Building the Internet of Everything (IoE) for First Responders
|
|
- Dorthy Marshall
- 6 years ago
- Views:
Transcription
1 Buildig the Iteret of Everythig (IoE) for First Respoders Robert E. Balfour, Ph.D. Chief Techology Officer V.C.O.R.E. Solutios LLC Bethpage, NY, USA Abstract The Iteret of Everythig (IoE) describes the brigig together of people, process, data, ad thigs to make etworked coectios more relevat ad valuable tha ever before. IoE ecompasses both machie-to-machie (M2M) ad Iteret-of-Thigs (IoT) techologies, ad it is the pervasiveess of IoE tha ca be leveraged to achieve may thigs for may people, icludig first respoders. The emergig IoE will cotiue to evolve over the ext te years ad beyod, but the IoT ca happe ow, with automated M2M commuicatios brigig first respoder commuicatios ad situatioal awareess to the leadig-edge of IoE-leveraged techology exactly where they belog as they risk their lives to protect ad save others. Preseted here are a umber of techological capabilities that are critical to achievig the IoE, especially for first respoders ad emergecy maagers, icludig (a) Security; (b) a global M2M stadard; (c) powerful four-dimesioal M2M applicatios; ad (d) Data Privacy ad trust. For advaced security, Software Defied etwork Perimeters (SDP) ca provide the critical fuctioality to protect ad secure M2M odes i a ad-hoc M2M IoT/IoE etwork. Without a secure, dyamic, M2M etwork, the visio of a emergecy respoder istatly commuicatig with a smart buildig would ot be feasible. But with SDP, it ca, ad will, happe. SDP eables a ad-hoc, secure M2M etwork to rapidly deploy ad hide i plai sight. I a emergecy respose situatio, this is exactly what we eed. For M2M/IoT to go mobile ad leverage global IoE capabilities aywhere (which is what emergecy respoders eed as emergecy locatios are somewhat upredictable ad chage every day), a global idustry stadard must be, ad is beig, developed: oem2m. Ad the existig fourdscape techology/platform could quickly support a oem2m system structure that ca be deployed i the short term, with the fourdscape browser providig powerful M2M IoT/IoE applicatios ad 4D visualizatios. Privacy-by-desig priciples ca also be applied ad other critical related issues addressed beyod privacy (i.e. oce privacy is achieved ad available IoE sesors/data ca be leveraged), such as trustig, scalig, hackig, ad securig M2M IoT/IoE devices ad systems. Without the full package of IoE iovatio embracig the very public IoE world i a very private ad secure way, ad ca cotiue to evolve i parallel with emergig commercial IoE techology, first respoders would ot be able to leverage the commercial state-of-the-art i the short term ad i the years to come. Curret techology iovatio ca chage that. Keywords- Machie-to-Machie; M2M; Iteret-of-Thigs; IoT; Iteret-of-Everythig; IoE; Software Defied Network Perimeters; SDP; fourdscape; Privacy-by-Desig; PbD I. INTRODUCTION Imagie a first respoder arrivig at a icidet site. Approachig the buildig wearig their advaced commuicatios techology, the buildig ad surroudig area i crisis begi to talk to the first respoders o their hadheld screes or wearable goggles. Various critical systems (ad maybe eve people) withi the buildig idetify themselves with their geo-locatio. All the facility maagemet systems/sesors status are reportig to the respoders over ad-hoc machie-to-machie (M2M) commuicatio etworks. Some systems eve offer cotrol to respoders, providig the ability to ope/close doors, shut dow vetilatio systems, tur o fire suppressio equipmet, etc. Various video surveillace cameras begi to idetify themselves ad selectively sed critical live video feeds to respoders. Other respoders have arrived at the scee, ad their wearable devices have automatically established commuicatio with the other respoders ad are sharig voice & data commuicatios amogst each other, as well as havig commuicatios back to a full commad ceter(s) i the regio. M2M techology ca coect may devices, both statioary ad mobile, over a variety of etwork topologies. First respoders eed to leverage automated machie-to-machie mobile coectivity at a icidet site i order to achieve the futuristic sceario described above. With coectivity automated through M2M etwork techology, respoders would have much improved situatioal awareess, ad ca effectively focus their complete attetio o the ecessary emergecy respose actios ad procedures. The emergig Iteret-of-Everythig (IoE) will cotiue to evolve over the ext te years ad beyod, but the Iteret-of-Thigs (IoT) ca happe ow, with automated M2M commuicatios brigig first respoder commuicatios ad situatioal awareess to the leadig-edge of IoE-leveraged techology exactly where they belog as they risk their lives to protect ad save others. II. FUNCTIONAL CAPABILITIES ANALYSIS What is the Iteret-of-Everythig, ad how do we get there, ad why? Before gettig there, we first eed to take a step back ad ivestigate some techology buildig blocks, defiitios, ad progress to date /2/$ IEEE, used by VCORE Solutios with permissio.
2 First, Machie-to-Machie (M2M) is geerally defied as techologies that allow both wireless ad wired systems to commuicate with other devices of the same type []. M2M cocepts ca be traced back to the 960 s whe the first Caller ID system was desiged it required itelliget machie-tomachie commuicatio, sice the callig telephoe umber eeded to be trasmitted ad read by the receivig telephoe to make caller ID work. By the 980 s, M2M commuicatios were becomig commo i idustrial machie istrumetatio ad moitorig. These private M2M etworks became kow as the Idustrial Iteret. Startig i the 990 s, wireless (cellular) M2M commuicatios took hold. Ad today, with the prevalece of smartphoes ad cloud computig, M2M commuicatios are commoplace o the public Iteret (which for a umber of years most people thought of as syoymous with oly the www - world-wide-web ). Next came the Iteret of Thigs (IoT), a term first used i 999 with the itroductio of radio-frequecy idetificatio (RFID) chip techology, but i the past few years has become a very popular term describig physical objects liked through wired ad wireless etworks [2]. IoT offers advaced M2M coectivity that ca achieve a level of automatio ad moitorig i may fields/markets. Most people would be familiar with the smart thermostat, a example of a M2M IoT device/applicatio. If every device i the world were to cotai a embedded RFID chip, the the IoT could potetially iclude every smart device i the world, commuicatig over wireless/wired etworks. But that s ot everythig The Iteret of Everythig (IoE) describes the brigig together of people, process, data, ad thigs to make etworked coectios more relevat ad valuable tha ever before [2]. IoE ecompasses both M2M ad IoT techologies, ad it is the pervasiveess of IoE tha ca be leveraged to achieve may thigs for may people, icludig first respoders. There are a umber of techological capabilities that are critical to achievig the IoE, which are discussed below: secure SDP logical etwork. With SDP, we ca deploy a mobile M2M device etwork that is ot depedet o the physical etwork ifrastructure layout - just use SDP to gather the desired IP-addressable M2M devices (from aywhere aroud the world) ito a secure logical etwork. As log as all M2M devices ca achieve iteret coectivity, by ay wired/wireless/cellular/etc. meas available, they ca be cofigured ito a secure SDP etwork. Ad it ca be dyamically re-cofigured for example, if a mobile M2M device geo-locates withi rage of a SDP M2M etwork ode, ad it ca provide appropriate SDP autheticatio credetials, it ca dyamically joi the etwork of M2M devices. What this meas is that our proposed visio of a emergecy respoder walkig toward a smart buildig ad have that buildig s occupats/sesors start commuicatig with him/her ca be achieved with SDP etworks. SDP has already bee demostrated as a operatioal cocept, ad with this M2M SDP approach, it becomes irrelevat which types of etwork commuicatios (Bluetooth, zigbee, cellular, wifi, etc.) are beig used to create iteret access for M2M devices all ca be leveraged to create the M2M IoT/IoE, with as may idividual secure SDP M2M subets as eeded, overlayed o top of ay/all physical iteret commuicatios pathways. SDP provides the critical fuctioality to protect ad secure M2M odes i a ad-hoc M2M IoT/IoE etwork. Without a secure, dyamic, M2M etwork, the visio of a emergecy respoder istatly commuicatig with a smart buildig would ot be feasible. But with SDP, it ca, ad will, happe. SDP eables a ad-hoc, secure M2M etwork to rapidly deploy ad hide i plai sight. I a emergecy respose situatio, this is exactly what we eed. The SDP etwork access authorizatio workflow is show i Fig. below: A. Security, Security, Security Software Defied Networks (SDN), ad more specifically, Software-Defied etwork Perimeters (SDP) appears to be a etwork game-chager for the M2M Iteret-of-Thigs, ad especially for emergecy respoders. [SDP is a ope protocol [3] developed by the Cloud Security Alliace, authored by a expert group of a doze idustry visioaries.] I its raw, basic form, a M2M IoT/IoE architecture would have a global iteret IP address for every M2M device. I reality, this is actually possible with IPv6 addressig. But with today s etwork security (i.e. physical firewall) approach, this would put every M2M device outside the firewall ad expose every M2M device to potetial iteret hackers, which is uacceptable. But SDP ca chage all that. Secure, ad-hoc IP etworks ca be deployed o-the-fly ad recofigured dyamically wheever eeded. Global-IP M2M devices ca securely hide-i-plai-sight o the global iteret withi a Figure. SDP Access Authorizatio Workflow [3] Balfour Techologies fourdscape system/software platform [4], utilized by VCORE Solutios i umerous M2M system deploymets for public safety, security ad emergecy maagemet, already implemeted may features of SDP-like autheticatio of users ad devices, ad has ow bee adapted to be coformat with the idustry ope stadard SDP specificatio (architecture, workflow, ad protocol) documeted i the SDP.0 Spec (April 204) published by the Cloud Security Alliace. M2M IoT/IoE ad all its potetial beefits will fail without achievig u-breachable
3 etwork security, which is what SDN/SDP advaced techology ca ad must deliver i a mobile, wireless M2M world. B. A pervasive M2M Stadard The Iteret-of-Everythig does t happe with a plethora of idepedet, competig silos of M2M techology ad coectivity. For M2M/IoT to go mobile ad leverage global IoE capabilities aywhere (which is what emergecy respoders eed as emergecy locatios are somewhat upredictable ad chage every day), a global idustry stadard must be, ad is beig, developed: the oem2m [5] fuctioal architecture must be a major focus i ay M2M IoT/IoE architecture/platform. It will be the global M2M stadard all the major global telecomm stadards groups have bought ito ad are supportig it. Also, it is beig developed as a best-of-breed architecture - oem2m has already doe a aalysis of most of the existig attempts of a M2M architecture/system (from stadards orgaizatios such as ATIS, ETSI, TIA, TTA, 3GPP, as documeted i their Architecture Aalysis Techical Report) ad are usig that kowledge, plus evaluatio of umerous M2M use cases i various vertical markets, as the basis for the oem2m architecture/protocol beig developed. oem2m focuses o the Service Layer aspects ad takes a Uderlyig Networkidepedet view of the ed-to-ed services. The Uderlyig Network is used for the trasport of data ad potetially for other services. [6] What this meas is that oem2m will work o ay etwork trasport architecture, which is exactly what we eed for globally addressable M2M devices to coect over heterogeeous ed-to-ed etworks. [oem2m achieves this with a layered services approach, specifically utilizig uderlyig Network Services Etity(s).] oem2m is clearly the best referece architecture ay M2M solutio ot addressig ad leveragig oem2m would likely have a very short half-life with sparse pockets of deploymet, which is certaily ot the goal of the IoE. Ad with SDP providig the ability to deploy perimeter fuctioality where eeded i order to isolate services from usecured etworks, SDP techology ca protect ad secure M2M odes ad services i a ad-hoc emergecy M2M etwork exactly what we eed. Our curret research/aalysis has also show that Balfour Techologies existig, mature fourdscape software techology/architecture has a umber of coceptual similarities to both oem2m ad SDP. This meas that existig, commercial fourdscape ca serve as the basis for a M2M/SDP system/architecture that ca be operatioal ow, ad also cotiue to evolve ito a comprehesive, compliat, commercial M2M IoT/IoE system for the foreseeable future. fourdscape is a layered architecture of etworked compoets, similar to the oem2m referece architecture. As is evidet i the brief descriptios below, there is a very straightforward mappig betwee our existig fourdscape etworked compoets ad oem2m defied compoets (see Fig. 2). It is ot a big stretch to see how the existig fourdscape architecture could quickly support a oem2m system structure. Case Case 2 Case 3 Case 4 Applicatio Dedicated Node Applicatio Dedicated Node Y Applicatio Z Service Node Y Applicatio Z Service Node Leged : Applicatio Etity : Commo Service Etity Middle Node Z Y Middle Node Y Z Y Z Ifrastructure Node Figure 2. oem2m Architecture To the Ifrastructure Node of other M2M Service Y Providers o resources - fourdscape resource modules ca serve as oem2m Applicatio Service Nodes, iterfacig to a multitude of mobile devices, wrappig them to appear as compatible M2M devices. o egies fourdscape egies coordiate betwee 4D resources ad 4D servers, ad ca serve as oem2m Middle Nodes or M2M gateways. o servers fourdscape servers coordiate the data feeds to/from 4D resources/egies ad fourdscape browsers, which would serve as oem2m Ifrastructure Nodes. o browsers fourdscape browsers are the user iterface to all 4D portal fuctioality geerated from 4D resources/egies/servers, ad would be the user-accessible M2M applicatios i a oem2m architecture. fourdscape is already a IP addressable, etworked system of scalable compoets, which are already deployed ad operatioal as a cloud-based system. This makes it ready to support both SDP ad oem2m i real-world M2M IoT/IoE deploymets. fourdscape utilizes RESTful (http/crud/uri) TCP/IP, over heterogeeous et trasport layers, which makes it both etwork idepedet/agostic ad capable of CRUD/URI accessible resources (like oem2m). M2M Commo Services Fuctios (CSF) A M2M IoT/IoE platform like fourdscape will implemet features idetified as M2M Commo Services (see Fig. 3 below), i a oem2m Commo Services Etity () package, such as: o Addressig & Idetificatio (AID) of physical ad logical resources i a M2M eviromet. o Discovery (DIS) of all available M2M odes. o Registratio (REG) of all authorized M2M odes, which ca also leverage the SDP autheticatio workflow, providig a quite secure ad-hoc M2M etwork. o Locatio (LOC), utilizig geo-data feeds idetifyig realtime locatios of assets (such as vehicles) ad/or devices (such as sesors, smartphoes, etc.).
4 Commo Services Etity () Applicatio Etity () Referece Poit are actual ipad screeshots of the live first respoder sceario): Addressig ad Idetificatio Data Maagemet & Repository Locatio Security Commuicatio Maagemet/ Delivery Hadlig Registratio Group Maagemet Sessio Maagemet Device Maagemet Subscriptio Notificatio Uderlyig Network Service Etity (NSE) Z Referece Poit Service Chargig & Accoutig Discovery Network Service Exposure/Service Ex+Triggerig Figure 3. oem2m Commo Services Y Referece Poit o Data Maagemet & Repository (DMR) desiged as a Big Data Repository of archived realtime dataflow. o Network Services (NSE) which ca be built o top of a object-orieted etwork sockets library that supports TCP/IP, SSL, HTTP, RTSP, etc. etwork message coectivity, which ca be utilized to grow M2M Network Services with fuctioality to support higher level etwork services as eeded. o Security (SEC) for etwork/autheticatio security, leveragig SDP, which also achieves the capability of ad hoc secure local etwork creatio o-the-fly, which would greatly ehace M2M fuctioality. M2M SEC also demads sesitive data hadlig capability to secure credetials durig storage ad maipulatio, which is a importat security cosideratio that must be addressed. o Subscriptio & Notificatio (SUB) offerig subscriptio services to M2M odes (for example: fourdscape resources/egies/servers/browsers), to ot oly otify of a available chage/update to a resource, but also to auto-deliver the updated data as requested. oem2m is a evolvig ope stadards work-i-progress, but the iitial release of oem2m stadards documets i 205 have provided sufficiet detail to be implemeted as a referece architecture, which ca be utilized to deploy M2M IoT/IoE systems ow, i a stadard oem2m fashio, ad be able to evolve ad comply with the global oem2m stadard i the years to come. The fourdscape software techology is becomig oe of the first M2M IoT/IoE platforms supportig a itegrated SDP ad M2M architecture a powerful combiatio that ca make M2M IoT/IoE a reality today. A first respoder with a ipad (which has a preloaded authorized etwork access certificate) has cellular access to a 4G LTE Verizo mobile etwork. The respoder with his ipad approaches the buildig. Whe it comes withi proximity, the buildig s secure Software Defied Perimeter (SDP) etwork seses its presece, checks its credetials, authorizes it ad grats the ipad access to the buildig's private SDP etwork. Oce o the buildig etwork, M2M machies withi the buildig preset themselves to the ipad user via icos overlayed o the live ipad camera view of the buildig, creatig a augmeted reality scee for the user (see Fig. 4). Figure 4. ipad Augmeted Reality scee of a Smart buildig I this demo the user accesses, via ico touch or M2M butto/dialog (ad/or voice commads), the followig sample machies providig realtime iformatio from the buildig: Pre-recorded 360 degree video walkthrus of the iterior of the buildig's layout, critical ifrastructure ad assets. (i top-left corer of Fig. 5) Figure video walkthrough of buildig accessed Live video feeds from the buildig's surveillace cameras. (see Fig. 6) C. Powerful M2M IoE Apps (i.e. 4D Data Visualizatio) Balfour Techologies has recetly demostrated that our futuristic sceario of a smart talkig buildig with M2M machies egagig first respoders at the scee ca be achieved, usig its fourdscape system as a prototype SDP/M2M system platform ad its fourdscape fourdimesioal browser as a powerful M2M iteractive applicatio. I September 204, a live demostratio of the followig sceario was performed i Bethpage, NY (images Figure 6. Live surveillace camera feeds accessed.
5 The buildig's Stadard Operatig Procedures (SOPs) for this emergecy, showig live status of which SOP steps have already bee executed (see Fig. 7). Figure 7. Live status of buildig s Stadard Operatig Procedures. Basic multi-user collaboratio is also demostrated: A secod authorized respoder with his ipad has previously etered the buildig ad accessed the buildig SDP etwork over a buildig wifi hotspot. The two users the collaborate o a floor pla drawig provided by oe of the buildig's M2M machies, loaded o a shared whiteboard. Each user iteractively draws o the floor pla to suggest a potetial igress route, ad also utilizes local text messagig facilities to commuicate with each other (see Fig. 8). Figure 8. A Twiddla shared whiteboard usig realtime floor plas provided by the smart buildig. The respoder iside the buildig, via text message, also tells the respoder outside to access his live ipad camera feed from iside the buildig, which he does. (see live mobile ipad video camera stream i ceter of Fig. 9). Figure 9. Mobile ipad camera iside buildig accessed. Note that the M2M machies, SDP servers, Egies, Resources, ad fourdserver that made this demo work were ruig o Verizo NextGe Cloud servers i Culpepper, VA., makig this a truly machie-to-machie Iteret-of- Thigs live demostratio. What was see demostrated are two respoders o completely differet etworks ad access poits (oe o a 4G LTE cell tower, the other o a local wifi hotspot) commuicatig with each other securely o a private SDP etwork provided ad-hoc by the buildig ifrastructure, with M2M machies i the buildig commuicatig with the respoders powerful capabilities ad situatioal awareess for all first respoders. D. Data Privacy ad Trust The Iteret-of-Everythig (IoE) is rapidly approachig. With access to the IoE ad millios of time-critical sesors/data, first respoder situatioal awareess ad immediate actioable kowledge will be ehaced, improvig public safety ad critical ifrastructure security. The safety, efficiecy ad accuracy/effectiveess of first respoder actios will also be sigificatly improved as well. Ad although the rapid proliferatio of etworked sesors ad big data aalytics facilitate sigificat opportuities to greatly ehace timely situatioal awareess for public safety, security ad emergecy respose, cocers have bee raised about IoE s impact o privacy. There is fear that fudametal privacy protectios oce take for grated, ca ow be compromised by the sheer volume ad velocity of data beig maipulated to create value for may private ad commercial applicatios. Just look at the popular process of udgig i commercial advertisig, where idetifiable data is used to profile idividuals to aalyze, predict ad ifluece their behavior, which ca certaily be characterized as potetially ivasive to privacy. Hudreds of years ago, Bejami Frakli is quoted as sayig: Those who would give up essetial liberty to purchase a little temporary safety, deserve either liberty or safety. So puttig privacy first ad foremost, we eed to develop the meas (processes, systems, architectures) to trasform the wealth of iformatio flowig i the IoE ito actioable kowledge, especially for public safety ad security, while protectig the privacy of idividuals ad orgaizatios that are the source of some of this valuable sesor data. The emergig Iteret-of-Everythig (IoE) will udoubtedly be the orm i the years to come. If public/govermet agecies (i this case specifically first respoder orgaizatios) are to leverage this powerful techological advacemet, privacy cocers must be addressed, ad idividual privacy guarateed. Balfour Techologies is curretly pursuig iovative research ito applyig privacy by desig priciples [7] to its fourdscape IoE platform/architecture, ad addressig other critical related issues beyod privacy (i.e. oce privacy is achieved ad available IoE sesors/data ca be leveraged), such as TRUSTING, HACKING, SCALING, SECURING, ad 4D BIG DATA VISUALIZATION. Without the full package of
6 IoE iovatio that ca embrace the very public IoE world i a very private ad secure way, ad ca cotiue to evolve i parallel with emergig commercial IoE techology, first respoders will ot be able to leverage the commercial stateof-the-art i the short term ad i the years to come. Curret techology iovatio ca chage that. Through techology iovatio, we eed to effectively eable first respoders to leverage state-of-the-art ad future IoE techology ad capabilities. Besides all the evirometal ad surveillace sesors that are rapidly beig deployed, idividual citizes also represet the potetial (if their privacy ca be guarateed) for millios of mobile sesors/video that ca provide uprecedeted, live data feeds to greatly ehace ad improve first respoder situatioal awareess, effective actios, safety, ad ultimately the safety ad security of the same public that is the source of these mobile sesors. This is how the goal of the Presidetial Policy Directive (PPD-8) o Natioal Preparedess [8] (aimed at achievig a itegrated, layered, ad ALL-OF-NATION (all levels of govermet, the private ad o-profit sectors, ad idividual citizes) preparedess ad respose approach that optimizes the use of available resources) ca be realized, ad maitaied with miimal techology update costs i the years to come (i.e. available, affordable, ad sustaiable ). III. CONCLUSIONS Over the past decade, fourdscape-based techology has bee utilized o a wide variety of projects, providig situatioal awareess to umerous levels of users. By itegratig fourdscape techology with SDP, oem2m, ad addressig importat data privacy ad trust cocers, a M2M IoT/IoE system ca be deployed for first respoders i the short term; i fact, a Small Busiess Iovative Research (SBIR) project has already commeced with U.S. Departmet of Homelad Security (DHS) Sciece & Techology (S&T) Phase II fudig support to do just that. There is much more that ca be doe with the techological capabilities described here. Ad ot just i the first respoder / emergecy maagemet field. Secure, machie-to-machie, iteret-of-thigs techology ca be a drivig force towards achievig the Iteret-of-Everythig, oe step at a time, i heavy idustry, facilities maagemet, public safety, home healthcare, traffic maagemet, home moitorig & cotrol, eve persoal services. Whe the IoE becomes aware ad shareable, with privacy guarateed, the world we live i will quickly evolve to a ew level of techology automatio ad coectivity. ACKNOWLEDGMENT Figures 4-9 ad fourdscape related techology details are used with permissio from Balfour Techologies LLC. This work is sposored i part by the U.S. Departmet of Homelad Security, Advaced Research Projects Agecy ad Sciece & Techology Directorate, uder multiple prior ad curret awards. This iformatio does ot ecessarily reflect the policy of the U.S. Govermet, ad o official edorsemet should be iferred. The Author would like to recogize the substatial efforts of the dedicated persoel at VCORE Solutios, Balfour Techologies, ad all the Residet Research Parters at the Morrelly Homelad Security Ceter. Thak you. REFERENCES [] Wikipedia, The Free Ecyclopedia olie, 7 March 205, <e.wikipedia.org/wiki/machie_to_machie>. [2] Lueth, Kud Lasse, Why the Iteret of Thigs is called Iteret of Thigs: Defiitio, history, disambiguatio, IoT Aalytics, 9 Dec 204, <iot-aalytics.com/iteret-of-thigsdefiitio/>. [3] J. Schweitzer, et.al., SDP Specificatio.0, Software Defied Perimeter Workig Group, Cloud Security Alliace, April 204. [4] R, Balfour, Next Geeratio Emergecy Maagemet Commo Operatig Picture Software/Systems (COPSS), LISAT 202 Coferece, IEEE plore, May 202. [5] oem2m Press Release, The Rise of the Machies World s First Global Stadards for M2M Deploymet, oem2m.org, 4 Feb 205. [6] oem2m parters, oem2m Techical Specificatio Fuctioal Architecture, oem2m.org, 30 Ja 205. [7] PbD website, Privacy by Desig Priciples ad Myths, privacybydesig.ca, 204. [8] B. Obama, Presidetial Policy Directive 8: Natioal Preparedess, The White House, Mar. 20, < presidetial-policy-directive-8-atioal-preparedess>. BIOGRAPHY Robert E. Balfour (BS 77, MS 80, PhD 99) is a Computer Scietist ad Chief Techology Officer at VCORE Solutios LLC, a Residet Research Parter at the Morrelly Homelad Security Ceter i Bethpage, NY. A expert computer software/systems egieer ad cosultat for most of his career, over the past decade he has bee issued multiple U.S. Patets for the ivetio of the 4D Browser, which forms the basis of VCORE s curret fourdscape techology. Dr. Balfour has bee istrumetal i the developmet of fourdscape software, which has wo multiple Log Islad Software Awards (LISAs), ad has also bee recogized with the atioal Tibbetts Award from the U.S. Small Busiess Admiistratio (SBA) for outstadig cotributio to a successful Small Busiess Iovatio Research (SBIR) Program. Curretly, Dr. Balfour cotiues his iovatio at VCORE, applyig fourdscape software techology to importat homelad security ad commercial applicatios.
n Explore virtualization concepts n Become familiar with cloud concepts
Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to
More information1 Enterprise Modeler
1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio
More informationCustomer Portal Quick Reference User Guide
Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationData Warehousing. Paper
Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial
More informationData Protection: Your Choice Is Simple PARTNER LOGO
Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected
More informationWeb OS Switch Software
Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com
More informationService Oriented Enterprise Architecture and Service Oriented Enterprise
Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE
More informationSystem and Software Architecture Description (SSAD)
System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality
More informationGE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III
GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-
More informationBaan Tools User Management
Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio
More informationCyber Risk Mitigation for Smart Cities
Cyber Risk Mitigatio for Smart Cities Abstract Rapid growth i global populatio ad evolvig techological, macro-ecoomic, ad evirometal ladscapes have fueled widespread iterest i smart cities, which are,
More informationMANAGED! PREPARE TO BE FEATURES HANDHELD USER DISPLAYS. Specifications MEASUREMENT STABILIZATION INDICATOR
FEATURES Trasfers data easily betwee Hadheld & PC via USB cable. Stores up to 3000 temperatures ad 300 meu items. Sets Max / Mi temperature limit idicators. Stores custom meus for easy recall. Exports
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More informationGuide to Applying Online
Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their
More informationContinuity Logic Frontline Live
September 2015 Cotiuity Logic Frotlie Live Iovatig User Experiece for Busiess Cotiuity SOLUTIONPERSPECTIVE Goverace, Risk Maagemet & Compliace Isight Cotiuity Logic Frotlie Live Iovatio i User Experiece
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationCORD Test Project in Okinawa Open Laboratory
CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationn Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk
Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet
More informationBE Software Upgrades to ITALYCS 5. It s in the. Software
BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the
More informationSCAN INSPECT TRACK SOLVE
SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More informationWorkflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.
Workflow model GM AR Gumpy RM Dyagump At a very high level, this is what gump does. We ll be lookig at each of the items described here seperately. User edits project descriptor ad commits s maitai their
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationSTRATEGIC. alliances & Services
STRATEGIC alliaces & Services Chesterto is a leadig iteratioal maufacturer of idustrial fluid sealig systems, advaced polymer composites, cleaers, lubricats ad idustrial speciality products. Sice 1884
More informationSecurity Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team
Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper
More informationAir Force Data Reference Architecture and Platform
Headquarters U.S. Air Force Air Force Data Referece Architecture ad Platform Ms. Jackie Murray 11 Oct 2018 1 AF Data Challeges Large umber of legacy systems with umerous poit-to-poit iterfaces that are
More informationTerm Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.
CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig
More informationIntelligent Systems in Retail. Powered by Windows Embedded
Itelliget i Retail Powered by Widows Embedded Coect with customers o their terms Today, a thrivig retail eterprise is likely to be a distributed eterprise sourcig ad sellig ew goods i a icreasig umber
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationDid you know that houses with CCTV are 90% less likely to be burgled? Introducing the new Easy Fit range of CCTV.
Easy Fit CCTV Rage Did you kow that houses with CCTV are 90% less likely to be burgled? Itroducig the ew Easy Fit rage of CCTV. Whether it s your home or your busiess, havig extra security ca help you
More informationCA Top Secret r14 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationNext generation IP- based multimedia services on cable TV networks
Iteratioal Telecommuicatio Uio Next geeratio IP- based multimedia services o cable TV etworks Volker Leisse ECCA Pre - coferece draft ITU-T Workshop All Star Network Access Geeva, 2-4 Jue 2004 Outlie o
More informationSoftware development of components for complex signal analysis on the example of adaptive recursive estimation methods.
Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig
More informationOutline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs
Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationGoals of the Lecture UML Implementation Diagrams
Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationArchitectural styles for software systems The client-server style
Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More informationOptimizing Out-of-band Management
> Techical White Paper Optimizig Out-of-bad Maagemet For Solaris Servers ABOUT UPLOGIX // Uplogix provides eterprise edge maagemet solutios for orgaizatios seekig to reduce the cost ad complexity of maagig
More informationTHIRD-QUARTER 2017 REVENUES
PRESS RELEASE Paris, November 16, 2017 THIRD-QUARTER 2017 REVENUES Reveues up 6.6% year o year for the first ie moths of 2017, comig i at 3,710 millio 250,000 ew mobile subscribers durig the quarter the
More informationIncorporatingCluster-BasedRelationshipsin Web Rule Language
IcorporatigCluster-BasedRelatioshipsi Web Rule Laguage Mala Mehrotra Pragati Syergetic ResearchIc. Cupertio. CA mm@pragati-ic.com http://www.pragati-ic.com 1 Itroductio The Sematic Web visio requires rule-based
More informationExtending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis
Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de
More information1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES
Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess ad icreasigly more distributed workforce, remote ad brach staff demad access
More informationPanel for Adobe Premiere Pro CC Partner Solution
Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere
More informationSCI Reflective Memory
Embedded SCI Solutios SCI Reflective Memory (Experimetal) Atle Vesterkjær Dolphi Itercoect Solutios AS Olaf Helsets vei 6, N-0621 Oslo, Norway Phoe: (47) 23 16 71 42 Fax: (47) 23 16 71 80 Mail: atleve@dolphiics.o
More informationSecurity and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms
Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The
More informationComplete Security Solutions with the Latest Technology and Law Enforcement Experienced Personnel.
Complete Security Solutios with the Latest Techology ad Law Eforcemet Experieced Persoel www.smartsecuritypros.com ( 3 0 1 ) 9 5 5-9 7 8 2 SPECIAL FEATURES Our Remote Guard VSaaS video surveillace equipmet
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationWeston Anniversary Fund
Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue
More informationOpenText RightFax Fax Server
OpeText RightFax Fax Server Icrease employee productivity, improve iformatio goverace, ad reduce costs by itegratig fax ito eterprise-wide busiess applicatios. Compaies eed a cetralized fax ifrastructure
More informationSession Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)
F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The
More informationOne advantage that SONAR has over any other music-sequencing product I ve worked
*gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig
More information1100 Appliances. Big security for small branches. Datasheet: Check Point 1100 Appliances FEATURES BENEFITS GATEWAY SOFTWARE BLADES
Formoreiformatio,pleasecal877.449.0458,oremailusatSales@CorporateArmor.com. Datasheet: Check Poit 00 Appliaces 00 Big security for small braches 00 Appliaces YOUR CHALLENGE I the age of global busiess
More informationIn today s information technology culture, the term server is thrown around
Itroducig Widows Home Server I today s iformatio techology culture, the term server is throw aroud quite a bit. Web servers, prit servers, proxy servers, file servers all of these refer to various computer
More informationBEA WebLogic Process Integrator
BEA WebLogic Process Itegrator A Compoet of BEA WebLogic Itegratio BEA WebLogic Process Itegrator Studio Olie Help BEA WebLogic Process Itegrator Release 2.0 Documet Editio 2.0 July 2001 Copyright Copyright
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.
Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple
More informationA QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services
A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute
More informationCS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python
CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about
More informationHumans are visual creatures, so it isn t surprising that we want to
Gettig Started with Visio Humas are visual creatures, so it is t surprisig that we wat to visualize our ideas, desigs, ad fial products ad commuicate them graphically. I the past, high-quality presetatios
More informationBike MS: 2013 Participant Center guide
Bike MS: 2013 Participat Ceter guide bikems.org 1 Why use Olie Fudraisig Tools? Usig olie tools makes fudraisig easier Table of Cotets Participats who use persoal pages raise more moey! Bike MS $883 v.
More informationBike MS: 2014 Participant Center guide
Bike MS: 2014 Participat Ceter guide bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...
More informationIS-IS in Detail. ISP Workshops
IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November
More informationBaan Finance Financial Statements
Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace
More informationServerless Computing: A Compelling Opportunity for Today s Digital Enterprise
Serverless Computig: A Compellig Opportuity for Today s Digital Eterprise Abstract Cloud computig has eabled orgaizatios to focus less o their IT ifrastructure ad more o their core products ad services.
More informationUsing the Keyboard. Using the Wireless Keyboard. > Using the Keyboard
1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries
More informationICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002
ICS Reget Commuicatios Modules RS-232, RS-422 ad RS-485 (T3150A) Issue 1, March, 06 Commuicatios modules provide a serial commuicatios iterface betwee the cotroller ad exteral equipmet. Commuicatios modules
More informationHuman-Computer Interaction IS4300
Huma-Computer Iteractio IS4300 1 I5 due ext class Your missio i this exercise is to implemet a very simple Java paitig applicatio. The app must support the followig fuctios: Draw curves, specified by a
More informationHuawei FusionHome Smart Energy Solution
Smarter Eergy for a Better Life Copyright Huawei Techologies Co., Ltd.208. All rights reserved. No part of this documet may be reproduced or trasmitted i ay form or by ay meas without prior writte coset
More informationAvid Interplay Bundle
Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers
More informationWhat are Information Systems?
Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),
More informationVISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION. Thomas Wiedemann
Proceedigs of the 2000 Witer Simulatio Coferece J. A. Joies, R. R. Barto, K. Kag, ad P. A. Fishwick, eds. VISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION Thomas Wiedema Techical
More information2017 LEARNING SYSTEM CONTACT INFORMATION FOR CLTD CERTIFICATION EXAM PREPARATION. learncltd.com. Joni Holeman, VP Education. APICS DC Metro Chapter
2017 LEARNING SYSTEM FOR CLTD CERTIFICATION EXAM PREPARATION CONTACT INFORMATION Joi Holema, VP Educatio APICS DC Metro Chapter Email: educatio@apicsdcmetro.org Phoe: 703-430-4075 learcltd.com THE CLTD
More informationSFP1215W Forensic Pouch E V A L U A T I O N R E P O R T
E V A L U A T I O N R E P O R T April 2012 NIJ Electroic Crime Techology Ceter of Excellece 550 Marshall St., Suite B Phillipsburg, NJ 08865 www.ectcoe.org NIJ ECTCOE TESTING AND EVALUATION PROJECT STAFF
More informationEfficiency and Fitness of Embedded Flash Storage
The Idustrial Flash Storage Expert. Efficiecy ad Fitess of Embedded Flash Storage By Chaso Li Email: Chaso.Li@embestor.com EmBestor Techology Ic. http://www.embestor.com Sata Clara, CA 1 Outlie The Idustrial
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationChapter 2 Distributed Information Systems Architecture
Prof. Dr.-Ig. Stefa Deßloch AG Heterogee Iformatiossysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@iformatik.ui-kl.de Chapter 2 Distributed Iformatio Systems Architecture Chapter Outlie (Distributed)
More informationHAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/ :06 Page 1 MAKING A COMPLAINT
HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/2013 17:06 Page 1 MAKING A COMPLAINT FEBRUARY 2010 HAFOD MAKING A COMPLAINT [NEW]_Layout 1 21/03/2013 17:06 Page 2 ABOUT THIS BOOKLET This booklet outlies
More informationOutline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers
Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate
More informationBEA WebLogic Collaborate
BEA WebLogic Collaborate A Compoet of BEA WebLogic Itegratio Itroducig BEA WebLogic Collaborate BEA WebLogic Collaborate Release 2.0 Documet Editio 2.0 July 2001 001 ServiceNow, Ic.'s Exhibit 1004 Copyright
More informationGSMA Seminars GSMA Seminars are free to all attendees
MOBILISING THE INTERNET OF THINGS Coected Livig at Mobile World Cogress 24-27 February 2014 1 Coected Livig at Mobile World Cogress GSMA Semiars GSMA Semiars are free to all attedees Coected Livig: Mobilisig
More informationNVP-903 Series. Multi-Stream Network Video Encoder REFERENCE GUIDE
NVP-903 Series Multi-Stream Network Video Ecoder REFERENCE GUIDE NVP-903 Series User Maual Table of Cotets 1 Itroductio... 4 1.1 Product Overview... 4 1.2 Product Features... 4 2 Pael Desig... 5 2.1 Frot
More informationHuman-Computer Interaction IS4300
Huma-Computer Iteractio IS4300 1 P4 Desig Sketches Due Iteractio Scearios Expad each of your activity desig scearios (3+) ito full iteractio scearios, thikig about what the user perceives ad the actios
More informationAPPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS
APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful
More informationThe Birth of the Connected Platform
Jue 2011 ThigWorx Foudatios: The Birth of the Coected Platform Sposored by ThigWorx Cotets Executive Summary 1 The Madate for a Coected Platform 3 Questios Facig Every Busiess 5 The Aatomy of a Coected
More informationMindmapping: A General Purpose (Test) Planning Tool
W8 Test Strategy, Plaig, Metrics Wedesday, May 2d, 2018 1:45 PM Midmappig: A Geeral Purpose (Test) Plaig Tool Preseted by: Bob Gale Zeergy Techologies Brought to you by: 350 Corporate Way, Suite 400, Orage
More informationFundamentals of. Chapter 1. Microprocessor and Microcontroller. Dr. Farid Farahmand. Updated: Tuesday, January 16, 2018
Fudametals of Chapter 1 Microprocessor ad Microcotroller Dr. Farid Farahmad Updated: Tuesday, Jauary 16, 2018 Evolutio First came trasistors Itegrated circuits SSI (Small-Scale Itegratio) to ULSI Very
More informationKeywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency
Volume 3, Issue 9, September 2013 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com Couplig Evaluator to Ehace
More informationTruVu 360 User Community. SpectroCare. Enterprise Fluid Intelligence for Predictive Maintenance. TruVu 360 Product Information
TruVu 360 User Commuity Cotiuous educatio is importat for a successful o-site lubricat program. With ever growig articles, videos, ad structured learig modules, TruVu 360 user commuity is a digital commuity
More informationFIRST-QUARTER 2017 REVENUES
PRESS RELEASE Paris, May 18, 2017 FIRST-QUARTER 2017 REVENUES First-quarter reveues up almost 7% to 1,224 millio 300,000 ew ladlie ad mobile subscribers durig the quarter Frace's leadig recruiter of mobile
More informationOutline n Introduction n Background o Distributed DBMS Architecture
Outlie Itroductio Backgroud o Distributed DBMS Architecture Datalogical Architecture Implemetatio Alteratives Compoet Architecture o Distributed DBMS Architecture o Distributed Desig o Sematic Data Cotrol
More informationChapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings
Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More information