Workshops ABC F12 F11 IR8

Maat: px
Weergave met pagina beginnen:

Download "Workshops ABC F12 F11 IR8"

Transcriptie

1 Workshops ABC AccessData (1): F12 AccessData (2): F4 Adallom: IR8 Amped Software (1): F9 Amped Software (2): F11 Big Data s impact on Forensics by Tim Leehealey, CEO AccessData Case sizes are growing incredibly fast and have forced forensics users to adopt awkward workflows that are sub optimal. AccessData is addressing this issue head on with a large list of key features designed to alleviate this exact problem and enable forensics investigators to more quickly sift through enormous volumes of data quickly and easily. In this session we will look at some of these key features and the technology enabling them and discuss the positives and negatives that these new technologies bring. FTK/Summation 6.0 by Tim Leehealey, CEO AccessData FTK/Summation 6.0 is set to launch early September. We will use this session to demonstrate the combined solution and show users some of the more compelling new features. Users can expect to see a fully integrated Summation and FTK solution enabling users to seamlessly hop back and forth between the two products to better facilitate the needs of their respective users. furthermore we will exploring the new forensics focused features in FTK and some of the new ediscovery focused features in Summation and the integration between the two. The pro-active Cloud Security platform. Are you in control of all of your cloud data? Do you know what cloud applications are currently in use by your organisation? With Adallom you will have visibility, governance and real-time protection of all of your data in the cloud. Productive Forensic Video Analysis: Converting DVR Videos, Enhancing Images and Preparing a Report for the Courtroom with Amped FIVE The seminar will reveal the truth about image and video analysis and provide a summary of all steps needed to get evidence out of the source (typically a digital video recorder), extract parts of interest, properly enhance them, take measurements, and prepare the results for presentation in the courtroom. This session will teach analysts how to improve their workflow by using the software Amped FIVE, which is being used daily by top government forensic labs worldwide. New Frontiers in Image and Video Tampering Detection and Camera Ballistics This session will focus on the growing demand for authenticating images and videos in the forensic landscape. This workshop will demonstrate the current tools available in Amped Authenticate, the leading software for forensic image authentication, and the new revolutionary image and video authentication tools being developed as part of the project MAVEN, funded

2 by the European Union, which will be implemented into the Amped Authenticate software. BlackBag: F1 ios9 and El Capitan : Implications for your Investigations CodeSealer: IR1 & IR5 DataExpert (1): IR6 Invisible end-to-end websession security, protecting you as well as your customers. With the new EU Data Protection Regulation companies that are active with online transaction have to rethink about how to protect customer data, passwords, financial data and account information when approx 80% of their customers are working from malware infected or insecure clients? CodeSealer will explain how you can achieve a 100% customer coverage for the protection of your websessions on desktops, tablets, mobile browsers and web view applications. Deze presentatie wordt twee keer gegeven. Language: English Audience: IT-Managers, Security Officers, Security Engineers, SOC/CERTmanagers, Compliance Officers, Data Protection Officers, Managers E- business. Incident Response: Are you in control or only compliant? door Arjan Kolvoort / Remco van der Lans With only network protection elements e.g. Firewalls, AV/IDS/IPS and SIEM installations you can be compliant towards several regulations e.g. ISO27001/PCI-DSS /etc... But in practice, are you in control of where your data resides and how to respond towards both incidents and the new EU General Data Protection Regulation? This session will elaborate on how to achieve better visibility, governance and detection of your data, wherever your data resides, on premise, on mobile phones/tablets, laptops or in the cloud. And most of all how to define the real impact and suited response for your company. SOC analysten, Data Protection Officers, IT-managers. DataExpert (2): IR2 Cyber Forensic End-point Security with Encase Enterprise door Arjan Kolvoort / Remco van der Lans This session will cover the mechanism of Malicious Activities Analytics, Accelerated Incident Response and Deep Forensic Investigation to help you fight malware and do internal investigations before incidents will happen. DataExpert Incident Response will provide you with an overview of how to do endpoint behaviour analysis and endpoint Forensics in a networked environment with Encase Enterprise. This session will cover Proactive Threat Hunting, Event Validation, Remediation and Automation.

3 SOC analysten, Data Protection Officers DataExpert: Hands-on sessie IBM i2 ibase, deel 1 van 2 CA11 In de laatste jaren is het gebruik van ibase toegenomen. Als gevolg is het aantal functionaliteit- en analyse vragen toegenomen. In deze sessies zullen we een aantal hints & tips geven over veel voorkomende zaken zoals importeren, het conceptualiseren van een datamodel (bijv. wanneer is een adres een entiteit, label of relatie?), zoeken of queries uitvoeren. Schrijf u snel in want het aantal plekken is beperkt! Doelgroep: Politie, RIEC s, ibase gebruikers. Max. 30 plaatsen beschikbaar! LET OP: Schrijft u zich ook in voor deel 2 van deze sessie? DataExpert: Hands-on sessie IBM i2 ibase, deel 2 van 2 CA12 In de laatste jaren is het gebruik van ibase toegenomen. Als gevolg is het aantal functionaliteit- en analyse vragen toegenomen. In deze sessies zullen we een aantal hints & tips geven over veel voorkomende zaken zoals importeren, het conceptualiseren van een datamodel (bijv. wanneer is een adres een entiteit, label of relatie?), zoeken of queries uitvoeren. Schrijf u snel in want het aantal plekken is beperkt! Doelgroep: Politie, RIEC s, ibase gebruikers. Max. 30 plaatsen beschikbaar! LET OP: Schrijft u zich ook in voor deel 1 van deze sessie? DataExpert DE Analyst Challenge 2015, deel 1 van 2 CA13 Welke organisatie heeft de beste digitale analist van Nederland? Deze vraag zal beantwoord worden op de Digital Experience 2015! Een nieuwe traditie is geboren: de DataExpert Analyst Challenge. In wedstrijd verband gaat u met andere analisten de strijd aan om 2 tot 3 cases zo goed mogelijk op te lossen door gebruik te maken IBM i2 Analyst s Notebook en IBM i2 ibase. Weet u uw skills en ervaring optimaal in te zetten en uw zenuwen in bedwang te houden? Wellicht dat u dan de Wisseltrofee mee naar kantoor kan nemen en de prestigieuze titel mag dragen van DataExpert Analyst of the Year. Sprekers: Erik van Kempen en Jelle Nieuwland, Softwaretrainers Doelgroep: Gebruikers Analyst s Notebook en ibase Max. 30 plaatsen beschikbaar! LET OP: Schrijft u zich ook in voor deel 2 van deze sessie? DataExpert DE Analyst Challenge 2015, deel 2 van 2 CA14 Welke organisatie heeft de beste digitale analist van Nederland? Deze vraag zal beantwoord worden op de Digital Experience 2015! Een nieuwe traditie is geboren: de DataExpert Analyst Challenge. In wedstrijd verband gaat u met andere analisten de strijd aan om 2 tot 3 cases zo goed mogelijk op te lossen door gebruik te maken IBM i2 Analyst s Notebook en IBM

4 i2 ibase. Weet u uw skills en ervaring optimaal in te zetten en uw zenuwen in bedwang te houden? Wellicht dat u dan de Wisseltrofee mee naar kantoor kan nemen en de prestigieuze titel mag dragen van DataExpert Analyst of the Year. Sprekers: Erik van Kempen en Jelle Nieuwland, Softwaretrainers Doelgroep: Gebruikers Analyst s Notebook en ibase Max. 30 plaatsen beschikbaar! LET OP: Schrijft u zich ook in voor deel 1 van deze sessie? DataExpert CA15 Crime Analysis Training - introductie en roadmap N.a.v. de vraag van klanten en organisaties hebben we een nieuwe serie trainingen toegevoegd aan ons portfolio: criminaliteitsanalyse trainingen voor beginners en gevorderden. Tijdens deze sessie geven we u meer inzicht in de mogelijkheden en nodigen we u graag uit om de inhoud, op basis van uw wensen, te verbeteren. DCMR Milieudienst Rijnmond: Het RIAN Toezicht Model DCMR houdt toezicht op een schone en veilige omgeving. Chris zal u CA8 een kijkje geven in de keuken bij het Team Informatie & Analyse en legt de nadruk op risico- en resultaatgestuurd toezicht en handhaven. Deze innovatieve aanpak betreft niet alleen het gebruik maken van leidende technologie zoals Analyst s Notebook en SPSS Modeler, maar betreft voornamelijk het aanpassen van de interne processen en denkwijze. In een omgeving waar de risico s steeds complexer worden is het efficiënter maken, professionaliseren van de toezicht - en handhavingactiviteiten hard nodig. Spreker: Chris Smit, Team Leader Informatie & Analyse Doelgroep: Milieu- en Omgevingsdiensten, Gemeenten en Provincies Taal: Nedelands Drone Hacking: F15 Fraudehelpdesk.nl: CA6 Drones are everywhere and their use by government, law enforcement, the private sector and hobbyists is only going to increase. With the increased use, the price will fall and put these devices into the hands of more and more responsible users. But what about those who wish to use this technology irresponsibly or with criminal intent in mind? This session will focus on low-end drones commercially available today and some of the risks they pose to to the public and challenges they pose to law enforcement and military. Fraudehelpdesk.nl en de strijd tegen phishing Fraudehelpdesk.nl is dé organisatie in Nederland die zich inzet bij de strijd tegen online fraude. Particulieren zijn het slachtoffer maar ook zeker de talloze organisaties in Nederland. Phishing doormiddel van social engineering, Spear Phishing, Cryptoware. Het zijn zomaar een aantal onderwerpen waardoor we elke dag weer bedreigd worden. Waar komt het vandaan, hoe herkent je het en misschien wel het belangrijkst, hoe voorkom je het?

5 Sprekers: John Kellij, Procesmanager Fraudehelpdesk.nl / Stichting Aanpak Financieel-Economische Criminaliteit in Nederland (SAFECIN) en Elmer Lastdrager PhD student Universiteit Twente bij Fraudehelpdesk.nl Doelgroep: Analisten, handhavers, beleidsmakers, provincies en politie, finance Taal: Nederlands Gemeente Bergen op Zoom: CA5 Guidance Software (1): F3 Guidance Software (2): F2 ibase en Analyst Notebook als ondersteuning in de gemeentelijke doelstellingen Steeds vaker krijgt ook de gemeente te maken met ondermijnende criminaliteit. Om hier een goede integrale aanpak op los te laten is het noodzakelijk dat de gemeente zijn informatiehuishouding op orde heeft. Patrick Roodenburg, Informatiemakelaar LIP/DIP, presenteert hoe de gemeente dit heeft gerealiseerd. Doelgroep: Analisten, handhavers, beleidsmakers bij gemeenten, provincies en politie Taal: Nederlands Getting the most out of EnCase Forensic v7 This session will help examiners using EnCase Forensic v7 work smarter by presenting simple functions they may have overlooked or may have never known existed. Addressing Solid State Drive (SSD) forensic acquisition challenges This session will help you understand the rapidly evolving SSD landscape and addresses data acquisition challenges forensic examiners are faced with. IBM: CA2 IBM: CA7 IBM i2 Enterprise Insight Analysis - Maximising the use of your data to combat fraud and criminal activity The IBM i2 portfolio continues to evolve to address the increasing need to analyse vast quantities of data from an ever growing variety of sources. This session will take you through some of the new and forthcoming capabilities of the i2 portfolio and show you how customers are leveraging the ability to collaborate, share and disseminate intelligence more effectively than ever for faster informed decision making. Presenter: Julian Midwinter, Business Unit Executive - Safer Planet Europe Doelgroep: alle geïnteresseerden Taal: Engels IBM Watson Analytics: analytics die de gebruiker begrijpt Het probleem dat de meeste gebruikers ervaren, is dat ze zelf moeten bepalen welke data ze gebruiken, welke grafieken ze in hun rapportages moeten gebruiken en in welke richting de analyses moeten gaan. Veel beslissingen binnen het bedrijfsleven worden nog steeds vanuit een gut feeling genomen.

6 IBM Watson Analytics maakt daar een einde aan. In plaats van zelf eindeloos te zoeken in gegevens en cijfers om antwoord te krijgen op belangrijke vragen, kunt u Watson vragen stellen als: 'met welke waardevolle klanten maak ik de meeste kans om een deal te sluiten in de komende dertig dagen? Spreker: Damiaan Zwietering, Predictive Analytics Specialist IBM: CA10 IBM Analytics - the big picture, innovations and futures. How can the combined analytics power of IBM help solve today's problems? This session will take you through some of the ways i2 and the wider analytics portfolio are innovating to make better sense of data faster. Cognitive computing, far - reaching solutions from IBM analytics and ground breaking new, 3D visualisation techniques from the innovation team will give you a view on the future of intelligence analysis. Presenter: Adam Etches, WW Solution Architect and Alister Brain, IBM i2 Product Innovation Taal: Engels IBM RedCell: CA3 IBM Security (1): IR11 Emerging Trends - Financial Crimes. Understanding your Adversary Fraudsters use increasingly innovative ways to target individuals, organisations and businesses, with impact varying from damage to to reputation and compliance obligations to revenues. This session will focus on emerging threats and the tactics that fraudsters are using today. Covering data breaches and their impact, how compromised data is sold in the dark web, and tactics such as card cloning, skimming, call spoofing, phishing attacks and trade based money laundering. Understand how organisations are maximising their financial crime analytics and intelligence teams to combat fraud, and some of the innovative ways they are using not only their own data but open source data to support that activity. Presenter: Steven D'Alfonso, Financial Crimes Intelligence Specialist Taal: Engels Integrated Security Intelligence Overview New technological capabilities come with new vulnerabilities. How do you keep up with attacks when there is a shortage of IT security skills and rising costs to secure your data? How fast can you address an attack when your solutions aren t integrated? This session will give you an overview of IBM s enterprise security portfolio customized to your company s needs. Focus on disrupt new threats, deploy security innovations and reduce the cost and complexity of IT security. IBM can safeguard your most critical data from compromise. Find out how IBM can help you optimize your security practices, stop advanced threats, protect critical assets, safeguard the cloud and mobile, and use security as a competitive advantage. Language: English

7 IBM Security (2): IR13 How to isolate and contain work data in the BYOD era: MaaS360 Secure Productivity Suite How do you enable your employees to securely access corporate data from ios, Android and Windows Phone s while preserving the mobile experience on their personal devices? This session gives you an overview of IBM s MaaS360 Secure Productivity Suite. MaaS360 delivers a comprehensive set of cross-platform solutions to isolate and contain work data in the BYOD era. It is the only complete cloud-based solution for smartphones and tablets that enables employees to securely access corporate data while preserving the mobile experience on their personal devices. MaaS360 Secure Productivity Suite addresses key concerns of data loss risks. Language: English Magnet Forensics (1): Advanced Evidence Analysis with Magnet IEF F13 Meant for experienced IEF users, this session will provide in-depth instruction on the newest analysis features that have been added to IEF Report Viewer. Learn how these new analysis tools can be used to quickly identify important facts, validate your findings, share results with non-technical stakeholders, and prepare evidence for presentation in a courtroom. Magnet Forensics (2): Investigating Smartphones with Magnet ACQUIRE and IEF F14 The amount of data being generated by mobile devices has exploded, resulting in exponentially more work for forensic examiners. To make matters more difficult, increased security features being introduced to ios and Android devices (including encryption and locked bootloaders) are preventing examiners from recovering the crucial evidence they need. In this session, we will demonstrate how our new smartphone acquisition tool, Magnet ACQUIRE, can help examiners overcome some of these new challenges. Magnet ACQUIRE can be used to quickly extract important data from ios and Android devices, providing you with reliable method for obtaining smartphone images. In addition, we will take an in-depth look at recovering and analyzing smartphone and Internet application data. Mandiant / FireEye (1): IR14 Responding to Advanced Persistence Threats (APT s), insights from the frontline. A walkthrough of an APT incident response by Mandiant. During this talk, we review how attackers gained a foothold to a customer environment and maintained access to reach their objectives. Mandiant s Incident Response Consultant and Forensic practitioner Bart Vanautgaerden shares a customer breach from detection to response and shares tips for prevention and remediation. During this session, you will learn what are the takeaways from these real-life breaches, and how to stay ahead of the game when attacker don t play fair.

8 Speaker: Bart Vanautgaerden - Incident Response Consultant and Forensic practitioner Mandiant / FireEye (2): IR7 From the Frontlines: Hear about the lifecycle of a breach, the latest threat actors, how they work and what they do. MD5: F5 Virtualisation Presentation The VFC presentation looks at VMware's freely available Player and Disk Mount utilities, along with the Computer Forensics disk mount tool such as Mount Image Pro or FTK Imager, to re-create a subject machine in a matter of seconds. The presentation discusses the techniques and methodologies used in the processes required to virtualise a computer together with some problem solving solutions and case studies. The presentation will also discuss what is virtualisation snapshots, migration, failover and software. There are numerous specialist software applications available to assist the investigation and analysis of digital media which has been forensically acquired. Whilst these tools can and do provide a great depth of analysis and will reveal data fragments of material no longer readily available, it is often the case that the 'scene of the crime' part of the examination process is overlooked as an additional source of potentially invaluable information. In the 'real' world, it is almost unthinkable not to examine in detail the actual crime scene and then perform 'Forensics' examinations on evidence gathered from the scene. In the 'virtual' world of Forensics Computing, the same is not true and all too often it is only the underlying data and information that resides on the storage devices that is examined in detail. This enables the investigator to experience the 'desktop' as seen by the original user in an entirely Forensics manner in a read only virtual environment. The presentation will be provided by Michael Penhallurick, a senior Computer Forensics analyst with MD5 Ltd. In 2005 an abridged version of his research was published in Digital Investigations, a magazine aimed directly at the Computer Forensics arena. His successful methods of transposing digital data into a virtual machine environment have been read and utilised by investigators across the globe. Building from this research, Michael has now developed a standalone application known as VFC (Virtual Forensic Computing) that enables an investigator to experience almost any Windows based system within seconds of acquisition which will avoid the need to have access to a full Computer Forensics application or the need to restore Computer Forensics image files to another PC to try and boot them. MH Service: F10 How to face the challenges of On-Site Data-Acquisition and Analysis? Benefits of the 2 nd Generation of the Forensic Laptop!

9 NetSkope: IR3 & IR15 CloudSecurity: 5 Must-Haves for Enabling SaaS While Securing Data and Complying with Regulations. Allow is the New Block: Netskope enables you to find, understand, and secure cloud apps in real-time and across any app. Our granular policies let you shape activities, not block apps. That s how cloud security solutions should work. During this session you will get more details on how to find, understand and secure data across all of your cloud applications. Language: English Oxygen Forensics: F6 PassWare: F7 Mobile Forensics: Modern ways of communication. Hidden and deleted data Modern devices are not just phones for calls but modern communication devices which keep a lot of personal data. The experts job is to analyze this information and the purpose of this presentation is to share knowledge on how to find and identify it. Not obvious things they have learnt once and forever not to be stuck when you stumble on them but problems that raise when some changes in the world of mobile devices happen (and they do happen frequently), or that are not highlighted by the tools they are using. Efficient Decryption and Cloud Forensics Documents, mobile devices, hard drives, cloud - where else could encrypted evidence reside? This workshop covers efficient methods to decrypt it, including live memory analysis and data acquisition from Cloud services. PhishMe: IR9 Security Awareness & Protection on Phishing attacks With 91% of attacks starting with spear phishing, numerous high-profile breaches emanating from a single phish, and typical incident detection times spanning hundreds of days, the PhishMe solution disrupts the core of the adversary s attack chain their targets and tactics. PhishMe has developed a phishing threat management solution that: - Prepares employees to be more resilient and vigilant against targeted cyber attacks - Empowers employees to easily report suspicious s to the internal security teams in a timely manner - Provides incident responders with the ability to effectively prioritize, analyze, and act on suspect reports detected by users, producing actionable intelligence that can be integrated with and employed by an organization s existing security ifrastructure and analytics capabilities. Speaker: Paul Witchell - Business Development at PhishMe Audience: IT-Managers, Security Officers, Security Engineers, SOC/CERT-managers, Compliance Officers, Data Protection Officers.

10 rola Security Solutions: CA1 rola Security Solutions CA4 Need to share - rsframe platform for investigation, intelligence and analysis. rsframe is a platform for Information Management for the Security Sector. Numerous powerful features help investigators to retrieve and to analyze relevant information. rsframe is a platform which allows collaboration, but it allows users to share information from the very first of an investigation thus enabling investigators to act with high speed and precision. Doelgroep: investigators, analysts, decision-makers Taal: Engels rscoala - standardization of communication data. rscoala - allows the standardization of communication data. Data from the surveillance of telecommunication are delivered in multiple formats depending on the provider. These data have to be transferred into a consistent format in order to be ready for analysis and to get relevant information quickly and reliably. Presenter: Nina Keller and/or Dirk Linneman Doelgroep: investigators, analysts, more practical level Taal: Engels SoftwareZaken.nl: IR12 Introductie gegevensbescherming en cybersecurity Veel organisaties voldoen niet aan de regels voor bescherming persoonsgegevens. Hierdoor ontstaan privacy-risico s en lopen organisaties het risico op hoge boetes (vanaf 2016 tot 2% van de omzet). Met deze workshop willen we iedere organisatie de kans geven zich bij te scholen op het gebied van gegevensbescherming, door het behandelen van de huidige en toekomstige regels. Deze workshop is bedoeld voor elke professional die betrokken is bij gegevensverwerking en goed op de hoogte wil zijn van alle regels. De workshop is aanbevolen voor consultants, informatie-architecten en CTO s. Ook is de workshop zeer geschikt voor security officers en voor de nieuwe rol van Functionaris Gegevensbescherming (FG). De nadruk ligt niet op technische aspecten van beveiliging, maar vooral op goede inrichting en organisatie. Hierdoor is de workshop goed te volgen voor mensen zonder technische achtergrond. In de workshop wordt een praktijkvoorbeeld aangehaald om het proces van gegevensbescherming door te lopen. Spreker: Dr. Sieuwert van Otterloo IT Expert / oprichter SoftwareZaken Taal: Nederlands Doelgroep: IT/Security-consultants, informatie-architecten, CTO s, CIO s, Security Officers en medewerkers in de nieuwe rol van Functionaris Gegevensbescherming (FG) SPSS: CA9 Hoe haalt u waardevolle voorspellende inzichten uit uw data? Hoe weet u wat u niet weet? Waarschijnlijk een vraag waar velen van ons wel eens van wakker liggen. Met IBM SPSS Predictive Analytics kunt u de kracht in handen hebben om een antwoord te vinden op deze vraag. Na het volgen van deze sessie weet u hoe u de

11 volgende stap kunt nemen in uw data intelligence. Dé voorbereiding op de toekomst! Doelgroep: Analisten, Beleidsbepalers, Projectmanagers, Taal: Nederlands Tracks Inspector: F8 Varonis: IR4 & IR10 The Digital Evidence Dashboard The Digital Evidence Dashboard (DED) introduces new concepts in Tracks Inspector that support detectives, experts and senior investigative officers to better collaborate when it comes to the investigation of digital evidence. The DED aims to avoid overcharging of digital forensics experts, to give more control to senior officers over their case and to enable detectives to find low hanging fruit in digital evidence by using an easy to use web-based solution. In this presentation we will explain the concepts of the DED and how have been implemented in Tracks Inspector 2.1. Taal: Nederlands Is your data at risk? See who can access sensitive data, monitor access activity, and prevent data breaches in your company. Audit your data in minutes, not days. Ensure the right access to the right data, monitor use, flag abuse. Identify and lockdown sensitive content, remain compliant, detect and prevent breaches e.g. Cryptolocker. Varonis is essential in helping organisations to comply towards the new EU Data Protection Regulation on the Breach Notification Requirement. Deze presentatie wordt twee keer gegeven. Language: Nederlands Audience: IT-Managers, Security Officers, Security Engineers, SOC/CERTmanagers, Compliance Officers, Data Protection Officers.

Process Mining and audit support within financial services. KPMG IT Advisory 18 June 2014

Process Mining and audit support within financial services. KPMG IT Advisory 18 June 2014 Process Mining and audit support within financial services KPMG IT Advisory 18 June 2014 Agenda INTRODUCTION APPROACH 3 CASE STUDIES LEASONS LEARNED 1 APPROACH Process Mining Approach Five step program

Nadere informatie

Security Les 1 Leerling: Marno Brink Klas: 41B Docent: Meneer Vagevuur

Security Les 1 Leerling: Marno Brink Klas: 41B Docent: Meneer Vagevuur Security Les 1 Leerling: Klas: Docent: Marno Brink 41B Meneer Vagevuur Voorwoord: In dit document gaan we beginnen met de eerste security les we moeten via http://www.politiebronnen.nl moeten we de IP

Nadere informatie

Mobile Devices, Applications and Data

Mobile Devices, Applications and Data Mobile Devices, Applications and Data 1 Jits Langedijk Senior Consultant Jits.langedijk@pqr.nl Peter Sterk Solution Architect peter.sterk@pqr.nl Onderwerpen - Rol van Mobile IT in Tomorrow s Workspace

Nadere informatie

Identity & Access Management & Cloud Computing

Identity & Access Management & Cloud Computing Identity & Access Management & Cloud Computing Emanuël van der Hulst Edwin Sturrus KPMG IT Advisory 11 juni 2015 Cloud Architect Alliance Introductie Emanuël van der Hulst RE CRISC KPMG IT Advisory Information

Nadere informatie

Profile visitors NRC Q

Profile visitors NRC Q NRC Media presents About NRC Q A unique concept Business news platform for ambitious people on the go Short, sharp articles with professional infographics Daily newsletter at 5.30am News updates via WhatsApp

Nadere informatie

Settings for the C100BRS4 MAC Address Spoofing with cable Internet.

Settings for the C100BRS4 MAC Address Spoofing with cable Internet. Settings for the C100BRS4 MAC Address Spoofing with cable Internet. General: Please use the latest firmware for the router. The firmware is available on http://www.conceptronic.net! Use Firmware version

Nadere informatie

De convergentie naar gemak. Hans Bos, Microsoft @hansbos, hans.bos@microsoft.com

De convergentie naar gemak. Hans Bos, Microsoft @hansbos, hans.bos@microsoft.com De convergentie naar gemak Hans Bos, Microsoft @hansbos, hans.bos@microsoft.com ge mak (het; o) 1. kalmte, bedaardheid: iem. op zijn gemak stellen kalm laten worden 2. het vermogen iets zonder moeite te

Nadere informatie

Taco Schallenberg Acorel

Taco Schallenberg Acorel Taco Schallenberg Acorel Inhoudsopgave Introductie Kies een Platform Get to Know the Jargon Strategie Bedrijfsproces Concurrenten User Experience Marketing Over Acorel Introductie THE JARGON THE JARGON

Nadere informatie

Cisco Cloud. Collaboration. Ronald Zondervan David Betlem September, 2011. Presentation_ID 2010 Cisco Systems, Inc. All rights reserved.

Cisco Cloud. Collaboration. Ronald Zondervan David Betlem September, 2011. Presentation_ID 2010 Cisco Systems, Inc. All rights reserved. Cisco Cloud Collaboration Ronald Zondervan David Betlem September, 2011 1 E Open architectuur Uitgangspunten Gebaseerd op Open Standaarden telefonie, video, desktop integratie, beschikbaarheidsstatus (presence)

Nadere informatie

Continuous testing in DevOps met Test Automation

Continuous testing in DevOps met Test Automation Continuous ing in met Continuous testing in met Marco Jansen van Doorn Tool Consultant 1 is a software development method that emphasizes communication, collaboration, integration, automation, and measurement

Nadere informatie

SECURITY UITDAGINGEN 2015

SECURITY UITDAGINGEN 2015 SECURITY UITDAGINGEN 2015 Hoe uw IT-infrastructuur beschermen? Robby Cauwerts Security Engineer 2015 Check Point Software Technologies Ltd. 1 CHECK POINT NAMED A LEADER IN THE GARTNER MAGIC QUADRANTS FOR

Nadere informatie

Bijlage 2: Informatie met betrekking tot goede praktijkvoorbeelden in Londen, het Verenigd Koninkrijk en Queensland

Bijlage 2: Informatie met betrekking tot goede praktijkvoorbeelden in Londen, het Verenigd Koninkrijk en Queensland Bijlage 2: Informatie met betrekking tot goede praktijkvoorbeelden in Londen, het Verenigd Koninkrijk en Queensland 1. Londen In Londen kunnen gebruikers van een scootmobiel contact opnemen met een dienst

Nadere informatie

Enterprise Portfolio Management

Enterprise Portfolio Management Enterprise Portfolio Management Strategische besluitvorming vanuit integraal overzicht op alle portfolio s 22 Mei 2014 Jan-Willem Boere Vind goud in uw organisatie met Enterprise Portfolio Management 2

Nadere informatie

Business Architectuur vanuit de Business

Business Architectuur vanuit de Business Business Architectuur vanuit de Business CGI GROUP INC. All rights reserved Jaap Schekkerman _experience the commitment TM Organization Facilities Processes Business & Informatie Architectuur, kun je vanuit

Nadere informatie

Windows 10 & Veiligheid

Windows 10 & Veiligheid Windows 10 & Veiligheid Windows Desktop Windows Phone Windows 10 ONE CORE OS ONE APP PLATFORM ONE STORE XBox IoT HoloLens Surface Hub on the full range of Windows devices Phone Phablet Small Tablet Large

Nadere informatie

Virtual Enterprise Centralized Desktop

Virtual Enterprise Centralized Desktop Virtual Enterprise Centralized Desktop Het gebruik van virtuele desktops en de licensering daarvan Bastiaan de Wilde, Solution Specialist Microsoft Nederland Aanleiding Steeds meer gebruik van Virtuele

Nadere informatie

Tim Akkerman - Head of Mobile

Tim Akkerman - Head of Mobile Tim Akkerman - Head of Mobile Emesa is the largest e-commerce company for searching, comparing and booking travel and leisure packages in the following categories: Holidays - Other accommodations - Hotels

Nadere informatie

Consumer billing Best practices

Consumer billing Best practices Consumer billing Best practices Jaap Jan Nienhuis 20 March 2013 tomorrow s transactions today Welcome 2 Titel subtitel. Auteur(s) datum voluit. Innopay BV. Alle rechten voorbehouden. Jaap Jan Nienhuis

Nadere informatie

Ervaringen met begeleiding FTA cursus Deployment of Free Software Systems

Ervaringen met begeleiding FTA cursus Deployment of Free Software Systems Ervaringen met begeleiding FTA cursus Deployment of Free Software Systems Frans Mofers Nederland cursusmateriaal & CAA's alle cursusmateriaal vrij downloadbaar als PDF betalen voor volgen cursus cursussite

Nadere informatie

Ius Commune Training Programme 2015-2016 Amsterdam Masterclass 16 June 2016

Ius Commune Training Programme 2015-2016 Amsterdam Masterclass 16 June 2016 www.iuscommune.eu Dear Ius Commune PhD researchers, You are kindly invited to attend the Ius Commune Amsterdam Masterclass for PhD researchers, which will take place on Thursday 16 June 2016. During this

Nadere informatie

Omnichannel klantcommunicatie. Roberto Nagel M-EDP Solutions Manager Document Dialog

Omnichannel klantcommunicatie. Roberto Nagel M-EDP Solutions Manager Document Dialog Omnichannel klantcommunicatie Roberto Nagel M-EDP Solutions Manager Document Dialog Inhoud Wat is omnichannel? Hoe kom je er? Wat betekent dit voor de documentprofessional? Omnichannel retail Winkel website

Nadere informatie

Researchcentrum voor Onderwijs en Arbeidsmarkt The role of mobility in higher education for future employability

Researchcentrum voor Onderwijs en Arbeidsmarkt The role of mobility in higher education for future employability The role of mobility in higher education for future employability Jim Allen Overview Results of REFLEX/HEGESCO surveys, supplemented by Dutch HBO-Monitor Study migration Mobility during and after HE Effects

Nadere informatie

Het beheren van mijn Tungsten Network Portal account NL 1 Manage my Tungsten Network Portal account EN 14

Het beheren van mijn Tungsten Network Portal account NL 1 Manage my Tungsten Network Portal account EN 14 QUICK GUIDE C Het beheren van mijn Tungsten Network Portal account NL 1 Manage my Tungsten Network Portal account EN 14 Version 0.9 (June 2014) Per May 2014 OB10 has changed its name to Tungsten Network

Nadere informatie

Innovative SUMP-Process in Northeast-Brabant

Innovative SUMP-Process in Northeast-Brabant Innovative SUMP-Process in Northeast-Brabant #polis14 Northeast-Brabant: a region in the Province of Noord-Brabant Innovative Poly SUMP 20 Municipalities Province Rijkswaterstaat Several companies Schools

Nadere informatie

Media en creativiteit. Winter jaar vier Werkcollege 7

Media en creativiteit. Winter jaar vier Werkcollege 7 Media en creativiteit Winter jaar vier Werkcollege 7 Kwartaaloverzicht winter Les 1 Les 2 Les 3 Les 4 Les 5 Les 6 Les 7 Les 8 Opbouw scriptie Keuze onderwerp Onderzoeksvraag en deelvragen Bespreken onderzoeksvragen

Nadere informatie

Digital municipal services for entrepreneurs

Digital municipal services for entrepreneurs Digital municipal services for entrepreneurs Smart Cities Meeting Amsterdam October 20th 2009 Business Contact Centres Project frame Mystery Shopper Research 2006: Assessment services and information for

Nadere informatie

Firewall van de Speedtouch 789wl volledig uitschakelen?

Firewall van de Speedtouch 789wl volledig uitschakelen? Firewall van de Speedtouch 789wl volledig uitschakelen? De firewall van de Speedtouch 789 (wl) kan niet volledig uitgeschakeld worden via de Web interface: De firewall blijft namelijk op stateful staan

Nadere informatie

SURFnet User Survey 2006

SURFnet User Survey 2006 SURFnet User Survey 2006 Walter van Dijk Madrid, 21 September 2006 Agenda A few facts General picture resulting from the survey Consequences for the service portfolio Consequences for the yearly innovation

Nadere informatie

ETS 4.1 Beveiliging & ETS app concept

ETS 4.1 Beveiliging & ETS app concept ETS 4.1 Beveiliging & ETS app concept 7 juni 2012 KNX Professionals bijeenkomst Nieuwegein Annemieke van Dorland KNX trainingscentrum ABB Ede (in collaboration with KNX Association) 12/06/12 Folie 1 ETS

Nadere informatie

Appendix A: List of variables with corresponding questionnaire items (in English) used in chapter 2

Appendix A: List of variables with corresponding questionnaire items (in English) used in chapter 2 167 Appendix A: List of variables with corresponding questionnaire items (in English) used in chapter 2 Task clarity 1. I understand exactly what the task is 2. I understand exactly what is required of

Nadere informatie

Internetbanking security challenges and co-operation. Patrick Wynant Manager Banking Operations (Febelfin)

Internetbanking security challenges and co-operation. Patrick Wynant Manager Banking Operations (Febelfin) Internetbanking security challenges and co-operation Patrick Wynant Manager Banking Operations (Febelfin) AGENDA I. Evolution internetbanking II. Co-operation: between banks with authorities III. Communication

Nadere informatie

Uitnodiging Security Intelligence 2014 Dertiende editie: Corporate IAM

Uitnodiging Security Intelligence 2014 Dertiende editie: Corporate IAM Uitnodiging Security Intelligence 2014 Dertiende editie: Corporate IAM 5 maart 2014 De Beukenhof Terweeweg 2-4 2341 CR Oegstgeest 071-517 31 88 Security Intelligence Bijeenkomst Corporate IAM On the Internet,

Nadere informatie

Session Educa-on. 14-15 October 2013

Session Educa-on. 14-15 October 2013 Session Educa-on 14-15 October 2013 FIRE facilities in education: Networking courses (fixed and wireless) IP fixed networks ComNet Labs Build your own network [Lab router] Calculate IP ranges According

Nadere informatie

Work to Work mediation

Work to Work mediation Work to Work mediation Mobility Centre Automotive Theo Keulen 19-9-2008 Policy Context Flexibility,mobility and sustainable employability are key words in modern labour market policy Work to work arrangements

Nadere informatie

Certified Ethical Hacker v9 (CEH v9)

Certified Ethical Hacker v9 (CEH v9) Certified Ethical Hacker v9 (CEH v9) Opleiding van 8 sessies Start: 18-02-2016, Tramstraat 63, 9052 Zwijnaarde Lesdata van deze opleiding: 18/02/2016 ( 09:00-12:00 ) 18/02/2016 ( 13:00-16:00 ) 19/02/2016

Nadere informatie

Enterprise Architectuur. een duur begrip, maar wat kan het betekenen voor mijn gemeente?

Enterprise Architectuur. een duur begrip, maar wat kan het betekenen voor mijn gemeente? Enterprise Architectuur een duur begrip, maar wat kan het betekenen voor mijn gemeente? Wie zijn we? > Frederik Baert Director Professional Services ICT @frederikbaert feb@ferranti.be Werkt aan een Master

Nadere informatie

The Control Room of the Future

The Control Room of the Future Even voorstellen: Prodek Automation products Opgericht in 2001 Importeur / distributeur Opleiding / levering / advies / consultancy / dienstverlening Joop de Kwant Directeur Hoe ziet de toekomstige controle

Nadere informatie

WWW.EMINENT-ONLINE.COM

WWW.EMINENT-ONLINE.COM WWW.EMINENT-OINE.COM HNDLEIDING USERS MNUL EM1016 HNDLEIDING EM1016 USB NR SERIEEL CONVERTER INHOUDSOPGVE: PGIN 1.0 Introductie.... 2 1.1 Functies en kenmerken.... 2 1.2 Inhoud van de verpakking.... 2

Nadere informatie

Talentmanagement in tijden van crisis

Talentmanagement in tijden van crisis Talentmanagement in tijden van crisis Drs. Bas Puts Page 1 Copyright Siemens 2009. All rights reserved Mission: Achieving the perfect fit Organisatie Finance Sales Customer Engineering Project management

Nadere informatie

VMWORLD 2011 US WRAP

VMWORLD 2011 US WRAP VMWORLD 2011 US WRAP UP VIKTOR VAN DEN BERG MARCEL VAN OS WELKOM ELKOM & A & AGENDA Viktor van den Berg, Dutch VMUG Leader Marcel van Os, Senior Technical Trainer @ XTG Agenda VMUG Update (Viktor) VMware

Nadere informatie

Stephanie van Dijck De integrale aanpak maakt complexiteit hanteerbaar

Stephanie van Dijck De integrale aanpak maakt complexiteit hanteerbaar Titel, samenvatting en biografie Stephanie van Dijck De integrale aanpak maakt complexiteit hanteerbaar Samenvatting: Nieuwe projecten nemen toe in complexiteit: afhankelijkheden tussen software componenten,

Nadere informatie

Klant. Klant - Branche: Industrie - > 20000 employees - Vestigingen in > 25 landen. Specifiek - Profitabele, kosten gedreven strategy

Klant. Klant - Branche: Industrie - > 20000 employees - Vestigingen in > 25 landen. Specifiek - Profitabele, kosten gedreven strategy Klant Klant - Branche: Industrie - > 20000 employees - Vestigingen in > 25 landen Specifiek - Profitabele, kosten gedreven strategy IT characteristics - Constante verandering: organsiatie, techniek, processen.

Nadere informatie

The Future of Mobility and Smartphone. Door Teus van der Plaat (BTG)

The Future of Mobility and Smartphone. Door Teus van der Plaat (BTG) The Future of Mobility and Smartphone Door Teus van der Plaat (BTG) The future of Mobility & smartphone INHOUD PRESENTATIE 1 Huidige markt situatie Marktaandelen Financieel Start ups 2 Wat gaat er gebeuren?

Nadere informatie

Introduction to IBM Cognos Express = BA 4 ALL

Introduction to IBM Cognos Express = BA 4 ALL Introduction to IBM Cognos Express = BA 4 ALL Wilma Fokker, IBM account manager BA Ton Rijkers, Business Project Manager EMI Music IBM Cognos Express Think big. Smart small. Easy to install pre-configured

Nadere informatie

BiZZdesign. Bouwen van sterke en wendbare organisaties met behulp van standaarden, methode, technieken en tools. Research & Development

BiZZdesign. Bouwen van sterke en wendbare organisaties met behulp van standaarden, methode, technieken en tools. Research & Development BiZZdesign Bouwen van sterke en wendbare organisaties met behulp van standaarden, methode, technieken en tools Research & Development 1 Profile CV Joost Niehof Name Grade Nationality Residence Role Joost

Nadere informatie

Screen Design. Deliverable 3 - Visual Design. Pepijn Gieles 0877217 19-12-2014. Docent: Jasper Schelling

Screen Design. Deliverable 3 - Visual Design. Pepijn Gieles 0877217 19-12-2014. Docent: Jasper Schelling Screen Design Deliverable 3 - Visual Design Pepijn Gieles 0877217 19-12-2014 Docent: Jasper Schelling Hulp bij het inloggen Inloggen Particulier Personal Banking Private Banking Zakelijk Zoeken in Particulier

Nadere informatie

Opgave 2 Geef een korte uitleg van elk van de volgende concepten: De Yield-to-Maturity of a coupon bond.

Opgave 2 Geef een korte uitleg van elk van de volgende concepten: De Yield-to-Maturity of a coupon bond. Opgaven in Nederlands. Alle opgaven hebben gelijk gewicht. Opgave 1 Gegeven is een kasstroom x = (x 0, x 1,, x n ). Veronderstel dat de contante waarde van deze kasstroom gegeven wordt door P. De bijbehorende

Nadere informatie

HEGRID EIT ICT LABS HEGRID 2013-2014 TNO. Hybrid Energy GRID Management. TNO, Siemens, KIT, Deutsche Telekom, UT, TU/e, VTT, CWI

HEGRID EIT ICT LABS HEGRID 2013-2014 TNO. Hybrid Energy GRID Management. TNO, Siemens, KIT, Deutsche Telekom, UT, TU/e, VTT, CWI HEGRID Hybrid Energy GRID Management EIT ICT LABS HEGRID 2013-2014 TNO TNO, Siemens, KIT, Deutsche Telekom, UT, TU/e, VTT, CWI 1 Doel en verwachte resultaten Doel: realiseren van een Open HybridEnergy

Nadere informatie

Aim of this presentation. Give inside information about our commercial comparison website and our role in the Dutch and Spanish energy market

Aim of this presentation. Give inside information about our commercial comparison website and our role in the Dutch and Spanish energy market Aim of this presentation Give inside information about our commercial comparison website and our role in the Dutch and Spanish energy market Energieleveranciers.nl (Energysuppliers.nl) Founded in 2004

Nadere informatie

Signal from the Stream

Signal from the Stream Signal from the Stream How social technologies are changing business. Eugenie van Wiechen http://nl.linkedin.com/in/eugenievanwiechen Sanoma Uitgevers LinkedIn EMEA Eugenie van Wiechen McKinsey LinkedIn

Nadere informatie

Understanding and being understood begins with speaking Dutch

Understanding and being understood begins with speaking Dutch Understanding and being understood begins with speaking Dutch Begrijpen en begrepen worden begint met het spreken van de Nederlandse taal The Dutch language links us all Wat leest u in deze folder? 1.

Nadere informatie

Innovaties in de chronische ziekenzorg 3e voorbeeld van zorginnovatie. Dr. J.J.W. (Hanneke) Molema, Prof. Dr. H.J.M.

Innovaties in de chronische ziekenzorg 3e voorbeeld van zorginnovatie. Dr. J.J.W. (Hanneke) Molema, Prof. Dr. H.J.M. Innovaties in de chronische ziekenzorg 3e voorbeeld van zorginnovatie Dr. J.J.W. (Hanneke) Molema, Prof. Dr. H.J.M. (Bert) Vrijhoef Take home messages: Voor toekomstbestendige chronische zorg zijn innovaties

Nadere informatie

Ontwikkelingen binnen Integratie

Ontwikkelingen binnen Integratie Ontwikkelingen binnen Integratie Informatica & Economie Integratie 1 Recap Innovatie Silicon Valley Financiering Engineering Nieuwe methodes Modelleren Outline Cloud Business Intelligence Big Data Internet

Nadere informatie

HBFF Training & Consultancy

HBFF Training & Consultancy HBFF Training & Consultancy Business English, level A Business English, Level B Business English, Level C Business Writing Skills One-to-one trainings GENERAL COURSES HBFF Training & Consultancy Verwersstraat

Nadere informatie

Interessegroep Critical Chain Interessegroep Critical Chain. Agenda. Richard Smal Voorzitter Critical Chain Interesse Groep

Interessegroep Critical Chain Interessegroep Critical Chain. Agenda. Richard Smal Voorzitter Critical Chain Interesse Groep IPMA Grote projecten plannen: How to plan a battleship! Aarle Rixtel, 24 april 2014 Richard Smal Voorzitter Interesse Groep 20:00 of Critical Change 1 Met dank aan onze sponsors Doelstellingen IPMA Critical

Nadere informatie

Digitalisering van de voedselketen

Digitalisering van de voedselketen Digitalisering van de voedselketen Patrick Roelandt Director Strategy, Technology & Business Innovation @PatrickRoelandt 26/11/2014 http://nl.linkedin.com/in/patrickroelandt Version: [###] Classification:

Nadere informatie

Creating a marketplace where expertise is made available through videoconferencing. Roland Staring Community Support Manager roland.staring@surfnet.

Creating a marketplace where expertise is made available through videoconferencing. Roland Staring Community Support Manager roland.staring@surfnet. Expert at a distance Creating a marketplace where expertise is made available through videoconferencing Roland Staring Community Support Manager roland.staring@surfnet.nl Working together for education

Nadere informatie

Usage guidelines. About Google Book Search

Usage guidelines. About Google Book Search This is a digital copy of a book that was preserved for generations on library shelves before it was carefully scanned by Google as part of a project to make the world s books discoverable online. It has

Nadere informatie

Over dit boek. Richtlijnen voor gebruik

Over dit boek. Richtlijnen voor gebruik Over dit boek Dit is een digitale kopie van een boek dat al generaties lang op bibliotheekplanken heeft gestaan, maar nu zorgvuldig is gescand door Google. Dat doen we omdat we alle boeken ter wereld online

Nadere informatie

The Power of N. Novell File Management Products. Dupaco Cafe. Anthony Priestman Sr. Solution Architect Novell Inc.

The Power of N. Novell File Management Products. Dupaco Cafe. Anthony Priestman Sr. Solution Architect Novell Inc. The Power of N Novell File Management Products Dupaco Cafe Anthony Priestman Sr. Solution Architect Novell Inc. Twentieth Century Fox Data Governance Beheren en monitoren van toegang File Management Zoek

Nadere informatie

Rolf Driesen, 15de Overheidscongres, 21 Oktober 2014

Rolf Driesen, 15de Overheidscongres, 21 Oktober 2014 If you have a client logo or other co-branding to include, this should go here. It should never be larger than the Deloitte logo. Waarom kiezen voor een shared services center? Succesfactoren en valkuilen

Nadere informatie

Ctrl Ketenoptimalisatie Slimme automatisering en kostenreductie

Ctrl Ketenoptimalisatie Slimme automatisering en kostenreductie Ctrl Ketenoptimalisatie Slimme automatisering en kostenreductie 1 Ctrl - Ketenoptimalisatie Technische hype cycles 2 Ctrl - Ketenoptimalisatie Technologische trends en veranderingen Big data & internet

Nadere informatie

Expertise seminar SURFfederatie and Identity Management

Expertise seminar SURFfederatie and Identity Management Expertise seminar SURFfederatie and Identity Management Project : GigaPort3 Project Year : 2010 Project Manager : Albert Hankel Author(s) : Eefje van der Harst Completion Date : 24-06-2010 Version : 1.0

Nadere informatie

o Theo Glaudemans Business Refresher theo.glaudemans@limebizz.nl o Rens Eijgermans Business Refresher rens.eijgermans@limebizz.nl

o Theo Glaudemans Business Refresher theo.glaudemans@limebizz.nl o Rens Eijgermans Business Refresher rens.eijgermans@limebizz.nl o Theo Glaudemans Business Refresher theo.glaudemans@limebizz.nl o Rens Eijgermans Business Refresher rens.eijgermans@limebizz.nl o Heb je vragen of geef je mening en reactie op deze presentatie via

Nadere informatie

CREATING VALUE THROUGH AN INNOVATIVE HRM DESIGN CONFERENCE 20 NOVEMBER 2012 DE ORGANISATIE VAN DE HRM AFDELING IN WOELIGE TIJDEN

CREATING VALUE THROUGH AN INNOVATIVE HRM DESIGN CONFERENCE 20 NOVEMBER 2012 DE ORGANISATIE VAN DE HRM AFDELING IN WOELIGE TIJDEN CREATING VALUE THROUGH AN INNOVATIVE HRM DESIGN CONFERENCE 20 NOVEMBER 2012 DE ORGANISATIE VAN DE HRM AFDELING IN WOELIGE TIJDEN Mieke Audenaert 2010-2011 1 HISTORY The HRM department or manager was born

Nadere informatie

Handleiding Installatie ADS

Handleiding Installatie ADS Handleiding Installatie ADS Versie: 1.0 Versiedatum: 19-03-2014 Inleiding Deze handleiding helpt u met de installatie van Advantage Database Server. Zorg ervoor dat u bij de aanvang van de installatie

Nadere informatie

User Centred Development. UCD Werkcollege blok 1 week 4

User Centred Development. UCD Werkcollege blok 1 week 4 User Centred Development UCD Werkcollege blok 1 week 4 Agenda Introductie Huisregels Blok beschrijving Observatie opdracht & huiswerk Introductie Aranea Felëus Industrieel Ontwerpen Strategic Product Design

Nadere informatie

Turn-key platform Newz. Big Content & Semantics

Turn-key platform Newz. Big Content & Semantics Introduction Michel de Ru Solution architect @ Dayon 16 years experience in publishing Among others Wolters-Kluwer, Sdu (ELS) and Dutch Railways Specialized in Content related Big Data challenges Specialized

Nadere informatie

GEO-HR: OPPORTUNITIES FOR MARITIME SECURITY OPERATIONS

GEO-HR: OPPORTUNITIES FOR MARITIME SECURITY OPERATIONS GEO-HR: OPPORTUNITIES FOR MARITIME SECURITY OPERATIONS 2nd GEO-HR User Consultation Workshop 25 April 2013 Arthur Smith TNO Defence Research 1 Who is TNO Defence Research? TNO Defence Research: Part of

Nadere informatie

Competencies atlas. Self service instrument to support jobsearch. Naam auteur 19-9-2008

Competencies atlas. Self service instrument to support jobsearch. Naam auteur 19-9-2008 Competencies atlas Self service instrument to support jobsearch Naam auteur 19-9-2008 Definitie competency The aggregate of knowledge, skills, qualities and personal characteristics needed to successfully

Nadere informatie

The role of local municipalities and labor market regions in adult education: monitoring quality

The role of local municipalities and labor market regions in adult education: monitoring quality Deze dia-indeling is zo gemaakt dat zelf een afbeelding kan worden geplaatst. Klik met de rechtermuisknop in de achtergrond en kies Achtergrond opmaken. Klik op Opvulling met figuur of bitmappatroon en

Nadere informatie

Organizational Change Driven by Vision & Courage

Organizational Change Driven by Vision & Courage Organizational Change Driven by Vision & Courage Breda, 26 Maart 2013 12 Juni 2006 H R U P D A T E H O T L I N E : ++ 4 1 2 1 6 1 8 6 1 1 8 2 Why do we need to change? All affiliates have full fledged

Nadere informatie

802.11b Wireless router w. 4 port switch. StarTech ID: BR411BWDC

802.11b Wireless router w. 4 port switch. StarTech ID: BR411BWDC 802.11b Wireless router w. 4 port switch StarTech ID: BR411BWDC Share your Internet connection without being constrained by cables with StarTech.com s 802.11b wireless router. The BR411BWDC lets you share

Nadere informatie

Over cloud-computing en Europese privacywetgeving: nu en straks

Over cloud-computing en Europese privacywetgeving: nu en straks SURFNET SEMINAR PRIVACY & DE CLOUD: DE STAND VAN ZAKEN Over cloud-computing en Europese privacywetgeving: nu en straks Gerrit-Jan Zwenne Utrecht 26 juni 2012 roadmap privacyrichtlijn 95/46/EG - verantwoordelijke

Nadere informatie

START IT now! CTO s perspective on Tomorrow s Workspace & Datacenter

START IT now! CTO s perspective on Tomorrow s Workspace & Datacenter START IT now! CTO s perspective on Tomorrow s Workspace & Datacenter 1 #itgalaxy Jerry Rozeman - jro@pqr.nl Ruben Spruijt - rsp@pqr.nl 2 This is IT: adapt or die How Tomorrow s Workspace drives productivity

Nadere informatie

Introduction to KM. Kampala CIKM Workshop 2013 Joost Lieshout

Introduction to KM. Kampala CIKM Workshop 2013 Joost Lieshout Introduction to KM Kampala CIKM Workshop 2013 Joost Lieshout Good to know Introductions Your CIKM experience Outline CIKM Sessions Tuesday Introduction to KM & Groupwork Introduction to (CI)KM Strategy

Nadere informatie

Future of the Financial Industry

Future of the Financial Industry Future of the Financial Industry Herman Dijkhuizen 22 June 2012 0 FS environment Regulatory & political pressure and economic and euro crisis 1 Developments in the sector Deleveraging, regulation and too

Nadere informatie

Meet your mentor and coach

Meet your mentor and coach Young Professional Program The importance of having a mentor in business Meet your mentor and coach What do Larry Page, and Steve Jobs have in common? They ve all received guidance from mentors. Yes even

Nadere informatie

Next Generation Poultry Health Redt Innovatie de Vleeskuikenhouder?

Next Generation Poultry Health Redt Innovatie de Vleeskuikenhouder? Next Generation Poultry Health Redt Innovatie de Vleeskuikenhouder? Paul Louis Iske Professor Open Innovation & Business Venturing, Maastricht University De wereld wordt steeds complexer Dit vraagt om

Nadere informatie

Interaction Design for the Semantic Web

Interaction Design for the Semantic Web Interaction Design for the Semantic Web Lynda Hardman http://www.cwi.nl/~lynda/courses/usi08/ CWI, Semantic Media Interfaces Presentation of Google results: text 2 1 Presentation of Google results: image

Nadere informatie

Introduction Henk Schwietert

Introduction Henk Schwietert Introduction Henk Schwietert Evalan develops, markets and sells services that use remote monitoring and telemetry solutions. Our Company Evalan develops hard- and software to support these services: mobile

Nadere informatie

1. In welk deel van de wereld ligt Nederland? 2. Wat betekent Nederland?

1. In welk deel van de wereld ligt Nederland? 2. Wat betekent Nederland? First part of the Inburgering examination - the KNS-test Of course, the questions in this exam you will hear in Dutch and you have to answer in Dutch. Solutions and English version on last page 1. In welk

Nadere informatie

Quick scan method to evaluate your applied (educational) game. Validated scales from comprehensive GEM (Game based learning Evaluation Model)

Quick scan method to evaluate your applied (educational) game. Validated scales from comprehensive GEM (Game based learning Evaluation Model) WHAT IS LITTLE GEM? Quick scan method to evaluate your applied (educational) game (light validation) 1. Standardized questionnaires Validated scales from comprehensive GEM (Game based learning Evaluation

Nadere informatie

Concept development. Haga Hospital. 17 september 2015

Concept development. Haga Hospital. 17 september 2015 Concept development Haga Hospital 17 september 2015 Marije Talstra 2015 Healthcare consultant at fluent 2003-2015 Healthcare consultant at Twynstra Gudde TUDelft, real estate & housing, urban planning

Nadere informatie

From Padua to Groningen

From Padua to Groningen From Padua to Groningen The effects of the CercleS Seminar in Padua in 2009 on writing Nederlands in gang (0-A2) Berna de Boer Benvenuti a tutti! Contents I. State of affairs in September 2009 II. The

Nadere informatie

Welkom! Michael Sourbron.

Welkom! Michael Sourbron. Make IT personal Welkom! Michael Sourbron Michael.Sourbron@callexcell.be François Gysbertsen François.Gysbertsen@callexcell.be GertJan Coolen GertJan.Coolen@frontline.nl Agenda Introductie Engage uw klant

Nadere informatie

Voorkom pijnlijke verrassingen Nieuwe Controleaanpak Belastingdienst. Presentator: Remko Geveke

Voorkom pijnlijke verrassingen Nieuwe Controleaanpak Belastingdienst. Presentator: Remko Geveke Voorkom pijnlijke verrassingen Nieuwe Controleaanpak Belastingdienst Presentator: Remko Geveke Start webinar: 08:30 uur Agenda Nieuwe Controleaanpak Belastingdienst Verticaal Toezicht vs. Horizontaal Toezicht

Nadere informatie

De Enterprise Security Architectuur

De Enterprise Security Architectuur De Enterprise Security Architectuur Martijn Doedens Security Consultant Peter Mesker CTO IT SECURITY IS TOPSPORT! Wat is de definitie?! Een enterprise security architectuur omvat alle noodzakelijke elementen

Nadere informatie

Comics FILE 4 COMICS BK 2

Comics FILE 4 COMICS BK 2 Comics FILE 4 COMICS BK 2 The funny characters in comic books or animation films can put smiles on people s faces all over the world. Wouldn t it be great to create your own funny character that will give

Nadere informatie

Model driven Application Delivery

Model driven Application Delivery Model driven Application Delivery Fast. Flexible. Future-proof. How Agis streamlines health procurement using Mendix Model driven Application Platform Mendix in a nutshell Mendix delivers the tools and

Nadere informatie

Safety Values in de context van Business Strategy.

Safety Values in de context van Business Strategy. Safety Values in de context van Business Strategy. Annick Starren en Gerard Zwetsloot (TNO) Papendal, 31 maart 2015. NVVK sessie Horen, Zien en Zwijgen. Safety Values in de context van Business strategy.

Nadere informatie

Marketing & Communications DNS.be 2010 & 2011. 28 april 2011

Marketing & Communications DNS.be 2010 & 2011. 28 april 2011 Marketing & Communications DNS.be 2010 & 2011 28 april 2011 CENTR Marketing Workshop April 2011 - Helsinki 2 Agenda Campaign 2010: Goal Campaign Results & Learnings Market research: Goal Outcome Learnings

Nadere informatie

Software Defined Datacenter Visie van Cisco. Erwin uit de Bos Datacenter Strategie Specialist NL euitdebo@cisco.com Versie: 5 februari 2015

Software Defined Datacenter Visie van Cisco. Erwin uit de Bos Datacenter Strategie Specialist NL euitdebo@cisco.com Versie: 5 februari 2015 Software Defined Datacenter Visie van Cisco Erwin uit de Bos Datacenter Strategie Specialist NL euitdebo@cisco.com Versie: 5 februari 2015 Tomorrow Starts Here. Make amazing things happen by connecting

Nadere informatie

Nieuwsbrief NRGD. Editie 11 Newsletter NRGD. Edition 11. pagina 1 van 5. http://nieuwsbrieven.nrgd.nl/newsletter/email/47

Nieuwsbrief NRGD. Editie 11 Newsletter NRGD. Edition 11. pagina 1 van 5. http://nieuwsbrieven.nrgd.nl/newsletter/email/47 pagina 1 van 5 Kunt u deze nieuwsbrief niet goed lezen? Bekijk dan de online versie Nieuwsbrief NRGD Editie 11 Newsletter NRGD Edition 11 17 MAART 2010 Het register is nu opengesteld! Het Nederlands Register

Nadere informatie

[ ] OVER ASCOM HARRY WASSENS, SALES DIRECTOR. Over Ascom Harry Wassens 13-10-11 Ascom (Nederland) B.V.

[ ] OVER ASCOM HARRY WASSENS, SALES DIRECTOR. Over Ascom Harry Wassens 13-10-11 Ascom (Nederland) B.V. [ ] OVER ASCOM HARRY WASSENS, SALES DIRECTOR 1 ASCOM Ascom employs about 2.300 people worldwide Ascom has subsidiaries in 20 countries In H1/2011 Ascom generated revenues of 253.1 MCHF with an EBITDA margin

Nadere informatie

Registratie- en activeringsproces voor de Factuurstatus Service NL 1 Registration and activation process for the Invoice Status Service EN 11

Registratie- en activeringsproces voor de Factuurstatus Service NL 1 Registration and activation process for the Invoice Status Service EN 11 QUICK GUIDE B Registratie- en activeringsproces voor de Factuurstatus Service NL 1 Registration and activation process for the Invoice Status Service EN 11 Version 0.14 (July 2015) Per May 2014 OB10 has

Nadere informatie

Healthy people want everything, sick people want only one thing. would love to see a Hospital Teacher

Healthy people want everything, sick people want only one thing. would love to see a Hospital Teacher Healthy people want everything, sick people want only one thing. would love to see a Hospital Teacher Consultant Education Sick Pupils Educational Service Centre University Medical Centre The Netherlands

Nadere informatie

Hoe met Windows 8 te verbinden met NDI Remote Office (NDIRO) How to connect With Windows 8 to NDI Remote Office (NDIRO

Hoe met Windows 8 te verbinden met NDI Remote Office (NDIRO) How to connect With Windows 8 to NDI Remote Office (NDIRO Handleiding/Manual Hoe met Windows 8 te verbinden met NDI Remote Office (NDIRO) How to connect With Windows 8 to NDI Remote Office (NDIRO Inhoudsopgave / Table of Contents 1 Verbinden met het gebruik van

Nadere informatie

Workflow en screenshots Status4Sure

Workflow en screenshots Status4Sure Workflow en screenshots Status4Sure Inleiding Het Status4Sure systeem is een ICT oplossing waarmee de transportopdrachten papierloos door het gehele proces gaan. De status kan gevolgd worden door de logistieke

Nadere informatie

OVERGANGSREGELS / TRANSITION RULES 2007/2008

OVERGANGSREGELS / TRANSITION RULES 2007/2008 OVERGANGSREGELS / TRANSITION RULES 2007/2008 Instructie Met als doel het studiecurriculum te verbeteren of verduidelijken heeft de faculteit FEB besloten tot aanpassingen in enkele programma s die nu van

Nadere informatie