How Deutsche Telekom protects customer data

Size: px
Start display at page:

Download "How Deutsche Telekom protects customer data"

Transcription

1 KEEPING THE CLOUD OF THINGS Secure How Deutsche Telekom protects customer data

2 CotetS Maximum security with the Cloud of Thigs A secure start CONTENTS 1. THE CLOUD OF THINGS IT All starts with access 1. Providig secure access TO THE INTERNET OF THINGS M2M, IoT, the Cloud ad security The Cloud of Thigs security takes top priority SECURITY AND DATA PRIVACy AT DEUTSCHE TELEKOM Secure processes usig the PSA method Security ad data privacy cocept Secure data ceters SECURITY IN THE CLOUD OF THINGS IT systems Security o the Iteret Additioal measures for icreased security TIPS FOR WORKING SECURELY on THE INTErNET OF THINGS Priciples ad guidelies Device security Ehacig your ow skills Summary Glossary...15 Cotact / publishig iformatio M2M, IOT, THE CLOUD AND SECURITY The Iteret of Thigs opes up a wealth of opportuities for compaies ad helps them to prepare for the future: Prevetive maiteace saves staffig costs ad prevets expesive machiery dowtime; automatio of processes speeds up mechaical workflows ad reduces the umber of errors; ad sesor data ca be used to develop ew busiess models. With the Cloud of Thigs, Deutsche Telekom offers the perfect maagemet platform for customers to etwork ad moitor machies ad devices, locate vehicles, or track the route ad status of cotaiers o scree. Sesor data is read i from the gateway, trasmitted to the cloud platform i ecrypted form, where it is processed ad visualized. The customer desigates which device will access their data. 1.2 THE CLOUD OF THINGS SECURITY TAKES TOP PRIORITY Despite these precautios, may compaies have cocers about whether their data is safe i the cloud. Sesitive compay data ad busiess secrets have to be protected from uauthorized access; the protectio of customer data has to be guarateed. These are requiremets that Deutsche Telekom takes very seriously, which is why security takes top priority whe it comes to the Cloud of Thigs. Security is esured by meas of a extesive list of measures: All data is stored o servers i high-security data ceters i Germay ad is subject to Germay s strict data protectio laws. Ecryptio is used to esure a secure trasport of data from the sesors. The etwork ifrastructure, iterfaces ad IT systems through which the data travels uses stadardized procedures ad protectio cocepts to esure data privacy ad security. Device Maagemet The Device Maagemet aspect of the Cloud of Thigs provides a overview of all coected devices, their curret operatig status ad the flow of data. This meas that o updates are forgotte ad security loopholes are avoided. Device maagemet also helps with the detectio of aomalies or attacks (itrusio detectio), ad automatically iforms the admiistrator i the evet of security breaches. Remote maiteace of devices from the Cloud of Thigs The Cloud of Thigs makes it possible for IoT devices to be maitaied remotely, therefore keepig all compoets icludig firmware ad operatig systems up to date. This also elimiates potetial security risks, which could arise as ew methods of attack are developed. I additio, remote maiteace allows the user to update hard-to-reach machies ad protect them agaist possible dagers without great iput i terms of labor, time or fuds. 2 3

3 Maximum security with the Cloud of Thigs SECURITY AND DATA PRIVACY Maximum security with the Cloud of Thigs SECURITY AND DATA PRIVACY 2. SECURITY AND DATA PRIVACY AT DEUTSCHE TELEKOM Two departmets of Deutsche Telekom are dedicated solely to customer security: Group IT Security (SEC) ad Group Privacy (GPR). SEC is resposible for techical security: It sets a appropriate security level ad implemets it usig suitable measures. GPR determies the Group s strategic aligmet i terms of data privacy ad defies the requiremets from a legal, techical ad orgaizatioal perspective. It also represets the Group i all data privacy matters, both iterally ad exterally. Deutsche Telekom s data privacy maagemet is certified i accordace with IDW PS CATEGORIZATION 2. IDENTIFICATION OF RELEVANT REQUIREMENTS 2.1 SECURE PROCESSES USING THE PSA METHOD The Germa Federal Office for Iformatio Security (BSI) has developed a list of measures that compaies ca use to esure the security of applicatios, etworks, IT systems ad ifrastructures. Based o this ad o the requiremets of the Europea regulatory authorities regardig risk maagemet for data privacy withi compaies Deutsche Telekom has established a stadard process for all of its products: The Privacy ad Security Assessmet ( PSA for short). The PSA method esures the itegratio of security ad data privacy ito product ad system developmet, ad is applied upo each release of the Cloud of Thigs. This stadardized Deutsche Telekom procedure icludes cosultig, testig ad documetatio, as well as risk assessmet ad approval. A project s relevace i terms of data privacy ad security is determied at the start of the process by meas of a questioaire. The categorizatio (A, B, C) is based o characteristics such as processig of particularly sesitive data, the complexity of the platforms ad systems, or strategic ad fiacial sigificace. The extet of cosultig ad support provided by Data Privacy ad Data Security icreases with the criticality ad complexity of a project. The Cloud of Thigs has bee categorized as A, ad therefore must meet the highest requiremets. 3. IMPLEMENTATION OF REQUIREMENTS 4. TESTING Ad DOCUMENTATION 5. AUTOMATIC RISK ASSESSMENT APPROVAL data privacy security A overview of the PSA procedure Our customers, shareholders, regulatory authorities ad the geeral public rightly expect that we hadle the data etrusted to us by our busiess parters, customers ad employees with the appropriate care. We make every effort ot just to satisfy these expectatios, but to ispire yet more trust i our depedability. Data protectio ad iformatio security are for us more tha just a resposibility; we cosider them a cocer of particular importace to us. You ca deped o that. Dr. Claus-Dieter Ulmer, Global Data Privacy Officer at Deutsche Telekom As part of ISO certificatio of Deutsche Telekom s cetralized security maagemet, the PSA procedure was preseted as oe of the service processes provided by Group IT Security. The procedure was rated positively i the certificatio process as a useful, sesible way of prioritizig the processig of developmet projects from a data privacy ad security perspective. Peter Rothfeld ad Igo Vase, exteral auditors from DQS GmbH, Deutsche Gesellschaft zur Zertifizierug vo Maagemetsysteme 4 5

4 Maximum security with the Cloud of Thigs SECURITY AND DATA PRIVACY Maximum security with the Cloud of Thigs SECURITY AND DATA PRIVACY 2.2 STANDARDIZED SECURITY AND DATA PRIVACY CONCEPT The PSA procedure ivolves a stadardized security ad data privacy cocept (SDSK) comprisig six modules: System descriptio Data privacy iformatio Authorizatio cocept Lists of requiremets Pla of measures System categorizatio 2.3 SECURE DATA CENTERS Access to the physical ifrastructure of a data ceter or eve the hardware would provide a attacker with a good startig poit for committig data espioage or maipulatig services. A attacker could, for example, export ad copy data via iput /output iterfaces or USB ports, import malicious codes, or discoect services. As such, safeguardig the ifrastructure is a importat aspect of basic IT protectio. This also icludes protectio agaist uforesee evets, which could lead to loss of services. Extesive buildig protectio Data ceters hostig the Cloud of Thigs are fully shielded ad top security measures protect data from uauthorized access. The grouds, buildigs ad rooms are protected agaist uauthorized etry ad break-i, ad ca oly be accessed by authorized persoel. Access is moitored ad, depedig o the security level, the persos that have access to certai rooms at certai times are stored. Protectio agaist fire ad lightig strike, as well as water ad high voltage damage, also form part of the extesive ifrastructure protectio. I additio, the power supply is fail-safe ad protected agaist fluctuatios i voltage, over-voltage ad uder-voltage. Cloud data ceters ad product developmet processes are certified i accordace with the iteratioal ISO / IEC stadard. This certificate, which is reviewed i regular itervals, attests that the compay meets the security stadards i terms of security guidelies, security requiremets ad risks. The Zero Outage priciple Deutsche Telekom s Zero Outage program was established i 2011 ad is certified by TÜV Rheilad. Eve a hour of dowtime i IT systems ca be critical to busiess operatios ad ca cost a six to seve-figure sum ot to metio the damage to the compay s reputatio. With twicore data ceters, the latest techologies ad traied staff, Deutsche Telekom esures maximum IT availability up to 99 percet, as well as rapid, competet ad efficiet troubleshootig i the evet of a outage. High-security servers i the data ceter Hoeypots I parallel with this, Deutsche Telekom has istalled what are kow as hoeypots as a core compoet of its early warig system. These are isolated server systems which are accessible from the Iteret but which are ot coected to Deutsche Telekom s real systems. The hoeypot systems are self-teachig: They record ukow attacks ad aalyze them. Deutsche Telekom s experts use these aalyses to prevet harmful attacks to the compay s real systems, ad to iform customers whose computers may have become part of a botet. The method has prove to be a success: The hoeypots have so far ot ucovered ay vulerabilities i Deutsche Telekom s systems from the Iteret. Deutsche Telekom is way above the geeral stadard with this cosolidated documetatio of data privacy ad security aspects ad the techical /orgaizatioal measures implemeted. Based o our log-stadig experiece i auditig ad certificatio, the SDSK is a extremely positive developmet. Moika Wojtowicz, Project Maager i Data Privacy Certificatio for Cloud Services at TÜV Iformatiostechik GmbH 6 7

5 Maximum security with the Cloud of Thigs Security i the Cloud of Thigs Maximum security with the Cloud of Thigs Security i the Cloud of Thigs 3. SECURITY IN THE CLOUD OF THINGS I additio to the Group-wide security strategies i place at Deutsche Telekom, there are special measures take to protect the IoT platform Cloud of Thigs agaist potetial risks. 3.1 IT SYSTEMS The kerels ad software compoets used i Deutsche Telekom s IT systems are subject to the highest requiremets i terms of the maiteace of software versios ad protectio agaist viruses ad malware. They ca oly be admiistered from the iteral etwork ad via virtual private etworkig (VPN), ad are ot accessible from the Iteret. All data is stored i ecrypted form. Costat maiteace ad moitorig All compoets, such as operatig systems, databases ad applicatio servers, are actively maaged ad subject to costat moitorig. Admiistratio rights for the IT systems are awarded o a idividual basis. Overload protectio The IT systems for the Cloud of Thigs are protected agaist overload: The platform is protected agaist attempts to block services or kock the system off balace by floodig it with requests (DDoS attacks). Approval of IT systems Before every release, idepedet experts check the IT systems to esure that the latest software versios ad patches have bee istalled. As part of this ispectio, they use peetratio tests to simulate attacks, usig a potetial hacker s procedure to attempt to get ito the systems. Secure trasfer to the Cloud of Thigs Gateway devices Mobile etwork Device maagemet User portal 3.2 SECURITY ON THE INTERNET A potetial target for cyber attacks are the etwork coectios betwee the customer s browser ad the Cloud of Thigs, as well as the radio lik betwee the devices ad the server platform. The ifiltratio of a radio or etwork lik could the be the startig poit for further espioage or attempts at sabotage: If a attacker has already ucovered usage ad positio data, recorded webcam videos or maipulated a smart home, their sabotage ca destroy etire product families or a product or provider s image or they ca blackmail maufacturers. Deutsche Telekom has a extesive list of measures to prevet this. TLS autheticatio prior to each commuicatio Usig a recogized ad stadardized autheticatio mechaism esures that o third parties are able to itervee i the commuicatio betwee a IoT device or a customer s browser ad the Cloud of Thigs. Prior to ay commuicatio via a etwork, the Cloud of Thigs proves its idetity by meas of a certificate. Certificates esure that the commuicatio parter is who they say they are a source that is uable to provide a accepted certificate will ever be trusted. This meas that the autheticity of the platform is evideced i the evet of chages to the firmware or other exchage of data with the device. The Cloud of Thigs uses the Trasport Layer Security (TLS) protocol. I TLS, the commuicatio parters check their autheticity by meas of certificates ad set up a ecrypted coectio. Data ca the be shared securely: The coectio is protected agaist attacks where the attacker assumes a fake idetity, iterveig betwee the seder ad recipiet ad tappig ito the data exchage (kow as ma i the middle attacks). Ecryptio with AES All data commuicatio with the Cloud of Thigs is ecrypted. This applies ot oly to access via the cockpit, but also to all commuicatio betwee the IoT devices ad the platform, i both directios. To this ed, the Cloud of Thigs supports the secure Advaced Ecryptio Stadard (AES) algorithm. This algorithm has bee declared stadard by the America Natioal Istitute of Stadards ad Techology (NIST). It is cosidered so secure that i the USA it is eve authorized for use o official, top-secret documets. For customers whose devices do ot support AES or whose security ratigs do ot require this, the Cloud of Thigs supports further ecryptio methods such as 3DES or Camellia. Strog ecryptio esures that o oe ca decrypt compay or customer data if they obtai it by chace, illegally or through espioage, prevetig them from usig it for their ow beefit, sellig it or publishig it elsewhere. Makig chages to data spoofig is also ot possible: For example, a attacker caot overwrite positio data or virtually chage the positio of a truck, maipulate sesor data from a refrigerated cotaier, or reproduce the sigal from a garage door i a smart home (which would make it possible to ope the door at ay time). Network separatio The core of the Cloud of Thigs is divided up ito several sub-sectios with differet fuctios. The idividual modules of these sub-sectios work i their ow cells, which, i tur, use idepedet etwork cofiguratios with their ow address zoes. These virtual etworks (VLANs) are isolated from oe aother i such a way that eve if a hacker breaks ito oe VLAN, they will be uable to access aother VLAN ad expad the attack to other cells. Firewalls The Cloud of Thigs uses a multi-stage firewall cocept to protect agaist access to the platform from isecure etworks. All icomig requests must pass through the firewall: This applies to access from the website as well as to requests from IoT devices via the software iterfaces of the Cloud of Thigs. Deutsche Telekom s security experts check the firewalls regularly usig peetratio tests: This ucovers ad resolves vulerabilities ad esures that hackers have o chace of breakig through the firewalls. 8 9

6 Maximum security with the Cloud of Thigs Security i the Cloud of Thigs Maximum security with the Cloud of Thigs Security i the Cloud of Thigs 3.3 ADDITIONAL MEASURES FOR INCREASED SECURITY The iterfaces i the Cloud of Thigs represet aother target for attack. They are required for device maagemet ad data retetio, ad are also used to pass o alerts. Because they are accessible via the Iteret, Deutsche Telekom has developed special cocepts to protect them. Multi-teacy The Cloud of Thigs has a multi-teat structure: O the platform, differet customers (teats) have separate user areas ad do ot share admiistrator, data or address areas with other customers. It is ot possible to view aother teat s customer data, user data or payload. For example, a logistics compay will ot have access to a competitor s customer or truck positioig data. Separatio of user data ad payload A secod separatig mechaism protects agaist espioage ad maipulatio of data: Withi each teat, customer ad user data is maaged ad stored separately from payload. This meas, for example, that i the Cloud of Thigs it is ot possible to secretly sed a database commad whe trasmittig a GPS positio (= payload), which would make it possible to obtai a customer s ame (= customer data) ad use it for other purposes. Authorizatio cocept Customers ca defie ad authorize differet user roles, such as admiistrator, stadard user or busiess user, which are associated with differet authorizatios ad privileges. This meas that users ca oly view cotet for which they have bee assiged rights i the user roles. The authorizatio cocept defies who ca geerate, read, edit ad delete data. Privileged rights are oly assiged to roles, groups or people that are primarily etrusted with admiistratio. No built-i back doors The Cloud of Thigs has properly defied ad secured iterfaces through the cockpit for maual users ad through the software iterfaces for devices. I additio, the Cloud of Thigs does ot feature ay additioal ports or other built-i back doors, either for customers with their ow iterfaces or, for Deutsche Telekom, for maiteace ad admiistratio purposes. All requests have to be hadled via the stadard ports, ad therefore through the same firewalls ad security mechaisms. Eve requests regardig admiistratio ad maiteace are ot hadled via dedicated iterfaces that could be exploited by a attacker. Approval by security experts before each releasee I the evet of ew developmets or chages, experts from Deutsche Telekom check whether the project meets all requiremets i terms of techical security ad data privacy. Approval by the security experts, who are orgaizatioally ad procedurally separated from the project ad developmet teams, is madatory before ay release of the Cloud of Thigs release without their approval is ot possible. Certificatio process for IoT devices The experts at Deutsche Telekom check ad certify all IoT devices that busiess parters may use with the Cloud of Thigs. This esures that these devices meet the requiremets i terms of techical security ad data privacy. Customers that itegrate their ow devices ad suppliers ca request the relevat test criteria, or commissio Deutsche Telekom to provide advice ad carry out tests. Staff i the data ceter 10 11

7 Maximum security with the Cloud of Thigs Workig Securely Maximum security with the Cloud of Thigs Workig Securely 4. TIPS FOR WORKING SECURELY IN THE INTErNET OF THINGS Deutsche Telekom has a extesive list of measures to esure the greatest possible security withi the Cloud of Thigs. However, eve the securest platform is useless if the customer s IT eviromet is ot sufficietly protected. This checklist should help you to avoid typical mistakes whe it comes to security. 4.1 Priciples ad guidelies Formal processes ad guidelies are a importat compoet: It helps to have a pla! Coduct risk aalyses: Idetify security risks, assess possible damage scearios, take prevetive measures Defie requiremets: Draw up requiremets ad checklists, defie referece values ad test criteria Test for security: Simulate targeted attacks usig your ow security staff, coduct peetratio tests, draw up a list of tests, geerate case studies, fid testers, defie a schedule for tests ad audits, utilize test automatio Defie acceptace strategies: Defie gates ad schedules, appoit auditors, documet results Develop emergecy plas: Set out procedures for emergecies, provide for switch-off / shut-dow of modules ad systems, esure operatioal cotiuity, create safety reserves, set out rules for commuicatio ad press relatios 4.2 Device security Security measures must also be take for the software ad data o coected devices outside of the Cloud of Thigs for example, o a computer used to access a web portal to esure that they are ot used as a gateway for attacks. Deutsche Telekom recommeds the followig measures: Load updates: Close security loopholes i the operatig system, update firmware, facilitate certificate updates Chage passwords: Replace all stadard passwords with your ow passwords, use strog passwords, search for compoets istalled i the backgroud Stregthe authorizatio: Check authorizatio o the server (ot o the cliet), facilitate password chages, eable chages to access details for other systems, provide for deletio of access data, use LDAP or comparable stadard authorizatio backeds Use stadard PKI: Implemet stadardized Public Key Ifrastructure (PKI) with certificate checks before ay data commuicatio, use TLS (where the cliet checks the server s certificate) or IPsec (both sides mutually check their certificates), use device-specific certificates, avoid sharig or joit use of certificates with other coected devices Protect agaist malware: Use ati-virus protectio ad keep it up to date Ecrypt memories: Ecrypt all local data carriers Protect agaist overload: Reject uauthorized data trasfer at the poit of etry, idetify ad react to overload situatios caused by a flood of requests (DDoS), shut dow systems i a cotrolled maer before ustable or upredictable behavior arises Provide rules for takig devices ad services out of use: Put devices ad services out of use i the evet of loss / theft / sale / at the ed of the product s life, block access details, disable access, cacel certificates ad liceses, uistall software, delete memories, update etries i whitelists, shut devices ad services dow, remove hardware, esure proper disposal 4.3 Ehacig your ow skills It is recommeded that you ot oly ivest i techology ad security cocepts, but to also costatly expad your ow skills ad observe treds ad ecessary adjustmets. Deutsche Telekom will be happy to help. Briefig: Brief employees, highlight dagers, defie resposibilities, preset techiques, provide materials Traiig: Provide traiig budget ad traiig i cocepts ad techiques, procure advice ad expertise, promote trasfer of kowledge Certificatio: Have exteral checks coducted ad processes certified, certify employees 12 13

8 Maximum security with the Cloud of Thigs Summary Maximum security with the Cloud of Thigs Glossary 5. SUMMARY GlossarY Without the Iteret of Thigs there is o Idustry 4.0 ad without security there is o Iteret of Thigs. O the oe had, compaies wat to take advatage of the beefits of a cloud-based IoT platform i order to future-proof their busiess models. O the other had, they wat to be absolutely certai that compay, customer ad sesor data will ot get ito the wrog hads. SECURITY AND DATA PRIVACY AT DEUTSCHE TELEKOM With this i mid, Deutsche Telekom has give top priority to the security of its IoT platform Cloud of Thigs. Throughout the Group, the Privacy ad Security Assessmet esures the itegratio of data privacy ad data security ito system ad product developmet. Data ceters, from which the Cloud of Thigs is provided, are subject to the highest security stadards: The high security data ceters hostig the Cloud of Thigs are also armed agaist cyber attacks with a early warig system. The ifrastructure beefits from extesive buildig protectio ad is safeguarded agaist uauthorized access, as well as agaist uforesee evets such as fire, floodig or power failure. SECURITY CONCEPT FOR THE CLOUD OF THINGS A special list of measures provides the Cloud of Thigs with additioal protectio. The operatig system ad software are immuized agaist viruses ad malware. The systems are ot coected to the Iteret without protectio, ad all data is ed-to-ed ecrypted. Bidirectioal autheticatio precedes ay etwork commuicatio. IT systems are protected agaist DDoS attacks; databases ad servers are actively maaged. I additio, the platform is protected agaist uauthorized access by meas of a multi-stage firewall. The idividual modules i the Cloud of Thigs work etirely idepedetly of oe aother. This meas that attacks o oe module caot affect other modules. Similarly, customer accouts are maaged separately: Users are ot able to access aother user s area. Customer data, user data ad payload is also stored idepedetly. Users caot be idetified by their payload; data privacy is always guarateed. With this comprehesive security package, Deutsche Telekom is pavig the way for compay applicatios i the Iteret of Thigs. 3DES Triple Data Ecryptio Stadard: Precursor of AES AES Advaced Ecryptio Stadard: Ecryptio method with a extremely high level of security BSI Germa Federal Office for Iformatio Security Camellia: A symmetrical block ecryptio method with similar parameters to AES, but with a differet ecryptio algorithm DDoS Distributed Deial of Service: Uavailability of a service as a result of overload caused by a targeted attack o a server or aother etwork compoet ru by a large umber of third-party systems Firewall: A security gateway, comprisig software ad hardware, used to securely lik up IP etworks IDS Itrusio Detectio System: System for detectig attacks o a computer system or etwork M2M machie-to-machie commuicatio: Automated exchage of data betwee machies, devices, dispesers, vehicles ad other termials or with a cetral cotrol ceter via the Iteret, cellular etworks ad other access etworks Ma-i-the-middle attacks: Itervetio i commuicatio betwee two parters by a attacker Multi-teacy: A computer system s ability to maage differet teats with idepedet data maagemet, cofiguratio ad presetatio Peetratio test: Simulated attempt to access your ow IT system by usig a method that might be used by a potetial attacker PKI Public Key Ifrastructure: A system for issuig, distributig ad checkig digital certificates for the purpose of autheticatio usig a pair of public ad private cryptography keys PSA Privacy ad Security Assessmet: Deutsche Telekom s stadard process for esurig security ad data privacy i all of its products Teat: A group of computer system users that are isolated i terms of their data ad have their ow access authorizatios TLS Trasport Layer Security: Ecryptio protocol for data trasmissio, advacemet of Secure Socket Layer (SSL) VPN Virtual Private Network: A closed commuicatio etwork that uses a differet commuicatio etwork as a medium of trasport, for example i the form of a VNP tuel through the public Iteret 14 15

9 CONTACT Phoe: Website: m2m.telekom.com Imprit Deutsche Telekom AG Ladgrabeweg Bo, Germay

CA Top Secret r14 for z/os

CA Top Secret r14 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Data Warehousing. Paper

Data Warehousing. Paper Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

Baan Finance Financial Statements

Baan Finance Financial Statements Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

Cyber Risk Mitigation for Smart Cities

Cyber Risk Mitigation for Smart Cities Cyber Risk Mitigatio for Smart Cities Abstract Rapid growth i global populatio ad evolvig techological, macro-ecoomic, ad evirometal ladscapes have fueled widespread iterest i smart cities, which are,

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports

More information

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess ad icreasigly more distributed workforce, remote ad brach staff demad access

More information

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

Bike MS: 2013 Participant Center guide

Bike MS: 2013 Participant Center guide Bike MS: 2013 Participat Ceter guide bikems.org 1 Why use Olie Fudraisig Tools? Usig olie tools makes fudraisig easier Table of Cotets Participats who use persoal pages raise more moey! Bike MS $883 v.

More information

Bike MS: 2014 Participant Center guide

Bike MS: 2014 Participant Center guide Bike MS: 2014 Participat Ceter guide bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...

More information

Demystifying IaaS Adoption for Enterprise Applications

Demystifying IaaS Adoption for Enterprise Applications Demystifyig IaaS Adoptio for Eterprise Applicatios Abstract Despite the growig sped o cloud techologies, eterprises worldwide are plagued with this questio, Which amog the may is the best solutio for us?

More information

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES Formoreiformatio,pleasecal877.449.0458,oremailusatSales@CorporateArmor.com. Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0

More information

BIKE MS: 2015 PARTICIPANT CENTER GUIDE

BIKE MS: 2015 PARTICIPANT CENTER GUIDE BIKE MS: 2015 PARTICIPANT CENTER GUIDE bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Data Protection: Your Choice Is Simple PARTNER LOGO

Data Protection: Your Choice Is Simple PARTNER LOGO Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected

More information

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper

More information

Strengthening Privacy Protection with the European General Data Protection Regulation

Strengthening Privacy Protection with the European General Data Protection Regulation Stregtheig Privacy Protectio with the Europea Geeral Data Protectio Regulatio Abstract The expoetial growth of digital data has led to a substatial icrease i data breaches. To meet the privacy cocers of

More information

Protection of Communication Infrastructures

Protection of Communication Infrastructures Protectio of Commuicatio Ifrastructures Chapter Itroductio Threats, Security Goals & Requiremets Threat Aalysis System Security Egieerig Course Objectives & Overview http://www.tu-ilmeau.de/telematik/protectio/

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8 BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

Building Your Security Operations Center and Taking it to the Next Level

Building Your Security Operations Center and Taking it to the Next Level Buildig Your Security Operatios Ceter ad Takig it to the Next Level Abstract IT threats cotiue to evolve ad become more evasive, bleded, ad persistet, with attackers dig resourceful ways to avoid detectio

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Windows Server 2008 R2 networking

Windows Server 2008 R2 networking Chapter3 Widows Server 2008 R2 etworkig Orgaizatios large ad small deped o computer etworks to operate their busiesses. Employees require aywhere access to data, while cliets ad busiess parters demad ehaced

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Firewall and IDS. TELE3119: Week8

Firewall and IDS. TELE3119: Week8 Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad

More information

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002 ICS Reget Commuicatios Modules RS-232, RS-422 ad RS-485 (T3150A) Issue 1, March, 06 Commuicatios modules provide a serial commuicatios iterface betwee the cotroller ad exteral equipmet. Commuicatios modules

More information

L5355 Modbus Plus Communications Interface

L5355 Modbus Plus Communications Interface L5355 Modbus Plus Commuicatios Iterface Techical Maual HA470897 Issue 2 Copyright SSD Drives Ic 2005 All rights strictly reserved. No part of this documet may be stored i a retrieval system, or trasmitted

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

STRATEGIC. alliances & Services

STRATEGIC. alliances & Services STRATEGIC alliaces & Services Chesterto is a leadig iteratioal maufacturer of idustrial fluid sealig systems, advaced polymer composites, cleaers, lubricats ad idustrial speciality products. Sice 1884

More information

Addressing SaaS Security

Addressing SaaS Security White Paper Addressig SaaS Security by Padma Krisha O V E R C O M I N G L I M I T S This paper ide fies some of the best prac ces ad desig priciples followed by Triget i developig SaaS applica os to address

More information

BE Software Upgrades to ITALYCS 5. It s in the. Software

BE Software Upgrades to ITALYCS 5. It s in the. Software BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the

More information

Guide to Applying Online

Guide to Applying Online Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their

More information

Going Mobile with. SYSPRO Espresso

Going Mobile with. SYSPRO Espresso Goig Mobile with SYSPRO Espresso SYSPRO Espresso offers the opportuity for you to brig your busiess ito the 21 st Cetury, takig advatage of mobile techology. www.syspro.com Ulock the world with SYSPRO

More information

The CCITT Communication Protocol for Videophone Teleconferencing Equipment

The CCITT Communication Protocol for Videophone Teleconferencing Equipment The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract

More information

OPC Server ECL Comfort 210/310 OPC Server

OPC Server ECL Comfort 210/310 OPC Server OPC Server Descriptio j l j o j l k j l j Modbus-RS485 k Etheret or Iteret l Modbus-TCP ECL Cofort cotroller Heat eter o SCADA server The Dafoss is a OPC-copliat server that serves data to OPC cliets.

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

BEA WebLogic Process Integrator

BEA WebLogic Process Integrator BEA WebLogic Process Itegrator A Compoet of BEA WebLogic Itegratio BEA WebLogic Process Itegrator Studio Olie Help BEA WebLogic Process Itegrator Release 2.0 Documet Editio 2.0 July 2001 Copyright Copyright

More information

Network Time Protocol (NTP)

Network Time Protocol (NTP) Network Time Protocol (NTP) Quick ad Dirty for AfNOG 2018 (Michuki Mwagi) Origial slides by Ayitey Bulley About NTP Network Time Protocol project http://tp.org NTP is a protocol desiged to sychroize the

More information

User Guide. Using Caliber Datamart

User Guide. Using Caliber Datamart User Guide Usig Caliber Datamart 11.1.0 Copyright 2013 Micro Focus. All Rights Reserved. Portios Copyright 1998-2009 Borlad Software Corporatio (a Micro Focus compay). All other marks are the property

More information

OpenText RightFax Fax Server

OpenText RightFax Fax Server OpeText RightFax Fax Server Icrease employee productivity, improve iformatio goverace, ad reduce costs by itegratig fax ito eterprise-wide busiess applicatios. Compaies eed a cetralized fax ifrastructure

More information

TargetLink. Installation Notes. MATLAB R14SP3 Compatibility Update for TargetLink 2.1

TargetLink. Installation Notes. MATLAB R14SP3 Compatibility Update for TargetLink 2.1 TargetLik Istallatio Notes MATLAB R14SP3 Compatibility Update for TargetLik 2.1 TargetLik 2.1.5 November 2005 ds How to Cotact dspace Mail: Tel.: Fax: E-mail: Web: Geeral Techical Support: TargetLik Support:

More information

Loop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation

Loop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation eea les-sig-bricks 1 Loop Emulatio Service Protocols over ATM Eea LES-SIG-Bricks is a complete implemetatio of the Loop Emulatio Service usig AAL2 stadard (AF-VMOA-0145.000) protocols. Eea LES-SIG-Bricks

More information

Human-Computer Interaction IS4300

Human-Computer Interaction IS4300 Huma-Computer Iteractio IS4300 1 I5 due ext class Your missio i this exercise is to implemet a very simple Java paitig applicatio. The app must support the followig fuctios: Draw curves, specified by a

More information

CORD Test Project in Okinawa Open Laboratory

CORD Test Project in Okinawa Open Laboratory CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio

More information

JavaFX. JavaFX 2.2 Installation Guide Release 2.2 E August 2012 Installation instructions by operating system for JavaFX 2.

JavaFX. JavaFX 2.2 Installation Guide Release 2.2 E August 2012 Installation instructions by operating system for JavaFX 2. JavaFX JavaFX 2.2 Istallatio Guide Release 2.2 E20474-06 August 2012 Istallatio istructios by operatig system for JavaFX 2.2 JavaFX/JavaFX 2.2 Istallatio Guide E20474-06 Copyright 2008, 2012, Oracle ad/or

More information

BEA WebLogic Commerce Server. Registration and User Processing Package

BEA WebLogic Commerce Server. Registration and User Processing Package BEA WebLogic Commerce Server Registratio ad User Processig Package BEA WebLogic Commerce Server 3.2 Documet Editio 3.2 December 2000 Copyright Copyright 2000 BEA Systems, Ic. All Rights Reserved. Restricted

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

USB TO PARALLEL USB to DB25 Parallel Adapter Cable

USB TO PARALLEL USB to DB25 Parallel Adapter Cable USB TO PARALLEL USB to DB25 Parallel Adapter Cable User Maual XUPP25 www.hamletcom.com Dear Customer, thaks for choosig a Hamlet product. Please carefully follow the istructios for its use ad maiteace

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Understanding the Federal IT Security Professional (FITSP) Certification

Understanding the Federal IT Security Professional (FITSP) Certification Uderstadig the Federal IT Security Professioal (FITSP) Certificatio ISSA-Natioal Capital Chapter Ceter for America Progress September 20th, 2016 Jim Wiggis Executive Director Federal IT Security Istitute

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Custodial Integrator Automation Guide

Custodial Integrator Automation Guide Custodial Itegrator Automatio Guide Compay Cofidetial Custodial Itegrator Product Versio: V3.8 Documet Versio: 14 Documet Issue Date: April 21, 2017 Techical Support: (866) 856-4951 Telephoe: (781) 376-0801

More information

SCI Reflective Memory

SCI Reflective Memory Embedded SCI Solutios SCI Reflective Memory (Experimetal) Atle Vesterkjær Dolphi Itercoect Solutios AS Olaf Helsets vei 6, N-0621 Oslo, Norway Phoe: (47) 23 16 71 42 Fax: (47) 23 16 71 80 Mail: atleve@dolphiics.o

More information

n Learn how to implement identity management controls n Learn how to implement access management controls n Prevent unauthorized access

n Learn how to implement identity management controls n Learn how to implement access management controls n Prevent unauthorized access Chapter Objectives Lear how to implemet idetity maagemet cotrols Lear how to implemet access maagemet cotrols Chapter #20: Idetity ad Access Maagemet 2 Idetity ad Access Maagemet Cotrols All actios will

More information

CareMat B DATASHEET. The pressure-sensitive mat for supervision of people with dementia and disorientation. RoHS

CareMat B DATASHEET. The pressure-sensitive mat for supervision of people with dementia and disorientation. RoHS CareMat B DATASHEET The pressure-sesitive mat for supervisio of people with demetia ad disorietatio Product Descriptio CareMat is used i retiremet ad ursig homes as well as i hospitals ad similar facilities.

More information

SCAN INSPECT TRACK SOLVE

SCAN INSPECT TRACK SOLVE SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately. Workflow model GM AR Gumpy RM Dyagump At a very high level, this is what gump does. We ll be lookig at each of the items described here seperately. User edits project descriptor ad commits s maitai their

More information

Neolane Social Marketing. Neolane v6.1

Neolane Social Marketing. Neolane v6.1 Neolae Social Marketig Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Linux DNS (BIND), DHCP and Servers

Linux DNS (BIND), DHCP and  Servers it 8 Liux (B), HCP ad mail ervers oa Warre HCP oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased P addresses are leased scope of addresses ca be assiged or excluded

More information

Oracle Server. What s New in this Release? Release Notes

Oracle  Server. What s New in this Release? Release Notes Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s

More information

Floristic Quality Assessment (FQA) Calculator for Colorado User s Guide

Floristic Quality Assessment (FQA) Calculator for Colorado User s Guide Floristic Quality Assessmet (FQA) Calculator for Colorado User s Guide Created by the Colorado atural Heritage Program Last Updated April 2012 The FQA Calculator was created by Michelle Fik ad Joaa Lemly

More information

BEA WebLogic Collaborate

BEA WebLogic Collaborate BEA WebLogic Collaborate A Compoet of BEA WebLogic Itegratio Itroducig BEA WebLogic Collaborate BEA WebLogic Collaborate Release 2.0 Documet Editio 2.0 July 2001 001 ServiceNow, Ic.'s Exhibit 1004 Copyright

More information

Resource Public Key Infrastructure for Secure Border Gateway Protocol

Resource Public Key Infrastructure for Secure Border Gateway Protocol Resource Public Key Ifrastructure for Secure Border Gateway Protocol George Chag, Majid Ariaezhad, ad Ljiljaa Trajković gkchag@sfu.ca, ariaezhad@live.com, ljilja@sfu.ca Commuicatio Networks Laboratory

More information

BAAN IV. BAAN IV Installation Manual for DB2 on Windows NT

BAAN IV. BAAN IV Installation Manual for DB2 on Windows NT BAAN IV BAAN IV Istallatio Maual for DB2 o Widows NT A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved.

More information

BEA Tuxedo. Introducing the BEA Tuxedo System

BEA Tuxedo. Introducing the BEA Tuxedo System BEA Tuxedo Itroducig the BEA Tuxedo System BEA Tuxedo Release 7.1 Documet Editio 7.1 May 2000 Copyright Copyright 2000 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This software ad documetatio

More information

Operating manual for message text display reporter 680

Operating manual for message text display reporter 680 1.95.2. (ed 4.95) Operatig maual for message text display reporter 680 ! Attetio: Read this! Dear customer, the maufacturer is ot liable for ay damage caused as a result of o-observace of the operatig

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Did you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV.

Did you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV. Easy Fit CCTV Rage Did you kow that houses with CCTV are 90% less likely to be burgled? Itroducig the ew Easy Fit rage of CCTV. Whether it s your home or your busiess, havig extra security ca help you

More information

USER GUIDE FOR VENDOR LISTING DATASHEET

USER GUIDE FOR VENDOR LISTING DATASHEET USER GUIDE FOR VENDOR LISTING DATASHEET Vedor Database Maagemet System (VDMS) Uit Cotracts Sectio Cotracts, Purchasig Ad Logistics Departmet (CPL) Level 2 Khartoum Tower Gamhouria St. PO 12527 Khartoum

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

In today s information technology culture, the term server is thrown around

In today s information technology culture, the term server is thrown around Itroducig Widows Home Server I today s iformatio techology culture, the term server is throw aroud quite a bit. Web servers, prit servers, proxy servers, file servers all of these refer to various computer

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

HP Media Center PC Getting Started Guide

HP Media Center PC Getting Started Guide HP Media Ceter PC Gettig Started Guide The iformatio i this documet is subject to chage without otice. Hewlett-Packard Compay makes o warraty of ay kid with regard to this material, icludig, but ot limited

More information

Optimizing Out-of-band Management

Optimizing Out-of-band Management > Techical White Paper Optimizig Out-of-bad Maagemet For Solaris Servers ABOUT UPLOGIX // Uplogix provides eterprise edge maagemet solutios for orgaizatios seekig to reduce the cost ad complexity of maagig

More information