Applying separation of concerns approaches into business process context generally results in several initiatives oriented to automatic generation of aspect code, generation of specific code according to the kind of concern (code for mapping roles and permissions derived from RBAC model for example), or proposition of new mechanisms as dedicated aspectual languages. Most of these initiatives only consider functional behaviours of business process, omitting special behaviours derived from quality attributes such as security, which can be modelled as concerns that must be supported in the business process. In this paper we propose the integration of cross-cuttings standardized control access policies (based on RBAC model and Oasis XACML) into legacy business processes, using a separation of concerns approach.
Dr Joshua Bishop (Former Chief Economist, IUCN and National Manager, Markets, Sustainability and Business Partnerships WWF Australia) - Presentation at the United Nations Association of Australia (Victorian Division) Business, Biodiversity and Ecosystem Services: Valuing the Earth's Natural Capital Seminar held in Melbourne, 20 September 2012, in partnership with National Australia Bank.
Building momentum for collective action post-Rio+20, the seminar brought together key players from business, government and civil society to discuss the challenges and opportunities in measuring the true value of nature and enhancing natural capital as a critical economic, ecological and social asset.
An expert panel addressed:
The Natural Capital Declaration and the finance sector
Australian Government perspective on natural capital and sustainability: current priorities, measurement and where Australia can make a difference
Business and biodiversity: valuing natural capital and ecosystem services in practice
The Economics of Ecosystem Services and Biodiversity (TEEB for Business)
The System of Environmental - Economic Accounts (SEEA)
Integrating the valuing and management of environmental assets into business and government decision-making processes
Experiences and opportunities for cross-sector collaboration
Guest speakers:
Rosemary Bissett (Head of Sustainability Governance and Risk, Enterprise Risk, National Australia Bank)
Malcolm Thompson (Deputy Secretary, Australian Government Department of Sustainability, Environment, Water, Population and Communities
Stuart Anstee (Chief Adviser, Biodiversity and Ecosystem Services, Rio Tinto)
Dr Joshua Bishop (Former Chief Economist, IUCN and National Manager, Markets, Sustainability and Business Partnerships, WWF Australia).
Charles Berger (Director of Strategic Ideas, Australian Conservation Foundation)
Facilitator:
Rosemary Sainty (Former Head, Secretariat UN Global Compact Network Australia and Adviser, Corporate Engagement, Transparency International Australia)
More information available at: http://www.unaavictoria.org.au/education-advocacy/masterclasses/natural-capital-seminar/
The document announces a Science World Retreat taking place on June 3rd, 2011. The retreat agenda includes sessions on topics such as innovation, technology inclusion, and entrepreneurial career paths. The document also lists various resources and programs available from science organizations that could assist technology companies.
The document reports on a study examining radial audiometry in patients with obstructive hydrocephalus before and after third ventriculostomy. The preoperative radioudiography identified radiopharmaceutical reflux into the lateral cerebral ventricles with delayed clearance for over 60 minutes, similar to the findings of radioudiography of communicating hydrocephalus. However, the cause of venticular radiopharmaceutical reflux is not yet understood, possibly associated with reversal of normal cerebrospinal fluid flow through the fenestration on the third ventricle floor.
Apple reported unaudited financial summary data for October 18, 2010. Key highlights include:
- iPhone revenue was up 92% year-over-year and 65% sequentially due to the launch of the iPhone 4.
- iPhone unit sales also increased 91% year-over-year and 65% sequentially.
- iPod revenue declined 6% year-over-year and 4% sequentially, reflecting seasonal trends.
The document provided Apple's revenue figures for iPhones, iPods, and total revenue over several recent quarters, showing growth in iPhone sales and a decline in iPods. It noted the iPhone surpassed iPod sales in 2009 and the launch of the iPad in 2010
The document is a marketing brochure from Bramkamp Printing promoting their web2print and multi-touch marketing solutions. It highlights how their 1 to 1 personalized direct mail, email, and digital campaigns have achieved 500% greater response rates than traditional marketing. It provides examples of campaigns they have run for banks, including personalized postcards and websites for collecting customer data. The brochure promotes attending an upcoming lunch and learn seminar about using direct mail and email together effectively.
Here are the steps to access your 401(k) statement online:
1. Go to www.53forward.com
2. Log into your account
3. Click "Statements" in the top menu
4. Select the quarter you want to view
Let me know if you have any other questions!
1. Bramkamp Printing can help companies manage their marketing materials and save money through a web-to-print solution that allows for personalized direct mail, email, variable data printing, and effective landing pages.
2. Bramkamp's 1-to-1 multi-touch campaigns have achieved at least 500% greater response rates than traditional marketing methods.
3. Bramkamp is hosting a lunch and learn event on May 19th about using direct mail and email together effectively.
Dr Joshua Bishop (Former Chief Economist, IUCN and National Manager, Markets, Sustainability and Business Partnerships WWF Australia) - Presentation at the United Nations Association of Australia (Victorian Division) Business, Biodiversity and Ecosystem Services: Valuing the Earth's Natural Capital Seminar held in Melbourne, 20 September 2012, in partnership with National Australia Bank.
Building momentum for collective action post-Rio+20, the seminar brought together key players from business, government and civil society to discuss the challenges and opportunities in measuring the true value of nature and enhancing natural capital as a critical economic, ecological and social asset.
An expert panel addressed:
The Natural Capital Declaration and the finance sector
Australian Government perspective on natural capital and sustainability: current priorities, measurement and where Australia can make a difference
Business and biodiversity: valuing natural capital and ecosystem services in practice
The Economics of Ecosystem Services and Biodiversity (TEEB for Business)
The System of Environmental - Economic Accounts (SEEA)
Integrating the valuing and management of environmental assets into business and government decision-making processes
Experiences and opportunities for cross-sector collaboration
Guest speakers:
Rosemary Bissett (Head of Sustainability Governance and Risk, Enterprise Risk, National Australia Bank)
Malcolm Thompson (Deputy Secretary, Australian Government Department of Sustainability, Environment, Water, Population and Communities
Stuart Anstee (Chief Adviser, Biodiversity and Ecosystem Services, Rio Tinto)
Dr Joshua Bishop (Former Chief Economist, IUCN and National Manager, Markets, Sustainability and Business Partnerships, WWF Australia).
Charles Berger (Director of Strategic Ideas, Australian Conservation Foundation)
Facilitator:
Rosemary Sainty (Former Head, Secretariat UN Global Compact Network Australia and Adviser, Corporate Engagement, Transparency International Australia)
More information available at: http://www.unaavictoria.org.au/education-advocacy/masterclasses/natural-capital-seminar/
The document announces a Science World Retreat taking place on June 3rd, 2011. The retreat agenda includes sessions on topics such as innovation, technology inclusion, and entrepreneurial career paths. The document also lists various resources and programs available from science organizations that could assist technology companies.
The document reports on a study examining radial audiometry in patients with obstructive hydrocephalus before and after third ventriculostomy. The preoperative radioudiography identified radiopharmaceutical reflux into the lateral cerebral ventricles with delayed clearance for over 60 minutes, similar to the findings of radioudiography of communicating hydrocephalus. However, the cause of venticular radiopharmaceutical reflux is not yet understood, possibly associated with reversal of normal cerebrospinal fluid flow through the fenestration on the third ventricle floor.
Apple reported unaudited financial summary data for October 18, 2010. Key highlights include:
- iPhone revenue was up 92% year-over-year and 65% sequentially due to the launch of the iPhone 4.
- iPhone unit sales also increased 91% year-over-year and 65% sequentially.
- iPod revenue declined 6% year-over-year and 4% sequentially, reflecting seasonal trends.
The document provided Apple's revenue figures for iPhones, iPods, and total revenue over several recent quarters, showing growth in iPhone sales and a decline in iPods. It noted the iPhone surpassed iPod sales in 2009 and the launch of the iPad in 2010
The document is a marketing brochure from Bramkamp Printing promoting their web2print and multi-touch marketing solutions. It highlights how their 1 to 1 personalized direct mail, email, and digital campaigns have achieved 500% greater response rates than traditional marketing. It provides examples of campaigns they have run for banks, including personalized postcards and websites for collecting customer data. The brochure promotes attending an upcoming lunch and learn seminar about using direct mail and email together effectively.
Here are the steps to access your 401(k) statement online:
1. Go to www.53forward.com
2. Log into your account
3. Click "Statements" in the top menu
4. Select the quarter you want to view
Let me know if you have any other questions!
1. Bramkamp Printing can help companies manage their marketing materials and save money through a web-to-print solution that allows for personalized direct mail, email, variable data printing, and effective landing pages.
2. Bramkamp's 1-to-1 multi-touch campaigns have achieved at least 500% greater response rates than traditional marketing methods.
3. Bramkamp is hosting a lunch and learn event on May 19th about using direct mail and email together effectively.
Presentación de Jeffrey Hayzlett Conecta 2012IAB México
This document contains advice and guidance for driving organizational change and being a leader and change agent. It emphasizes the need to adapt to change, beat naysayers, and be proactive in pursuing change. It discusses common reasons why people and companies fail to drive needed change, such as lack of vision, tension, and keeping promises. The document encourages thinking big, taking risks, stirring things up, and owning top relationships to enable change.
This document contains several paragraphs of text in an unknown language with various formatting. It discusses topics like numbers, dates, and measurements. The formatting includes parentheses, brackets, and symbols like commas and periods.
1) The document discusses various topics in 3 paragraphs, including details about dates and locations.
2) It provides statistics such as numbers, dates, and citations in tables.
3) The writing includes technical terms and follows a structured format with headings.
Before Oracle optimises your statement it may apply transformations that restructure it completely. This presentation examines the optimiser’s capabilities in transforming SQL. It describes performance issues that are overcome by common transformations, and more importantly identifies common code techniques which cannot be transformed and which may cause performance problems. It aims to clarify the reality for developers who now frequently just say "I can write what I like as Oracle will rewrite it for me anyway".
This document contains the database schema for a university student housing system. It includes tables for students, courses, contracts, payments, residences, inspections, and their relationships. Foreign keys linking the tables are then dropped to remove the relationships between the tables in the schema.
This document provides an introduction to Puppet, including an overview of its open source ecosystem, operating system support, Puppet Enterprise, how Puppet works, and how it manages configuration drift. It also discusses Puppet modules, catalogs, reports, facts, templates, storeconfigs, and using an external node classifier.
Web 2.0 tools such as blogs, wikis, and RSS feeds are changing the way people communicate.
Learn how each of these tools can help your business succeed, as well as some tips on how to gain adoption for these new technologies within the enterprise
Syed Mohamed has over 20 years of experience in textile production planning and IT support. He has worked in managerial roles planning production, inventory, and retail operations for textile companies. He is proficient in implementing and supporting various software programs to optimize production planning, inventory management, and other operations. Syed Mohamed is seeking a managerial role utilizing his expertise in textile operations and information technology.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In just one sentence, it pitches the idea of using Haiku Deck to easily create engaging slideshows.
RiminiLUG. Mini Corso su Linux p1: Installazione & ConfigurazioneAlessandro Carichini
Prima parte del mini corso su Linux, con una breve introduzione, accenni alle distro più comuni, installazione di Linux Mint e post installazione con gestione dei pacchetti.
This document provides a guide to SEO basics and the changing SEO landscape in 2016. It discusses how SEO has evolved with changes in technology and search engines. Key points include:
- SEO strategies must adapt to changes in algorithms like Google's RankBrain and Hummingbird that better understand user intent.
- Keywords remain important but the focus is shifting to providing answers to user questions through content.
- Updates to Google's search interface and paid ad formats can impact organic search results.
- An understanding of recent changes is crucial for SEO success in the current landscape.
CV SANDEEP_EKHE_ME_VLSI and Embedded Systems_4.9 year Exp in Embedded Firmwar...Sandeep Ekhe
The document is a cover letter and resume for Sandeep Pradeep Ekhe. It summarizes his educational qualifications including a Master's degree in VLSI and Embedded Systems and a Bachelor's degree in Electronics and Telecommunication. It outlines his work experience over 4 years and 9 months including projects in embedded software development, circuit design, and product development at various companies. It also lists his areas of expertise such as embedded C programming, microcontroller programming, communication protocols, and circuit design.
Strategische Personalplanung in der AssekuranzSTRIMgroup
Noch vor einigen Jahren war die #Personalplanung beschränkt auf die Lücke zwischen Angebot und Nachfrage an Mitarbeitenden. Heute ist es ein deutlich anspruchsvollerer Prozess, ähnlich wie Risk Management oder Supply Chain Management. Die Strategische Personalplanung erzeugt mehrere, datengesteuerte #Prognosen, die auf einer Vielzahl von #Szenarien beruhen. Ausserdem ermöglicht eine solche Planung einer Organisation, sich rasch anzupassen und auf aktuelle und zukünftige Änderungen in den Geschäftsanforderungen zu reagieren.
Damit eine Personalplanung als "strategisch" bezeichnet werden kann sind m.E. folgende Eigenschaften notwendig:
(1) Verzahnung mit der Strategischen Unternehmensplanung. (2) Gezielte Ausrichtung auf jene Belegschaftssegmente, welche die grössten strategischen Auswirkungen erzielen (z.B. unternehmenskritische Positionen, Aufgaben, die schwer zu erfüllen sind, oder Fähigkeiten, die über eine lange Zeit hinweg aufgebaut wurden).
(3) Einbindung eines Entscheidungswerkzeuges, das obere Führungsebenen dazu befähigt, Alternativen abzuwägen, Geschäftsentscheide herbeizuführen und bei der Strategischen Planung Fortschritte zu machen.
PLM Open Hours - Definition von Farben und OberflächenIntelliact AG
Die Definition und Ausprägung von Farbe und Oberflächen stellen die Unternehmen immer wieder vor ungeahnten Herausforderungen – sowohl in der Organisation, wie auch in der Umsetzung im PLM. In diesen PLM Open Hours werden die Möglichkeiten im Umgang mit Farbe- und Oberflächenvarianten gezeigt. Insbesondere legen wir Wert auf die Vorgehensweise zu einem optimalen PLM-Konzept für Farb- und Oberflächengebung sowie die verschiedenen Möglichkeiten zur Abbildung in den Systemen.
Sudeshna Roy has over 2 years of experience developing embedded software and GUI applications using C/C++. She has expertise in middleware development, network programming, and communication protocols like SPI and I2C. Her most recent projects involve developing QT-based GUIs for FPGA-based systems performing tasks like video processing and encryption. She holds an MTech in Embedded Systems and seeks a challenging role in the semiconductor industry to further enhance her technical skills.
In seinem Vortrag „Geschäftsprozessmanagement – Anspruch vs. Wirklichkeit“ stellt Sven Hellmann (OPITZ CONSULTING) die vier Phasen des Geschäftsprozessmanagements vor: Strategie, Design, Implementierung und Controlling.
OSGI workshop - Become A Certified Bundle ManagerSkills Matter
OSGi is great at enabling you to build your systems out of sets of bundles. In a way, your bundles are your configuration. However, this also requires you to master the identification, assembly and provisioning of all of the components that make-up your system.
* How do you hot-deploy bundles for delivery?
* Is there a simple way of bootstrapping your system with specific configurations that are easy to assemble and kick-start?
* Once your system is "out there" how can you take things one-step further and manage the provisioning remotely?
* Is there an easy way to let the user discover and deploy what he wants, when he wants it?
* How can you do all of these things using existing technologies?
Well, you've come to the right place. In this workshop we will focus on ways to manage OSGi installations. Using a simple example application, we will show you how you can:
* use Fileinstall to hot-deploy bundles into your live application environment
* take advantage of Pax Runner to create and easily bootstrap configurations of bundles
* remotely manage, provision, and audit systems in the field with Apache Ace
* provide, discover, and deploy bundles using Apache Felix OBR
Presentación de Jeffrey Hayzlett Conecta 2012IAB México
This document contains advice and guidance for driving organizational change and being a leader and change agent. It emphasizes the need to adapt to change, beat naysayers, and be proactive in pursuing change. It discusses common reasons why people and companies fail to drive needed change, such as lack of vision, tension, and keeping promises. The document encourages thinking big, taking risks, stirring things up, and owning top relationships to enable change.
This document contains several paragraphs of text in an unknown language with various formatting. It discusses topics like numbers, dates, and measurements. The formatting includes parentheses, brackets, and symbols like commas and periods.
1) The document discusses various topics in 3 paragraphs, including details about dates and locations.
2) It provides statistics such as numbers, dates, and citations in tables.
3) The writing includes technical terms and follows a structured format with headings.
Before Oracle optimises your statement it may apply transformations that restructure it completely. This presentation examines the optimiser’s capabilities in transforming SQL. It describes performance issues that are overcome by common transformations, and more importantly identifies common code techniques which cannot be transformed and which may cause performance problems. It aims to clarify the reality for developers who now frequently just say "I can write what I like as Oracle will rewrite it for me anyway".
This document contains the database schema for a university student housing system. It includes tables for students, courses, contracts, payments, residences, inspections, and their relationships. Foreign keys linking the tables are then dropped to remove the relationships between the tables in the schema.
This document provides an introduction to Puppet, including an overview of its open source ecosystem, operating system support, Puppet Enterprise, how Puppet works, and how it manages configuration drift. It also discusses Puppet modules, catalogs, reports, facts, templates, storeconfigs, and using an external node classifier.
Web 2.0 tools such as blogs, wikis, and RSS feeds are changing the way people communicate.
Learn how each of these tools can help your business succeed, as well as some tips on how to gain adoption for these new technologies within the enterprise
Syed Mohamed has over 20 years of experience in textile production planning and IT support. He has worked in managerial roles planning production, inventory, and retail operations for textile companies. He is proficient in implementing and supporting various software programs to optimize production planning, inventory management, and other operations. Syed Mohamed is seeking a managerial role utilizing his expertise in textile operations and information technology.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation and sharing it on SlideShare. In just one sentence, it pitches the idea of using Haiku Deck to easily create engaging slideshows.
RiminiLUG. Mini Corso su Linux p1: Installazione & ConfigurazioneAlessandro Carichini
Prima parte del mini corso su Linux, con una breve introduzione, accenni alle distro più comuni, installazione di Linux Mint e post installazione con gestione dei pacchetti.
This document provides a guide to SEO basics and the changing SEO landscape in 2016. It discusses how SEO has evolved with changes in technology and search engines. Key points include:
- SEO strategies must adapt to changes in algorithms like Google's RankBrain and Hummingbird that better understand user intent.
- Keywords remain important but the focus is shifting to providing answers to user questions through content.
- Updates to Google's search interface and paid ad formats can impact organic search results.
- An understanding of recent changes is crucial for SEO success in the current landscape.
CV SANDEEP_EKHE_ME_VLSI and Embedded Systems_4.9 year Exp in Embedded Firmwar...Sandeep Ekhe
The document is a cover letter and resume for Sandeep Pradeep Ekhe. It summarizes his educational qualifications including a Master's degree in VLSI and Embedded Systems and a Bachelor's degree in Electronics and Telecommunication. It outlines his work experience over 4 years and 9 months including projects in embedded software development, circuit design, and product development at various companies. It also lists his areas of expertise such as embedded C programming, microcontroller programming, communication protocols, and circuit design.
Strategische Personalplanung in der AssekuranzSTRIMgroup
Noch vor einigen Jahren war die #Personalplanung beschränkt auf die Lücke zwischen Angebot und Nachfrage an Mitarbeitenden. Heute ist es ein deutlich anspruchsvollerer Prozess, ähnlich wie Risk Management oder Supply Chain Management. Die Strategische Personalplanung erzeugt mehrere, datengesteuerte #Prognosen, die auf einer Vielzahl von #Szenarien beruhen. Ausserdem ermöglicht eine solche Planung einer Organisation, sich rasch anzupassen und auf aktuelle und zukünftige Änderungen in den Geschäftsanforderungen zu reagieren.
Damit eine Personalplanung als "strategisch" bezeichnet werden kann sind m.E. folgende Eigenschaften notwendig:
(1) Verzahnung mit der Strategischen Unternehmensplanung. (2) Gezielte Ausrichtung auf jene Belegschaftssegmente, welche die grössten strategischen Auswirkungen erzielen (z.B. unternehmenskritische Positionen, Aufgaben, die schwer zu erfüllen sind, oder Fähigkeiten, die über eine lange Zeit hinweg aufgebaut wurden).
(3) Einbindung eines Entscheidungswerkzeuges, das obere Führungsebenen dazu befähigt, Alternativen abzuwägen, Geschäftsentscheide herbeizuführen und bei der Strategischen Planung Fortschritte zu machen.
PLM Open Hours - Definition von Farben und OberflächenIntelliact AG
Die Definition und Ausprägung von Farbe und Oberflächen stellen die Unternehmen immer wieder vor ungeahnten Herausforderungen – sowohl in der Organisation, wie auch in der Umsetzung im PLM. In diesen PLM Open Hours werden die Möglichkeiten im Umgang mit Farbe- und Oberflächenvarianten gezeigt. Insbesondere legen wir Wert auf die Vorgehensweise zu einem optimalen PLM-Konzept für Farb- und Oberflächengebung sowie die verschiedenen Möglichkeiten zur Abbildung in den Systemen.
Sudeshna Roy has over 2 years of experience developing embedded software and GUI applications using C/C++. She has expertise in middleware development, network programming, and communication protocols like SPI and I2C. Her most recent projects involve developing QT-based GUIs for FPGA-based systems performing tasks like video processing and encryption. She holds an MTech in Embedded Systems and seeks a challenging role in the semiconductor industry to further enhance her technical skills.
In seinem Vortrag „Geschäftsprozessmanagement – Anspruch vs. Wirklichkeit“ stellt Sven Hellmann (OPITZ CONSULTING) die vier Phasen des Geschäftsprozessmanagements vor: Strategie, Design, Implementierung und Controlling.
OSGI workshop - Become A Certified Bundle ManagerSkills Matter
OSGi is great at enabling you to build your systems out of sets of bundles. In a way, your bundles are your configuration. However, this also requires you to master the identification, assembly and provisioning of all of the components that make-up your system.
* How do you hot-deploy bundles for delivery?
* Is there a simple way of bootstrapping your system with specific configurations that are easy to assemble and kick-start?
* Once your system is "out there" how can you take things one-step further and manage the provisioning remotely?
* Is there an easy way to let the user discover and deploy what he wants, when he wants it?
* How can you do all of these things using existing technologies?
Well, you've come to the right place. In this workshop we will focus on ways to manage OSGi installations. Using a simple example application, we will show you how you can:
* use Fileinstall to hot-deploy bundles into your live application environment
* take advantage of Pax Runner to create and easily bootstrap configurations of bundles
* remotely manage, provision, and audit systems in the field with Apache Ace
* provide, discover, and deploy bundles using Apache Felix OBR
Here are a few suggestions for tracing vulnerabilities and threats across products and marketplaces:
- Use a vulnerability management platform to track known vulnerabilities across all products and services. This can help identify exposures across an organization's digital footprint.
- Consider a threat intelligence platform to monitor dark web marketplaces and hacker forums for any mentions of your brands or products. This provides outside-in visibility into potential risks.
- Audit third-party vendors and open source components used within your offerings. Ensure all dependencies are regularly patched and secure. Many supply chain compromises stem from unpatched or misconfigured external technologies.
- Implement a bug bounty program to encourage external research of your products and attack surfaces. Responsible disclosures can surface
The document discusses the potential for using methane hydrate structures as an energy source by extracting methane gas from hydrate deposits in ocean floors and arctic tundra. Methane hydrate forms naturally when methane gas combines with water under high pressure and low temperatures. These methane hydrate deposits represent an enormous untapped energy source that could be harvested using engineered systems. The document outlines some design challenges for autonomous systems and vehicles that could sustainably extract methane from hydrate deposits to generate power on kilowatt scales for distributed sensor networks and unmanned vehicles. Oxygen could potentially be used to facilitate extracting the methane gas from the solid hydrate structures.
Developer Tools, Nokia Platforms Santtu AhonenAshley Walker
This document discusses developing applications for the Maemo 5 platform using Qt framework. It highlights that the necessary bits and pieces are already available to familiarize yourself with Qt and build apps that can run on any Maemo 5 environment. The document also provides an example of configuring an Info.plist file for a widget application to define display name, identifier, main HTML file and allow network access.
Steering Iterative and Incremental Delivery with Jeff PattonUIEpreviews
The document discusses how product owners can leverage incremental and iterative development approaches to build products in a way that allows for continuous improvement and flexibility to change based on customer feedback, highlighting the differences between incremental and iterative approaches and how both can be used to structure development in a way that builds quality over time.
The document provides information about the features and functions of a Smart TV. It discusses the Smart TV's ability to connect to the internet and access online content like Netflix as well as its built-in functions for viewing photos, playing music and watching videos from external storage devices. It also describes the TV's 3D capabilities and HD picture quality. The summary highlights the key points about the Smart TV's smart and connectivity features as well as its video and audio functions.
WALA is a static and dynamic program analysis library initially developed at IBM for Java applications that was open sourced in 2006, and has since been used in various academic research publications and commercial products for tasks like pointer analysis, dataflow analysis, and context-sensitive slicing. The document outlines some of WALA's key features like its intermediate representation, analysis frameworks, and front-ends for different programming languages.
The document discusses Embedded InnoDB and related technologies. It provides an overview of InnoDB as the transactional storage engine for MySQL. It then describes g414-inno, an open-source Java library that provides object-oriented access to Embedded InnoDB. The document also discusses using InnoDB as the storage layer for the Voldemort key-value store and St8, a RESTful storage server prototype built on top of InnoDB. It shares some initial benchmark results and outlines next steps to improve performance and integration with other technologies.
The document provides details for designing 4-6 website designs for a natural pet food company with an eco-friendly concept. It lists the company name as Bark Bakery and provides the main page categories to include in the designs: Our Story, Accessories, Contact, etc. Basic contact information is also given for the client.
What use are experiments for industry?
1. Experiments are a powerful tool for evaluating technologies. Experiments provide an objective comparison rather than subjective opinions
2. The results of experiments should allow industry to: Base decisions on objective grounds and increase control on software development
Архитектура коммутаторов Cisco Catalyst 6500Cisco Russia
The document discusses the Cisco Catalyst 6500 modular switching platform, including its key components like the Supervisor 2T module with a 2Tbps switch fabric and the MSFC5 multilayer switch feature card. It provides an overview of the Cisco Catalyst 6500 Series switches and modular cards like the 6513-E chassis, highlighting its performance and capabilities. The Catalyst 6500 offers advanced switching and routing with high-density 10GbE, 40GbE, and 100GbE interfaces in a modular system designed for large enterprise and service provider networks.
Soundararajan arthurbalci agile2012_handout_v1_0drewz lin
The document discusses Agile methods and strategies for assessing an organization's adoption of Agile principles and practices. It begins by introducing the Agile Assessment Framework (AAF) which includes objectives, principles, and strategies taken from the AAF. It then provides 3 approaches for assessing Agile methods - identification, solution approach, and benefits to organizations. The approaches analyze the objectives, development process, and execution of the adopted Agile method. The document concludes by stating the benefits of Agile assessment include guiding improvements and enhancing an organization's Agile method and development environment.
CMMI models are abstractions of activities that should be implemented in technical projects and organizations. Recognizing the real-world examples of abstractions is difficult when a new model is introduced. The 2010 CMMI for Services looks for "instantiations" even more abstract than "projects", entities appraisers using the earlier Development CMMI found not always so easy to define. This conference presentation to CMMI appraisers shows that the Services CMMI outlines a business process unlike the earlier CMMI for Development which explicitly claimed not to do so.
OpenSolaris is an open source software distribution based on Solaris that provides developers with tools and technologies to build and deploy their applications; it includes optimized packages for development, performance enhancements and security updates distributed through a network package repository system. OpenSolaris also provides automated installation and software management tools, integrated debugging capabilities, and is optimized to take advantage of multicore processors and virtualization technologies.
Blueprint+: Developing a Tool for Service DesignAndy Polaine
Presented at the Service Design Network Conference 09 in Madeira. The presentation is about a work-in-progress examining how we can best expand the service design blueprint diagramming to include other critical information such as time and emotional states of the participants in the service.
This document announces an upcoming press conference and launch cocktail event. It provides the date, time and location for the press conference (May 14th at 10am at Hotel B) and launch cocktail (May 15th at 6pm at Hotel B). It encourages attendance at the events and discusses using them as an opportunity to generate positive stories and transform opinions.
The document discusses principles of interaction design including consistency, following conventions, using natural language and concepts familiar to users, providing clear navigation, and preventing errors through careful design. It emphasizes designing systems that speak the users' language, follow real-world conventions, and avoid unnecessary complexity or dialogue.
Brand & UX: Toward a New Interpretation (Version 2)Mark Badger
This presentation explores the relationship between marketing (brand) and user experience (UX) by examining their shared goal of defining the experience of a company's product or service. The presentation notes that while brand and UX originate from different areas, they are intertwined and strategic thinkers from both camps need to collaborate more. It provides examples of how brand and UX intersect and influence each other, suggesting their relationship is complex and interdependent.
Similar to Introducing Security Access Control Policies into Legacy Business Processes (20)
A commutative model composition operator to support software adaptationSébastien Mosser
The document proposes a commutative operator for composing software adaptation models. It introduces a set-based representation of adaptations as added and deleted model elements. This allows modeling adaptation composition as set operations, ensuring properties like commutativity and consistency checking. An implementation of the approach in a domain-specific language is described, along with validation using a car crash crisis management system case study.
Towards CloudML, a Model-Based Approach to Provision Resources in the CloudsSébastien Mosser
The Cloud-computing paradigm advocates the use of re- sources available “in the clouds”. In front of the multiplicity of cloud providers, it becomes cumbersome to manually tackle this heterogene- ity. In this paper, we propose to define an abstraction layer used to model resources available in the clouds. This cloud modelling language (CloudML) allows cloud users to focus on their needs, i.e., the modelling the resources they expect to retrieve in the clouds. An automated provi- sioning engine is then used to automatically analyse these requirements and actually provision resources in clouds. The approach is implemented, and was experimented on prototypical examples to provision resources in major public clouds (e.g., Amazon EC2 and Rackspace).
The document discusses tools for software engineering through the example of implementing Peano's axioms of natural numbers as a "Machine of Peano". It covers:
1. Specifying tests for the machine using a testing framework to ensure initial failure.
2. Implementing the machine's code to pass the tests.
3. Using version control systems like Git and code repositories to collaborate.
4. Packaging the machine as a reusable library using a build tool like Maven for dependencies, testing, and adding license headers.
5. Delivering continuous integration using Jenkins to automate building and publishing snapshots.
Cette présentation fait suite à l'atelier des doctorants LMO'08.
Elle à pour objectif de compiler le feed-back obtenu auprès des mentors de l'atelier, et d'amener à se poser les "bonnes questions" avant et pendant la thèse.
http://hal.inria.fr/hal-00669772
Using Domain Feature to handle Feature InteractionsSébastien Mosser
Software Product Lines in general and feature diagrams in particular support the modeling of software variability. Un- fortunately, features may interact with each other, leading to feature interaction issues. Even if detected at the im- plementation level, interaction resolution choices are part of the business variability. In this paper, we propose to use a stepwise process to deal with feature interactions at the domain level: the way an interaction is resolved is consid- ered as a variation point in the configuration process. This method and the associated implementation are applied onto a concrete case study (the jSeduite information system).
The document discusses the evolution of cloud computing from hype to reality. It describes how migrating applications to the cloud is just the beginning, and software must continue to evolve once in the cloud. The REMICS project aims to support this evolution by extracting code from legacy systems to UML models, but existing standards do not address the needs of distributed systems or software evolution in the cloud. The PIM4Cloud language is being developed to fill this gap and support migrating, deploying, and evolving cloud-based applications across multiple cloud providers. Future work includes developing a working prototype and obtaining feedback from users.
Undoing Event-driven Adaptation of Business ProcessesSébastien Mosser
This document discusses undoing event-driven adaptations of business processes. It proposes automated unadaptation by identifying the triggering event, correlated adaptations, and yielding the system as if the adaptation never occurred. A demonstration shows events triggering adaptations, then automated unadaptation identifying the trigger, pruning correlated changes, and replaying the process. The approach aims to avoid corrupted processes from naive unadaptation and supports platform-independent unadaptation of running process instances over time.
Behavioral Compositions in Service-Oriented ArchitectureSébastien Mosser
The document discusses the benefits of exercise for both physical and mental health. It notes that regular exercise can reduce the risk of diseases like heart disease and diabetes, improve mood, and reduce feelings of stress and anxiety. Exercise is also credited with boosting brain health and improving cognitive function as we age.
The document describes a case study on a Car Crash Crisis Management System (CCCMS) to validate an approach for behavioral composition in service-oriented architectures. The CCCMS contains 8 main success scenarios, 27 business extensions, and 3 non-functional properties. The scenarios and extensions were modeled as business processes and atomic services respectively, which were then composed together using the proposed algorithms.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This presentation shows how the ADORE framework is used to tame the complexity of orchestration design, based on a case study defined by Kienzle et al. This case study (Car Crash Crisis Management System) is defined as a common requirement set used to compare Aspect Oriented Modeling techniques.
This document describes the Adore framework for taming complexity in orchestration design. Adore uses a model-driven approach to automatically integrate incomplete process fragments into a complete process while preserving properties like execution order. It includes a domain-specific language for designers to model processes and services. Algorithms then weave and merge the fragments, applying rules to handle issues like equivalent activities and incomplete models. The demonstration shows Adore in action on a car crash crisis management case study.
Présentation du framework jSeduite pour les JM2L.
L’équipe MODALIS du laboratoire CNRS / I3S s’interesse à la définition de modèles pour les architectures largement distribuées. Dans le cadre de nos recherches sur les Architectures Orientées Services (SOA), nous avons mis en place (en partenariat avec l’Institut d’Education Sensoriel Clément Ader, établissement scolaire niçois accueillant de jeunes handicapés) une architecture orientée services permettant de diffuser des informations en milieu scolaire : menu de la cantine, Horaire de bus, Albums Photos, Vidéos, ... Le framework ainsi créé (jSeduite, publié sous licence LGPL) est déployé sur le site de l’EPU Polytech’Nice - Sophia Antipolis ainsi qu’à l’IES.
Nous nous proposons d’illustrer le fonctionnement d’une SOA sur cet exemple. Comment le Web 2.0, de par sa nature participative, nous permet de mettre en place un système de diffusion d’information libre relié aux principaux acteurs du marché (Google, Yahoo, Twitter, ...) ? Comment intégrer la multitude d’information existantes sur la toile dans le système ? Comment techniquement déployer une architecture orientée service sans être débordé ? Quelles solutions ’libres’ peuvent supporter une telle infrastructure ? Comment manipuler les informations récupérées pour les diffuser efficacement aux utilisateurs ? C’est à ces questions que nous tenterons de répondre en décrivant l’architecture ainsi que la mise en oeuvre du framework jSeduite.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Introducing Security Access Control Policies into Legacy Business Processes
1. Introducing Security Control Access Policies
into Legacy Business Processes
1 2 3
Fáber D. Giraldo, Mireille Blay-Fornarino and Sébastien Mosser
1: System and Computer Engineering, University of Quindío, Colombia
2: I3S (UMR CNRS 6070), Université Nice - Sophia Antipolis, France
3: INRIA Lille-Nord Europe, LIFL (UMR CNRS 8022), Université Lille 1, France
EDOC 2011, Helsinki, Finland
2. Problem : Security & Business Processes
• Business processes
• Model (business) behavior in a Service-oriented Architecture
• Think «activity diagram» in the UML
• As complex as the modeled business: no magic here (at least yet)
• Security is often handled at the infrastructure level (e.g., WS-*)
• But clearly impacts modeled behaviors (e.g., «role-based access
control»)
2
3. Case Study: Car Crash Crisis Mgmt System
• Requirement documents specified in [Kienzle et al, 2010]
• Special issue of TAOSD, focusing on Aspect Oriented Modeling
• Contents:
• 8 main success scenario
• 27 business extensions
• 3 non-functional properties
• How to handle a Car Crash accident?
3
6. Proposition: Consider Security as Concern
• Existing approaches deal with Separation of Concerns:
• Concerns reification (e.g., «Aspects» in Aspect-oriented Programming)
• Composition with legacy systems (e.g., «Aspect weaving»)
• Security (e.g., XACML standard) can be considered as another concern
• Thus composed with other concerns (e.g., persistence standard)
• Compliant with concern reasoning approaches
• E.g, interaction detection mechanisms
6
7. sidered as a concern (e.g.,
requirements specification. All orchestrations are
ation could be extended to
calls to services (even the fragments themselve
r business processes, if it
A DORE focus on the modeling of orchestrations r
compositions of services
Implementation modeling the internal behavior of services or acti
and considering security
sed control access policies.
• «Activity moDel to suppOrt
iques oRchestration Evolution» [TAOSD’10]
has been widely ac- !
sulate functional and non-
modules overconcerns as
• Consider a software "# $%&'(()*+,*-.%++/0&12(3$4)
el of abstraction by identi- be composed
«process fragments» to
;%&'((
which is a existing processes
with targeted goal of
"8# -.%++7'((94&63/&':'-"&'0/$4)
• Support fragment composition through
%&'((
different (endogenous) algorithms
e extended to the treatment "8 $"4&6)*+,*-.%++"4&6<%3=$4)
• Algorithms ensure compositional properties
nd its derived implications, "4&6 ;"4&6
siness processes managed
ditional features to preservation
• E.g., order func- 6 6007$4) & &6=0>$?@"294&63/&':'-"&'0/?)
access control as a non-
ts the Provide interference detection mechanisms 5
• functional part of a 7
8. Endogenous Composition of Concerns
hal-00594845, version 1 - 21 May 2011
Figure 2. A DORE XACML Fragment.
!
!
"# $%&'"(%)*&+,-./0.12&//3"(%)"4+*&+,$5-
%&'"(%)*&+, " #$%&'()'"**+#&
"7 $,+&89:&+-./0.8)8//;<=>?,+@5+&4$,+&95,1+-
-. #"$/0*12&'()'"*/3$0-4/((567//8$/0*12#$%&
"K
"H $3"(5+&?%&4-./0.8%8//I+4<44,%J54+'"(5+&$5-
$"11+&&-./0.8)8//1928",+$,+&89:&+L3"(5+&?%&4-
F%&'"(%)*&+,
⊕ 0 #9&'()'$/:*0:644#"$/0*12&
9
"11+&& F"11+&&
;9 -< 6$((%$/34-28$/0*12#=1+>"$/0*12&
A A99G$- 4# 4A,9B$CD+:E.<11+&&C-
,
6
XACML PEP concern Hospital EIS concern
Figure 3. retrieveVictimHistory fragment
Figure 2. A DORE XACML Fragment. 8
9. Composition leads to Iterative Process Modeling
!
" #$%&'()'"**+#&
-. #$/0-1$%2/34&'()'56/((7-1$%-832/34#94+& !"# $%!&'"!(')*(+,-.,!/"/*#/$+
$/0-1$%2/34
01 $*234/5+,-.,6*--5!7)589*"8*):/("!*58*72$%!&+
-A #43/;*C/3&'()';%;((DEFGH43I=3/8#$%&
0; $*<+,-.,6*--5!7)589*"8*)=</28*8>$%!&+
-M #7-1=3/H$/8&'()';$;((<38E884$N=830-1=3/#94+& @$/0-1$%2/34
0?@ $A7(5+,-.,")(--*</28*B>C55!75!*08/D7(5*80E$*234/5')*(FE7"+
-O #-553//&'()';%;((5*6;-43#43/;*C/3B7-1=3/H$/8&
-553// @-553//
rsion 1 - 21 May 2011
⊕ 0?1 6*--<*(5E0>:/(8*208*72$%!&'A7(5+
-. #"$/8*4:&'()'"*/;$8-1/((<=3//>$/8*4:#$%& -J 8"4*9#KL3C:'E553//K& 0G )(HI6(--%0*8?)(H$J*2B7J'JE/0#*2HJ'%!&+
8 #5&'()'$/?*8?=11#"$/8*4:& 0K )(HI6(--%0*8?)(H$J*2B7J'J#*"8*):!755/<J'%!&+
5
0L )(HI6(--(/2<$J(8086(J'J(6""/((J')*(+
@5 -A =$((%$/;1-:>$/8*4:#94+B"$/8*4:&
!5E !/5E>$+
,
Composed Concern Initial Process
(a) Initial version
9
10. !"# $%!&'"!(')*(+,-.,!/"/*#/$+
Results 0; $*<+,-.,6*--5!7)589*"8*)=</28*8>$%!&+
01 $*234/5+,-.,6*--5!7)589*"8*):/("!*58*72$%!&+
0G $*(90E*<H(/!+,-.,")(--#0E*<08/H(/!$%!&+
• Final process designed through
*(90E*<H(/!
the composition of smaller
artifacts 01@ $!/(572(/+,-.,5<5--ICJKL!/M6/(8$*<+
P*(90E*<H(/! 011 $#0E6/(L*(8+,-.,5*5--Q/8C88!*R68/90E6/($%!&+
• Security fragments are
«process independent» 01; $0""/((+,-.,5<5--"7)50!/$!/(572(/'#0E6/(L*(8+
P0""/(( 0""/((
• Thus can be reused in other 01N 8A!7%$O:/2>,C""/((O+ 01? $A*(87!>+,-.,A7(5*80E(--Q6/((D*(87!>$*<+
systems
01G $"+,-.,*(S78S6EE$A*(87!>+
• Approach applied successfully on "
the complete CCCMS 01T 6*--<*(5E0>D*(87!>$A*(87!>'%!&+ P"
0?@ $A7(5+,-.,")(--*</28*B>C55!75!*08/D7(5*80E$*234/5')*(FE7"+
10
FFF
11. Conclusions & Perspectives
• Achievements
• XACML behaviors implemented as process fragments
• Approach applied to a concrete and complex case study
• Future Works
• Final process «optimization» (e.g., avoid redundant activities)
• Raise the abstraction level into a more «semantic-driven» approach
• «I want this process to be secured», automagically
11
12. Graphics: sxc.hu & C.line
Thank You for Your Attention !
Introducing Security Control
Access Policies into Legacy
Business Processes
Fáber D. Giraldo, Mireille Blay-Fornarino and Sébastien Mosser
1: System and Computer Engineering, University of Quindío, Colombia
2: I3S (UMR CNRS 6070), Université Nice - Sophia Antipolis, France
3: INRIA Lille-Nord Europe, LIFL (UMR CNRS 8022), Université Lille 1, France