CTI-TC Weekly Working Sessions
|
|
- Rosa Osborne
- 6 years ago
- Views:
Transcription
1 CTI-TC Weekly Working Sessions Meeting Date: October 18, 2016 Time: 15:00:00 UTC Purpose: Weekly CTI-TC Joint Working Session Attendees: Agenda: Jordan - Moderator Darley Christian Hunt Rich Piazza TAXII 2.0 Discussions Meeting Notes Greg Back Dave Cridland Davidson Taylor Jon Baker Katz Jane Ginn - Recorder Others Had a discussion after last call on working on a TAXII Workflow to illustrate various Questions, potential problems, gaps We ve had some people on Slack - Started with idea that you have a STIX report then have a series of Refs - How would a customer or End-User de-reference all of these Refs? - How to automatically dereference them - We d like to step through this Workflow today to see if there are any questions - Has everyone had a chance to go through it? Why don t you go through it? I ve written code so I can push a button and go through this One of the things we came across is that we see that what people wanted Say you have a STIX object and you want to dereference it Say SoltraEdge is advertising info from there you can go and identify the domain names What we discovered was that there is no way to go and identify a Domain Name We need to develop a solution for That is a potential gap that we have identified For each Referenced object there would be an Object in the Collections Resource Used the example for foo Have an ID Filter Issue a GET Request and filter it by ID We ve also talked about a Version Filter or specify All If the Version is not specified, then you would be returned the most recent Version One open question that we had some discussion on Slack Should TAXII be married to STIX IDs? Reference in a normal, RESTful way or URL parameter We are leaning towards NOT being married to STIX We want to make sure that everyone agrees on this.
2 I don t mind if TAXII supports different schemes But, we must have as an MTI that STIX Can be returned Then that is the question How to do that This would be a Filter of the Objects For TAXII API, are we going to require the exact ID of the STIX Object Are we putting requirements on the STIX Schema, or not. My feeling - Beyond being a valid URL, we should be able to use any ID I ll chime in it should be a requirement of the Filter I also agree with MTI My only concern is that that we need to make sure the TAXII server supports the ID Can we cover this through a Discovery Request? From how the Discovery Request return show how the format should be? Yea, we could (gave example of how it might work) Explained further what he means I think it makes a lot more sense to have it discover it through the URI Discusses how it might work We are not hearing people complain about the Filter All done in one way I think we need to be cautious about building in too much optionality we ve been down that road Let s focus on the MTI for this this release OK One of the other things we ve talked about for a later release We need to be able to tell server About how much content the client can receive at one time Provide an X-header that limits the amount of data One of the things that has been brought up is a Range-header instead of X-header If anyone else knows of other native commands, let us know With ID, it should be available as a Filter and Type as a Filter Type would be like Indicator Incident, etc. - Also some discussion on Versioning - Also, idea behind the Depth parameter then would tell them to resolve We are not yet talking about how it would be encapsulated Gave example of how would work With a Report object - It might have a Sighting object - In sighting objects they have the ability to have other references - The Depth idea is really a way to pull information about Sighting objects - There are people with mixed feelings about this Page 2
3 Is there a way that you can specify that you want the full depth? I m sure you could you want to make sure you are not getting too much For a consumer there should be a way to set a Max Depth Plus 1 to Negative 1 I ll make note of that You might be making too many HTTP Requests in order to get a full report I agree, but we need to look at what that means for Implementers in terms of the volume of data We also need to make sure that pagination is there. Gave example of how a server would respond That opens up the pagination question If we do depth, we need to handle this Can we exchange IDs for each Object You would only have 2 HTTP requests You still go to that recursion, because that is one off Explains how it works I don t think it is a substitute for Depth, just for Depth equals 1 It feels like a simpler solution and more predictable Do we have query parameter for Time? Gave example We had Long Polling as a discussion early on We discussed in Brussels But we tabled for now Open to standard Time-outs There are some standard things that we will use with HTTP Another issue is when you want to start doing recursion through the graph [Gave example of recursion through the graph] It may work in conjunction with Depth the idea of how to Walk through the Graph I think that would be a combination of the Depth with the Query It might be as simple as setting up a series of Calls We don t really If I have a Threat Actor ID, and then gave example of how We could all that support How many of the STIX properties we will make as URL properties This ability to walk the graph, it will be very useful We provided that kind of capability in our system you need to define which properties you Can pivot on We had to add a lot of additional information Gave example of Time Information We don t want to bite off more than we can chew for this version Gray Pivoting and referencing are two key things Page 3
4 Are we still looking at 6-month releases? My personal opinion is that we would like to have that The reason I asked is to let the Community know what to expect I agree with you we need to get the opinions of all What will be life boated to the next release The point of this exercise is to walk through end-to-end so we can walk through Went on to describe the Server Response section Two ways that encoding of version can be handled Discussed how MIME type handles it Showed how MIME type syntax would be used for Versioning For clarification, we won t have to change the MIME type, right? That is a decision the STIX SC needs to make With a Version that is not required, right? Explained how I like that Moving down Talked about JSON representation and how the data is returned One of the open questions How to handle HTTP redirect to a different location If you went to a TAXII API Is there a reason to prohibit redirects? In TAXII, what would be the purpose of that? Gave example of how it would be used in a rewrite Another Use Case would be Vanity IDs HTTP 206 Jason found this as an option we added explained how it would work Discussed more about Error Codes This came up in Jan/Feb when we first started talking about Collections Gave examples of high volume versus low volume Servers Gave examples of how to do optimizations We want to make sure that the Spec can accommodate the high throughput vendors So stepping through the example here You ask for some number then ask for a Filter Described how the 4.3 Example would work I think it is a pretty good, pretty useful Workflow Jane Asked the question about referencing Domain Names I think we need to get the Workflow done, then we need to identify how to Identify where that we find that exists Page 4
5 This is something that Terry has talked about for a while how things are discoverable It is a lot more complex than it seems I think it is more than how to identify where to get a data feed Maybe you have the producers tagged Created by Ref Or, maybe you join a new Trust Group and you need to retrieve Data ings I think it needs to be a parking lot item for now Now it has been identified in a theoretical exercise but, not an issue in practice One of the things that need to be done end-to-end How does the client know that the Client and Server can talk to each other? We need to make sure that things just work Along those lines, we need to be clear about the quality of the data feed for That report The assumption of this that you get some random report needs clarification Going further if a Server does not want to be a Broker Good point That is something that is left to implementation and that is where it should stay Gave example of how it would work could you add those comments into the document to your point if I go and ask for an indicator How do I dereference that? Gave example of how it would work I chose the Report as an example I wanted to do something that could help us illustrate problems We are making an assumption of getting a series of data I want to make sure that this part works first Yea, that makes sense, I just want to make sure that assumptions are written down Started adding text on potential gaps in the Workflow document I would encourage you all to go through and add your comments Jason has been pretty vocal so far telling us where we are going wrong Thanks everybody for dialing in We d like to stabilize this document by the end of this week. With that, we ll close the call. ******************************************************** ****** Meeting Terminated Page 5
CTI-TC Weekly Working Sessions
CTI-TC Weekly Working Sessions Meeting Date: October 4, 2016 Time: 15:00:00 UTC Purpose: Weekly CTI-TC Joint Working Session Attendees: Agenda: Jordan Trey Darley Wunder Ivan Kirillov Stephen Banghart
More informationCTI-TC Weekly Working Sessions
CTI-TC Weekly Working Sessions Meeting Date: Thursday, May 12 2016 Time: UTC 14:00:00 Purpose: CTI-TC CybOX Subcommittee Working Session Attendees: Agenda: Kirillov - Moderator Darley Wunder Rich Piazza
More informationCTI-TC Weekly Working Sessions
CTI-TC Weekly Working Sessions Meeting Date: February 21, 2017 Time: 15:00:00 UTC Purpose: Weekly CTI TC Joint Working Session Attendees: Jordan - Moderator Darley Thomson Eric Burger Taylor Jon Baker
More informationCTI-TC Monthly Meeting - Notes
CTI-TC Monthly Meeting - Notes Meeting Date: March 28, 2017 Time: CTI TC Weekly Working Session- 11:00 AM US EDT Tuesday, March 21, 2017 Purpose: CTI TC Weekly Working Session Attendees: Company Name Kingfisher
More informationCTI-TC Working Session
CTI-TC Working Session Meeting Date: March 13, 2018 Time: 3:00 p.m. EDT Purpose: Weekly CTI-TC Weekly Working Call Attendees: Sarah Kelley Wunder Davidson Moderator ard Struse Piazza Thomson Drew Varner
More informationCTI-TC Interoperability Subcommittee
CTITC Interoperability Subcommittee Meeting Date: Wednesday, April 13, 2016 Time: 18:00 UTC 02:00pm to 03:00pm EDT Purpose: Monthly Meeting Attendees: Thomson Looking Glass Cochair Keirstead IBM CoChair
More informationCTI-TC Working Session
CTI-TC Working Session John Meeting Date: Sept 4, 2018 Time: 3:00 p.m. EDT Purpose: Weekly Working Session Attendees: Chris Ricard Bret Jordan Nicholas Hayden Moderator Jane Ginn - Recorder Drew Varner
More informationCTI-TC. Monthly Meeting UPDATE ON MVP RELEASE FOR DRAFT SPECIFICATIONS. Session #1: 15:00:00 UTC July 21, 2016*
Session #1: 15:00:00 UTC July 21, 2016* CTI-TC Monthly Meeting Session #2: 01:00:00 UTC July 22, 2016* UPDATE ON MVP RELEASE FOR DRAFT SPECIFICATIONS * Attendance at either Session #1 or Session #2 Counts
More informationCTI-TC Monthly Meeting - Notes
CTI-TC Monthly Meeting - Notes Meeting Date: March 7, 2017 Time: CTI TC Weekly Working Session- 11:00 AM US EDT Tuesday, March 7, 2017 Purpose: CTI TC Weekly Working Session Attendees: Company Name Role
More informationClose Your File Template
In every sale there is always a scenario where I can t get someone to respond. No matter what I do. I can t get an answer from them. When people stop responding I use the Permission To. This is one of
More informationTAXII 1.0 (DRAFT) Capabilities and Services. Charles Schmidt & Mark Davidson
TAXII 1.0 (DRAFT) Capabilities and Services Charles Schmidt & Mark Davidson 2 About This Talk Look at the use scenarios we want to support and how we have designed TAXII to support them TAXII supports
More informationModern Cyber Defense with Automated Real-Time Response: A Standards Update
SESSION ID: AIR-F01 Modern Cyber Defense with Automated Real-Time Response: A Standards Update Bret Jordan Director of Security Architecture Symantec @jordan_bret Joe Brule Executive Director OpenC2 Forum
More informationTAXII 2.0 Specification Pre Draft
TAXII 2.0 Specification Pre Draft Current Status/Intent This document serves to gain consensus on pre draft concepts of TAXII 2.0. Please feel free to poke holes and comment! Overview TAXII is an open
More informationChapter01.fm Page 1 Monday, August 23, :52 PM. Part I of Change. The Mechanics. of Change
Chapter01.fm Page 1 Monday, August 23, 2004 1:52 PM Part I The Mechanics of Change The Mechanics of Change Chapter01.fm Page 2 Monday, August 23, 2004 1:52 PM Chapter01.fm Page 3 Monday, August 23, 2004
More informationVoyant Connect User Guide
Voyant Connect User Guide WELCOME TO VOYANT CONNECT 3 INSTALLING VOYANT CONNECT 3 MAC INSTALLATION 3 WINDOWS INSTALLATION 4 LOGGING IN 4 WINDOWS FIRST LOGIN 6 MAKING YOUR CLIENT USEFUL 6 ADDING CONTACTS
More informationRavenDB & document stores
université libre de bruxelles INFO-H415 - Advanced Databases RavenDB & document stores Authors: Yasin Arslan Jacky Trinh Professor: Esteban Zimányi Contents 1 Introduction 3 1.1 Présentation...................................
More informationGit. all meaningful operations can be expressed in terms of the rebase command. -Linus Torvalds, 2015
Git all meaningful operations can be expressed in terms of the rebase command -Linus Torvalds, 2015 a talk by alum Ross Schlaikjer for the GNU/Linux Users Group Sound familiar? add commit diff init clone
More informationNotes from the OASIS WSRF TC teleconference 24 th January 2005
Notes from the OASIS WSRF TC teleconference 24 th January 2005 Roll call The roll call is kept on the TC web site under the meeting record. See http://www.oasis-open.org/apps/org/workgroup/wsrf/event.php?event_id=4812
More informationThe next generation of Google APIs
The next generation of Google APIs Ade Oshineye www.oshineye.com/+ Let s talk about the future This is not a vendor pitch This. Is. Not. A. Vendor. Pitch. I work on the Google+ Project www.oshineye.com/+
More informationClickbank Domination Presents. A case study by Devin Zander. A look into how absolutely easy internet marketing is. Money Mindset Page 1
Presents A case study by Devin Zander A look into how absolutely easy internet marketing is. Money Mindset Page 1 Hey guys! Quick into I m Devin Zander and today I ve got something everybody loves! Me
More informationDealer Reviews Best Practice Guide
Dealer Reviews Best Practice Guide What do I do if I get a negative review? Well, the first thing is, don t panic. Negative reviews aren t the end of the world, they actually help build trust and credibility
More informationEffective Communication in Research Administration
Effective Communication in Research Administration Ianthe Cookie Bryant-Gawthrop Director, Research Regulatory Affairs and Human Research Protection Program 9:30 10:40 and 10:50 12:00 Effective Communication
More informationDigital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience
Persona name Amanda Industry, geographic or other segments B2B Roles Digital Marketing Manager, Marketing Manager, Agency Owner Reports to VP Marketing or Agency Owner Education Bachelors in Marketing,
More informationParticipants. Results & Recommendations. Summary of Findings from User Study Round 3. Overall. Dashboard
Summary of Findings from User Study Round 3 Participants 6 people total 4 Product users Jay Nicole Chris Nic 2 Non Product users Karine (QB ProAdvisor) Ellen (pilot test) Results & Recommendations Overall
More informationGood afternoon, everyone. Thanks for joining us today. My name is Paloma Costa and I m the Program Manager of Outreach for the Rural Health Care
Good afternoon, everyone. Thanks for joining us today. My name is Paloma Costa and I m the Program Manager of Outreach for the Rural Health Care program. And I m joined by Carolyn McCornac, also Program
More informationModule 6. Campaign Layering
Module 6 Email Campaign Layering Slide 1 Hello everyone, it is Andy Mackow and in today s training, I am going to teach you a deeper level of writing your email campaign. I and I am calling this Email
More informationLifehack #1 - Automating Twitter Growth without Being Blocked by Twitter
Lifehack #1 - Automating Twitter Growth without Being Blocked by Twitter Intro 2 Disclaimer 2 Important Caveats for Twitter Automation 2 Enter Azuqua 3 Getting Ready 3 Setup and Test your Connection! 4
More informationFrequently Asked Questions about the NDIS
Frequently Asked Questions about the NDIS Contents 3 4 5 5 5 5 6 6 7 7 8 8 8 8 8 9 9 9 9 9 10 10 10 10 11 11 11 11 12 12 12 12 13 13 13 14 14 What is the NDIS and how is it different to current funding
More informationIntro. Scheme Basics. scm> 5 5. scm>
Intro Let s take some time to talk about LISP. It stands for LISt Processing a way of coding using only lists! It sounds pretty radical, and it is. There are lots of cool things to know about LISP; if
More informationMeet our Example Buyer Persona Adele Revella, CEO
Meet our Example Buyer Persona Adele Revella, CEO 685 SPRING STREET, NO. 200 FRIDAY HARBOR, WA 98250 W WW.BUYERPERSONA.COM You need to hear your buyer s story Take me back to the day when you first started
More informationSept 2018 CTI TC F2F Summary Notes
Sept 2018 CTI TC F2F Summary Notes Session 1: STIX 2.1 Review The majority of the discussion centered around how we develop and validate implementations for the newly added features. No real hard and fast
More informationICANN Start, Episode 1: Redirection and Wildcarding. Welcome to ICANN Start. This is the show about one issue, five questions:
Recorded in October, 2009 [Music Intro] ICANN Start, Episode 1: Redirection and Wildcarding Welcome to ICANN Start. This is the show about one issue, five questions: What is it? Why does it matter? Who
More informationUnderstanding Managed Services
Understanding Managed Services The buzzword relating to IT Support is Managed Services, and every day more and more businesses are jumping on the bandwagon. But what does managed services actually mean
More informationEvaluation Guide for ASP.NET Web CMS and Experience Platforms
Evaluation Guide for ASP.NET Web CMS and Experience Platforms CONTENTS Introduction....................... 1 4 Key Differences...2 Architecture:...2 Development Model...3 Content:...4 Database:...4 Bonus:
More informationWelcome to today s Webcast. Thank you so much for joining us today!
Welcome to today s Webcast. Thank you so much for joining us today! My name is Michael Costa. I m a member of the DART Team, one of several groups engaged by HAB to provide training and technical assistance
More informationTHE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP!
THE MORE THINGS CHANGE THE MORE THEY STAY THE SAME FOR BACKUP! Latest Macrium survey results take a detailed look into the backup and recovery space. INTRODUCTION WHO DID WE SPEAK TO? Where are you responsible
More informationIf Statements, For Loops, Functions
Fundamentals of Programming If Statements, For Loops, Functions Table of Contents Hello World Types of Variables Integers and Floats String Boolean Relational Operators Lists Conditionals If and Else Statements
More informationRoc Model and Density Dependence, Part 1
POPULATION MODELS Roc Model and Density Dependence, Part 1 Terri Donovan recorded: February, 2012 You ve now completed several modeling exercises dealing with the Roc population. So far, the caliph of
More informationDay in the Life of an SAP Consultant using IntelliCorp s LiveCompare Software
Day in the Life of an SAP Consultant using IntelliCorp s LiveCompare Software Introduction Consultants use LiveCompare on a daily basis to help them deliver results to their clients more effectively and
More informationThe name of our class will be Yo. Type that in where it says Class Name. Don t hit the OK button yet.
Mr G s Java Jive #2: Yo! Our First Program With this handout you ll write your first program, which we ll call Yo. Programs, Classes, and Objects, Oh My! People regularly refer to Java as a language that
More informationSharePoint Designer Advanced
SharePoint Designer Advanced SharePoint Designer Advanced (1:00) Thank you for having me here today. As mentioned, my name is Susan Hernandez, and I work at Applied Knowledge Group (http://www.akgroup.com).
More informationUTILIZING THE NEW ALDA WEBSITE (CHAPTER LEADERS GROUP) PRESENTER: BRIAN JENSEN SEPTEMBER 16, 2016
UTILIZING THE NEW ALDA WEBSITE (CHAPTER LEADERS GROUP) PRESENTER: BRIAN JENSEN SEPTEMBER 16, 2016 Today I will be explaining the issues involved in fixing and upgrading our website, and how we can use
More informationHOW TO TEXT OUT THE VOTE (TOTV)
HOW TO TEXT OUT THE VOTE (TOTV) Introductions AGENDA HUSTLE Overview of Hustle HOW TO How to start texting voters! We ll be learning about best practices and replying to messages PRACTICE Try it yourself
More informationEmberJS A Fitting Face for a D8 Backend. Taylor Solomon
EmberJS A Fitting Face for a D8 Backend Taylor Solomon taylor.solomon @jtsolomon http://interactivestrategies.com 2 Years Ago 2 Years Ago URL Ember Data assumes a few things. - Your API format is JSON
More informationTA hours and labs start today. First lab is out and due next Wednesday, 1/31. Getting started lab is also out
Announcements TA hours and labs start today. First lab is out and due next Wednesday, 1/31. Getting started lab is also out Get you setup for project/lab work. We ll check it with the first lab. Stars
More informationGoogle Docs Tipsheet. ABEL Summer Institute 2009
Google Docs Tipsheet ABEL Summer Institute 2009 Contents Logging in to Google Apps for CollaborativeSchools.net for the First Time... 2 Text Documents Creating a New Text Document in Google Docs... 5 Uploading
More information15 Minute Traffic Formula. Contents HOW TO GET MORE TRAFFIC IN 15 MINUTES WITH SEO... 3
Contents HOW TO GET MORE TRAFFIC IN 15 MINUTES WITH SEO... 3 HOW TO TURN YOUR OLD, RUSTY BLOG POSTS INTO A PASSIVE TRAFFIC SYSTEM... 4 HOW I USED THE GOOGLE KEYWORD PLANNER TO GET 11,908 NEW READERS TO
More informationTim moves to accept, Chris Z seconds. No objections or comments.
Minutes for PKCS 11 TC weekly concall 5-Feb-2014 1 Opening remarks (co-chairs) 2 Roll call taken by Bob Griffin. Quorum achieved. 3 Review / approval of the agenda Proposed Agenda: 1 Opening remarks (co-chairs)
More informationNetalyzr Updates. Christian Kreibich (ICSI), Nicholas Weaver (ICSI), and Vern Paxson (ICSI & UC Berkeley) Netalyzr Updates
Christian Kreibich (ICSI), Nicholas Weaver (ICSI), and Vern Paxson (ICSI & UC Berkeley) 1 Acknowledgements and Important Disclaimers This work sponsored by the National Science Foundation With additional
More informationUsing Images in FF&EZ within a Citrix Environment
1 Using Images in FF&EZ within a Citrix Environment This document explains how to add images to specifications, and covers the situation where the FF&E database is on a remote server instead of your local
More informationJump to: Using AAUP Photos AAUP Logos Embedding the AAUP Twitter Feed Embedding the AAUP News Feed CREATING A WEBSITE
Jump to: Using AAUP Photos AAUP Logos Embedding the AAUP Twitter Feed Embedding the AAUP News Feed CREATING A WEBSITE You can make a simple, free chapter website using Google Sites. To start, go to https://sites.google.com/
More information» How do I Integrate Excel information and objects in Word documents? How Do I... Page 2 of 10 How do I Integrate Excel information and objects in Word documents? Date: July 16th, 2007 Blogger: Scott Lowe
More informationGit Workbook. Self-Study Guide to Git. Lorna Mitchell. This book is for sale at
Git Workbook Self-Study Guide to Git Lorna Mitchell This book is for sale at http://leanpub.com/gitworkbook This version was published on 2018-01-15 This is a Leanpub book. Leanpub empowers authors and
More informationPython & Web Mining. Lecture Old Dominion University. Department of Computer Science CS 495 Fall 2012
Python & Web Mining Lecture 6 10-10-12 Old Dominion University Department of Computer Science CS 495 Fall 2012 Hany SalahEldeen Khalil hany@cs.odu.edu Scenario So what did Professor X do when he wanted
More informationFIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE
FIGURING OUT WHAT MATTERS, WHAT DOESN T, AND WHY YOU SHOULD CARE CONTENTFAC.COM As an FYI, this document is designed to go along with our video by the same name. If you haven t checked that out yet, you
More informationGratitude Journal Presented by
www.gettingunstuckllc.com 1 Presented by Getting Unstuck, LLC http://www.gettingunstuckllc.com User Manual Introduction Welcome to The! We all know how important gratitude is in our lives. Without gratitude
More informationThe COS 333 Project. Robert M. Dondero, Ph.D. Princeton University
The COS 333 Project Robert M. Dondero, Ph.D. Princeton University 1 Overview A simulation of reality In groups of 3-5 people... Build a substantial three tier software system 2 Three-Tier Systems "Three
More informationMedia-Ready Network Transcript
Media-Ready Network Transcript Hello and welcome to this Cisco on Cisco Seminar. I m Bob Scarbrough, Cisco IT manager on the Cisco on Cisco team. With me today are Sheila Jordan, Vice President of the
More informationIn today s video I'm going show you how you can set up your own online business using marketing and affiliate marketing.
Hey guys, Diggy here with a summary of part two of the four part free video series. If you haven't watched the first video yet, please do so (https://sixfigureinc.com/intro), before continuing with this
More informationExcel for Algebra 1 Lesson 5: The Solver
Excel for Algebra 1 Lesson 5: The Solver OK, what s The Solver? Speaking very informally, the Solver is like Goal Seek on steroids. It s a lot more powerful, but it s also more challenging to control.
More informationUsing GitHub to Share with SparkFun a
Using GitHub to Share with SparkFun a learn.sparkfun.com tutorial Available online at: http://sfe.io/t52 Contents Introduction Gitting Started Forking a Repository Committing, Pushing and Pulling Syncing
More information2013 edition (version 1.1)
2013 edition (version 1.1) Contents 1 Introduction... 3 2 Signing in to your Office 365 account... 3 2.1 Acceptable Use Policy and Terms of Use... 4 3 Setting your profile and options... 4 3.1 Settings:
More informationKeeping Sane - Managing your
WITH KEVIN Keeping Sane - Managing your Email TODAY S COFFEE TALK Email is a wonderful tool for sending and receiving a lot of information quickly and securely. However, it s important that your personal
More informationWebDirect Configuration Guide
WebDirect Configuration Guide (The following graphics are screen shots from Microsoft ISA Server 2004/2006 which is the property of Microsoft Corp. and are included here for instructive use. Some images
More informationGETTING STARTED GUIDE
SETUP GETTING STARTED GUIDE About Benchmark Email Helping you turn your email list into relationships and sales. Your email list is your most valuable marketing asset. Benchmark Email helps marketers short
More informationGroup Leader Quickstart Guide. Original photo by Trey Ratcliff
Group Leader Quickstart Guide Original photo by Trey Ratcliff In This Guide Group Setup Create a Group Profile Post Types and Restrictions Group Tags Ideal Group Size Group Nickname Default Invitation
More informationDental Buyers Guide 101
Website Design and Marketing Dental Buyers Guide 101 Top Questions to Ask When Hiring a Dental Website Provider Your website is arguably the most important piece of the marketing puzzle. It s the cornerstone
More informationVulnerability Disclosure Policy. v.1.1
Vulnerability Disclosure Policy v.1.1 This document describes the security vulnerability disclosure policy of VoidSec Team Members. It is the official policy of VoidSec Team Members (referred to as us
More informationTDDC88 Lab 4 Software Configuration Management
TDDC88 Lab 4 Software Configuration Management Introduction "Version control is to programmers what the safety net is to a trapeze artist. Knowing the net is there to catch them if they fall, aerialists
More information(Refer Slide Time: 06:01)
Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 28 Applications of DFS Today we are going to be talking about
More informationPROFILE_<PARAM>_QC. What should the variable be and how should it be defined?
PROFILE__QC The PROFILE__QC variables are defined to be the worst QC flag of any level in the profile. A concern was expressed that this definition will lead to a misinterpretation of the
More informationTHREAT MANAGEMENT AND OUR TECHNICAL LEARNINGS IMPLEMENTING CTI
LIFE AFTER THREAT INTELLIGENCE EXCHANGE THREAT MANAGEMENT AND OUR TECHNICAL LEARNINGS IMPLEMENTING CTI Joep Gommers @joepgommers Marko Dragoljevic @chipi_nbgd Download whitepaper http://bit.do/threatintel
More informationWelcome to today s Webcast. Thank you so much for joining us today!
Welcome to today s Webcast. Thank you so much for joining us today! My name is Michael Costa. I m a member of the DART Team, one of several groups engaged by HAB to provide training and technical assistance
More informationLearning Objectives. Description. Your AU Expert(s) Trent Earley Behlen Mfg. Co. Shane Wemhoff Behlen Mfg. Co.
PL17257 JavaScript and PLM: Empowering the User Trent Earley Behlen Mfg. Co. Shane Wemhoff Behlen Mfg. Co. Learning Objectives Using items and setting data in a Workspace Setting Data in Related Workspaces
More informationONS Beta website. 7 December 2015
ONS Beta website Terminology survey results 7 December 2015 Background During usability sessions, both moderated and online, it has become clear that users do not understand the majority of terminology
More information[Maria Jackson Hittle] Thanks, Michael. Since the RSR was implemented in 2009, HAB has been slowing shifting its focus from data submission to data
[Michael Costa] Welcome to today s Webcast. Thank you so much for joining us today! My name is Michael Costa. I m a member of the DART Team, one of several groups engaged by HAB to provide training and
More informationWEBINARS FOR PROFIT. Contents
Contents Introduction:... 3 Putting Your Presentation Together... 5 The Back-End Offer They Can t Refuse... 8 Pick One Target Audience per Webinar... 10 Automate Your Webinar Sessions... 12 Introduction:
More informationCLIENT ONBOARDING PLAN & SCRIPT
CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in
More informationFilter and PivotTables in Excel
Filter and PivotTables in Excel FILTERING With filters in Excel you can quickly collapse your spreadsheet to find records meeting specific criteria. A lot of reporters use filter to cut their data down
More informationGetting Started With Squeeze Server
Getting Started With Squeeze Server & Squeeze Server takes the proven Squeeze encoding engine and makes it available on- premise, in the cloud or both, with a robust application programming interface (API)
More informationResilient Linked Data. Dave Reynolds, Epimorphics
Resilient Linked Data Dave Reynolds, Epimorphics Ltd @der42 Outline What is Linked Data? Dependency problem Approaches: coalesce the graph link sets and partitioning URI architecture governance and registries
More informationData Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon
Data Protection and Information Security Webinar Presented by Emma Hawksworth Slater and Gordon 1 3 ways to participate Ask questions link below this presentation Answer the polls link below this presentation
More informationThe Rise of the Purple Team
SESSION ID: AIR-W02 The Rise of the Purple Team Robert Wood Head of Security Nuna @robertwood50 William Bengtson Senior Security Program Manager Nuna @waggie2009 Typical Team Responsibilities Red Vulnerability
More informationICANN and Technical Work: Really? Yes! Steve Crocker DNS Symposium, Madrid, 13 May 2017
ICANN and Technical Work: Really? Yes! Steve Crocker DNS Symposium, Madrid, 13 May 2017 Welcome, everyone. I appreciate the invitation to say a few words here. This is an important meeting and I think
More informationCLIENT ONBOARDING PLAN & SCRIPT
CLIENT ONBOARDING PLAN & SCRIPT FIRST STEPS Receive Order form from Sales Representative. This may come in the form of a BPQ from client Ensure the client has an account in Reputation Management and in
More informationXDI Link Contract Deep Dive
XDI Link Contract Deep Dive August 25-27, 2014 (Document by Dan Blum, slightly edited for Aug 29 XDI TC call by Markus) Introduction I learned that this is the second- or third XDI retreat, and for some
More informationCREATE YOUR CONTENT STRATEGY & LAUNCH PLAN Amanda Genther Inc. & Irresistible Offerings
CREATE YOUR CONTENT STRATEGY & LAUNCH PLAN WHAT WE RE GOING TO TALK ABOUT» How to create content that entices your prospects to buy» How to create a content marketing plan that can be put on autopilot
More informationIn this white paper we want to look at seven basic principles that can help make your website be the best it can be.
websites matter A good website is important now more than ever. More and more people first visit your church through your website -- not through your front doors. Visitors will likely evaluate six to 12
More informationPair projects due Thursday I do not anticipate giving any extensions for this assignment. 3/2/ Larry Snyder, CSE 1
Pair projects due Thursday I do not anticipate giving any extensions for this assignment 3/2/15 2011 Larry Snyder, CSE 1 XML is essential for huge corporate systems. and for us Lawrence Snyder University
More informationAnatomy of a Standard Transcript
Anatomy of a Standard Transcript Maddie: Hi everyone! Throughout this joint project, Eli, Christina, & I all had to use technical standards to make sure our products met the necessary requirements & specifications,
More informationHow do we make the transition less painful? IPv6 & recursive resolvers:
How do we make the transition less painful? IPv6 & recursive resolvers: 11.5.2009 Overview of the problem IPv6 rollout may not impact production IPv4 Rolling out dedicated IPv6 hostnames is not a good
More informationCSE P 501 Compilers. Parsing & Context-Free Grammars Hal Perkins Spring UW CSE P 501 Spring 2018 C-1
CSE P 501 Compilers Parsing & Context-Free Grammars Hal Perkins Spring 2018 UW CSE P 501 Spring 2018 C-1 Administrivia Project partner signup: please find a partner and fill out the signup form by noon
More informationSo, you re child wants to sign up for Myspace...
So, you re child wants to sign up for Myspace... Social networking is a brilliant concept that has sadly been tainted by several nefarious individuals. The term simply means a website that allows its users
More informationfacebook a guide to social networking for massage therapists
facebook a guide to social networking for massage therapists table of contents 2 3 5 6 7 9 10 13 15 get the facts first the importance of social media, facebook and the difference between different facebook
More informationReading How the Web Works
Reading 1.3 - How the Web Works By Jonathan Lane Introduction Every so often, you get offered a behind-the-scenes look at the cogs and fan belts behind the action. Today is your lucky day. In this article
More informationVersioned APIs with Phoenix. Elvio Vicosa
Versioned APIs with Phoenix Elvio Vicosa About the author My name is Elvio Vicosa and I am a software developer based in Berlin, Germany. I've been working with software for over 10 years and throughout
More informationNew user introduction to Attend
1 New user introduction to Attend 1. Sign up to Attend... 2 2. First Steps Create a Course... 2 3. Sharing your course... 4 4. Viewing the course participants... 5 5. Create a new member of Staff... 6
More informationConsiderations for Mobilizing your Lotus Notes Applications
Considerations for Mobilizing your Lotus Notes Applications John Kingsley Teamstudio Technical Director Why Mobilize? It all started with email. Not any one email in particular, just the fact that you
More informationWhat s new in SketchUp Pro?
What s new in SketchUp Pro? SketchUp Pro (Desktop) Making Information Modeling Useful Ultimately, we think BIM is about using information in your model to make better buildings. Our focus is to help users
More informationTesting. So let s start at the beginning, shall we
Testing Today we are going to talk about testing. Before you all lapse into comas in anticipation of how exciting this lecture will be, let me say that testing actually is kind of interesting. I can t
More information