some certification authority, which certifies

More information

Prototype 1.0 Specification

Prototype 1.0 Specification Prototype 1.0 Specification Javier Ramos Rodríguez Use Case View The prototype 1.0 will implement some basic functionality of the system to check if the technology used is the appropriate one to implement

More information

Product Data Sheet: TimeBase

Product Data Sheet: TimeBase Product Data Sheet: Time Series Database is a high performance event-oriented time-series database engine and messaging middleware. is designed explicitly for very fast population and retrieval of massive

More information

External Database Requirements

External Database Requirements This chapter provides information about how to configure an external database to store information from Cisco Unified Communications Manager IM and Presence Service features. The following IM and Presence

More information

Agenda Time (PT) 8:45 a.m. Event Platform Opening 9:00 a.m. Keynote - Java: Present and Future Java EE 7 Java SE 8 Java Embedded

Agenda Time (PT) 8:45 a.m. Event Platform Opening 9:00 a.m. Keynote - Java: Present and Future Java EE 7 Java SE 8 Java Embedded Virtual Developer Day: Java 2014 May 6 th 9:00 a.m. - 1:00 p.m. PDT / 12:00 p.m. - 4:00 p.m. EDT / 1:00 p.m. 5:00 p.m. BRT Agenda Time (PT) 8:45 a.m. Event Platform Opening 9:00 a.m. Keynote - Java: Present

More information

Sentences Installation Guide. Sentences Version 4.0

Sentences Installation Guide. Sentences Version 4.0 Sentences Installation Guide Sentences Version 4.0 A publication of Lazysoft Ltd. Web: www.sentences.com Lazysoft Support: support@sentences.com Copyright 2000-2012 Lazysoft Ltd. All rights reserved. The

More information

CoreMax Consulting s Cyber Security Roadmap

CoreMax Consulting s Cyber Security Roadmap CoreMax Consulting s Cyber Security Roadmap What is a Cyber Security Roadmap? The CoreMax consulting cyber security unit has created a simple process to access the unique needs of each client and allows

More information

<Insert Picture Here> MySQL Web Reference Architectures Building Massively Scalable Web Infrastructure

<Insert Picture Here> MySQL Web Reference Architectures Building Massively Scalable Web Infrastructure MySQL Web Reference Architectures Building Massively Scalable Web Infrastructure Mario Beck (mario.beck@oracle.com) Principal Sales Consultant MySQL Session Agenda Requirements for

More information

External Database Requirements

External Database Requirements This guide provides information about how to configure an external database for Cisco Unified Communications Manager IM and Presence Service features. The following features require an external database:

More information

"Web Age Speaks!" Webinar Series

Web Age Speaks! Webinar Series "Web Age Speaks!" Webinar Series Java EE Patterns Revisited WebAgeSolutions.com 1 Introduction Bibhas Bhattacharya CTO bibhas@webagesolutions.com Web Age Solutions Premier provider of Java & Java EE training

More information

SAP NetWeaver Process Integration 7.1

SAP NetWeaver Process Integration 7.1 SAP NetWeaver Process Integration 7.1 Using Integration Processes (ccbpm) in SAP NetWeaver Process Integration 7.1 SAP NetWeaver Regional Implementation Group SAP NetWeaver Product Management December

More information

HIBERNATE MOCK TEST HIBERNATE MOCK TEST IV

HIBERNATE MOCK TEST HIBERNATE MOCK TEST IV http://www.tutorialspoint.com HIBERNATE MOCK TEST Copyright tutorialspoint.com This section presents you various set of Mock Tests related to Hibernate Framework. You can download these sample mock tests

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

Database Visual ARCHITECT 5.2

Database Visual ARCHITECT 5.2 Visual ARCHITECT 5.2 Access with Object-Oriented Technology Design, generate and maintain database, application persistent layer with innovative technologies What DB-VA Provides? Design Design database

More information

What s New in Ignition v7.9

What s New in Ignition v7.9 Product Data Sheet: Ignition Industrial Application Platform VERSION 7.9 What s New in Ignition v7.9 See, Maintain, and Manage Your Enterprise with Ease Ignition by Inductive Automation is the industry

More information

WebCenter Interaction 10gR3 Overview

WebCenter Interaction 10gR3 Overview WebCenter Interaction 10gR3 Overview Brian C. Harrison Product Management WebCenter Interaction and Related Products Summary of Key Points AquaLogic Interaction portal has been renamed

More information

Jdbc Connection In Java Example For Oracle 10g

Jdbc Connection In Java Example For Oracle 10g Jdbc Connection In Java Example For Oracle 10g Pdf Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names Example of Routing Based on Request Path Prefix. release 10.2.0.3

More information

IBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace

IBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace Programming Announcement September 28, 2004 IBM Host Access Client Package for Multiplatforms, V5 IBM Personal Communications and IBM WebSphere Host On-Demand Migrate to the Web at your own pace Overview

More information

LIT Middleware: Design and Implementation of RFID Middleware based on the EPC Network Architecture

LIT Middleware: Design and Implementation of RFID Middleware based on the EPC Network Architecture LIT Middleware: Design and Implementation of RFID Middleware based on the EPC Network Architecture Ashad Kabir, Bonghee Hong, Wooseok Ryu, Sungwoo Ahn Dept. of Computer Engineering Pusan National University,

More information

IBM Lotus Domino Product Roadmap

IBM Lotus Domino Product Roadmap IBM Lotus Domino Product Roadmap Your Name Your Title Today s agenda Domino Strategy What s coming in Domino 8? What s planned beyond Domino 8? Lotus Domino Strategy The integrated messaging & collaboration

More information

Pandora FMS Welcome to monitoring heaven

Pandora FMS Welcome to monitoring heaven Pandora FMS Welcome to monitoring heaven Pandora FMS 4.0 Technical Presentation 2 What is Pandora FMS? 3 What is Pandora FMS? 4 What is Pandora FMS? Pandora FMS (Flexible Monitoring System) is a monitoring

More information

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker

More information

UA-5200 IIoT Communication Server

UA-5200 IIoT Communication Server UA-5200 Series UA-5200 IIoT Communication Server Features OPC UA Server and MQTT Client Service MQTT Broker Inside AM3354, 1 GHz 256 MB RAM and 512 MB Flash Linux kernel 3.2.14 OS Real-Time Capability

More information

(a.k.a.uwcalendar) an institute-wide open-source Java events calendar

(a.k.a.uwcalendar) an institute-wide open-source Java events calendar Bedework 3.0 (a.k.a.uwcalendar) an institute-wide open-source Java events calendar Communications & Middleware Technologies Rensselaer Polytechnic Institute October 26, 2005 1 Who We Are Mike Douglass

More information

ASP.NET on zlinux: A New Workload

ASP.NET on zlinux: A New Workload ASP.NET on zlinux: A New Workload Mike Friesenegger Novell Tuesday, March 1, 2011 Session Number: 8473 Agenda What is Mono? Suggested approach for a Mono proof-of-concept The Mono tools used for a POC

More information

BioPassport TM Enterprise Server

BioPassport TM Enterprise Server BioPassport TM Enterprise Server The BioPassport Enterprise AD Server is the intelligence behind all of IdentAlink s biometric modules. Password management for a network or application can cost hundreds

More information

F-Interop Online Platform of Interoperability and Performance Tests for the Internet of Things

F-Interop Online Platform of Interoperability and Performance Tests for the Internet of Things 22 F-Interop Online Platform of Interoperability and Performance Tests for the Internet of Things Sébastien Ziegler 1, Loïc Baron 2, Brecht Vermeulen 3 and Serge Fdida 2 1 Mandat International, Switzerland

More information

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,

More information

Remote power and console management in large datacenters

Remote power and console management in large datacenters Remote power and console management in large datacenters A Horváth IT department, CERN, CH-1211 Genève 23, Switzerland E-mail: Andras.Horvath@cern.ch Abstract. Today s datacenters are often built of a

More information

Flex2SQL. Contents. Mertech s ISAM to SQL Database Connectivity (ISDBC) Drivers For DataFlex

Flex2SQL. Contents. Mertech s ISAM to SQL Database Connectivity (ISDBC) Drivers For DataFlex MERTECH DATA SYSTEMS, INC. 18503 Pines Boulevard, Suite 312 Pembroke Pines, Florida 33029 USA Tel: (954)585-9016 Fax: (866)228-1213 www.mertechdata.com Contents Overview Product Fact Sheet Interaction

More information

ASP.NET on zlinux: A New Workload

ASP.NET on zlinux: A New Workload ASP.NET on zlinux: A New Workload Mike Friesenegger (mikef@novell.com) Novell August 3, 2010 7202 Agenda What is Mono? Suggested approach for a Mono proof-of-concept Preparing the POC environment (The

More information

SEM-BPS Enhancements. Product Management BI

SEM-BPS Enhancements. Product Management BI SEM-BPS Enhancements Product Management BI Roadmap Integration of master and transactional data Excel integration Access to plan data via web Integration to operational systems via retractors Process monitoring

More information

Analytics with IMS and QMF

Analytics with IMS and QMF Analytics with IMS and QMF Steve Mink Worldwide z System Analytics Client Success mink@us.ibm.com March 2015 * IMS Technical Symposium 2015 QMF for z/os 11 QMF for z/os is a visual business intelligence

More information

ADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day

ADM960. SAP NetWeaver Application Server Security COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day ADM960 SAP NetWeaver Application Server Security. COURSE OUTLINE Course Version: 15 Course Duration: 5 Day SAP Copyrights and Trademarks 2015 SAP SE. All rights reserved. No part of this publication may

More information

PROVIDING YOU LOG INFRASTRUCTURE LOG COLLECTION SOLUTIONS TO BUILD A SECURE, FLEXIBLE AND RELIABLE

PROVIDING YOU LOG INFRASTRUCTURE LOG COLLECTION SOLUTIONS TO BUILD A SECURE, FLEXIBLE AND RELIABLE PROVIDING YOU LOG COLLECTION SOLUTIONS TO BUILD A SECURE, FLEXIBLE AND RELIABLE LOG INFRASTRUCTURE 01 ENTERPRISE EDITION NXLOG KEY FEATURES: DO YOU NEED TO COLLECT LOG DATA OF YOUR EVENTS? NXLOG ENTERPRISE

More information

Database Explorer Quickstart

Database Explorer Quickstart Database Explorer Quickstart Last Revision: Outline 1. Preface 2. Requirements 3. Introduction 4. Creating a Database Connection 1. Configuring a JDBC Driver 2. Creating a Connection Profile 3. Opening

More information

NEW FEATURES ENTIREX OCTOBER. Juergen Lind, Dir. Product Management November 2017

NEW FEATURES ENTIREX OCTOBER. Juergen Lind, Dir. Product Management November 2017 ENTIREX 10.1 2017 OCTOBER NEW FEATURES Juergen Lind, Dir. Product Management November 2017 Software AG provides no commitment to deliver any of the features described herein, and reserves the right to

More information

Overview. Introducing Cisco UCS Central. This chapter includes the following sections: Introducing Cisco UCS Central, page 1

Overview. Introducing Cisco UCS Central. This chapter includes the following sections: Introducing Cisco UCS Central, page 1 This chapter includes the following sections: Introducing Cisco UCS Central, page 1 Introducing Cisco UCS Central Cisco UCS Central provides scalable management solution for growing Cisco UCS environment.

More information

ForeScout CounterACT. Configuration Guide. Version 3.4

ForeScout CounterACT. Configuration Guide. Version 3.4 ForeScout CounterACT Open Integration Module: Data Exchange Version 3.4 Table of Contents About the Data Exchange Module... 4 About Support for Dual Stack Environments... 4 Requirements... 4 CounterACT

More information

SAP Automation (BC-FES-AIT)

SAP Automation (BC-FES-AIT) HELP.BCFESRFC Release 4.6C SAP AG Copyright Copyright 2001 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission

More information

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor

More information

Practical Aspects of CTI WSN Testbed

Practical Aspects of CTI WSN Testbed Practical Aspects of CTI WSN Testbed Dpt. of Computer Engineering and Informatics, University of Patras, Greece Research Academic Computer Technology Institute (CTI), Patras, Greece 2nd PROSENSE Meeting

More information

Cisco Integration Platform

Cisco Integration Platform Data Sheet Cisco Integration Platform The Cisco Integration Platform fuels new business agility and innovation by linking data and services from any application - inside the enterprise and out. Product

More information

Java Card Technology-based Corporate Card Solutions

Java Card Technology-based Corporate Card Solutions Java Card Technology-based Corporate Card Solutions Jack C. Pan, Leader and Sr. Architect Hervé Garcia, Tech. Project Manager econsumer Emerging Technologies, Citibank Overall Presentation Goal The objectives

More information

A non-technical, business introduction to OpenCms 7. Alkacon Software GmbH August, 2007

A non-technical, business introduction to OpenCms 7. Alkacon Software GmbH August, 2007 A non-technical, business introduction to OpenCms 7 Alkacon Software GmbH August, 2007 Index Alkacon OpenCms Overview Alkacon OpenCms 7 main features Screenshots of Highlights Reasons for using OpenCms

More information

SAS ODBC Driver. Overview: SAS ODBC Driver. What Is ODBC? CHAPTER 1

SAS ODBC Driver. Overview: SAS ODBC Driver. What Is ODBC? CHAPTER 1 1 CHAPTER 1 SAS ODBC Driver Overview: SAS ODBC Driver 1 What Is ODBC? 1 What Is the SAS ODBC Driver? 2 Types of Data Accessed with the SAS ODBC Driver 3 Understanding SAS 4 SAS Data Sets 4 Unicode UTF-8

More information

Cisco Configuration Engine 2.0

Cisco Configuration Engine 2.0 Cisco Configuration Engine 2.0 The Cisco Configuration Engine provides a unified, secure solution for automating the deployment of Cisco customer premises equipment (CPE). This scalable product distributes

More information

Biometrics. Overview of Authentication

Biometrics. Overview of Authentication May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication

More information

Upgrade to Webtrends Analytics 8.5: Best Practices

Upgrade to Webtrends Analytics 8.5: Best Practices Technical Best Practices 8.5 Software Upgrade Upgrade to Webtrends Analytics 8.5: Best Practices Version 4 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.

More information

Bedework 3.0 (a.k.a. UWCalendar)

Bedework 3.0 (a.k.a. UWCalendar) Bedework 3.0 (a.k.a. UWCalendar) an institute-wide open-source Java events calendar Communications & Middleware Technologies Rensselaer Polytechnic Institute December 5, 2005 1 Who We Are Mike Douglass

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

IBM iseries Models 800 and 810 for small to medium enterprises

IBM iseries Models 800 and 810 for small to medium enterprises Multi-platform management, exceptional price performance IBM iseries Models 800 and 810 for small to medium enterprises Highlights Simple, centralised Simple Windows ** Integration for management of multiple

More information

Progress DataDirect For Business Intelligence And Analytics Vendors

Progress DataDirect For Business Intelligence And Analytics Vendors Progress DataDirect For Business Intelligence And Analytics Vendors DATA SHEET FEATURES: Direction connection to a variety of SaaS and on-premises data sources via Progress DataDirect Hybrid Data Pipeline

More information

Hitachi Converged Platform for Oracle

Hitachi Converged Platform for Oracle Hitachi Converged Platform for Oracle Manfred Drozd, Benchware Ltd. Sponsored by Hitachi Data Systems Corporation Introduction Because of their obvious advantages, engineered platforms are becoming increasingly

More information

JVA-163. Enterprise JavaBeans

JVA-163. Enterprise JavaBeans JVA-163. Enterprise JavaBeans Version 3.0.2 This course gives the experienced Java developer a thorough grounding in Enterprise JavaBeans -- the Java EE standard for scalable, secure, and transactional

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

About Database Adapters

About Database Adapters About Database Adapters Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 820 5069 07/08/08 Copyright 2007 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054

More information

Unleash the Power of Secure, Real-Time Collaboration

Unleash the Power of Secure, Real-Time Collaboration White Paper Unleash the Power of Secure, Real-Time Collaboration This paper includes security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support Center and Cisco

More information

PostgreSQL and REST API s The Easy Way

PostgreSQL and REST API s The Easy Way Migration and Developer Productivity Solutions PostgreSQL and REST API s The Easy Way Charles Finley, Transformix Computer Corporation http://modernization.xformix.com/resources/articles/ 1 PostgresOpen

More information

Developing ASP.Net MVC 4 Web Application

Developing ASP.Net MVC 4 Web Application Developing ASP.Net MVC 4 Web Application About this Course In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools and technologies. The focus will

More information