This document discusses an approach called OPBUS that aims to automate risk treatment in business processes. OPBUS extends business process models to include risk assessment. It uses a domain specific language to assess risks in business processes by analyzing activities, data flows, and threats. OPBUS then uses constraint programming techniques and security pattern models to generate optimized configurations of security controls to address identified risks in an automated manner. The approach was prototyped as an Eclipse plugin to demonstrate specification of security patterns and risk-based selection of security controls for business processes.
Model-driven prototyping for corporate software specification Thomas Memmel
Model-driven prototyping is proposed as an approach to address increasing complexity in automotive human-machine interface development. Currently, development processes are predominantly paper-based and supported by heterogeneous tools. This leads to communication problems, unnecessary work, and delays. The proposed approach defines a domain-specific modeling language for automotive interfaces based on concepts identified by domain experts. Formal specifications can then be used to generate interactive prototypes early in development, allowing for rapid feedback. This standardized and model-driven process aims to improve flexibility, avoid duplicate work, and facilitate cross-discipline collaboration.
Electricity Subsector Cybersecurity Capability Maturity Model Case StudyEnergySec
The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2), which allows electric utilities and grid operators to assess their cybersecurity capabilities and prioritize their actions and investments to improve cybersecurity, combines elements from existing cybersecurity efforts into a common tool that can be used consistently across the industry. The ES-C2M2 was developed as part of a White House initiative led by the Department of Energy in partnership with the Department of Homeland Security (DHS) and involved close collaboration with industry, other Federal agencies, and other stakeholders. This presentation covers a real world “case study” of how this ES-C2M2 work can easily be adapted to improve cyber security at your organization.
Stefan Wallin Ph D Presentation : Rethinking Network Managementwallann
Stefan Wallins Ph D Presentation 23 Feb 2013.
http://pure.ltu.se/portal/sv/publications/rethinking-network-management-solutions%28524ec0f6-7cb3-45bd-b350-72a21f0b7c6e%29.html
This document discusses the need for a standard to model and notate business decisions. It provides background on how decisions are currently modeled using tools like business rule management systems and decision tables. It proposes the Decision Model and Notation (DMN) as a new standard to provide a common way to define the inputs, logic, and outputs of decisions. The DMN would include a metamodel to define decisions and standardize at least one decision modeling technique, such as decision tables. It would support modeling decisions used in different business processes and systems. The presentation outlines the goals and progress of developing the DMN standard through the Object Management Group.
This is lecture 3 of my lessons as lector at Hanze University with the explanation of outsourcing as a way of sourcing. It will also give details about building a sourcing business case and the change approach for outsourcing.
Financial Services Data - Use It or Lose ItJohn Avery
Presentation at Data-Intensive
Computing, Graphs, and
Combinatorics in
Bio-Informatics, Finance,
Linguistics,
and National Security
Tuesday–Wednesday, July 26–27, 2011
Experimental Study Using Functional Size Measurement in Building Estimation M...Luigi Buglione
This paper reports on an experiment that investigates the predictability of software project size from software product size. The predictability research problem is analyzed at the stage of early requirements by accounting the size of functional requirements as well as the size of non-functional requirements. The experiment was carried out with 55 graduate students in Computer Science from Concordia University in Canada. In the experiment, a functional size measure and a project size measure were used in building estimation models for sets of web application development projects. The results show that project size is predictable from product size. Further replications of the experiment are, however, planed to obtain more results to confirm or disconfirm our claim.
Model-driven prototyping for corporate software specification Thomas Memmel
Model-driven prototyping is proposed as an approach to address increasing complexity in automotive human-machine interface development. Currently, development processes are predominantly paper-based and supported by heterogeneous tools. This leads to communication problems, unnecessary work, and delays. The proposed approach defines a domain-specific modeling language for automotive interfaces based on concepts identified by domain experts. Formal specifications can then be used to generate interactive prototypes early in development, allowing for rapid feedback. This standardized and model-driven process aims to improve flexibility, avoid duplicate work, and facilitate cross-discipline collaboration.
Electricity Subsector Cybersecurity Capability Maturity Model Case StudyEnergySec
The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2), which allows electric utilities and grid operators to assess their cybersecurity capabilities and prioritize their actions and investments to improve cybersecurity, combines elements from existing cybersecurity efforts into a common tool that can be used consistently across the industry. The ES-C2M2 was developed as part of a White House initiative led by the Department of Energy in partnership with the Department of Homeland Security (DHS) and involved close collaboration with industry, other Federal agencies, and other stakeholders. This presentation covers a real world “case study” of how this ES-C2M2 work can easily be adapted to improve cyber security at your organization.
Stefan Wallin Ph D Presentation : Rethinking Network Managementwallann
Stefan Wallins Ph D Presentation 23 Feb 2013.
http://pure.ltu.se/portal/sv/publications/rethinking-network-management-solutions%28524ec0f6-7cb3-45bd-b350-72a21f0b7c6e%29.html
This document discusses the need for a standard to model and notate business decisions. It provides background on how decisions are currently modeled using tools like business rule management systems and decision tables. It proposes the Decision Model and Notation (DMN) as a new standard to provide a common way to define the inputs, logic, and outputs of decisions. The DMN would include a metamodel to define decisions and standardize at least one decision modeling technique, such as decision tables. It would support modeling decisions used in different business processes and systems. The presentation outlines the goals and progress of developing the DMN standard through the Object Management Group.
This is lecture 3 of my lessons as lector at Hanze University with the explanation of outsourcing as a way of sourcing. It will also give details about building a sourcing business case and the change approach for outsourcing.
Financial Services Data - Use It or Lose ItJohn Avery
Presentation at Data-Intensive
Computing, Graphs, and
Combinatorics in
Bio-Informatics, Finance,
Linguistics,
and National Security
Tuesday–Wednesday, July 26–27, 2011
Experimental Study Using Functional Size Measurement in Building Estimation M...Luigi Buglione
This paper reports on an experiment that investigates the predictability of software project size from software product size. The predictability research problem is analyzed at the stage of early requirements by accounting the size of functional requirements as well as the size of non-functional requirements. The experiment was carried out with 55 graduate students in Computer Science from Concordia University in Canada. In the experiment, a functional size measure and a project size measure were used in building estimation models for sets of web application development projects. The results show that project size is predictable from product size. Further replications of the experiment are, however, planed to obtain more results to confirm or disconfirm our claim.
Digital pen solutions allow for mobility and optimization of business processes. The digital pen captures handwriting and drawings and sends the data via Bluetooth to a computer or phone over the internet. The pen has a unique code for identification and paper has invisible patterns that establish the pen's position. This allows handwritten forms to be digitized and processed more efficiently than faxing or scanning paper forms. Thales provides tools for designing digital forms, routing data from pens, managing form data and integrating with backend systems. They also offer services for deploying and supporting digital pen solutions. Examples of successful implementations include using digital pens for technical vehicle inspections and gas inspections.
Bull is a European technology company that provides high-performance computing and cybersecurity solutions. It helps customers innovate with new technologies, optimize their infrastructure through outsourcing and cloud services, integrate critical business applications, and guarantee trust through cybersecurity products and services. Bull has a presence in over 50 countries and expertise in key verticals such as public sector, telecom, finance, energy, defense, and transportation.
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...Compuware APM
Virtualization, Cloud Computing and Outsourcing promise significant cost savings and enhanced business agility. Implemented correctly these initiatives can cut hardware and software costs, improve web application performance and quality, and positively impact business results. Learn how these 5 key business and technology trends are enabling companies to reduce costs AND ensure web application performance:
1. Virtualization
2. Outsourced Hosting & Management of Applications
3. Cloud Computing
4. Real-user Monitoring
5. ‘SaaS’ification of IT Management Software
This document summarizes the WebWay International company and its digital alarm signalling solutions. It discusses how migrating from analogue to digital signalling can reduce costs, enhance security, and improve operational efficiency by (1) reducing communications costs; (2) reducing business disruption; (3) improving security; and (4) improving reliability. Standards compliance is emphasized as a way to mitigate risks when specifying digital alarm systems.
Tata Tele Services, having devised measurable strategy and short/mid-& long-term oriented execution strategy to roll out the Integrated Marketing Management solution. Analytics as an area has started to fuse into the Operations and in process of building "Data Based Decision Support" across various functions of the Organization. Importantly how Analytics has gotten interspersed with the Enterprise's Strategic and Operational activities.
Automotive embedded systems now include numerous software-intensive functions that are critical from a safety point of view (e.g., braking, assisted driving, etc). These functions are distributed on the Electronic Control Units and they need to exchange large amount of data with real-time constraints. In this context, the communication system plays a major role and it has to respect stringent dependability constraints. Security, especially with the widespread of wireless networks, is now becoming a serious matter of concern too. In this talk, we will review the main threats to dependability and security in automotive communication systems, the existing technical solutions to attain them, and, highlight areas where developments might be needed.
The document discusses system choice and provides an overview of its principles and techniques. It explains that system choice aims to define the system context and agree on overall system characteristics through a system definition. Key activities include appreciating the situation using rich pictures, cultivating new ideas through exemplars and metaphors, and defining alternative systems. The result is a system definition that fulfills the FACTOR criteria of functionality, application domain, conditions, technology, objects, and responsibility.
This document summarizes a study that evaluated the performance of a proposed wireless computer network for an integrated manufacturing and management system.
The study proposed a wireless network architecture based on TCP/IP and LonWorks protocols to connect different departments within a household appliance manufacturer. The network was modeled as a set of closed routes consisting of users, servers, routers, and communication links.
To evaluate network performance, a method developed for packet switching networks was adapted. This involved modeling the network as queues, calculating metrics like waiting time, service time and thinking time for sample routes, and validating the approximations using simulation and measurements on an existing network. The goal was to provide a feasible performance evaluation approach for the prospective computer-integrated manufacturing system
This presentation was created as part of a team project for Designing a New Learning Environment, MOOC offered by Stanford University, Fall 2012. Team members who contributed to this presentation are Kimberly Hayworth, Cathleen Galas, Laura Gibbs, Susan Lieberman, Donna Murdoch.
1) The document discusses different techniques for combining unrelated ideas to boost creativity, such as making remote associations between different concepts or combining concepts imaginatively.
2) It describes an experiment where subjects were more creative writing stories using unrelated words versus related words, showing that fusing unrelated ideas leads to greater creativity.
3) Techniques for fusing ideas discussed include making remote associations, combining concepts, working on different projects simultaneously, making analogies between different objects or concepts, mimicking nature, and gaining new perspectives by interacting with others.
The document discusses how B2B marketing is changing and becoming more inbound focused. It notes that today's buyers will find companies on their own when they are ready to purchase. The buyer journey is non-linear and influenced early on by awareness building content. The challenges for companies are to have relevant content to be part of conversations with buyers and influence how buyers define their needs. Content marketing is presented as a solution, but companies need a content strategy and to repurpose existing materials from subject matter experts. Measurement of content effectiveness and distribution channels is also important. An example case study is provided of a company that successfully grew its audience and leads through a video-based content marketing experiment.
El documento ofrece consejos para mantener la buena salud en el trabajo, recomendando tomar descansos reales para comer y relajarse, mantener un espacio de trabajo limpio, hacer ejercicio regularmente, evitar la comida chatarra, beber agua, y cuidar la salud mental mediante el sueño adecuado y el tiempo libre.
La huella ecológica mide la superficie de tierra y agua necesarias para producir los recursos que consume una población y absorber sus residuos. Se calcula comparando el consumo de una comunidad con la productividad de diferentes tipos de tierra. Un déficit ecológico indica que el consumo supera los recursos disponibles localmente. El cálculo de la huella ecológica puede ayudar a visualizar la dependencia ecológica, la inequidad social y monitorear el uso de recursos para informar políticas de sostenibil
Molly Smith Thompson House, Goldsboro
Renovation/design plans by Meredith College students Sandra Moncada, Donna Ryzinski, and Melissa Wright-Cheek.
Presented May 6, 2010.
Designing experiences, not just featuresAmir Khella
The document describes the author's frustrating experience with a rental car that had a keyless ignition system. Although it was a nice new feature, it created an unexpected experience for the author since it did not operate like typical car locks. It took trial and error to understand that the car would not lock when the key was nearby. The author argues that new features need clear instructions or cues to help users transition from existing mental models. Designers should test on a variety of users and make experiences intuitive rather than requiring users to feel they are at fault for not understanding poorly designed interactions.
This document summarizes a webinar about implementing social features in SharePoint 2013 intranets. It outlines the social components that can be included like personal and team sites, groups, microblogging, check-ins, and more. It also discusses analytics and metrics for measuring social adoption and ROI. The webinar provides examples of implementing these social features and discusses plans for developing social intranets as well as future directions like Web 3.0. Attendees can contact the presenters for more information on social intranet consulting services.
Universidad nacional del centro del perúLesly Aguilar
Este documento describe los principales transportadores de glucosa en los seres vivos: GLUT1, GLUT2, GLUT3, GLUT4 y SGLUT1. Explica brevemente la función de cada transportador y en qué tejidos se encuentran. También analiza la importancia de las rutas catabólicas del piruvato y los mecanismos de regulación de la glucólisis.
Board game night at a small university library has grown in popularity and provides several benefits. It draws visitors to campus which is appreciated by administration. It offers students an intellectual alternative to typical sports and arts opportunities and helps library staff build relationships with students. The event provides a non-threatening way for students who avoid the library to engage with it.
Dropbox: The Perfect Home for Your StuffsMafel Gorne
We don’t know when our computer or phones will get busted so backing up our files is a wise decision and I am glad to discover Dropbox.
Dropbox has the capability to save all your photos, documents, videos, and files. You can see all the stuffs you saved in Dropbox on all your devices such as computer, phones, Tablets, and even in the Dropbox website so you can access your stuff all the time wherever you are. Dropbox makes sure that if you edit the file on your computer the file will be updated automatically on all the devices.
SharePoint 2013 - Why, How and What? - Session #SPCon13Roland Driesen
SharePoint 2013 offers even better equipment than SharePoint 2010 did and has good reviews, a very positive vibe, and an appealing look and feel. But, how do you implement and use this great technology? Or, being cynical: WHY even bother? This session is about rephrasing your thoughts on Collaboration and/or Enterprise Social. Based on the concept of “Start with WHY” Roland will show you the real benefits to leverage the technology adoption lifecycle across your organization (innovators > early adopters > early majority > late majority) and why not to focus on the laggards. With the four stages model of user adoption Roland will give you practical advice on HOW to support this process including the Getting Things Done method with SharePoint to also appeal to the "not-so-social-media-savvy". The WHAT of SharePoint will be presented by co-presenters during the two days. This session is a summary of the 3G implementation methodology; a blend of great thinkers (Carl Gustav Jung, Simon Sinek, Michael Sampson, David Allen) and proven methods (Getting Things Done, Insights Discovery) combined with great technology (SharePoint 2013) to successfully motivate at least 84% of any population in the real usage of your SharePoint platform.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Digital pen solutions allow for mobility and optimization of business processes. The digital pen captures handwriting and drawings and sends the data via Bluetooth to a computer or phone over the internet. The pen has a unique code for identification and paper has invisible patterns that establish the pen's position. This allows handwritten forms to be digitized and processed more efficiently than faxing or scanning paper forms. Thales provides tools for designing digital forms, routing data from pens, managing form data and integrating with backend systems. They also offer services for deploying and supporting digital pen solutions. Examples of successful implementations include using digital pens for technical vehicle inspections and gas inspections.
Bull is a European technology company that provides high-performance computing and cybersecurity solutions. It helps customers innovate with new technologies, optimize their infrastructure through outsourcing and cloud services, integrate critical business applications, and guarantee trust through cybersecurity products and services. Bull has a presence in over 50 countries and expertise in key verticals such as public sector, telecom, finance, energy, defense, and transportation.
5 IT Trends That Reduce Cost And Improve Web Performance - A Forrester and Go...Compuware APM
Virtualization, Cloud Computing and Outsourcing promise significant cost savings and enhanced business agility. Implemented correctly these initiatives can cut hardware and software costs, improve web application performance and quality, and positively impact business results. Learn how these 5 key business and technology trends are enabling companies to reduce costs AND ensure web application performance:
1. Virtualization
2. Outsourced Hosting & Management of Applications
3. Cloud Computing
4. Real-user Monitoring
5. ‘SaaS’ification of IT Management Software
This document summarizes the WebWay International company and its digital alarm signalling solutions. It discusses how migrating from analogue to digital signalling can reduce costs, enhance security, and improve operational efficiency by (1) reducing communications costs; (2) reducing business disruption; (3) improving security; and (4) improving reliability. Standards compliance is emphasized as a way to mitigate risks when specifying digital alarm systems.
Tata Tele Services, having devised measurable strategy and short/mid-& long-term oriented execution strategy to roll out the Integrated Marketing Management solution. Analytics as an area has started to fuse into the Operations and in process of building "Data Based Decision Support" across various functions of the Organization. Importantly how Analytics has gotten interspersed with the Enterprise's Strategic and Operational activities.
Automotive embedded systems now include numerous software-intensive functions that are critical from a safety point of view (e.g., braking, assisted driving, etc). These functions are distributed on the Electronic Control Units and they need to exchange large amount of data with real-time constraints. In this context, the communication system plays a major role and it has to respect stringent dependability constraints. Security, especially with the widespread of wireless networks, is now becoming a serious matter of concern too. In this talk, we will review the main threats to dependability and security in automotive communication systems, the existing technical solutions to attain them, and, highlight areas where developments might be needed.
The document discusses system choice and provides an overview of its principles and techniques. It explains that system choice aims to define the system context and agree on overall system characteristics through a system definition. Key activities include appreciating the situation using rich pictures, cultivating new ideas through exemplars and metaphors, and defining alternative systems. The result is a system definition that fulfills the FACTOR criteria of functionality, application domain, conditions, technology, objects, and responsibility.
This document summarizes a study that evaluated the performance of a proposed wireless computer network for an integrated manufacturing and management system.
The study proposed a wireless network architecture based on TCP/IP and LonWorks protocols to connect different departments within a household appliance manufacturer. The network was modeled as a set of closed routes consisting of users, servers, routers, and communication links.
To evaluate network performance, a method developed for packet switching networks was adapted. This involved modeling the network as queues, calculating metrics like waiting time, service time and thinking time for sample routes, and validating the approximations using simulation and measurements on an existing network. The goal was to provide a feasible performance evaluation approach for the prospective computer-integrated manufacturing system
This presentation was created as part of a team project for Designing a New Learning Environment, MOOC offered by Stanford University, Fall 2012. Team members who contributed to this presentation are Kimberly Hayworth, Cathleen Galas, Laura Gibbs, Susan Lieberman, Donna Murdoch.
1) The document discusses different techniques for combining unrelated ideas to boost creativity, such as making remote associations between different concepts or combining concepts imaginatively.
2) It describes an experiment where subjects were more creative writing stories using unrelated words versus related words, showing that fusing unrelated ideas leads to greater creativity.
3) Techniques for fusing ideas discussed include making remote associations, combining concepts, working on different projects simultaneously, making analogies between different objects or concepts, mimicking nature, and gaining new perspectives by interacting with others.
The document discusses how B2B marketing is changing and becoming more inbound focused. It notes that today's buyers will find companies on their own when they are ready to purchase. The buyer journey is non-linear and influenced early on by awareness building content. The challenges for companies are to have relevant content to be part of conversations with buyers and influence how buyers define their needs. Content marketing is presented as a solution, but companies need a content strategy and to repurpose existing materials from subject matter experts. Measurement of content effectiveness and distribution channels is also important. An example case study is provided of a company that successfully grew its audience and leads through a video-based content marketing experiment.
El documento ofrece consejos para mantener la buena salud en el trabajo, recomendando tomar descansos reales para comer y relajarse, mantener un espacio de trabajo limpio, hacer ejercicio regularmente, evitar la comida chatarra, beber agua, y cuidar la salud mental mediante el sueño adecuado y el tiempo libre.
La huella ecológica mide la superficie de tierra y agua necesarias para producir los recursos que consume una población y absorber sus residuos. Se calcula comparando el consumo de una comunidad con la productividad de diferentes tipos de tierra. Un déficit ecológico indica que el consumo supera los recursos disponibles localmente. El cálculo de la huella ecológica puede ayudar a visualizar la dependencia ecológica, la inequidad social y monitorear el uso de recursos para informar políticas de sostenibil
Molly Smith Thompson House, Goldsboro
Renovation/design plans by Meredith College students Sandra Moncada, Donna Ryzinski, and Melissa Wright-Cheek.
Presented May 6, 2010.
Designing experiences, not just featuresAmir Khella
The document describes the author's frustrating experience with a rental car that had a keyless ignition system. Although it was a nice new feature, it created an unexpected experience for the author since it did not operate like typical car locks. It took trial and error to understand that the car would not lock when the key was nearby. The author argues that new features need clear instructions or cues to help users transition from existing mental models. Designers should test on a variety of users and make experiences intuitive rather than requiring users to feel they are at fault for not understanding poorly designed interactions.
This document summarizes a webinar about implementing social features in SharePoint 2013 intranets. It outlines the social components that can be included like personal and team sites, groups, microblogging, check-ins, and more. It also discusses analytics and metrics for measuring social adoption and ROI. The webinar provides examples of implementing these social features and discusses plans for developing social intranets as well as future directions like Web 3.0. Attendees can contact the presenters for more information on social intranet consulting services.
Universidad nacional del centro del perúLesly Aguilar
Este documento describe los principales transportadores de glucosa en los seres vivos: GLUT1, GLUT2, GLUT3, GLUT4 y SGLUT1. Explica brevemente la función de cada transportador y en qué tejidos se encuentran. También analiza la importancia de las rutas catabólicas del piruvato y los mecanismos de regulación de la glucólisis.
Board game night at a small university library has grown in popularity and provides several benefits. It draws visitors to campus which is appreciated by administration. It offers students an intellectual alternative to typical sports and arts opportunities and helps library staff build relationships with students. The event provides a non-threatening way for students who avoid the library to engage with it.
Dropbox: The Perfect Home for Your StuffsMafel Gorne
We don’t know when our computer or phones will get busted so backing up our files is a wise decision and I am glad to discover Dropbox.
Dropbox has the capability to save all your photos, documents, videos, and files. You can see all the stuffs you saved in Dropbox on all your devices such as computer, phones, Tablets, and even in the Dropbox website so you can access your stuff all the time wherever you are. Dropbox makes sure that if you edit the file on your computer the file will be updated automatically on all the devices.
SharePoint 2013 - Why, How and What? - Session #SPCon13Roland Driesen
SharePoint 2013 offers even better equipment than SharePoint 2010 did and has good reviews, a very positive vibe, and an appealing look and feel. But, how do you implement and use this great technology? Or, being cynical: WHY even bother? This session is about rephrasing your thoughts on Collaboration and/or Enterprise Social. Based on the concept of “Start with WHY” Roland will show you the real benefits to leverage the technology adoption lifecycle across your organization (innovators > early adopters > early majority > late majority) and why not to focus on the laggards. With the four stages model of user adoption Roland will give you practical advice on HOW to support this process including the Getting Things Done method with SharePoint to also appeal to the "not-so-social-media-savvy". The WHAT of SharePoint will be presented by co-presenters during the two days. This session is a summary of the 3G implementation methodology; a blend of great thinkers (Carl Gustav Jung, Simon Sinek, Michael Sampson, David Allen) and proven methods (Getting Things Done, Insights Discovery) combined with great technology (SharePoint 2013) to successfully motivate at least 84% of any population in the real usage of your SharePoint platform.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document discusses the history and technology of smartwatches. It describes how the concept originated from Dick Tracy's wrist communicator watch in comic strips from the 1940s. Early smartwatch models were introduced in 2004 but discontinued by 2008. Modern smartwatches function as portable media players and some can make phone calls. They provide notifications and access to news, weather, messages and more from a paired smartphone. The document examines different smartwatch brands and models, their features, battery life, prices and the top companies in 2013.
This document discusses how brands can use social media for marketing and customer relationship management. It notes that social media allows for two-way interaction between brands and customers. The document then provides statistics on the growth and usage of various social media platforms like Twitter, YouTube, Facebook, LinkedIn and MySpace. It discusses how social media platforms continuously evolve based on user demands. The document advocates that brands can benefit from social media by empowering customers to spread positive experiences about brands to large networks, which can significantly help sales and brand perception.
Loyola University is a private university located in Chicago, Illinois. Founded in 1870 by the Jesuits, it has an enrollment of over 16,000 students and offers undergraduate and graduate degree programs. Loyola is composed of several undergraduate and graduate schools and colleges, including a law school and medical school.
Impacto de las tic en los destinos turisticos. Destinos turísticos inteligentesPedro Anton
Impacto de la TIC en un Destino Turístico.
Evento: Presentación del Plan estratégico de Turismo de la Mancomunidad de Vigo
Fecha: 11 de Enero de 2011
Lugar: Vigo
The document provides an overview of the Telecommunications and Network Security domain, covering security countermeasures and controls for different layers of the OSI model including physical, data-link, network, transport, and application layers. It also discusses VPNs, NAS, and technical implementations of countermeasures like routers, switches, firewalls, and intrusion detection/prevention systems. The learning objectives focus on understanding communications and network security as it relates to data transmission in local and wide area networks.
Tech Ed 09 - Arc302 - Analysis and Architecturemhessinger
The document discusses the disconnect that often exists between architects and business analysts in defining system requirements. It argues that architects need to get more involved in the requirements process to help ensure all necessary requirements are considered. Closer collaboration between architects and analysts can yield benefits like reduced complexity, increased usability, and quicker time to market. The document provides examples of how architects can influence requirements and considerations if they do not increase their role in defining system needs.
The document is a functional organizational chart for the Division of Information Systems at a university from July 2004. It shows the Chief Information Officer at the top overseeing various departments, including Information Security, Administrative Services, Project Management, Software Compliance, Operation/Network/System Service, and others related to providing information systems support across the university.
Setting up a secure development life cycle with OWASP - seba deleersnyderSebastien Deleersnyder
Using the OWASP Software Assurance Maturity Model (OpenSAMM) as a framework, this talk covers the major application security controls of a secure development lifecycle program as provided by OWASP. Featured OWASP open source material include: OWASP guidelines and tools such as ESAPI, ZAProxy, as well as educational resources.
It is crucial for businesses to audit their software test processes. This enables management to understand / evaluate if they are being adhered to. In cases where process deviation was accepted, it helps one to evaluate how the risks and impacts were measured and communicated. An audit will uncover what triggers major problems and early warning indicators are set in place to reduce risk.
Mindtree quality and test consulting addresses these issues by providing optimum solutions to help businesses audit their software test process.
International approaches to critical information infrastructure protection ...owaspindia
This document discusses international cooperation on critical infrastructure protection (CIP) and trustworthy information and communications technology (ICT). It describes the BIC project, which aims to identify challenges to EU and global trust and security, and facilitate collaboration between organizations. Key issues discussed include monitoring critical infrastructure ecosystems, detection of anomalies, secure notification systems, metrics for quantifying protection, and response strategies. International cooperation is needed for technologies, threat information sharing, and data management standards regarding acquisition, dissemination, storage, and access.
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish PresentationWon Ju Jub
The document provides information about Surachai Chatchalermpun's qualifications and an upcoming presentation on secure software development. It includes:
1) Surachai Chatchalermpun's credentials which include a Master's Degree in Management Information Systems and certifications as a Certified Secure Software Lifecycle Professional (CSSLP) and EC-Council Certified Security Analyst (ECSA).
2) An agenda for the presentation that will discuss challenges in application security today, provide an overview of the CSSLP and Open Web Application Security Project (OWASP), demonstrate the WebGoat security training tool, and include a WebGoat lesson.
3) A brief speaker profile for Surachai Ch
PRONET is an IT strategic partner established in 1992 based in Athens and Sofia that provides turnkey solutions for networks, security, backup, storage, and virtualization. It focuses on centralizing, virtualizing and protecting its clients' systems through solutions that monitor systems, provide security, support customers, and document systems. It assists clients with architecture, infrastructure, security assessments, and consultancy. PRONET also offers managed security, backup, and patch management services.
1. The document discusses software quality and reliability in engineering. It defines quality as software being bug-free, on time, meeting requirements, and maintainable. Reliability is the probability of failure-free operation over time in a given environment.
2. Ensuring quality involves preventing and detecting faults during all phases of the software development life cycle from requirements to testing. The V-model helps achieve quality by involving testers early on.
3. Reliability focuses on avoiding faults during design and detecting problems during all phases through techniques like fault tolerance, forecasting, and measuring metrics like MTBF.
Security Patterns How To Make Security Arch Easy To ConsumeJeff Johnson
A challenge security professionals often face is ensuring security is aligned with the business strategy. Enterprise Security Architecture can solve that problem, but to do so you need a way to make it easy for the rest of IT to follow the security architecture. Security Patterns is one solution to that problem.
Service Oriented Approach to Application Modernization sept 2010davemayo
This document discusses service-oriented application modernization. It begins by introducing Everware-CBDI and their expertise in SOA. It then lists the topics that will be covered, including how application complexity has increased due to factors like new code and technological advances. The document explains that approaches like modeling, structured programming, object-oriented programming, and components were introduced to help manage complexity but that SOA provides additional benefits by abstracting and loosely coupling applications. It defines SOA and lists some of its key benefits for businesses and IT.
Techserv Consulting provides IT governance services including audits, implementation of standards, and consulting. Their portfolio includes assurance services like audits and outsourcing assurance, as well implementation of standards like ISO, COBIT, and CMMI. They also offer consulting services regarding documentation, project and governance metrics, and establishing governance policies, processes, and measurements. The goal is to help clients strengthen systems integrity across domains like IT security, project management, and software engineering.
Tech Alliance provides five cybersecurity services: 1) Enterprise Security Program Design and Implementation to assess risks, identify gaps, and create a security roadmap; 2) IT Risk Assessment to identify threats, vulnerabilities, impacts, and recommend controls; 3) Disaster Recovery Planning and Implementation to design technology solutions and processes to ensure business continuity; 4) Vulnerability Assessment and Penetration Testing to identify and prioritize vulnerabilities and validate fixes; 5) a Security Operations Center for 24/7 security monitoring, event correlation, and reporting.
Tech Alliance provides five cybersecurity services: 1) Enterprise Security Program Design and Implementation to assess risks, identify gaps, and create a security roadmap; 2) IT Risk Assessment to identify threats, vulnerabilities, impacts, and recommend controls; 3) Disaster Recovery Planning and Implementation to design technology solutions and processes to ensure business continuity; 4) Vulnerability Assessment and Penetration Testing to identify vulnerabilities and validate fixes; 5) a Security Operations Center for 24/7 monitoring of networks, systems, and security devices.
Enabling predictive analysis in service oriented BPM solutions.Mindtree Ltd.
Complex Event Processing (CEP) is a real time event analysis, correlation and processing mechanism that fits in seamlessly with service oriented Business Process Management (BPM) solutions. Conceived in the early 1990s by Dr. David Luckham of Stanford University, CEP uses technology to predict high-level events likely to result from specific sets of low-level factors.
1. The document discusses Business Activity Monitoring (BAM) as part of Oracle's SOA Suite. It describes BAM concepts and components, including Complex Event Processing (CEP).
2. BAM allows real-time monitoring of business processes and key performance indicators using an Active Data Cache to store and update data objects. Reports can be defined and updated in real-time against these objects.
3. BAM uses CEP to correlate independent events, identify threats and opportunities, and provide context around historical performance and trends. Dashboards are used to deliver real-time information to business users through various interfaces.
Cyber security in real-time systems is an evolving area with several obstacles and open issues still remaining. [1] Adoption of cloud computing lessons is limited and implementation experiences are narrow, while security and risk management methods are still immature. [2] Best practices are emerging but gaps exist, and the views of regulators and auditors on legal and regulatory issues are still unclear. [3] Overcoming these challenges will require further work to develop robust and accepted security policies, access control, encryption, and flexibility in contractual agreements.
This document discusses Extol Corp, an information and communications technology security solutions provider in Malaysia. It provides details on Extol's 25 years in business, growth from general IT trading to a leading security provider, and research and development successes creating antivirus and authentication software. The document also outlines Extol's human capital and certifications, as well as selected security products. It then provides snapshots of the information security landscape, including policies, threats, and trends, before discussing general trends in attacks becoming cheaper and more proactive while defenses become more expensive and reactive. Potential research areas are outlined around developing a comprehensive artificial intelligence framework and optimizing individual AI APIs.
Thoughts on Utility, Grid, on demand, cloud computing and appliancesMark Cathcart
The document discusses the evolution of grid computing, cloud computing, and on-demand computing. It describes IBM's plans to launch "Blue Cloud", a family of cloud computing offerings based on open standards. Blue Cloud will provide a massively scalable compute platform for hosting data-intensive workloads. It will deliver an on-demand infrastructure and SOA environment to reduce IT costs and complexity while increasing business responsiveness.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Full-RAG: A modern architecture for hyper-personalization
Presentation for CISIS 2012
1. A Security Pattern-Driven Approach Toward the
Automation of Risk Treatment in Business
Processes
MSc. Ángel Jesús Varela Vaca
Higher Technical School of Computer Engineering -
Department of Computer Languages and Systems - Quivir Research Group
University of Seville
contact: ajvarela@us.es
2. Outline
Context
OPBUS: Automatic Risk Assessment in BPs
Security Patterns, theory and models
Case of study
OPBUS: A prototype
Ongoing work
3. Context Sequence
(Work flow)
Participants
External
Activites (Task) Services
Messages
(Data flow)
What about risks?
Q
Events Artifacts (Data
(Work Flow) Store/Annotation) What about security?
What about implementation?
Main Challenges:
• Business goals (time, cost, resources) Business Process Models
• Could we ensure that BP models are conformed to specific risk
level?? Risk assessment
* M. Menzel, I. Thomas, and C. Meinel, “Security requirements specification in service-oriented business process
management,” International Conference on Availability, Reliability and Security vol. 0, pp. 41–48, 2009.
* C. Wolter, M. Menzel, A. Schaad, P. Miseldine, and C. Meinel, “Model-driven business process security requirement
specification,” Journal of Systems Architecture – Embedded Systems Design, vol. 55, no. 4, pp. 211–223, 2009.
4. Context
BPi
Activity Channel of
Customers/ Start communication
BPMS
Users
Main challenges:
1. How to “describe” the countermeasures in Security Countermeasure:
Secure pipe
business processes? Fault Tolerance
Access control
2. Countermeasures are very heterogeneous.
3. Countermeasures are described in natural
language and informal way.
Application Web DataBase Legacy
4. The selection of countermeasures is carried Web Server
Server Service System
out in manual way without criteria.
Business/Logical
Confidentiality Integrity Availability
Security Goals
Domain
Regulations/
Standards Security Patterns
Secure Protocol
Models !!!
Technnical /
Standards
Network Layer Application Layer Transport Layer
Application/ Infrastructure
Domain
IPSec
S-HTTP HTTPS (SSL/TLS)
Configuration/
Code
require
OpenSSL Apache (mod_ssl) JSSE GnuTLS
5. OPBUS – Automatic Risk Assessment in BPS
Main challenges:
1. What is a security risk?! Security risks are related to threats and
vulnerabilities
• Technical risks (SQL Injections, XSS, DoS, Protocols, …)
• No-design failures/changes of business processes (live locks, dead
locks, …)
2. How to assess BP models ?! Activities Data WebForms
3. How to figure out where/why fail to conform risk levels?!
4. How to adapt solutions to the assessment carried out ?!
6. OPBUS – Automatic Risk Assessment in BPS
• Provide a light-extension for generic BP models
• Provide a DSL for risk assessment of BPs
• New artifact
• New properties
I: [3,5]
C: [5,5]
A: [1,6] Frequency: [1,6]
Threats: {R1,R3,R6} Consequence: [2,3]
Vulnerability: V1 Frequency: [3,6]
Consequence: [1,5]
Risk= Value * Frequency * Consequence A1
Vulnerability: V2
RiskBP = RiskA1 + RiskA2 G1 G2 Threat Scenario
BPi
S1 E1
R3 R2
A2 R6
R1 R4 R5
I: [3,5] Threats
C: [5,5]
A: [1,6]
Threats: {R1,R3,R6} T1 T2
Treatments
Extension Meta-Model Business Meta-Model Business Process Meta-Model
Risk Reduction: [10,20]%
Acceptable Risk Reduction: [10,30]% Cost: 10.000
Integrity Risk Cost: 1000
Confidentiality Asset Value
1 Process Model Model Element Property
Availability Cost
Risk Meta-Model
1
Pre 1..*
Objective Message Flow
Frenquency
1
Post 1
Pool
1..*
Connector
Sequence
In general, risk assessment methods use:
- Asset: Low or 1 SINGLE VALUE
1 Flow
Consequence
1..* Vulnerability 1
1..*
1..*
Threat
1..* Threat
Countermeasure
1..*
1..*
Treatment
1..* Scenario 1..*
Activity
1..*
Events
1..*
Gateway
1..* 1..*
Artefact
1..*
OPBUS approach is more accurate:
- Asset: [1,5] RANGE
1
Risk Scenario
Reduction
8. OPBUS – IDE for BP risk assessment
• Eclipse Plug-in
• BPMN Modeller with support
for the risk extension
• Transform. to Const. Prog.
• Visual – Diagnosis of BPs
10. OPBUS – Security Patterns, theory and models
Christopher Alexander in 1977: “A pattern describes a problem which
occurs over and over again our environment, and then describes the core
of the solution to that pattern“
• We found an standard/template representation !!!
• Still being very textual and natural Let’s model security patterns
11. Security Patterns, theory and models
Example of an extended security pattern template:
Label to describe security
intentions to implement
Indicates the security goals
to fulfill
Indicates el type of risk
treatment
Describes the attributes
concerning to the context
Describe the constraints
that exist in the business
process that affect the
problem
12. Security Patterns, theory and models
• Ontological represention of concepts
• Extending security pattern info.
13. Security Patterns, theory and models
Customizable models
ISO 27000-series
UML QoS
and FT
Common
Weakness
Enumeration
(CWE)
15. Case of study Catalogue Security Patterns
Example Scenario (BPMS –
Web Services – Web Forms)
16. Case of study
Forces
Context
AI techniques
for optimized
searchs
Objective
function
Process of selection based
on attributes and constraint
of security patterns
19. Ongoing works
Generation and selection of the best configuration from security patterns
1. Analyze features of typical
BPi
Customers/ BPMS
Start
Activity
SSL/TLS
countermeasures in order to achieve
Users
security goals of
Confidentiality info. Encryption/Decryption info. confidentiality, availability, integrity
Authentication Digital Signatures
Information Integrity Message Authentication Code
, authorization and authentication
(Done)
Web Server Application Web DataBase Legacy
Server Service System
Apache (SSL/TLS)
SecurityLevel = {High}
Algorithm CipherSuite ClientAuth Port KeyStore Trust Protocol
SecurityLevel = {High}
Attributes/Extra-
true want false Type Pass File File Pass Type SSLv2.0 TLSv1.X SSLv3
func.
Cross-Relations
Optional
SecurityLevel = {Medium}
JKS PKCS12 PKCS11 JKS PKCS12 PKCS11
Mandatory
Alternative exclude
Or-alternative require
20. Ongoing works
Selection of the best configuration from security patterns:
2. Define a catalogue of security patterns by means of feature models (Done)
3. Apply feature-oriented model analysis in order to obtain configurations based on
objectives functions (Done)
4. Integrate the generation of configuration through feature model analysis in
OPBUS plugin (In progress)
Risk Treatment Catalogue
Security
Countermeasures
Security 1.
Security Pattern 3 Problem
Config.
Context
Pattern 1 Security Force
Problem Pattern 5
Problem Security Context
Context Pattern 2 Force Security Feature
Problem
Pattern 4
Force
Context
analyser 2. Problem
Problem Force Config.
Solution Context
Problem
Force Force
Context
Force
Feature
model
Feature
Feature Feature
model
model model
21. Thank you
MSc. Ángel Jesús Varela Vaca
Higher Technical School of Computer Engineering -
Department of Computer Languages and Systems - Quivir Research Group
University of Seville
contact: ajvarela@us.es