SlideShare a Scribd company logo
BOE Xir2 security concepts
Synopsis BO5 or BO6 security concepts  1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge  4 Our approach: 360view toolset  5
BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
BO5 or BO6 security: Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BO5 or BO6 security: Effective rights ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Nota: « NS » means not specified OK KO OK KO OK KO Universes (*) OK KO OK KO OK KO Documents (*) OK KO OK KO OK KO Domains OK KO OK KO OK KO Stored procedures KO KO OK KO OK OK Security commands OK OK + NS OK KO + NS OK KO OK OK Applications OK + KO KO OK NS
BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
BOE Xir2 security concepts: Folders ,[object Object],[object Object],Objects folders tree (documents and universes)
[object Object],[object Object],BOE Xir2 security concepts: Groups - Users Sales US sales Purchasing George George Deski group US sales Purchasing
BOE Xir2 security concepts: Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object]
Double inheritance example ,[object Object],Worldwide sales US Sales George Worldwide sales group had an explicit right on Sales folder
Double inheritance implementation « Sales » folder « Worldwide sales » group Right creation
BOE Xir2 security concepts: Rights ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BOE Xir2 security concepts: Effective rights ,[object Object],[object Object],[object Object],[object Object],[object Object],Nota: « NS » means not specified OK OK + NS KO KO + NS KO KO OK KO Xir2 objects OK + KO KO OK NS
BOE Xir2 security concepts: Granularity 1/2 ,[object Object],[object Object],[object Object],[object Object]
BOE Xir2 security concepts: Granularity 2/2
BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
Example 1/3: Rights comparison ,[object Object],Nota : « NS » means not specified BO5 or BO6 effective rights (user real rights): In Version 5.x or 6.x you could denied access to a universe to a user in one group and allow him/her in another group.  In Xi, not even an ‘ explicitly granted’ ( OK ) will over rule an ‘explicitly denied’ ( KO ). Morale: Use the ‘explicitly denied’ right wisely. OK OK + NS KO KO + NS KO KO OK KO Xir2 objects OK + KO KO OK NS OK OK + NS KO KO + NS OK KO OK KO universe OK + KO KO OK NS
Example 2/3: Current BO vision ,[object Object],[object Object]
Example 3/3: BOE Xir2 vision ,[object Object],[object Object],[object Object],Audit group (maybe a new group) Georges Cedric form3 Rights
BO and BOE security comparison 1/2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BO and BOE security comparison 2/2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
Migration objectives: Recalls ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BOE Xir2 security migration: Double challenge ,[object Object],[object Object],[object Object],[object Object]
Challenge 1: Define a security model  ,[object Object],[object Object],[object Object],[object Object]
Challenge 2: Things to do pre-migration ,[object Object],[object Object],[object Object],[object Object]
Challenge 2: Security migration - Alternatives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Case study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
Solution for security migration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
360view solution benefits ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Approach and requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
About us ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contacts Christophe Mallet Tel: +61 (0)424 961 998  [email_address] http://www.businessintelligentsia.com Sebastien Goiffon Tel: +33 (0)660 822 440   [email_address] http://www.goiffon.biz

More Related Content

Similar to Business Objects Xir2 Security Concept

360suite Business Objects Xi3 New Security Concepts
360suite Business Objects Xi3 New Security Concepts360suite Business Objects Xi3 New Security Concepts
360suite Business Objects Xi3 New Security Concepts
Sebastien Goiffon
 
report on network security fundamentals
report on network security fundamentalsreport on network security fundamentals
report on network security fundamentals
Jassika
 
Security models
Security models Security models
Security models
LJ PROJECTS
 
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...FilGov
 
Bell-LaPadula (1).ppt
Bell-LaPadula (1).pptBell-LaPadula (1).ppt
Bell-LaPadula (1).ppt
KhushiAgarwal193641
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
gourav kottawar
 
CR based development in Synergy
CR based development in SynergyCR based development in Synergy
CR based development in SynergyManageware
 
IJET-V3I2P8
IJET-V3I2P8IJET-V3I2P8
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
Siva Pradeep Bolisetti
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
IGEEKS TECHNOLOGIES
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
IGEEKS TECHNOLOGIES
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
Bhagyashree Barde
 
OpenChain Webinar #50 - An Overview of SPDX 3.0
OpenChain Webinar #50 - An Overview of SPDX 3.0OpenChain Webinar #50 - An Overview of SPDX 3.0
OpenChain Webinar #50 - An Overview of SPDX 3.0
Shane Coughlan
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
Jyotishkar Dey
 
A Hand Book of Visual Basic 6.0.pdf.pdf
A Hand Book of Visual Basic 6.0.pdf.pdfA Hand Book of Visual Basic 6.0.pdf.pdf
A Hand Book of Visual Basic 6.0.pdf.pdf
Ann Wera
 
Blockchain Series: Key Evaluation Criteria and Solution Platforms
Blockchain Series: Key Evaluation Criteria and Solution PlatformsBlockchain Series: Key Evaluation Criteria and Solution Platforms
Blockchain Series: Key Evaluation Criteria and Solution Platforms
Flevy.com Best Practices
 
Visible Governance: How to set up data governance using Visible Analyst Comme...
Visible Governance: How to set up data governance using Visible Analyst Comme...Visible Governance: How to set up data governance using Visible Analyst Comme...
Visible Governance: How to set up data governance using Visible Analyst Comme...
Michael Cesino
 
VRE Cancer Imaging BL RIC Workshop 22032011
VRE Cancer Imaging BL RIC Workshop 22032011VRE Cancer Imaging BL RIC Workshop 22032011
VRE Cancer Imaging BL RIC Workshop 22032011djmichael156
 

Similar to Business Objects Xir2 Security Concept (20)

360suite Business Objects Xi3 New Security Concepts
360suite Business Objects Xi3 New Security Concepts360suite Business Objects Xi3 New Security Concepts
360suite Business Objects Xi3 New Security Concepts
 
360View Presentation
360View Presentation360View Presentation
360View Presentation
 
report on network security fundamentals
report on network security fundamentalsreport on network security fundamentals
report on network security fundamentals
 
Security models
Security models Security models
Security models
 
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
Fighting Spyware With Mandatory Access Control In Microsoft Windows Vista (Di...
 
Bell-LaPadula (1).ppt
Bell-LaPadula (1).pptBell-LaPadula (1).ppt
Bell-LaPadula (1).ppt
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
CR based development in Synergy
CR based development in SynergyCR based development in Synergy
CR based development in Synergy
 
IJET-V3I2P8
IJET-V3I2P8IJET-V3I2P8
IJET-V3I2P8
 
SAP BI 7 security concepts
SAP BI 7 security conceptsSAP BI 7 security concepts
SAP BI 7 security concepts
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...Panda public auditing for shared data with efficient user revocation in the c...
Panda public auditing for shared data with efficient user revocation in the c...
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
OpenChain Webinar #50 - An Overview of SPDX 3.0
OpenChain Webinar #50 - An Overview of SPDX 3.0OpenChain Webinar #50 - An Overview of SPDX 3.0
OpenChain Webinar #50 - An Overview of SPDX 3.0
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
L5 m256 block2_unit5
L5 m256 block2_unit5L5 m256 block2_unit5
L5 m256 block2_unit5
 
A Hand Book of Visual Basic 6.0.pdf.pdf
A Hand Book of Visual Basic 6.0.pdf.pdfA Hand Book of Visual Basic 6.0.pdf.pdf
A Hand Book of Visual Basic 6.0.pdf.pdf
 
Blockchain Series: Key Evaluation Criteria and Solution Platforms
Blockchain Series: Key Evaluation Criteria and Solution PlatformsBlockchain Series: Key Evaluation Criteria and Solution Platforms
Blockchain Series: Key Evaluation Criteria and Solution Platforms
 
Visible Governance: How to set up data governance using Visible Analyst Comme...
Visible Governance: How to set up data governance using Visible Analyst Comme...Visible Governance: How to set up data governance using Visible Analyst Comme...
Visible Governance: How to set up data governance using Visible Analyst Comme...
 
VRE Cancer Imaging BL RIC Workshop 22032011
VRE Cancer Imaging BL RIC Workshop 22032011VRE Cancer Imaging BL RIC Workshop 22032011
VRE Cancer Imaging BL RIC Workshop 22032011
 

Recently uploaded

Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
jamalseoexpert1978
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Boris Ziegler
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
narasimhamurthyh4
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Lviv Startup Club
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
Any kyc Account
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 

Recently uploaded (20)

Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
FIA officials brutally tortured innocent and snatched 200 Bitcoins of worth 4...
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
Helen Lubchak: Тренди в управлінні проєктами та miltech (UA)
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 

Business Objects Xir2 Security Concept

  • 1. BOE Xir2 security concepts
  • 2. Synopsis BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
  • 3. BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
  • 4.
  • 5.
  • 6. BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Double inheritance implementation « Sales » folder « Worldwide sales » group Right creation
  • 12.
  • 13.
  • 14.
  • 15. BOE Xir2 security concepts: Granularity 2/2
  • 16. BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. BO5 or BO6 security concepts 1 BOE Xir2 new security concepts 2 Comparison. Examples 3 Migration: A double challenge 4 Our approach: 360view toolset 5
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Contacts Christophe Mallet Tel: +61 (0)424 961 998 [email_address] http://www.businessintelligentsia.com Sebastien Goiffon Tel: +33 (0)660 822 440 [email_address] http://www.goiffon.biz