Building the Internet of Everything (IoE) for First Responders

Size: px
Start display at page:

Download "Building the Internet of Everything (IoE) for First Responders"

Transcription

1 Buildig the Iteret of Everythig (IoE) for First Respoders Robert E. Balfour, Ph.D. Chief Techology Officer V.C.O.R.E. Solutios LLC Bethpage, NY, USA Abstract The Iteret of Everythig (IoE) describes the brigig together of people, process, data, ad thigs to make etworked coectios more relevat ad valuable tha ever before. IoE ecompasses both machie-to-machie (M2M) ad Iteret-of-Thigs (IoT) techologies, ad it is the pervasiveess of IoE tha ca be leveraged to achieve may thigs for may people, icludig first respoders. The emergig IoE will cotiue to evolve over the ext te years ad beyod, but the IoT ca happe ow, with automated M2M commuicatios brigig first respoder commuicatios ad situatioal awareess to the leadig-edge of IoE-leveraged techology exactly where they belog as they risk their lives to protect ad save others. Preseted here are a umber of techological capabilities that are critical to achievig the IoE, especially for first respoders ad emergecy maagers, icludig (a) Security; (b) a global M2M stadard; (c) powerful four-dimesioal M2M applicatios; ad (d) Data Privacy ad trust. For advaced security, Software Defied etwork Perimeters (SDP) ca provide the critical fuctioality to protect ad secure M2M odes i a ad-hoc M2M IoT/IoE etwork. Without a secure, dyamic, M2M etwork, the visio of a emergecy respoder istatly commuicatig with a smart buildig would ot be feasible. But with SDP, it ca, ad will, happe. SDP eables a ad-hoc, secure M2M etwork to rapidly deploy ad hide i plai sight. I a emergecy respose situatio, this is exactly what we eed. For M2M/IoT to go mobile ad leverage global IoE capabilities aywhere (which is what emergecy respoders eed as emergecy locatios are somewhat upredictable ad chage every day), a global idustry stadard must be, ad is beig, developed: oem2m. Ad the existig fourdscape techology/platform could quickly support a oem2m system structure that ca be deployed i the short term, with the fourdscape browser providig powerful M2M IoT/IoE applicatios ad 4D visualizatios. Privacy-by-desig priciples ca also be applied ad other critical related issues addressed beyod privacy (i.e. oce privacy is achieved ad available IoE sesors/data ca be leveraged), such as trustig, scalig, hackig, ad securig M2M IoT/IoE devices ad systems. Without the full package of IoE iovatio embracig the very public IoE world i a very private ad secure way, ad ca cotiue to evolve i parallel with emergig commercial IoE techology, first respoders would ot be able to leverage the commercial state-of-the-art i the short term ad i the years to come. Curret techology iovatio ca chage that. Keywords- Machie-to-Machie; M2M; Iteret-of-Thigs; IoT; Iteret-of-Everythig; IoE; Software Defied Network Perimeters; SDP; fourdscape; Privacy-by-Desig; PbD I. INTRODUCTION Imagie a first respoder arrivig at a icidet site. Approachig the buildig wearig their advaced commuicatios techology, the buildig ad surroudig area i crisis begi to talk to the first respoders o their hadheld screes or wearable goggles. Various critical systems (ad maybe eve people) withi the buildig idetify themselves with their geo-locatio. All the facility maagemet systems/sesors status are reportig to the respoders over ad-hoc machie-to-machie (M2M) commuicatio etworks. Some systems eve offer cotrol to respoders, providig the ability to ope/close doors, shut dow vetilatio systems, tur o fire suppressio equipmet, etc. Various video surveillace cameras begi to idetify themselves ad selectively sed critical live video feeds to respoders. Other respoders have arrived at the scee, ad their wearable devices have automatically established commuicatio with the other respoders ad are sharig voice & data commuicatios amogst each other, as well as havig commuicatios back to a full commad ceter(s) i the regio. M2M techology ca coect may devices, both statioary ad mobile, over a variety of etwork topologies. First respoders eed to leverage automated machie-to-machie mobile coectivity at a icidet site i order to achieve the futuristic sceario described above. With coectivity automated through M2M etwork techology, respoders would have much improved situatioal awareess, ad ca effectively focus their complete attetio o the ecessary emergecy respose actios ad procedures. The emergig Iteret-of-Everythig (IoE) will cotiue to evolve over the ext te years ad beyod, but the Iteret-of-Thigs (IoT) ca happe ow, with automated M2M commuicatios brigig first respoder commuicatios ad situatioal awareess to the leadig-edge of IoE-leveraged techology exactly where they belog as they risk their lives to protect ad save others. II. FUNCTIONAL CAPABILITIES ANALYSIS What is the Iteret-of-Everythig, ad how do we get there, ad why? Before gettig there, we first eed to take a step back ad ivestigate some techology buildig blocks, defiitios, ad progress to date /2/$ IEEE, used by VCORE Solutios with permissio.

2 First, Machie-to-Machie (M2M) is geerally defied as techologies that allow both wireless ad wired systems to commuicate with other devices of the same type []. M2M cocepts ca be traced back to the 960 s whe the first Caller ID system was desiged it required itelliget machie-tomachie commuicatio, sice the callig telephoe umber eeded to be trasmitted ad read by the receivig telephoe to make caller ID work. By the 980 s, M2M commuicatios were becomig commo i idustrial machie istrumetatio ad moitorig. These private M2M etworks became kow as the Idustrial Iteret. Startig i the 990 s, wireless (cellular) M2M commuicatios took hold. Ad today, with the prevalece of smartphoes ad cloud computig, M2M commuicatios are commoplace o the public Iteret (which for a umber of years most people thought of as syoymous with oly the www - world-wide-web ). Next came the Iteret of Thigs (IoT), a term first used i 999 with the itroductio of radio-frequecy idetificatio (RFID) chip techology, but i the past few years has become a very popular term describig physical objects liked through wired ad wireless etworks [2]. IoT offers advaced M2M coectivity that ca achieve a level of automatio ad moitorig i may fields/markets. Most people would be familiar with the smart thermostat, a example of a M2M IoT device/applicatio. If every device i the world were to cotai a embedded RFID chip, the the IoT could potetially iclude every smart device i the world, commuicatig over wireless/wired etworks. But that s ot everythig The Iteret of Everythig (IoE) describes the brigig together of people, process, data, ad thigs to make etworked coectios more relevat ad valuable tha ever before [2]. IoE ecompasses both M2M ad IoT techologies, ad it is the pervasiveess of IoE tha ca be leveraged to achieve may thigs for may people, icludig first respoders. There are a umber of techological capabilities that are critical to achievig the IoE, which are discussed below: secure SDP logical etwork. With SDP, we ca deploy a mobile M2M device etwork that is ot depedet o the physical etwork ifrastructure layout - just use SDP to gather the desired IP-addressable M2M devices (from aywhere aroud the world) ito a secure logical etwork. As log as all M2M devices ca achieve iteret coectivity, by ay wired/wireless/cellular/etc. meas available, they ca be cofigured ito a secure SDP etwork. Ad it ca be dyamically re-cofigured for example, if a mobile M2M device geo-locates withi rage of a SDP M2M etwork ode, ad it ca provide appropriate SDP autheticatio credetials, it ca dyamically joi the etwork of M2M devices. What this meas is that our proposed visio of a emergecy respoder walkig toward a smart buildig ad have that buildig s occupats/sesors start commuicatig with him/her ca be achieved with SDP etworks. SDP has already bee demostrated as a operatioal cocept, ad with this M2M SDP approach, it becomes irrelevat which types of etwork commuicatios (Bluetooth, zigbee, cellular, wifi, etc.) are beig used to create iteret access for M2M devices all ca be leveraged to create the M2M IoT/IoE, with as may idividual secure SDP M2M subets as eeded, overlayed o top of ay/all physical iteret commuicatios pathways. SDP provides the critical fuctioality to protect ad secure M2M odes i a ad-hoc M2M IoT/IoE etwork. Without a secure, dyamic, M2M etwork, the visio of a emergecy respoder istatly commuicatig with a smart buildig would ot be feasible. But with SDP, it ca, ad will, happe. SDP eables a ad-hoc, secure M2M etwork to rapidly deploy ad hide i plai sight. I a emergecy respose situatio, this is exactly what we eed. The SDP etwork access authorizatio workflow is show i Fig. below: A. Security, Security, Security Software Defied Networks (SDN), ad more specifically, Software-Defied etwork Perimeters (SDP) appears to be a etwork game-chager for the M2M Iteret-of-Thigs, ad especially for emergecy respoders. [SDP is a ope protocol [3] developed by the Cloud Security Alliace, authored by a expert group of a doze idustry visioaries.] I its raw, basic form, a M2M IoT/IoE architecture would have a global iteret IP address for every M2M device. I reality, this is actually possible with IPv6 addressig. But with today s etwork security (i.e. physical firewall) approach, this would put every M2M device outside the firewall ad expose every M2M device to potetial iteret hackers, which is uacceptable. But SDP ca chage all that. Secure, ad-hoc IP etworks ca be deployed o-the-fly ad recofigured dyamically wheever eeded. Global-IP M2M devices ca securely hide-i-plai-sight o the global iteret withi a Figure. SDP Access Authorizatio Workflow [3] Balfour Techologies fourdscape system/software platform [4], utilized by VCORE Solutios i umerous M2M system deploymets for public safety, security ad emergecy maagemet, already implemeted may features of SDP-like autheticatio of users ad devices, ad has ow bee adapted to be coformat with the idustry ope stadard SDP specificatio (architecture, workflow, ad protocol) documeted i the SDP.0 Spec (April 204) published by the Cloud Security Alliace. M2M IoT/IoE ad all its potetial beefits will fail without achievig u-breachable

3 etwork security, which is what SDN/SDP advaced techology ca ad must deliver i a mobile, wireless M2M world. B. A pervasive M2M Stadard The Iteret-of-Everythig does t happe with a plethora of idepedet, competig silos of M2M techology ad coectivity. For M2M/IoT to go mobile ad leverage global IoE capabilities aywhere (which is what emergecy respoders eed as emergecy locatios are somewhat upredictable ad chage every day), a global idustry stadard must be, ad is beig, developed: the oem2m [5] fuctioal architecture must be a major focus i ay M2M IoT/IoE architecture/platform. It will be the global M2M stadard all the major global telecomm stadards groups have bought ito ad are supportig it. Also, it is beig developed as a best-of-breed architecture - oem2m has already doe a aalysis of most of the existig attempts of a M2M architecture/system (from stadards orgaizatios such as ATIS, ETSI, TIA, TTA, 3GPP, as documeted i their Architecture Aalysis Techical Report) ad are usig that kowledge, plus evaluatio of umerous M2M use cases i various vertical markets, as the basis for the oem2m architecture/protocol beig developed. oem2m focuses o the Service Layer aspects ad takes a Uderlyig Networkidepedet view of the ed-to-ed services. The Uderlyig Network is used for the trasport of data ad potetially for other services. [6] What this meas is that oem2m will work o ay etwork trasport architecture, which is exactly what we eed for globally addressable M2M devices to coect over heterogeeous ed-to-ed etworks. [oem2m achieves this with a layered services approach, specifically utilizig uderlyig Network Services Etity(s).] oem2m is clearly the best referece architecture ay M2M solutio ot addressig ad leveragig oem2m would likely have a very short half-life with sparse pockets of deploymet, which is certaily ot the goal of the IoE. Ad with SDP providig the ability to deploy perimeter fuctioality where eeded i order to isolate services from usecured etworks, SDP techology ca protect ad secure M2M odes ad services i a ad-hoc emergecy M2M etwork exactly what we eed. Our curret research/aalysis has also show that Balfour Techologies existig, mature fourdscape software techology/architecture has a umber of coceptual similarities to both oem2m ad SDP. This meas that existig, commercial fourdscape ca serve as the basis for a M2M/SDP system/architecture that ca be operatioal ow, ad also cotiue to evolve ito a comprehesive, compliat, commercial M2M IoT/IoE system for the foreseeable future. fourdscape is a layered architecture of etworked compoets, similar to the oem2m referece architecture. As is evidet i the brief descriptios below, there is a very straightforward mappig betwee our existig fourdscape etworked compoets ad oem2m defied compoets (see Fig. 2). It is ot a big stretch to see how the existig fourdscape architecture could quickly support a oem2m system structure. Case Case 2 Case 3 Case 4 Applicatio Dedicated Node Applicatio Dedicated Node Y Applicatio Z Service Node Y Applicatio Z Service Node Leged : Applicatio Etity : Commo Service Etity Middle Node Z Y Middle Node Y Z Y Z Ifrastructure Node Figure 2. oem2m Architecture To the Ifrastructure Node of other M2M Service Y Providers o resources - fourdscape resource modules ca serve as oem2m Applicatio Service Nodes, iterfacig to a multitude of mobile devices, wrappig them to appear as compatible M2M devices. o egies fourdscape egies coordiate betwee 4D resources ad 4D servers, ad ca serve as oem2m Middle Nodes or M2M gateways. o servers fourdscape servers coordiate the data feeds to/from 4D resources/egies ad fourdscape browsers, which would serve as oem2m Ifrastructure Nodes. o browsers fourdscape browsers are the user iterface to all 4D portal fuctioality geerated from 4D resources/egies/servers, ad would be the user-accessible M2M applicatios i a oem2m architecture. fourdscape is already a IP addressable, etworked system of scalable compoets, which are already deployed ad operatioal as a cloud-based system. This makes it ready to support both SDP ad oem2m i real-world M2M IoT/IoE deploymets. fourdscape utilizes RESTful (http/crud/uri) TCP/IP, over heterogeeous et trasport layers, which makes it both etwork idepedet/agostic ad capable of CRUD/URI accessible resources (like oem2m). M2M Commo Services Fuctios (CSF) A M2M IoT/IoE platform like fourdscape will implemet features idetified as M2M Commo Services (see Fig. 3 below), i a oem2m Commo Services Etity () package, such as: o Addressig & Idetificatio (AID) of physical ad logical resources i a M2M eviromet. o Discovery (DIS) of all available M2M odes. o Registratio (REG) of all authorized M2M odes, which ca also leverage the SDP autheticatio workflow, providig a quite secure ad-hoc M2M etwork. o Locatio (LOC), utilizig geo-data feeds idetifyig realtime locatios of assets (such as vehicles) ad/or devices (such as sesors, smartphoes, etc.).

4 Commo Services Etity () Applicatio Etity () Referece Poit are actual ipad screeshots of the live first respoder sceario): Addressig ad Idetificatio Data Maagemet & Repository Locatio Security Commuicatio Maagemet/ Delivery Hadlig Registratio Group Maagemet Sessio Maagemet Device Maagemet Subscriptio Notificatio Uderlyig Network Service Etity (NSE) Z Referece Poit Service Chargig & Accoutig Discovery Network Service Exposure/Service Ex+Triggerig Figure 3. oem2m Commo Services Y Referece Poit o Data Maagemet & Repository (DMR) desiged as a Big Data Repository of archived realtime dataflow. o Network Services (NSE) which ca be built o top of a object-orieted etwork sockets library that supports TCP/IP, SSL, HTTP, RTSP, etc. etwork message coectivity, which ca be utilized to grow M2M Network Services with fuctioality to support higher level etwork services as eeded. o Security (SEC) for etwork/autheticatio security, leveragig SDP, which also achieves the capability of ad hoc secure local etwork creatio o-the-fly, which would greatly ehace M2M fuctioality. M2M SEC also demads sesitive data hadlig capability to secure credetials durig storage ad maipulatio, which is a importat security cosideratio that must be addressed. o Subscriptio & Notificatio (SUB) offerig subscriptio services to M2M odes (for example: fourdscape resources/egies/servers/browsers), to ot oly otify of a available chage/update to a resource, but also to auto-deliver the updated data as requested. oem2m is a evolvig ope stadards work-i-progress, but the iitial release of oem2m stadards documets i 205 have provided sufficiet detail to be implemeted as a referece architecture, which ca be utilized to deploy M2M IoT/IoE systems ow, i a stadard oem2m fashio, ad be able to evolve ad comply with the global oem2m stadard i the years to come. The fourdscape software techology is becomig oe of the first M2M IoT/IoE platforms supportig a itegrated SDP ad M2M architecture a powerful combiatio that ca make M2M IoT/IoE a reality today. A first respoder with a ipad (which has a preloaded authorized etwork access certificate) has cellular access to a 4G LTE Verizo mobile etwork. The respoder with his ipad approaches the buildig. Whe it comes withi proximity, the buildig s secure Software Defied Perimeter (SDP) etwork seses its presece, checks its credetials, authorizes it ad grats the ipad access to the buildig's private SDP etwork. Oce o the buildig etwork, M2M machies withi the buildig preset themselves to the ipad user via icos overlayed o the live ipad camera view of the buildig, creatig a augmeted reality scee for the user (see Fig. 4). Figure 4. ipad Augmeted Reality scee of a Smart buildig I this demo the user accesses, via ico touch or M2M butto/dialog (ad/or voice commads), the followig sample machies providig realtime iformatio from the buildig: Pre-recorded 360 degree video walkthrus of the iterior of the buildig's layout, critical ifrastructure ad assets. (i top-left corer of Fig. 5) Figure video walkthrough of buildig accessed Live video feeds from the buildig's surveillace cameras. (see Fig. 6) C. Powerful M2M IoE Apps (i.e. 4D Data Visualizatio) Balfour Techologies has recetly demostrated that our futuristic sceario of a smart talkig buildig with M2M machies egagig first respoders at the scee ca be achieved, usig its fourdscape system as a prototype SDP/M2M system platform ad its fourdscape fourdimesioal browser as a powerful M2M iteractive applicatio. I September 204, a live demostratio of the followig sceario was performed i Bethpage, NY (images Figure 6. Live surveillace camera feeds accessed.

5 The buildig's Stadard Operatig Procedures (SOPs) for this emergecy, showig live status of which SOP steps have already bee executed (see Fig. 7). Figure 7. Live status of buildig s Stadard Operatig Procedures. Basic multi-user collaboratio is also demostrated: A secod authorized respoder with his ipad has previously etered the buildig ad accessed the buildig SDP etwork over a buildig wifi hotspot. The two users the collaborate o a floor pla drawig provided by oe of the buildig's M2M machies, loaded o a shared whiteboard. Each user iteractively draws o the floor pla to suggest a potetial igress route, ad also utilizes local text messagig facilities to commuicate with each other (see Fig. 8). Figure 8. A Twiddla shared whiteboard usig realtime floor plas provided by the smart buildig. The respoder iside the buildig, via text message, also tells the respoder outside to access his live ipad camera feed from iside the buildig, which he does. (see live mobile ipad video camera stream i ceter of Fig. 9). Figure 9. Mobile ipad camera iside buildig accessed. Note that the M2M machies, SDP servers, Egies, Resources, ad fourdserver that made this demo work were ruig o Verizo NextGe Cloud servers i Culpepper, VA., makig this a truly machie-to-machie Iteret-of- Thigs live demostratio. What was see demostrated are two respoders o completely differet etworks ad access poits (oe o a 4G LTE cell tower, the other o a local wifi hotspot) commuicatig with each other securely o a private SDP etwork provided ad-hoc by the buildig ifrastructure, with M2M machies i the buildig commuicatig with the respoders powerful capabilities ad situatioal awareess for all first respoders. D. Data Privacy ad Trust The Iteret-of-Everythig (IoE) is rapidly approachig. With access to the IoE ad millios of time-critical sesors/data, first respoder situatioal awareess ad immediate actioable kowledge will be ehaced, improvig public safety ad critical ifrastructure security. The safety, efficiecy ad accuracy/effectiveess of first respoder actios will also be sigificatly improved as well. Ad although the rapid proliferatio of etworked sesors ad big data aalytics facilitate sigificat opportuities to greatly ehace timely situatioal awareess for public safety, security ad emergecy respose, cocers have bee raised about IoE s impact o privacy. There is fear that fudametal privacy protectios oce take for grated, ca ow be compromised by the sheer volume ad velocity of data beig maipulated to create value for may private ad commercial applicatios. Just look at the popular process of udgig i commercial advertisig, where idetifiable data is used to profile idividuals to aalyze, predict ad ifluece their behavior, which ca certaily be characterized as potetially ivasive to privacy. Hudreds of years ago, Bejami Frakli is quoted as sayig: Those who would give up essetial liberty to purchase a little temporary safety, deserve either liberty or safety. So puttig privacy first ad foremost, we eed to develop the meas (processes, systems, architectures) to trasform the wealth of iformatio flowig i the IoE ito actioable kowledge, especially for public safety ad security, while protectig the privacy of idividuals ad orgaizatios that are the source of some of this valuable sesor data. The emergig Iteret-of-Everythig (IoE) will udoubtedly be the orm i the years to come. If public/govermet agecies (i this case specifically first respoder orgaizatios) are to leverage this powerful techological advacemet, privacy cocers must be addressed, ad idividual privacy guarateed. Balfour Techologies is curretly pursuig iovative research ito applyig privacy by desig priciples [7] to its fourdscape IoE platform/architecture, ad addressig other critical related issues beyod privacy (i.e. oce privacy is achieved ad available IoE sesors/data ca be leveraged), such as TRUSTING, HACKING, SCALING, SECURING, ad 4D BIG DATA VISUALIZATION. Without the full package of

6 IoE iovatio that ca embrace the very public IoE world i a very private ad secure way, ad ca cotiue to evolve i parallel with emergig commercial IoE techology, first respoders will ot be able to leverage the commercial stateof-the-art i the short term ad i the years to come. Curret techology iovatio ca chage that. Through techology iovatio, we eed to effectively eable first respoders to leverage state-of-the-art ad future IoE techology ad capabilities. Besides all the evirometal ad surveillace sesors that are rapidly beig deployed, idividual citizes also represet the potetial (if their privacy ca be guarateed) for millios of mobile sesors/video that ca provide uprecedeted, live data feeds to greatly ehace ad improve first respoder situatioal awareess, effective actios, safety, ad ultimately the safety ad security of the same public that is the source of these mobile sesors. This is how the goal of the Presidetial Policy Directive (PPD-8) o Natioal Preparedess [8] (aimed at achievig a itegrated, layered, ad ALL-OF-NATION (all levels of govermet, the private ad o-profit sectors, ad idividual citizes) preparedess ad respose approach that optimizes the use of available resources) ca be realized, ad maitaied with miimal techology update costs i the years to come (i.e. available, affordable, ad sustaiable ). III. CONCLUSIONS Over the past decade, fourdscape-based techology has bee utilized o a wide variety of projects, providig situatioal awareess to umerous levels of users. By itegratig fourdscape techology with SDP, oem2m, ad addressig importat data privacy ad trust cocers, a M2M IoT/IoE system ca be deployed for first respoders i the short term; i fact, a Small Busiess Iovative Research (SBIR) project has already commeced with U.S. Departmet of Homelad Security (DHS) Sciece & Techology (S&T) Phase II fudig support to do just that. There is much more that ca be doe with the techological capabilities described here. Ad ot just i the first respoder / emergecy maagemet field. Secure, machie-to-machie, iteret-of-thigs techology ca be a drivig force towards achievig the Iteret-of-Everythig, oe step at a time, i heavy idustry, facilities maagemet, public safety, home healthcare, traffic maagemet, home moitorig & cotrol, eve persoal services. Whe the IoE becomes aware ad shareable, with privacy guarateed, the world we live i will quickly evolve to a ew level of techology automatio ad coectivity. ACKNOWLEDGMENT Figures 4-9 ad fourdscape related techology details are used with permissio from Balfour Techologies LLC. This work is sposored i part by the U.S. Departmet of Homelad Security, Advaced Research Projects Agecy ad Sciece & Techology Directorate, uder multiple prior ad curret awards. This iformatio does ot ecessarily reflect the policy of the U.S. Govermet, ad o official edorsemet should be iferred. The Author would like to recogize the substatial efforts of the dedicated persoel at VCORE Solutios, Balfour Techologies, ad all the Residet Research Parters at the Morrelly Homelad Security Ceter. Thak you. REFERENCES [] Wikipedia, The Free Ecyclopedia olie, 7 March 205, <e.wikipedia.org/wiki/machie_to_machie>. [2] Lueth, Kud Lasse, Why the Iteret of Thigs is called Iteret of Thigs: Defiitio, history, disambiguatio, IoT Aalytics, 9 Dec 204, <iot-aalytics.com/iteret-of-thigsdefiitio/>. [3] J. Schweitzer, et.al., SDP Specificatio.0, Software Defied Perimeter Workig Group, Cloud Security Alliace, April 204. [4] R, Balfour, Next Geeratio Emergecy Maagemet Commo Operatig Picture Software/Systems (COPSS), LISAT 202 Coferece, IEEE plore, May 202. [5] oem2m Press Release, The Rise of the Machies World s First Global Stadards for M2M Deploymet, oem2m.org, 4 Feb 205. [6] oem2m parters, oem2m Techical Specificatio Fuctioal Architecture, oem2m.org, 30 Ja 205. [7] PbD website, Privacy by Desig Priciples ad Myths, privacybydesig.ca, 204. [8] B. Obama, Presidetial Policy Directive 8: Natioal Preparedess, The White House, Mar. 20, < presidetial-policy-directive-8-atioal-preparedess>. BIOGRAPHY Robert E. Balfour (BS 77, MS 80, PhD 99) is a Computer Scietist ad Chief Techology Officer at VCORE Solutios LLC, a Residet Research Parter at the Morrelly Homelad Security Ceter i Bethpage, NY. A expert computer software/systems egieer ad cosultat for most of his career, over the past decade he has bee issued multiple U.S. Patets for the ivetio of the 4D Browser, which forms the basis of VCORE s curret fourdscape techology. Dr. Balfour has bee istrumetal i the developmet of fourdscape software, which has wo multiple Log Islad Software Awards (LISAs), ad has also bee recogized with the atioal Tibbetts Award from the U.S. Small Busiess Admiistratio (SBA) for outstadig cotributio to a successful Small Busiess Iovatio Research (SBIR) Program. Curretly, Dr. Balfour cotiues his iovatio at VCORE, applyig fourdscape software techology to importat homelad security ad commercial applicatios.

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Data Warehousing. Paper

Data Warehousing. Paper Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial

More information

Data Protection: Your Choice Is Simple PARTNER LOGO

Data Protection: Your Choice Is Simple PARTNER LOGO Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

Cyber Risk Mitigation for Smart Cities

Cyber Risk Mitigation for Smart Cities Cyber Risk Mitigatio for Smart Cities Abstract Rapid growth i global populatio ad evolvig techological, macro-ecoomic, ad evirometal ladscapes have fueled widespread iterest i smart cities, which are,

More information

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR

MANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Guide to Applying Online

Guide to Applying Online Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their

More information

Continuity Logic Frontline Live

Continuity Logic Frontline Live September 2015 Cotiuity Logic Frotlie Live Iovatig User Experiece for Busiess Cotiuity SOLUTIONPERSPECTIVE Goverace, Risk Maagemet & Compliace Isight Cotiuity Logic Frotlie Live Iovatio i User Experiece

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

CORD Test Project in Okinawa Open Laboratory

CORD Test Project in Okinawa Open Laboratory CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

BE Software Upgrades to ITALYCS 5. It s in the. Software

BE Software Upgrades to ITALYCS 5. It s in the. Software BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the

More information

SCAN INSPECT TRACK SOLVE

SCAN INSPECT TRACK SOLVE SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately. Workflow model GM AR Gumpy RM Dyagump At a very high level, this is what gump does. We ll be lookig at each of the items described here seperately. User edits project descriptor ad commits s maitai their

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

STRATEGIC. alliances & Services

STRATEGIC. alliances & Services STRATEGIC alliaces & Services Chesterto is a leadig iteratioal maufacturer of idustrial fluid sealig systems, advaced polymer composites, cleaers, lubricats ad idustrial speciality products. Sice 1884

More information

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper

More information

Air Force Data Reference Architecture and Platform

Air Force Data Reference Architecture and Platform Headquarters U.S. Air Force Air Force Data Referece Architecture ad Platform Ms. Jackie Murray 11 Oct 2018 1 AF Data Challeges Large umber of legacy systems with umerous poit-to-poit iterfaces that are

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

Intelligent Systems in Retail. Powered by Windows Embedded

Intelligent Systems in Retail. Powered by Windows Embedded Itelliget i Retail Powered by Widows Embedded Coect with customers o their terms Today, a thrivig retail eterprise is likely to be a distributed eterprise sourcig ad sellig ew goods i a icreasig umber

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Did you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV.

Did you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV. Easy Fit CCTV Rage Did you kow that houses with CCTV are 90% less likely to be burgled? Itroducig the ew Easy Fit rage of CCTV. Whether it s your home or your busiess, havig extra security ca help you

More information

CA Top Secret r14 for z/os

CA Top Secret r14 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Next generation IP- based multimedia services on cable TV networks

Next generation IP- based multimedia services on cable TV networks Iteratioal Telecommuicatio Uio Next geeratio IP- based multimedia services o cable TV etworks Volker Leisse ECCA Pre - coferece draft ITU-T Workshop All Star Network Access Geeva, 2-4 Jue 2004 Outlie o

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Goals of the Lecture UML Implementation Diagrams

Goals of the Lecture UML Implementation Diagrams Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Optimizing Out-of-band Management

Optimizing Out-of-band Management > Techical White Paper Optimizig Out-of-bad Maagemet For Solaris Servers ABOUT UPLOGIX // Uplogix provides eterprise edge maagemet solutios for orgaizatios seekig to reduce the cost ad complexity of maagig

More information

THIRD-QUARTER 2017 REVENUES

THIRD-QUARTER 2017 REVENUES PRESS RELEASE Paris, November 16, 2017 THIRD-QUARTER 2017 REVENUES Reveues up 6.6% year o year for the first ie moths of 2017, comig i at 3,710 millio 250,000 ew mobile subscribers durig the quarter the

More information

IncorporatingCluster-BasedRelationshipsin Web Rule Language

IncorporatingCluster-BasedRelationshipsin Web Rule Language IcorporatigCluster-BasedRelatioshipsi Web Rule Laguage Mala Mehrotra Pragati Syergetic ResearchIc. Cupertio. CA mm@pragati-ic.com http://www.pragati-ic.com 1 Itroductio The Sematic Web visio requires rule-based

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess ad icreasigly more distributed workforce, remote ad brach staff demad access

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information

SCI Reflective Memory

SCI Reflective Memory Embedded SCI Solutios SCI Reflective Memory (Experimetal) Atle Vesterkjær Dolphi Itercoect Solutios AS Olaf Helsets vei 6, N-0621 Oslo, Norway Phoe: (47) 23 16 71 42 Fax: (47) 23 16 71 80 Mail: atleve@dolphiics.o

More information

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The

More information

Complete Security Solutions with the Latest Technology and Law Enforcement Experienced Personnel.

Complete Security Solutions with the Latest Technology and Law Enforcement Experienced Personnel. Complete Security Solutios with the Latest Techology ad Law Eforcemet Experieced Persoel www.smartsecuritypros.com ( 3 0 1 ) 9 5 5-9 7 8 2 SPECIAL FEATURES Our Remote Guard VSaaS video surveillace equipmet

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Weston Anniversary Fund

Weston Anniversary Fund Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue

More information

OpenText RightFax Fax Server

OpenText RightFax Fax Server OpeText RightFax Fax Server Icrease employee productivity, improve iformatio goverace, ad reduce costs by itegratig fax ito eterprise-wide busiess applicatios. Compaies eed a cetralized fax ifrastructure

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES

1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES Formoreiformatio,pleasecal877.449.0458,oremailusatSales@CorporateArmor.com. Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess

More information

In today s information technology culture, the term server is thrown around

In today s information technology culture, the term server is thrown around Itroducig Widows Home Server I today s iformatio techology culture, the term server is throw aroud quite a bit. Web servers, prit servers, proxy servers, file servers all of these refer to various computer

More information

BEA WebLogic Process Integrator

BEA WebLogic Process Integrator BEA WebLogic Process Itegrator A Compoet of BEA WebLogic Itegratio BEA WebLogic Process Itegrator Studio Olie Help BEA WebLogic Process Itegrator Release 2.0 Documet Editio 2.0 July 2001 Copyright Copyright

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about

More information

Humans are visual creatures, so it isn t surprising that we want to

Humans are visual creatures, so it isn t surprising that we want to Gettig Started with Visio Humas are visual creatures, so it is t surprisig that we wat to visualize our ideas, desigs, ad fial products ad commuicate them graphically. I the past, high-quality presetatios

More information

Bike MS: 2013 Participant Center guide

Bike MS: 2013 Participant Center guide Bike MS: 2013 Participat Ceter guide bikems.org 1 Why use Olie Fudraisig Tools? Usig olie tools makes fudraisig easier Table of Cotets Participats who use persoal pages raise more moey! Bike MS $883 v.

More information

Bike MS: 2014 Participant Center guide

Bike MS: 2014 Participant Center guide Bike MS: 2014 Participat Ceter guide bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Baan Finance Financial Statements

Baan Finance Financial Statements Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace

More information

Serverless Computing: A Compelling Opportunity for Today s Digital Enterprise

Serverless Computing: A Compelling Opportunity for Today s Digital Enterprise Serverless Computig: A Compellig Opportuity for Today s Digital Eterprise Abstract Cloud computig has eabled orgaizatios to focus less o their IT ifrastructure ad more o their core products ad services.

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002 ICS Reget Commuicatios Modules RS-232, RS-422 ad RS-485 (T3150A) Issue 1, March, 06 Commuicatios modules provide a serial commuicatios iterface betwee the cotroller ad exteral equipmet. Commuicatios modules

More information

Human-Computer Interaction IS4300

Human-Computer Interaction IS4300 Huma-Computer Iteractio IS4300 1 I5 due ext class Your missio i this exercise is to implemet a very simple Java paitig applicatio. The app must support the followig fuctios: Draw curves, specified by a

More information

Huawei FusionHome Smart Energy Solution

Huawei FusionHome Smart Energy Solution Smarter Eergy for a Better Life Copyright Huawei Techologies Co., Ltd.208. All rights reserved. No part of this documet may be reproduced or trasmitted i ay form or by ay meas without prior writte coset

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

What are Information Systems?

What are Information Systems? Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),

More information

VISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION. Thomas Wiedemann

VISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION. Thomas Wiedemann Proceedigs of the 2000 Witer Simulatio Coferece J. A. Joies, R. R. Barto, K. Kag, ad P. A. Fishwick, eds. VISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION Thomas Wiedema Techical

More information

2017 LEARNING SYSTEM CONTACT INFORMATION FOR CLTD CERTIFICATION EXAM PREPARATION. learncltd.com. Joni Holeman, VP Education. APICS DC Metro Chapter

2017 LEARNING SYSTEM CONTACT INFORMATION FOR CLTD CERTIFICATION EXAM PREPARATION. learncltd.com. Joni Holeman, VP Education. APICS DC Metro Chapter 2017 LEARNING SYSTEM FOR CLTD CERTIFICATION EXAM PREPARATION CONTACT INFORMATION Joi Holema, VP Educatio APICS DC Metro Chapter Email: educatio@apicsdcmetro.org Phoe: 703-430-4075 learcltd.com THE CLTD

More information

SFP1215W Forensic Pouch E V A L U A T I O N R E P O R T

SFP1215W Forensic Pouch E V A L U A T I O N R E P O R T E V A L U A T I O N R E P O R T April 2012 NIJ Electroic Crime Techology Ceter of Excellece 550 Marshall St., Suite B Phillipsburg, NJ 08865 www.ectcoe.org NIJ ECTCOE TESTING AND EVALUATION PROJECT STAFF

More information

Efficiency and Fitness of Embedded Flash Storage

Efficiency and Fitness of Embedded Flash Storage The Idustrial Flash Storage Expert. Efficiecy ad Fitess of Embedded Flash Storage By Chaso Li Email: Chaso.Li@embestor.com EmBestor Techology Ic. http://www.embestor.com Sata Clara, CA 1 Outlie The Idustrial

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Chapter 2 Distributed Information Systems Architecture

Chapter 2 Distributed Information Systems Architecture Prof. Dr.-Ig. Stefa Deßloch AG Heterogee Iformatiossysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@iformatik.ui-kl.de Chapter 2 Distributed Iformatio Systems Architecture Chapter Outlie (Distributed)

More information

HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/ :06 Page 1 MAKING A COMPLAINT

HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/ :06 Page 1 MAKING A COMPLAINT HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/2013 17:06 Page 1 MAKING A COMPLAINT FEBRUARY 2010 HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/2013 17:06 Page 2 ABOUT THIS BOOKLET This booklet outlies

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information

BEA WebLogic Collaborate

BEA WebLogic Collaborate BEA WebLogic Collaborate A Compoet of BEA WebLogic Itegratio Itroducig BEA WebLogic Collaborate BEA WebLogic Collaborate Release 2.0 Documet Editio 2.0 July 2001 001 ServiceNow, Ic.'s Exhibit 1004 Copyright

More information

GSMA Seminars GSMA Seminars are free to all attendees

GSMA Seminars GSMA Seminars are free to all attendees MOBILISING THE INTERNET OF THINGS Coected Livig at Mobile World Cogress 24-27 February 2014 1 Coected Livig at Mobile World Cogress GSMA Semiars GSMA Semiars are free to all attedees Coected Livig: Mobilisig

More information

NVP-903 Series. Multi-Stream Network Video Encoder REFERENCE GUIDE

NVP-903 Series. Multi-Stream Network Video Encoder REFERENCE GUIDE NVP-903 Series Multi-Stream Network Video Ecoder REFERENCE GUIDE NVP-903 Series User Maual Table of Cotets 1 Itroductio... 4 1.1 Product Overview... 4 1.2 Product Features... 4 2 Pael Desig... 5 2.1 Frot

More information

Human-Computer Interaction IS4300

Human-Computer Interaction IS4300 Huma-Computer Iteractio IS4300 1 P4 Desig Sketches Due Iteractio Scearios Expad each of your activity desig scearios (3+) ito full iteractio scearios, thikig about what the user perceives ad the actios

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

The Birth of the Connected Platform

The Birth of the Connected Platform Jue 2011 ThigWorx Foudatios: The Birth of the Coected Platform Sposored by ThigWorx Cotets Executive Summary 1 The Madate for a Coected Platform 3 Questios Facig Every Busiess 5 The Aatomy of a Coected

More information

Mindmapping: A General Purpose (Test) Planning Tool

Mindmapping: A General Purpose (Test) Planning Tool W8 Test Strategy, Plaig, Metrics Wedesday, May 2d, 2018 1:45 PM Midmappig: A Geeral Purpose (Test) Plaig Tool Preseted by: Bob Gale Zeergy Techologies Brought to you by: 350 Corporate Way, Suite 400, Orage

More information

Fundamentals of. Chapter 1. Microprocessor and Microcontroller. Dr. Farid Farahmand. Updated: Tuesday, January 16, 2018

Fundamentals of. Chapter 1. Microprocessor and Microcontroller. Dr. Farid Farahmand. Updated: Tuesday, January 16, 2018 Fudametals of Chapter 1 Microprocessor ad Microcotroller Dr. Farid Farahmad Updated: Tuesday, Jauary 16, 2018 Evolutio First came trasistors Itegrated circuits SSI (Small-Scale Itegratio) to ULSI Very

More information

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency Volume 3, Issue 9, September 2013 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com Couplig Evaluator to Ehace

More information

TruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information

TruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information TruVu 360 User Commuity Cotiuous educatio is importat for a successful o-site lubricat program. With ever growig articles, videos, ad structured learig modules, TruVu 360 user commuity is a digital commuity

More information

FIRST-QUARTER 2017 REVENUES

FIRST-QUARTER 2017 REVENUES PRESS RELEASE Paris, May 18, 2017 FIRST-QUARTER 2017 REVENUES First-quarter reveues up almost 7% to 1,224 millio 300,000 ew ladlie ad mobile subscribers durig the quarter Frace's leadig recruiter of mobile

More information

Outline n Introduction n Background o Distributed DBMS Architecture

Outline n Introduction n Background o Distributed DBMS Architecture Outlie Itroductio Backgroud o Distributed DBMS Architecture Datalogical Architecture Implemetatio Alteratives Compoet Architecture o Distributed DBMS Architecture o Distributed Desig o Sematic Data Cotrol

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information