CS 5523 Operating Systems: Intro to Distributed Systems

Size: px
Start display at page:

Download "CS 5523 Operating Systems: Intro to Distributed Systems"

Transcription

1 CS 5523 Operating Systems: Intro to Distributed Systems Instructor: Dr. Tongping Liu Thank Dr. Dakai Zhu, Dr. Palden Lama for providing their slides. Outline Different Distributed Systems Ø Distributed computing systems Ø Distributed information systems Ø Distributed pervasive systems OS in distributed systems Ø Distributed OS vs. Network OS vs. Middleware Design objectives of distributed systems Ø Transparency, openness and scalability Architecture of distributed systems Ø Software vs. system architectures 2 Computer System Revolution Computers" " "large/expensive à small/cheap" Networks: " "LAN à WAN " " "bps à Kbps à Gbps" Now, it is easy to put together many computers. Why? " Ø Solve problems" Ø Share resources" Ø Increase collaboration" Centralized systems à Distributed systems! What are Distributed Systems? ISP intranet desktop computer: server: network link: satellite link backbone A collection of networked independent computers that appears to its users as a single coherent system 4 1

2 Different Types of Distributed Systems Distributed Computing Systems: Ø Cluster computing: similar components Ø Grid computing / Cloud computing: different components Distributed Information Systems Ø Web servers Ø Distributed database applications Distributed Pervasive Systems: instable Ø Smart home systems Ø Electronic health systems: monitor Ø Sensor networks: surveillance systems Cluster Computing Systems (Supercomputer) High-performance computing Ø a group of high-end systems connected through a LAN Ø Homogeneous: same OS, near-identical hardware Ø Single managing node 5 6 Grid Computing Systems Lots of nodes from everywhere share resources and collaborate" Ø Heterogeneous! Ø Dispersed across several organizations" Ø Can easily span a wide-area network" To allow for collaborations, grids generally use virtual organizations. " Ø Same organization: a grouping of users (or better: their IDs) have the same access rights" Ø The key questions are " ü Authorize users from different administrative domains" ü Provide authorized users with the access to specific resources " Grid Computing Systems (cont.) Application: " Ø Use the grid computing environment" Collective layer: " Ø Handles access to multiple resources (resource discovery, allocation and scheduling, data replication)" Connectivity layer: " Ø Communication protocols " (transfer data across resources, access a remote resource, security) "" Resource layer: " Ø Manage a single resource " (create a process, access control)" Fabric layer: " Ø Interface to local resources (query, locking)" 7 8 2

3 Cloud Computing Systems Cloud computing has become another buzzword after Web 2.0. " We won t compute on local computers, but on centralized facilities operated by third-party compute and storage utilities "" There are dozens of different definitions for cloud computing and there seems to be no consensus on what a cloud is. Here is one definition:!! A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically-scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet. " Cloud computing is not a completely new concept; it has intricate connection to the relatively new but thirteen-year established grid computing paradigm, and other relevant technologies such as utility computing, cluster computing, and distributed systems in general. " DIS: Distributed Information Systems Organizations have legacy networked applications, but it is hard to make them interoperate " Middleware can help " Integration can take place at several levels" Ø Client-servers wrap a number of requests into one and have it executed as a Distributed Transaction (all or none of requests would be executed)" Ø Applications can be detached from their databases and may need to directly communicate with each other" I. Foster, Cloud Computing and Grid Computing 360-Degree Compared, Grid Computing Environments Workshop, GCE '08 9 DIS: Transaction Processing Systems Database applications, transactions properties (ACID) " Atomic: A transaction happens indivisibly; " Ø All operations either succeed, or all of them fail; " Consistent: Don t violate system invariants " Ø Internal transfer: total money should be the same" Ø Intermediate states may violate if not visible outside" Isolated (serializable): Concurrent transactions do not interfere with each other" Durable: Once a transaction commits, the changes are permanent " DIS: Distributed Database Transactions n Transaction Processing Monitor: coordinate the execution of a transaction (subtransactions) when data is distributed across servers middleware 3

4 DIS: Enterprise Information Systems Inter-application Communication" Ø RPC (Remote Procedure Calls) or" RMI (Remote Method Invocations)" ü both applications must be up and running" ü know exactly how to refer to each other" Ø Message-Oriented Middleware (MOM)" ü send data to a logical contact" ü publish/subscribe" Stability: nodes are fixed and have high-quality connection to the system 13 DPS: Distributed Pervasive Systems DCS and DIS: stable distributed systems (fixed nodes good connections)" Unstable with mobile and embedded devices " Distributed Pervasive Systems:" Ø Computing anywhere and anytime! Ø Contextual change: environment changes should be immediately react." Ø Ad hoc composition: Each node may be used in a very different ways by different users. Requires ease-of-configuration." Ø Sharing is the default: Nodes come and go, providing sharable services and information. Calls again for simplicity." Expose distribution instead of hiding it! 14 DPS: Electronic Health Care Systems DPS: Sensor Networks Devices are physically close to a person Ø Where and how should monitored data be stored? Ø How can we prevent loss of crucial data? Ø How can security be enforced? Ø How can physicians provide online feedback? The nodes to which sensors are attached are: n Many (10s-1000s) n Simple (small memory/compute/communication capacity) n Often battery-powered (or even battery-less) 4

5 Distributed Systems: Definition A distributed system (DS) is a piece of software that ensures that " a collection of independent computers, communicate through network by passing messages! And appears to its users as a single coherent system" " " But HOW can we" Ø hide the differences between independent computers &" Ø provide a single system view?" " OS Structures in Distributed Systems Distributed Operating Systems: OS essentially tries to maintain a single, global view of the resources it manages (Tightly-coupled OS). Network Operating Systems: Collection of independent OSes augmented by network services (Loosely-coupled OS) Middleware: Provide a level of transparency between applications and local OSes 18 Distributed Operating Systems Full transparency: users feel a big system and are not aware of multiple different machines Access to remote services similar to local resources Distributed Operating Systems (Cont.) Each node has its own kernel for managing local resources (memory, local CPU, disk, ) Common software layer implements OS and supports parallel and concurrent execution of various tasks. Possible complete software implementation of shared memory (distributed shared memory) Additional facilities: task assignments, handle hardware failures, transparent storage, inter-process communication, data/computation/ process migration

6 Network Operating Systems (NOS) NO single view of the distributed system Users are aware of the multiplicity of the machines Applications use NOS services to access resources Network Operating Systems (Cont.) NOS provide facilities to allow users to make use of services in other machines Ø Remote login (telnet, rlogin) Ø File transfer (ftp) The only communication is message passing Users need to explicitly log into remote machines, or copy files from one machine to another. Need multiple passwords, multiple access permissions. In contrast, adding or removing a machine is relatively simple Middleware-Based Systems Middleware: a higher level of abstraction on top of network operating systems for efficient transparency Middleware-Based Systems (cont.) Each local system is a part of underlying NOS Target of middleware : Ø Resolve the integration problems of various networked applications Examples: Remote Procedure Calls (RPC), Remote Method Invocations (RMI), Distributed File Systems, Distributed Object Systems

7 Design Objectives of Distributed Systems Goal of distributed systems Ø Make resources (hardware/software) available Ø Make it easy for users to access remote resources Ø Share resources in a controlled and efficient way Distribution transparency: hiding distribution Openness Scalability Distribution Transparency Access Location Migration Relocation Replication Hides differences in data representation and invocation mechanisms Hides where a resource resides Hides that a resource may move Hides that a resource may be moved while in use Hides that a resource is replicated Concurrency Hides that other users may access the same resource Failure Hides failure and possible recovery of resources Degree of Transparency Openness of Distributed Systems Full transparency will can be costly Expose distribution of the system Ø Mobile phone is moving around. We may need location and text awareness Completely hiding failures of networks and nodes is (theoretically and practically) impossible Ø You cannot distinguish a slow computer from a failing one Ø You can never be sure that a server actually performed an operation before a crash Users may be located in different continents à distribution is apparent and not something you want to hide Observation: Aiming at full distribution transparency may be too much Offer services according to standard rules that describe the syntax and semantics of those services" How to achieve openness" Ø Well-defined interfaces (often described using IDL)" ü Easy to define syntax. But semantics are hard thus it is defined in a natural language" Ø portability!! ü The same implementation should work on different machines" Ø Easily interoperate! ü Two different implementations should work together" Distributed system should be independent from heterogeneity of the underlying environment Hardware, Software Platforms, and Languages "

8 Scalability in Distributed Systems Three aspects of scalability Ø size: number of users and/or processes Ø geographical: Maximum distance between nodes Ø administrative : Number of administrative domains Most systems account only, to a certain extent, for size scalability: powerful servers (supercomputer) Challenge nowadays: geographical and administrative scalability Problems with Size Scalability n What happens when more users/resources added? n Limitations of centralized systems l Service (e.g., single server) overloaded servers l Data (e.g., single phone book) saturated communication links l Algorithm (e.g., routing based on global info) too much traffic n Use distributed service, database, and algorithm l No machine has complete info l Make decision based on local info l Failure of one node does affect others l No global clock 29 Problems with Geographical Scalability Suppose we have an interactive application working on a LAN, can we use it over a WAN?" Delay " Ø Blocking read/write might be OK on LAN but not on WAN" Reliability" Ø Longer the distance, higher the chance of loosing messages" Bandwidth " n Locating a service by broadcasting is OK on LAN (e.g., ARP) but not on WAN " Problems with Administrative Scalability n In a single domain: l We can try to optimize resource usage because each entity belongs to the same domain and can be trusted n In case of multiple and independent administrative domains: l We do not own all resources and cannot trust others l Several problems! Conflicting policies (who uses what and pays how much)! Management! Security (access rights and trust management) 8

9 Techniques for Scalability Hiding communication latency: (Geographical)" Ø Use asynchronous communication: " ü +: separate handler for incoming response and do something while waiting." ü - what if there is nothing else to do " Distribution: splitting it to small parts" Ø Domain naming systems (DNS)" Ø Decentralized data, information systems (WWW)" Ø Decentralized algorithm (Distance Vector)" Replicate: " Ø Increase availability " Ø Load balance" Techniques for Scalability (cont d) Use Replication/caching that makes multiple copies of the same services or data available at different machines" Ø Mirrored Web sites" Ø Replicated file servers and databases" Ø Web caches (in browsers and proxies)" Ø File caching (at server and client)" Ø + increase availability" Ø + improve load balance and performance" Ø + hide communication latency" " Ø - Inconsistencies when one copy is modified " Ø - Global synchronization is need for keeping copies consistent but it precludes large-scale solutions" Ø - Tolerance to inconsistencies depends on application" Techniques for Scalability (cont d) All the techniques discussed so far deal with performance problems due to size and geographical scalability " How about administrative scalability?" Ø The most challenging one (why?)" Ø The problems are often non-technical (Politics!)" Developing Distributed Systems: Pitfalls Mistakes are often due to false assumptions:" Ø The same global time! Ø Perfect network/communication" ü Latency is zero"" ü Bandwidth is infinite" ü The network is reliable" ü The network is secure" ü The network is homogeneous" Ø The topology does not change" Ø There is one administrator! 9

10 Outline Software Architectures for DS Different Distributed Systems Ø Distributed computing systems Ø Distributed information systems Ø Distributed pervasive systems OS in distributed systems Ø Distributed OS vs. Network OS vs. Middleware Design objectives of distributed systems Ø Transparency, openness and scalability Architecture of distributed systems Ø Software vs. system architectures Logical organization of different components; Ø How to divide to different components Ø How to connect and communicate with each other Ø How to figure different elements into a system division of responsibilities of components; distribute them over multiple machines, and allow them to communicate through connectors Ø Component: a modular unit with well-defined required and provided interfaces," Ø Connector: a mechanism that mediates communication, coordination, and cooperation (e.g., RPC, msg passing) Software Architecture Style Layered style " Ø A component at higher layers can call components at a lower layer" Ø Widely adopted by the networking community" Ø Control goes down whereas the results flow upward" Object-based " Ø Components are connected through a procedure call" Ø Used for client-server systems" Two most important styles! Software Architecture Style Event-based(Publish/subscribe) " Ø Communicate through propagation of events" Ø Loosely coupled components" ü decoupled in space or referentially decoupled" processes do not refer to each other Data-centered: " Ø Communicate through a common repository (e.g., shared distributed file system) " Ø Can combine with event-based, yielding shared data spaces " ü processes are now decoupled in space and time" processes do not need to be active at the same time 10

11 System Architectures for DS Consider how and where to place software components and realize their interactions! About physical realization, placement of software components & interactions Ø Centralized: client-server Ø Decentralized: P2P (Structured vs. unstructured) Ø Hybrid: Combination of centralized and P2P Basic Client-Server Model Clients & servers may across different machines Clients follow request/reply model to use services +: efficient -: reliability. Can t detect whether a request is lost or a reply fail. Connection-oriented protocol: TCP/IP Application Layering (logical) How to draw a clear line between client end server?! User-interface layer" Traditional Two-Tiered Configurations How to place the three layers on client and server?! Processing layer: " Ø functions of an application, i.e. without specific data" Data layer: " Ø data that a client wants to manipulate" Observation: layering is found in many distributed information systems, using traditional database technology and accompanying applications. " "Thin client CS5523: " Operating System UTSA "Fat client" 44 11

12 Multitiered Architectures The server part could be distributed over multiple machines," Three-tiered: each layer on a separate machine" Vertical Distribution Servers and States: Stateful Servers Vertical Distribution: Ø Functions are logically and physically split across multiple machines. Ø Processes are not equal and Interactions are asymmetric: One acts as client while the other acts as server" Keeps track of the status of its clients Ø Record that a file has been opened, so that pre-fetching can be done Ø Knows which data a client has cached, and allows clients to keep local copies of shared data Decentralized Architectures: P2P Systems Decentralized Architectures: An Example P2P architectures are horizontal distribution:" Ø split up clients and servers into logically equivalent parts and let each part operate on its own share of data" Processes are equal and Interactions are symmetric" Ø Each acts as both client and server" Tremendous growth in the last couple of years" Star War Sharable! objects! Peer 1! Application! Peer 2! Application! Peer 3! Application! The Beatles Peer 4! An Example: BitTorrent Peers 5... N! Application! Roman Holiday 48 12

13 Decentralized Architectures: P2P Systems Key question:" Ø How to organize processes in an overlay network, where links are usually TCP channels" Three approaches to organize nodes into overlay networks through which data is routed" Ø Structured P2P: nodes are organized following a specific distributed data structure and deterministic algorithms" Ø Unstructured P2P: randomly selected neighbors" Ø Hybrid P2P: some nodes are appointed special functions in a well-organized fashion" Structured P2P Systems Distributed Hash Table (DHT) is the most used one" Ø Assume we have a large ID space Ω (e.g., 128-bit)" Ø Assign random keys to data items (from Ω)" Ø Assign random number to nodes (from Ω)" Ø The key of DHT: implement an efficient and deterministic scheme that maps the key of a data item to node ID" Ø When looking up a data item, the system should route the request to the associated node and return the network address of that node" Example: Chord" 49 A DHT Example: Chord Data item with key k is mapped to a node with the smallest ID >= k." This node is called as the successor of key k and denoted by succ(k)! Unstructured P2P Architectures Basic principle: Each node maintains a random list of neighbors: Ø Each peer maintain a partial view of the network, consisting of c other nodes Ø Each node P periodically selects a node Q from its partial view: P and Q exchange information and exchange members from their respective partial views Ø Robustness of the network can be maintained depending on the random exchange LOOKUP(key=8)? This should return succ(8), which is node

14 Superpeers Collaborative Hybrid Structures: BitTorrent Combining a P2P with a client-server architecture Basic idea: a node identifies where to download a file from and joins a swarm of downloaders; who get file chunks in parallel from the source, and distribute these chunks among each other Peers maintain an index (for search) Peers monitor the state of the network Peers setup connections Tit-for-tat: A client can download only if he provides contents for others Summary Distributed Systems Ø Distributed computing systems Ø Distributed information systems Ø Distributed pervasive systems OS in distributed systems Ø Distributed OS vs. Network OS vs. Middleware Design objectives of distributed systems Ø Transparency, openness and scalability Architecture of distributed systems Ø Software vs. system architectures 55 14

CS 5523 Operating Systems: Synchronization in Distributed Systems

CS 5523 Operating Systems: Synchronization in Distributed Systems CS 5523 Operating Systems: Synchronization in Distributed Systems Instructor: Dr. Tongping Liu Thank Dr. Dakai Zhu and Dr. Palden Lama for providing their slides. Outline Physical clock/time in distributed

More information

CS 5523: Operating Systems

CS 5523: Operating Systems CS 5523: Operating Systems Instructor: Dr. Tongping Liu Final Reviews (Comprehensive) Final Exam: May 5, 2015, Tuesday 6:00pm 8:30pm CS5523: Operating Systems @ UTSA 1 Lecture06: Distributed Systems Distributed

More information

CS 5523: Operating Systems

CS 5523: Operating Systems Lecture1: OS Overview CS 5523: Operating Systems Instructor: Dr Tongping Liu Midterm Exam: Oct 2, 2017, Monday 7:20pm 8:45pm Operating System: what is it?! Evolution of Computer Systems and OS Concepts

More information

COMP 635: WIRELESS & MOBILE COMMUNICATIONS COURSE INTRODUCTION. Jasleen Kaur. Fall 2017

COMP 635: WIRELESS & MOBILE COMMUNICATIONS COURSE INTRODUCTION.   Jasleen Kaur. Fall 2017 COMP 635: WIRELESS & MOBILE COMMUNICATIONS COURSE INTRODUCTION http://wireless.web.unc.edu Jasleen Kaur Fall 2017 1 Introductions Names BS/MS, First-year Grad, Senior Grad? If you re new, where have you

More information

4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands

4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands 4th International Industrial Supercomputing Workshop Supercomputing for industry and SMEs in the Netherlands Dr. Peter Michielse Deputy Director 1 Agenda q Historical example: oil reservoir simulation

More information

Dependability in Distributed Systems

Dependability in Distributed Systems Dependability in Distributed Systems INF 5360 spring 2014 INF5360, Amir Taherkordi & Roman Vitenberg 1 Average Cost of Downtime Ø Revenue loss, productivity loss, reputation loss Ø Revenue loss + productivity

More information

Cloud Tutorial: AWS IoT. TA for class CSE 521S, Fall, Jan/18/2018 Haoran Li

Cloud Tutorial: AWS IoT. TA for class CSE 521S, Fall, Jan/18/2018 Haoran Li Cloud Tutorial: AWS IoT TA for class CSE 521S, Fall, Jan/18/2018 Haoran Li Pointers Ø Amazon IoT q http://docs.aws.amazon.com/iot/latest/developerguide/what-isaws-iot.html Ø Amazon EC2 q http://docs.aws.amazon.com/awsec2/latest/userguide/

More information

Servilla: Service Provisioning in Wireless Sensor Networks. Chenyang Lu

Servilla: Service Provisioning in Wireless Sensor Networks. Chenyang Lu Servilla: Provisioning in Wireless Sensor Networks Chenyang Lu Sensor Network Challenges Ø Device heterogeneity Ø Network dynamics q due to mobility and interference Ø Limited resources and energy Signal

More information

Last Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs

Last Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs Last Time u Embedded networks Ø Characteristics Ø Requirements Ø Simple embedded LANs Bit banged SPI I2C LIN Ethernet Today u CAN Bus Ø Intro Ø Low-level stuff Ø Frame types Ø Arbitration Ø Filtering Ø

More information

File Systems: Fundamentals

File Systems: Fundamentals File Systems: Fundamentals 1 Files What is a file? Ø A named collection of related information recorded on secondary storage (e.g., disks) File attributes Ø Name, type, location, size, protection, creator,

More information

Estonian National Electoral Committee. E-Voting System. General Overview

Estonian National Electoral Committee. E-Voting System. General Overview Estonian National Electoral Committee E-Voting System General Overview Tallinn 2005-2010 Annotation This paper gives an overview of the technical and organisational aspects of the Estonian e-voting system.

More information

ForeScout Extended Module for McAfee epolicy Orchestrator

ForeScout Extended Module for McAfee epolicy Orchestrator ForeScout Extended Module for McAfee epolicy Orchestrator Version 3.1 Table of Contents About McAfee epolicy Orchestrator (epo) Integration... 4 Use Cases... 4 Additional McAfee epo Documentation... 4

More information

Real-Time CORBA. Chenyang Lu CSE 520S

Real-Time CORBA. Chenyang Lu CSE 520S Real-Time CORBA Chenyang Lu CSE 520S CORBA Common Object Request Broker Architecture Ø CORBA specifications q OMG is the standards body q Over 800 companies q CORBA defines interfaces, not implementations

More information

CSE 520S Real-Time Systems

CSE 520S Real-Time Systems CSE 520S Real-Time Systems Prof. Chenyang Lu TAs: Haoran Li, Yehan Ma Real-Time Systems Ø Systems operating under timing constraints q Automobiles. q Airplanes. q Mars rovers. q Game console. q Factory

More information

M-Vote (Online Voting System)

M-Vote (Online Voting System) ISSN (online): 2456-0006 International Journal of Science Technology Management and Research Available online at: M-Vote (Online Voting System) Madhuri Mahajan Madhuri Wagh Prof. Puspendu Biswas Yogeshwari

More information

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia

General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia State Electoral Office of Estonia General Framework of Electronic Voting and Implementation thereof at National Elections in Estonia Document: IVXV-ÜK-1.0 Date: 20 June 2017 Tallinn 2017 Annotation This

More information

HPCG on Tianhe2. Yutong Lu 1,Chao Yang 2, Yunfei Du 1

HPCG on Tianhe2. Yutong Lu 1,Chao Yang 2, Yunfei Du 1 HPCG on 2 Yutong Lu 1,Chao Yang 2, Yunfei Du 1 1, Changsha, Hunan, China 2 Institute of Software, CAS, Beijing, China Outline r HPCG result overview on -2 r Key Optimization works Ø Hybrid HPCG:CPU+MIC

More information

Cyber-Physical Systems Scheduling

Cyber-Physical Systems Scheduling Cyber-Physical Systems Scheduling ICEN 553/453 Fall 2018 Prof. Dola Saha 1 Quick Recap 1. What characterizes the memory architecture of a system? 2. What are the issues with heaps in embedded/real-time

More information

CS 2461: Computer Architecture I

CS 2461: Computer Architecture I The von Neumann Model : Computer Architecture I Instructor: Prof. Bhagi Narahari Dept. of Computer Science Course URL: www.seas.gwu.edu/~bhagiweb/cs2461/ Memory MAR MDR Processing Unit Input ALU TEMP Output

More information

Case Study. MegaMatcher Accelerator

Case Study. MegaMatcher Accelerator MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,

More information

Final Review. Chenyang Lu. CSE 467S Embedded Compu5ng Systems

Final Review. Chenyang Lu. CSE 467S Embedded Compu5ng Systems Final Review Chenyang Lu CSE 467S Embedded Compu5ng Systems OS: Basic Func2ons Ø OS controls resources: q who gets the CPU; q when I/O takes place; q how much memory is allocated; q power management. Ø

More information

Adaptive QoS Control for Real-Time Systems

Adaptive QoS Control for Real-Time Systems Adaptive QoS Control for Real-Time Systems Chenyang Lu CSE 520S Challenges Ø Classical real-time scheduling theory relies on accurate knowledge about workload and platform. New challenges under uncertainties

More information

Uncovering the veil on Geneva s internet voting solution

Uncovering the veil on Geneva s internet voting solution Uncovering the veil on Geneva s internet voting solution The Swiss democratic semi-direct system enables citizens to vote on any law adopted by any authority (communal, cantonal or federal) and to propose

More information

Secure Electronic Voting

Secure Electronic Voting Secure Electronic Voting Dr. Costas Lambrinoudakis Lecturer Dept. of Information and Communication Systems Engineering University of the Aegean Greece & e-vote Project, Technical Director European Commission,

More information

SMS based Voting System

SMS based Voting System IJIRST International Journal for Innovative Research in Science & Technology Volume 4 Issue 11 April 2018 ISSN (online): 2349-6010 SMS based Voting System Dr. R. R. Mergu Associate Professor Ms. Nagmani

More information

Addressing the Challenges of e-voting Through Crypto Design

Addressing the Challenges of e-voting Through Crypto Design Addressing the Challenges of e-voting Through Crypto Design Thomas Zacharias University of Edinburgh 29 November 2017 Scotland s Democratic Future: Exploring Electronic Voting Scottish Government and University

More information

Statement on Security & Auditability

Statement on Security & Auditability Statement on Security & Auditability Introduction This document is designed to assist Hart customers by providing key facts and support in preparation for the upcoming November 2016 election cycle. It

More information

State Election Commission Maharashtra (EMP)

State Election Commission Maharashtra (EMP) State Election Commission Maharashtra (EMP) E lection Management Project was conceptualized to conduct local body and urban local body elections most Transparent, Fare and efficient manner. A common voter

More information

ADAMS ISP SERVICES AGREEMENT and NETWORK MANAGEMENT POLICY

ADAMS ISP SERVICES AGREEMENT and NETWORK MANAGEMENT POLICY ADAMS ISP SERVICES AGREEMENT and NETWORK MANAGEMENT POLICY Adams NetWorks, Inc. and Adams Telephone Co-Operative (Adams) has adopted this ISP Services Agreement and Network Management Policy to outline

More information

Voting Protocol. Bekir Arslan November 15, 2008

Voting Protocol. Bekir Arslan November 15, 2008 Voting Protocol Bekir Arslan November 15, 2008 1 Introduction Recently there have been many protocol proposals for electronic voting supporting verifiable receipts. Although these protocols have strong

More information

Netvote: A Blockchain Voting Protocol

Netvote: A Blockchain Voting Protocol Netvote: A Blockchain Voting Protocol Technical White Paper Jonathan Alexander Steven Landers Ben Howerton jalexander@netvote.io steven@netvote.io ben@netvote.io June 22, 2018 Version 1.12 Abstract This

More information

The Digital Appellate Court Introduction to the edca Electronic Portal

The Digital Appellate Court Introduction to the edca Electronic Portal The Digital Appellate Court Introduction to the edca Electronic Portal First District Court of Appeal - State of Florida Table of Contents Introduction... 2 External District Court of Appeal - edca...

More information

BRAIN GAIN INITIATIVE

BRAIN GAIN INITIATIVE United Nations Cultural Organization BRAIN GAIN INITIATIVE Linking African and Arab Region universities to global knowledge BRAIN GAIN INITIATIVE Linking African and Arab Region universities to global

More information

Management Overview. Introduction

Management Overview. Introduction Introduction Information is nothing without Control! Information under control? The electronic information explosion: Currently 1.5 billion document pages are created worldwide on a daily basis, this figure

More information

DevOps Course Content

DevOps Course Content INTRODUCTION TO DEVOPS DevOps Course Content Ø What is DevOps? Ø History of DevOps Ø Different Teams Involved Ø DevOps definitions Ø DevOps and Software Development Life Cycle o Waterfall Model o Agile

More information

UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA CIVIL MINUTES GENERAL

UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA CIVIL MINUTES GENERAL Present: The Honorable Andrea Keifer Deputy Clerk JOHN A. KRONSTADT, UNITED STATES DISTRICT JUDGE Not Reported Court Reporter / Recorder Attorneys Present for Plaintiffs: Not Present Attorneys Present

More information

Amendment to the Infinite Campus END USER LICENSE AGREEMENT

Amendment to the Infinite Campus END USER LICENSE AGREEMENT Amendment to the Infinite Campus END USER LICENSE AGREEMENT This Amendment to the Infinite Campus End User License Agreement (the Amendment ), is made between Infinite Campus, Inc. a Minnesota corporation

More information

Supreme Court of Florida

Supreme Court of Florida Supreme Court of Florida No. AOSC18-8 IN RE: JUROR SELECTION PLAN: OSCEOLA COUNTY ADMINISTRATIVE ORDER Section 40.225, Florida Statutes, provides for the selection of jurors to serve within the county

More information

David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev (1996)

David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev (1996) David R. Johnson and David G. Post, Law and Borders The Rise of Law in Cyberspace 45 Stan. L. Rev. 1367 (1996) Global computer-based communications cut across territorial borders, creating a new realm

More information

Review: Background on Bits. PFTD: What is Computer Science? Scale and Bits: Binary Digits. BIT: Binary Digit. Understanding scale, what does it mean?

Review: Background on Bits. PFTD: What is Computer Science? Scale and Bits: Binary Digits. BIT: Binary Digit. Understanding scale, what does it mean? PFTD: What is Computer Science? Understanding scale, what does it mean? Ø Using numbers to estimate size, performance, time Ø What makes a password hard to break? Ø How hard to break encrypted message?

More information

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 -

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 - Comparison Sorts - 1 - Sorting Ø We have seen the advantage of sorted data representations for a number of applications q Sparse vectors q Maps q Dictionaries Ø Here we consider the problem of how to efficiently

More information

Swiss E-Voting Workshop 2010

Swiss E-Voting Workshop 2010 Swiss E-Voting Workshop 2010 Verifiability in Remote Voting Systems September 2010 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Auditability in e-voting Types of verifiability

More information

We should share our secrets

We should share our secrets We should share our secrets Shamir secret sharing: how it works and how to implement it Daan Sprenkels hello@dsprenkels.com Radboud University Nijmegen 28 December 2017 Daan Sprenkels We should share our

More information

Product Description

Product Description www.youratenews.com Product Description Prepared on June 20, 2017 by Vadosity LLC Author: Brett Shelley brett.shelley@vadosity.com Introduction With YouRateNews, users are able to rate online news articles

More information

Concurrent Programing: Why you should care, deeply. Don Porter Portions courtesy Emmett Witchel

Concurrent Programing: Why you should care, deeply. Don Porter Portions courtesy Emmett Witchel Concurrent Programing: Why you should care, deeply Don Porter Portions courtesy Emmett Witchel 1 Uniprocessor Performance Not Scaling Performance (vs. VAX-11/780) 10000 1000 100 10 1 20% /year 52% /year

More information

Optimize Web Presence in China

Optimize Web Presence in China Optimize Web Presence in China Tapping into China s massive, complex, and repidly growing Internet economy. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com Executive Summary China is home to

More information

Cadac SoundGrid I/O. User Guide

Cadac SoundGrid I/O. User Guide Cadac SoundGrid I/O User Guide 1 TABLE OF CONTENTS 1. Introduction... 3 1.1 About SoundGrid and the Cadac SoundGrid I/O... 3 1.2 Typical Uses... 4 1.3 Native/SoundGrid Comparison Table... 6 2. Hardware

More information

Economic and Social Council

Economic and Social Council United Nations Economic and Social Council ECE/TRADE/C/CEFACT/2013/MISC.2 Distr.: General 17 May 2013 Original: English Economic Commission for Europe Committee on Trade Centre for Trade Facilitation and

More information

Fall Detection for Older Adults with Wearables. Chenyang Lu

Fall Detection for Older Adults with Wearables. Chenyang Lu Fall Detection for Older Adults with Wearables Chenyang Lu Internet of Medical Things Ø Wearables: wristbands, smart watches q Continuous monitoring q Sensing: activity, heart rate, sleep, (pulse-ox, glucose

More information

Kjell-Einar Anderssen. Country Manager Norway - Nutanix

Kjell-Einar Anderssen. Country Manager Norway - Nutanix Kjell-Einar Anderssen. Country Manager Norway - Nutanix About Nutanix Make datacenter infrastructure invisible, eleva4ng IT to focus on applica4ons and services 1750+ customers Founded in 2009 Over 70

More information

HASHGRAPH CONSENSUS: DETAILED EXAMPLES

HASHGRAPH CONSENSUS: DETAILED EXAMPLES HASHGRAPH CONSENSUS: DETAILED EXAMPLES LEEMON BAIRD BAIRD@SWIRLDS.COM DECEMBER 11, 2016 SWIRLDS TECH REPORT SWIRLDS-TR-2016-02 ABSTRACT: The Swirlds hashgraph consensus algorithm is explained through a

More information

Quality of Service in Optical Telecommunication Networks

Quality of Service in Optical Telecommunication Networks Quality of Service in Optical Telecommunication Networks Periodic Summary & Future Research Ideas Zhizhen Zhong 2015.08.28 @Networks Lab Group Meeting 1 Outline Ø Background Ø Preemptive Service Degradation

More information

Real-Time Scheduling Single Processor. Chenyang Lu

Real-Time Scheduling Single Processor. Chenyang Lu Real-Time Scheduling Single Processor Chenyang Lu Critiques Ø 1/2 page critiques of research papers. q Back-of-envelop comments - NOT whole essays. q Guidelines: http://www.cs.wustl.edu/%7elu/cse521s/critique.html

More information

Agreement for iseries and AS/400 System Restore Test Service

Agreement for iseries and AS/400 System Restore Test Service Agreement for iseries and AS/400 System Restore Test Service 1. Introduction The iseries and AS/400 System Restore Test Service (called "the Service"). The Service is provided to you, as a registered subscriber

More information

The Angola National ID Card

The Angola National ID Card The Angola National ID Card Advanced document security for a widely dispersed population 25 by Uwe Ludwig The Republic of Angola in south-central Africa is bordered by Namibia to the South, the Democratic

More information

Software License Agreement for Beckhoff Software Products

Software License Agreement for Beckhoff Software Products 1 Scope of this Agreement (1) Licensor has agreed with Licensee to grant Licensee a license to use and exploit the software set out in the License Certificate ("Licensed Software") subject to the terms

More information

bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc.

bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc. bitqy The official cryptocurrency of bitqyck, Inc. per valorem coeptis Whitepaper v1.0 bitqy The official cryptocurrency of bitqyck, Inc. Page 1 TABLE OF CONTENTS Introduction to Cryptocurrency 3 Plan

More information

Security Analysis on an Elementary E-Voting System

Security Analysis on an Elementary E-Voting System 128 Security Analysis on an Elementary E-Voting System Xiangdong Li, Computer Systems Technology, NYC College of Technology, CUNY, Brooklyn, New York, USA Summary E-voting using RFID has many advantages

More information

CONCRETE: A benchmarking framework to CONtrol and Classify REpeatable Testbed Experiments

CONCRETE: A benchmarking framework to CONtrol and Classify REpeatable Testbed Experiments CONCRETE: A benchmarking framework to CONtrol and Classify REpeatable Testbed Experiments Stratos Keranidis* Wei Liu, Michael Mehari, Pieter Becue, Stefan Bouckaert, Ingrid Moerman, Thanasis Korakis*,

More information

Internet of Things Wireless Sensor Networks. Chenyang Lu

Internet of Things Wireless Sensor Networks. Chenyang Lu Internet of Things Wireless Sensor Networks Chenyang Lu Internet of Things Ø Convergence of q Miniaturized hardware: processor+sensors+wireless q Low-power wireless: connect millions of devices to the

More information

Processes. Criteria for Comparing Scheduling Algorithms

Processes. Criteria for Comparing Scheduling Algorithms 1 Processes Scheduling Processes Scheduling Processes Don Porter Portions courtesy Emmett Witchel Each process has state, that includes its text and data, procedure call stack, etc. This state resides

More information

process will save judges, sheriffs, clerks, and attorneys' time and money.

process will save judges, sheriffs, clerks, and attorneys' time and money. Impr oving Legal Logistics Court systems across the U.S. use paper-based workflows for signing documents such as Orders, motions, Warrants, TRO etc. Allowing the judges, Court staff and attorney's to electronically

More information

IF YOU DO NOT AGREE TO THESE TERMS, DO NOT DOWNLOAD, INSTALL OR USE BSC.

IF YOU DO NOT AGREE TO THESE TERMS, DO NOT DOWNLOAD, INSTALL OR USE BSC. Bitvise SSH Client End User License Agreement Bitvise Limited, a Texas corporation with its principal office at 4105 Lombardy Ct, Colleyville, Texas 76034, USA, ("Bitvise"), develops a Windows SSH client

More information

FEDEX SAMEDAY CITY WEB SERVICES END USER LICENSE AGREEMENT

FEDEX SAMEDAY CITY WEB SERVICES END USER LICENSE AGREEMENT FEDEX SAMEDAY CITY WEB SERVICES END USER LICENSE AGREEMENT FOR SHIPPING SERVICES WITHIN THE USA ONLY Version 3.1 February 2017 BELOW ARE THE TERMS AND CONDITIONS UNDER WHICH YOU, AS A FEDEX CUSTOMER AND/OR

More information

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013

City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 City of Toronto Election Services Internet Voting for Persons with Disabilities Demonstration Script December 2013 Demonstration Time: Scheduled Breaks: Demonstration Format: 9:00 AM 4:00 PM 10:15 AM 10:30

More information

YOOCHOOSE GmbH Terms and Conditions Subject Matter

YOOCHOOSE GmbH Terms and Conditions Subject Matter 1 Subject Matter The temporary transfer of software use options over public data networks for a fee and the accompanying option to analyze "customer" "data" through the "web server software" or "plug-ins"

More information

OPEN SOURCE CRYPTOCURRENCY E-PUB

OPEN SOURCE CRYPTOCURRENCY E-PUB 09 April, 2018 OPEN SOURCE CRYPTOCURRENCY E-PUB Document Filetype: PDF 441.89 KB 0 OPEN SOURCE CRYPTOCURRENCY E-PUB A nnouncing Royal Coin ( ROYAL ), an experimental open-source decentralized CryptoCurrency

More information

Key Considerations for Implementing Bodies and Oversight Actors

Key Considerations for Implementing Bodies and Oversight Actors Implementing and Overseeing Electronic Voting and Counting Technologies Key Considerations for Implementing Bodies and Oversight Actors Lead Authors Ben Goldsmith Holly Ruthrauff This publication is made

More information

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early

More information

Google App Engine 8/10/17. CS Cloud Compu5ng Systems--Summer II 2017

Google App Engine 8/10/17. CS Cloud Compu5ng Systems--Summer II 2017 Google App Engine CS 6030--Cloud Compu5ng Systems--Summer II 2017 WESTERN MICHIGAN UNIVERSITY Professor: Dr. AJAY K. GUPTA SubmiPed by: JAPINDER PAL SINGH GHOTRA Contents Ø Introduc/on Ø Key Features Ø

More information

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana)

Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana) Electronic Voting For Ghana, the Way Forward. (A Case Study in Ghana) Ayannor Issaka Baba 1, Joseph Kobina Panford 2, James Ben Hayfron-Acquah 3 Kwame Nkrumah University of Science and Technology Department

More information

DATA PROCESSING AGREEMENT. (1) You or your organization or entity as The Data Controller ( The Client or The Data Controller ); and

DATA PROCESSING AGREEMENT. (1) You or your organization or entity as The Data Controller ( The Client or The Data Controller ); and DATA PROCESSING AGREEMENT BETWEEN: (1) You or your organization or entity as The Data Controller ( The Client or The Data Controller ); and (2) Moodle Pty Ltd being a company registered within Australia

More information

CUG Members' Handbook

CUG Members' Handbook CUG Members' Handbook March 31, 2016 Revisions 4/26/06 ToC add chapter 6 page 1 add xd1, xt3, and x1 list server info page 2 add xt3 and xd1 as eligible systems in section 1.2.1 page 4 replace old Program

More information

IF YOU DO NOT AGREE TO THESE TERMS, DO NOT DOWNLOAD, INSTALL OR USE BSC.

IF YOU DO NOT AGREE TO THESE TERMS, DO NOT DOWNLOAD, INSTALL OR USE BSC. Bitvise SSH Client End User License Agreement Bitvise Limited, a Texas corporation with its principal office at 4105 Lombardy Court, Colleyville, Texas 76034, USA, ("Bitvise"), develops a Windows SSH client

More information

Philips Lifeline. Ø Chenyang Lu 1

Philips Lifeline. Ø  Chenyang Lu 1 Philips Lifeline Ø http://www.lifelinesys.com/content/lifeline-products/auto-alert Chenyang Lu 1 Smartphone for Medicine Ø http://video.msnbc.msn.com/rock-center/50582822 2 Proposal Presenta5on Ø 2/12,

More information

Citizen engagement and compliance with the legal, technical and operational measures in ivoting

Citizen engagement and compliance with the legal, technical and operational measures in ivoting Citizen engagement and compliance with the legal, technical and operational measures in ivoting Michel Chevallier Geneva State Chancellery Setting the stage Turnout is low in many modern democracies Does

More information

Installation Guide: cpanel Plugin

Installation Guide: cpanel Plugin Installation Guide: cpanel Plugin Installation using an SSH client such as Terminal or Putty partners@cloudflare.com partnersupport@cloudflare.com www.cloudflare.com Installation using an SSH client such

More information

Contributary Platform User Terms of Service

Contributary Platform User Terms of Service Contributary Platform User Terms of Service BY CLICKING THE ACCEPT BUTTON OR UTILIZING THE CONTRIBUTARY PLATFORM, YOU AGREE TO THE FOLLOWING USER TERMS OF SERVICE (THE AGREEMENT ) GOVERNING YOUR USE OF

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

CSE 308, Section 2. Semester Project Discussion. Session Objectives

CSE 308, Section 2. Semester Project Discussion. Session Objectives CSE 308, Section 2 Semester Project Discussion Session Objectives Understand issues and terminology used in US congressional redistricting Understand top-level functionality of project system components

More information

PRACTICE DIRECTION [ ] DISCLOSURE PILOT FOR THE BUSINESS AND PROPERTY COURTS

PRACTICE DIRECTION [ ] DISCLOSURE PILOT FOR THE BUSINESS AND PROPERTY COURTS Draft at 2.11.17 PRACTICE DIRECTION [ ] DISCLOSURE PILOT FOR THE BUSINESS AND PROPERTY COURTS 1. General 1.1 This Practice Direction is made under Part 51 and provides a pilot scheme for disclosure in

More information

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes. Online Voting for Credit Union Elections Helping increase voter turnout & provide accessible, efficient and secure election processes. In a time of cyber-security awareness, Federal Credit Unions and other

More information

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15 Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15-1 Applicability of chapter Sec. 1. Except as otherwise provided,

More information

Public Libraries and Access to Justice: #2. The Role of Public Libraries

Public Libraries and Access to Justice: #2. The Role of Public Libraries Prepared by the Self-Represented Litigation Network Notes for Slide 1 Prepared by the Self-Represented Litigation Network Notes for slide 2 Public librarians are the front line for access to justice, but

More information

THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING

THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING Abbas Akkasi 1, Ali Khaleghi 2, Mohammad Jafarabad 3, Hossein Karimi 4, Mohammad Bagher Demideh 5 and Roghayeh

More information

Best Practices for Preservation of ESI John Rosenthal

Best Practices for Preservation of ESI John Rosenthal Best Practices for Preservation of ESI John Rosenthal November 16, 2016 John Rosenthal Partner Washington, D.C. Antitrust and commercial litigator Chair, Winston E-Discovery & Information Governance Group

More information

Local differential privacy

Local differential privacy Local differential privacy Adam Smith Penn State Bar-Ilan Winter School February 14, 2017 Outline Model Ø Implementations Question: what computations can we carry out in this model? Example: randomized

More information

One View Watchlists Implementation Guide Release 9.2

One View Watchlists Implementation Guide Release 9.2 [1]JD Edwards EnterpriseOne Applications One View Watchlists Implementation Guide Release 9.2 E63996-03 April 2017 Describes One View Watchlists and discusses how to add and modify One View Watchlists.

More information

THE PRIMITIVES OF LEGAL PROTECTION AGAINST DATA TOTALITARIANISMS

THE PRIMITIVES OF LEGAL PROTECTION AGAINST DATA TOTALITARIANISMS THE PRIMITIVES OF LEGAL PROTECTION AGAINST DATA TOTALITARIANISMS Mireille Hildebrandt Research Professor at Vrije Universiteit Brussel (Law) Parttime Full Professor at Radboud University Nijmegen (CS)

More information

CASE TRANSLATION: GREECE

CASE TRANSLATION: GREECE CASE TRANSLATION: GREECE Case citation: 46/2014 Name and level of the court: Court of Appeals of Piraeus President of the court: Mrs G. Sotiropoulou, Justice of the Court of Appeals Members of the court:

More information

UTAH LEGISLATIVE BILL WATCH

UTAH LEGISLATIVE BILL WATCH UTAH LEGISLATIVE BILL WATCH Category: Fast Track Solutions Contact: David Fletcher State of Utah Project Initiation and Completion Dates: December 2012/Completion February 2013 NASCIO 2013 1 EXECUTIVE

More information

Netizen Participation in Internet Governance

Netizen Participation in Internet Governance Netizen Participation in Internet Governance ITU Workshop on Internet Governance Geneva, February 27, 2004 Izumi Aizu Deputy Director, Institute for HyperNetwork Society izumi@anr.org 1 I have been involved

More information

Economic and Social Council

Economic and Social Council UNITED NATIONS E Economic and Social Council Distr. GENERAL 23 July 2008 Original: ENGLISH ECONOMIC COMMISSION FOR EUROPE COMMITTEE ON TRADE Centre for Trade Facilitation and Electronic Business Fourteenth

More information

Hoboken Public Schools. PLTW Introduction to Computer Science Curriculum

Hoboken Public Schools. PLTW Introduction to Computer Science Curriculum Hoboken Public Schools PLTW Introduction to Computer Science Curriculum Introduction to Computer Science Curriculum HOBOKEN PUBLIC SCHOOLS Course Description Introduction to Computer Science Design (ICS)

More information

Assumption of TOBT Responsibility and Usage Agreement HAM CSA

Assumption of TOBT Responsibility and Usage Agreement HAM CSA Assumption of TOBT Responsibility and Usage Agreement HAM CSA (Airport CDM Common Situational Awareness Tool) Please mark with a cross as appropriate! We wish to agree the assumption of TOBT responsibility

More information

Bylaws of Information Technology Sector Coordinating Council

Bylaws of Information Technology Sector Coordinating Council Bylaws of Information Technology Sector Coordinating Council Article I Name 1. Name: This organization shall be known as the Information Technology Sector Coordinating Council, abbreviated as IT SCC. Article

More information

ETSI TS V1.4.1 ( )

ETSI TS V1.4.1 ( ) TS 102 587-1 V1.4.1 (2014-09) TECHNICAL SPECIFICATION Electromagnetic compatibility and Radio spectrum Matters (ERM); Peer-to-Peer Digital Private Mobile Radio; Part 1: Conformance testing; Protocol Implementation

More information

30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture (MDA)

30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture (MDA) Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie 30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture () Prof. Dr.

More information

Aspect Decomposition: Model-Driven Architecture (MDA) 30 Transformational Design with Essential. References. Ø Optional: Ø Obligatory:

Aspect Decomposition: Model-Driven Architecture (MDA) 30 Transformational Design with Essential. References. Ø Optional: Ø Obligatory: Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie 30 Transformational Design with Essential Aspect Decomposition: Model-Driven Architecture () Prof. Dr.

More information

RULES OF EVIDENCE LEGAL STANDARDS

RULES OF EVIDENCE LEGAL STANDARDS RULES OF EVIDENCE LEGAL STANDARDS Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. The use of digital

More information