Call for participation: OASIS Enterprise Key Management Infrastructure TC

We would welcome your participation in this process. Thank you.
Arshad Noor
StrongAuth, Inc.
To: OASIS members & interested parties
A new OASIS technical committee is being formed. The OASIS Enterprise Key
Management Infrastructure (EKMI) Technical Committee has been proposed by the
members of OASIS listed below. The proposal, below, meets the requirements of
the OASIS TC Process [a]. The TC name, statement of purpose, scope, list of
deliverables, audience, and language specified in the proposal will constitute
the TC's official charter. Submissions of technology for consideration by the
TC, and the beginning of technical discussions, may occur no sooner than the
TC's first meeting.
This TC will operate under our 2005 IPR Policy. The eligibility
requirements for becoming a participant in the TC at the first meeting (see
details below) are that:
(a) you must be an employee of an OASIS member organization or an individual
member of OASIS;
(b) the OASIS member must sign the OASIS membership agreement [c];
(c) you must notify the TC chair of your intent to participate at least 15
days prior to the first meeting, which members may do by using the "Join this
TC" button on the TC's public page at [d]; and
(d) you must attend the first meeting of the TC, at the time and date fixed
below.
Of course, participants also may join the TC at a later time. OASIS and the TC
welcomes all interested parties.
Non-OASIS members who wish to participate may contact us about joining OASIS
[c]. In addition, the public may access the information resources maintained for
each TC: a mail list archive, document repository and public comments facility,
which will be linked from the TC's public home page at [d].
Please feel free to forward this announcement to any other appropriate lists.
OASIS is an open standards organization; we encourage your feedback.
Regards,
Mary
Mary P McRae
Manager of TC Administration, OASIS
email: mary.mcrae(AT)oasis-open.org
web: www.oasis-open.org
a) http://www.oasis-open.org/committees/process.php
b) http://www.oasis-open.org/who/intellectualproperty.php
c) See http://www.oasis-open.org/join/
d) http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=ekmi
CALL FOR PARTICIPATION
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Name
OASIS Enterprise Key Management Infrastructure (EKMI) TC
Statement of Purpose
Public Key Infrastructure (PKI) technology has been around for more than a
decade, and many companies have adopted it to solve specific problems in the
area of public-key cryptography. Public-key cryptography has been embedded in
some of the most popular tools -- web clients and servers, VPN clients and
servers, mail user agents, office productivity tools and many industry-specific
applications -- and underlies many mission-critical environments today.
Additionally, there are many commercial and open-source implementations of PKI
software products available in the market today. However, many companies across
the world have recognized that PKI by itself, is not a solution.
There is also the perception that most standards in PKI have already been
established by ISO and the PKIX (IETF), and most companies are in
operations-mode with their PKIs -- just using it, and adopting it to other
business uses within their organizations. Consequently, there is not much left
to architect and design in the PKI community.
Simultaneously, there is a new interest on the part of many companies in the
management of symmetric keys used for encrypting sensitive data in their
computing infrastructure. While symmetric keys have been traditionally managed
by applications doing their own encryption and decryption, there is no
architecture or protocol that provides for symmetric key management services
across applications, operating systems, databases, etc. While there are many
industry standards around protocols for the life-cycle management of asymmetric
(or public/private) keys -- PKCS10, PKCS7, CRMF, CMS, etc. -- however, there is
no standard that describes how applications may request similar life-cycle
services for symmetric keys, from a server and how public-key cryptography may
be used to provide such services.
Key management needs to be addressed by enterprises in its entirety -- for both
symmetric and asymmetric keys. While each type of technology will require
specific protocols, controls and management disciplines, there is sufficient
common ground in the discipline justifying the approach to look at
key-management as a whole, rather than in parts. Therefore, this TC will
address the following:
Scope
A) The TC will create use-case(s) that describe how and where
the protocols it intends to create, will be used;
B) The TC will define symmetric key management protocols,
including those for:
1. Requesting a new or existing symmetric key from a server;
2. Requesting policy information from a server related to caching of keys on the
client;
3. Sending a symmetric key to a requestor, based on a request;
4. Sending policy information to a requestor, based on a request;
5. Other protocol pairs as deemed necessary.
C) To ensure cross-implementation interoperability, the TC will create a test
suite (as described under 'Deliverables' below) that will allow different
implementations of this protocol to be certified against the OASIS standard
(when ratified);
D) The TC will provide guidance on how a symmetric key-management infrastructure
may be secured using asymmetric keys, using secure and generally accepted
practices;
E) Where appropriate, and in conjunction with other standards organizations that
focus on disciplines outside the purview of OASIS, the TC will provide input on
how such enterprise key-management infrastructures may be managed, operated and
audited;
F) The TC may conduct other activities that educate users about, and promote,
securing sensitive data with appropriate cryptography, and the use of proper
key-management techniques and disciplines to ensure appropriate protection of
the infrastructure.
List of Deliverables
1. XSchema Definitions (XSD) of the request and response protocols (by August
2007) 2. A Test Suite of conformance clauses and sample transmitted keys and
content that allows for clients and servers to be tested for conformance to the
defined protocol (by December 2007)
3. Documentation that explains the communication protocol (by August 2007)
4. Documentation that provides guidelines for how an EKMI may be built,
operated, secured and audited (by December 2007)
5. Resources that promote enterprise-level key-management: white papers,
seminars, samples, and information for developer and public use. (beginning
August 2007, continuing at least through 2008)
Anticipated Audiences:
Any company or organization that has a need for managing cryptographic keys
across applications, databases, operating systems and devices, yet desires
centralized policy-driven management of all cryptographic keys in the
enterprise. Retail, health-care, government, education, finance - every industry
has a need to protect the confidentiality of sensitive data. The TC's
deliverables will provide an industry standard for protecting sensitive
information across these, and other, industries.
Security services vendors and integrators should be able to fulfill their use
cases with the TC's key management methodologies.
Members of the OASIS PKI TC should be very interested in this new TC, since the
goals of this TC potentially may fulfill some of the goals in the charter of the
PKI TC.
Language:
English
IPR Policy:
Royalty Free on Limited Terms under the OASIS IPR Policy
Additional Non-normative information regarding the start-up of the TC:
a. Identification of similar or applicable work:
The proposers are unaware of any similar work being carried on in this exact
area. However, this TC intends to leverage the products of, and seek liaison
with, a number of other existing projects that may interoperate with or provide
functionality to the EKMI TC's planned outputs, including:
OASIS Web Services Security TC
OASIS Web Services Trust TC
W3C XMLSignature and XMLEncryption protocols and working group
OASIS Digital Signature Services TC
OASIS Public Key Infrastructure TC
OASIS XACML TC (and other methods for providing granular access-control
permissions that may be consumed or enforced by symmetic key management)
b. Anticipated contributions:
StrongAuth, Inc. anticipates providing a draft proposal for the EKMI protocol,
at the inception of the TC. The current draft can be viewed at:
http://www.strongkey.org/resources/documentation/misc/skcl-sks-protocol.html
and a working implementation of this protocol is available at:
http://sourceforge.net/projects/strongkey for interested parties.
c. Proposed working title and acronym for specification:
Symmetric Key Services Markup Language (SKSML), subject to TC's approval or
change.
d. Date, time, and location of the first meeting:
First meeting will be by teleconference at:
Date: January 16, 2007
Time: 10 AM PST, 1PM EST
Call in details: to be posted to TC list
StrongAuth has agreed to host this meeting.
e. Projected meeting schedule:
Subject to TC's approval, we anticipate monthly telephone meetings for the first
year. First version of the protocol to be voted on by Summer 2007. StrongAuth is
willing to assist by arranging for the teleconferences; we anticipate using
readily available free teleconference services.
f. Names, electronic mail addresses, of supporters:
Ken Adler, ken(AT)adler.net
June Leung,June.Leung(AT)FundServ.com
John Messing, jmessing(AT)law-on-line.com
Arshad Noor, arshad.noor(AT)strongauth.com
Davi Ottenheimer, davi(AT)poetry.org
Ann Terwilliger, aterwil(AT)isa.com
g. TC Convener:
Arshad Noor, arshad.noor(AT)strongauth.com

Hi Bilge,
did you put your text in a blender before sending it?
I understood everything works fine except the miscellaneous menu item in the configuration tab of ERM?
Have you already tried to clear all browser cache, close all browsers and try it again?
Best,
Frank

Similar Messages

  • VL 2000 Call for Participation

    VL'2000: IEEE Symposium on Visual Languages
    September 10-14, 2000
    Seattle, Washington
    http://www.cs.orst.edu/~burnett/vl2000/
    Call for Participation
    VL'2000 is the premier international conference on visual and
    multimedia languages for creating/understanding software.
    We hope you will plan to join us at this year's conference, which
    includes keynote talks by Brad Myers and Tony DeRose, a special
    session by S.-K. Chang, tutorials, satellite workshops, a social
    program to provide a sampling of some of Seattle's unique attractions,
    and more. Here are some of the details:
    Opening keynote: Brad Myers (Carnegie-Mellon University).
    Brad Myers is an extremely well known researcher in programming by
    demonstration. His topic will be "Creating More Natural Programming
    Languages," a description of his new line of research into
    deriving the design of a programming language from the results of
    human-factors experiments and principles.
    Closing keynote: Tony DeRose (Pixar Animation Studios).
    Tony DeRose is a senior scientist at Pixar, and was a major
    contributor
    to the Oscar winning short film "Geri's Game." In 1999 he received
    the ACM SIGGRAPH Computer Graphics Achievement Award. His topic
    will be "How Computer Graphics is Changing Hollywood," a behind-the-
    scenes look at how fully digital films --- such as Pixar's "A Bug's
    Life" and "Toy Story 2"--- are made, with particular emphasis on the
    role that geometry plays in the revolution.
    Tutorial -- Diagrammatic Reasoning and Visual Languages: How to draw
    upon research findings from psychology, art, mathematics, and
    human-computer interaction to design a diagrammatic visual
    language or environment.
    Tutorial -- Object-Oriented Software Development of Multimedia
    Applications with UML: UML is becoming extremely popular. This
    tutorial will introduce participants to UML diagrams, and will
    preview
    the currently proposed UML extensions to model multimedia
    applications.
    Tutorial -- Advanced Visual Modelling: Beyond UML:
    An overview of UML and some of its strengths and weaknesses, and
    alternative visual reasoning mechanisms that can be used instead of
    or in conjunction with UML.
    Tutorial -- Programming by Example Techniques: Introduction and survey
    of a broad range of techniques used in programming systems that
    allow the user to give examples of the desired behaviors and
    contents, from which the system generalizes.
    Satellite Workshop -- The Visual End User:
    http://borg.cs.dal.ca/~smedley/veu/index.html
    Satellite Workshop -- Visual Methods for Parallel/Distributed
    Programming:
    http://wwwmath.uni-muenster.de/math/u/guidow/wsvl2000/index.html
    Satellite Workshop -- Multimedia Computing on the World Wide Web:
    http://grail.cba.csuohio.edu/~mcwww2k/Vl2000.html
    Also, S.-K. Chang will be doing a special presentation on the emerging
    subarea of Multimedia Software Engineering.
    Finally, our social program this year includes two receptions, an
    excursion to Paradise on Mount Rainier, and a banquet. See the web
    page for details.
    Please join us! More information, including the advance program
    and registration details, is available at:
    http://www.cs.orst.edu/~burnett/vl2000/
    Hotel reservation deadline for the special VL rates: August 9.
    Conference registration deadline for the early rates: August 15.

    Hi John,
    Is I said in the mail I sent you, I'd be interested in having a go at this. We use TRAC in house and it would be nice to have a connector up and running for TPC.
    I'm hoping others would be willing to join in as well.
    Thanks
    Femi

  • IPTComm 2007 Call for Participation

    Please find enclosed the Call for Participation for a new conference devoted to IP telecommunications to be held in New York, July 2007. You are encouraged to circulate this message to interested colleagues, mailing lists, forums and blogs.
    Greg Bond
    IPTComm 2007 Co-Chair
    ==============================================================
    Call For Participation
    IPTComm 2007
    PRINCIPLES, SYSTEMS AND APPLICATIONS OF IP TELECOMMUNICATIONS
    19, 20 July 2007
    Columbia University
    NY, USA
    (in cooperation with ACM SIGCOMM)
    http://iptcomm.org
    Registration for IPTComm 2007 is now open! Be sure to register soon in order to qualify for the early registration discount. The conference program has been finalized. Some highlights are: a stimulating technical program, Jeff Pulver as the keynote speaker, Jonathan Rosenberg opening Day Two, a panel discussion with broad representation from industry and academia, two tutorials, and a demos program. We are now in the process of organizing some entertaining social events. Details will be available soon. Hope to see you in New York in July!

    Hi John,
    Is I said in the mail I sent you, I'd be interested in having a go at this. We use TRAC in house and it would be nice to have a connector up and running for TPC.
    I'm hoping others would be willing to join in as well.
    Thanks
    Femi

  • Catalogue of SQL and PL/SQL bad practices: Call for participation

    I started compiling a list of Oracle SQL and PL/SQL bad practices, with the intention of producing a comprehensive catalogue of common and recurring programming mistakes, that can be used as a check-list for code reviews or given to junior developers. I have identified about 30 bad practices so far. For each bad practice, I provided a list of symptoms in the code, an explanation why it causes problems and a list of preferred solutions.
    My goal with this list is primarily to start a discussion about similar recurring issues that other people have noticed. That discussion should lead to a more complete list which the community will then be able to use, hopefully, to learn something from the mistakes of others and to produce better code.
    I would really appreciate your feedback - if you are interested in discussing these practices we can either do it in this forum, or start a separate mailing list.
    You can download the first version of the catalogue in PDF form from http://gojko.net/effective-oracle
    gojko adzic
    http://gojko.net

    exception handler (already covered), the philosophy
    behind not using stored procedures, and having beenHi riedelme,
    I'm not advocating not using stored procedures, but I am advocating not using exclusively stored procedures. I've seen that approach often, typically with people coming from SQL server or Oracle forms backgrounds, I never could understand the reasons behind it. Even for a simple select or update, they would write a stored proc that wraps the call and then require the client to execute a stored proc.
    I think that views are much better for getting the data out of the database in general, and forcing people to use stored procedures with ref output cursors makes little sense. If the only possible interface is a stored proc, then one proc must be created for every required combination of data and every required filtering or grouping method, so there is much much more code in the database, and more code means harder maintenance.
    If client apps can get data out using views, then they can join them with other views, filter or group the data as they require, which means that there is a lot less code in the database to maintain.
    My other problem with stored-proc only approach is when people wrap simple insert/update/delete commands into a stored proc. Again, I'm not advocating using complex instead-of triggers to implement workflows and forcing people to use views, but I simply don't see any benefit of implementing a stored proc to do a simple update. I see a bad side of it because a stored proc needs to be implemented for every combination of columns that a client may need to update and every criteria that can be used for that. If a client is allowed to update a view, there is much less code in the database.
    Views are, in my experience, also a lot easier to maintain and optimise without downtime because they can be revalidated without causing any problems to currently connected clients, where revalidated stored procedure or package will throw an exception the first time a connected client that had called it before calls it again.
    If I'm missing something, please tell me. I'd really love to understand why someone would build a client API exclusively from stored procedures.
    So far, I've been given explanations that it is for security purposes, or for performance. I don't know of any security restriction that can be implemented on a stored procedure or package that cannot be implemented with a view, and if bound variables and statement caching is used, sql statements don't suffer from sql injection and support pre-compilation.
    Again, i'm not advocating throwing stored procs completely out, i'm against using them exclusively and throwing out any chance of SQL access.
    gojko adzic
    http://gojko.net

  • Enterprise Asset Management

    Hey.. any one worked on Enterprise Asset Management or any knowledge to use in your Project.
    Please share it.

    Hi
    You did not post your question in correct forum.
    Post your question in EAM forum, then you would get a reply for your question:
    [Enterprise Asset Management (SAP EAM);

  • Enterprise Risk Management Approach in SAP GRC

    Hi All,
    Can you please let me know  as to what is the approach followed for implementation of  Enterprise Risk Management (ERM) in SAP GRC.  Also please tell me how the internal control frameworks like COSO, COBIT is mapped to ERM in SAP GRC.
    Regards
    Vivek

    Dear Vivek,
    While assigning roles to users, you will be displayed the risks that are identified with those roles, if any. You can either mitigate or remove the roles.
    The process covered by GRC Risk management includes the following steps:
    -Risk Planning: Determines the approach to risk management in each business area or project. This includes setting up the risk management organization and defining risk thresholds . This phase is partially supported by a software application.
    -Risk Identification and Analysis: Identifies the risks in order to analyze and prioritize them along different attributes, such as probability of occurrence and potential total loss associated to the risk.
    -Risk Response: Decides on actions needed to respond to a risk. One action could be to actively mitigate the risk to reduce probability of occurrence and/or potential impact.
    -Risk Monitoring: Includes the regular update of risk information and the risk reporting to monitor progress along the risk management process.
    The Risk Management application provides a set of different reporting capabilities based on the individual needs of the target groups:
    -A set of built-in reports that are delivered with the application. These reports allow risk managers to review the current risk state.
    -Visual Composer based dashboards that provide information about the current risk status on an aggregated basis. The dashboards fulfill the risk reporting needs of senior managers and line managers.
    Step 1: You maintain the Risk structure
    1. You set up the organizational hierarchy
    2. You set up the Activity Hierarchy
    3. You set up the Risk Hierarchy
    Step 2: You perform the Risk Assessment
    1. You identify the risks
    2. You analyze the risks
    3. You respond to risks
    4. You document the Incidents
    Step 3: You analyze risk reports
    1. You generate risk reports
    2. You report the incidents
    Step 4: You analyze the dashboards
    Refer SAP documentation on GRC for more information.
    Regards,
    Naveen.

  • SAP TechEd- Enterprise Information Management Sessions

    Looking for answers on "Enterprise Information Management," check out the related educational sessions at SAP TechEd 2011 ([Las Vegas|http://bit.ly/naRRzw], [Bangalore|http://bit.ly/pad21u], [Madrid|http://bit.ly/n2X807]). [Register today|http://www.sdn.sap.com/irj/scn/sapteched]!

    Hi!
    please try this:
    https://www.sapevents.com/SAP/TechEd2006/index.cfm?PAGE_REFERER=http%3A%2F%2Fwww.sapteched.com%3A80%2Fhandouts%2Fbouncer.asp&PAB=1&add_info=callPage%3D%252522%2Fusa%2Fhandouts%2Fhome.htm%252522&fuseaction=reg.HOSLogin
    Regards
    Michael

  • Enterprise Compensation Management Info Cube

    SAP BI contains a special enterprise compensation management InfoCube and queries that can be used to analyze all compensation data in detail. Now, if one has to use R/3 4.6C for the backend compensation management, can this InfoCube (using BW 3.5 on NW '04) be leveraged?...or, does the back-end have to be upgraded to the '04 Business Suite level?
    Quick response from someone who has done it or from SAP will be highly appreciated!!!

    Bryan,
    Great response. One last question: The comment you have made about what we get with "BI Content 3.5.1 (same as BI Content 3.3 Add-on)" in terms of the "1 InfoCube, enabling the evaluation of LTI awards" is of particular interest to us. To leverage this BI content, what should be in the back end? In other words, can I leverage this BI business content using R/3 4.6C in the backend or will I need to upgrade to mySAP ERP (NW '04) and mySAP HCM?
    Thanks and regards,
    Puneet
    > Puneet,
    >
    > Yes, you can still use those in BW 3.5.  If you go to
    > the Business Content tab in the Administrator
    > Workbench you'll see them.  You can also check
    > help.sap.com and the Service Marketplace alias /bw
    > for more details on the content delivered with each
    > release.
    >
    > With BI Content 3.5.1 (same as BI Content 3.3 Add-on)
    > there is additional content delivered:
    >
    > The BW Business Content for mySAP HR Enterprise
    > Compensation Management comprises:
    >
    > <u><b>Extractors</b></u> for transferring data from
    > mySAP HR Enterprise Compensation Management (PA-EC)
    > to SAP Business Information Warehouse
    >
    > Predefined Data Models, including:
    >
    > 8 ODS objects, collecting data about compensation
    > processes, compensation budgets, employee pay
    > categories, composite market data, raw market data,
    > job matching, salary structure of jobs as well as
    > active and planned salary structures
    >
    > 5 InfoSets, providing data on compensation processes,
    > compensation budgets, Comparison of Market Data and
    > Employee Payment, Salary Survey Market Data and Job
    > Matching as well as Comparison of Salary Structure
    > Against Market
    >
    > 1 InfoCube, enabling the evaluation of LTI awards
    >
    > 24 predefined standard queries
    >
    > Increased visibility of all information around the
    > compensation management process at your enterprise.
    >
    > Thanks,
    > Bryan
    >
    >
    > Message was edited by: Bryan Katis

  • Monitoring Enterprise Manager Infrastructure

    Hello together,
    I hope this topic hasn't been asked many times before, but the keywords monitoring and enterprise manager of course generate results to a lot of different topics in the search function...
    Is there any Oracle recommended way - and if not, how could I manage it otherwise - to monitor the Enterprise Manager Infrastructure itself (OMS, repository..)?
    I know from Enterprise Manager if any of the targets fail, but how do I know when Enterprise Manager fails? Would I have to write scripts that check it notify me by myself?
    If so, which commands (in addition to the obvious emctl status oms) do you think would be important?
    Thanks in advance.

    In environments where grid control is used as a management framework tool, monitoring number of targets both from oracle and other vendors, its always a best-practice to configure high availability for grid control itself.
    Multiple Management server can be configured to provide load balancing and high availability, using beacons to monitor each other's availability.
    Kamaljeet

  • Search for records by Remote Key or Remote System in Data Manager

    Hi all,
    We have a requirement to search for records by Remote key and/or Remote System at the main table level. Is it possible to do this using the Data Manager? If so, how?
    Thanks in advance!
    Lavanya.

    Hi,
    I crosschecked with MDM 5.5 and Don't think it is possible through Data Manager. How ever using APIs you can search records using remote key/ remote system.
    Regards,
    Shiv

  • Menu Path for Enterprise Asset Management

    Dear All,
    I am new to the subject.Can anybody brief me the menu path were we can find this Enterprise Asset Management Configuration steps.
    If any body has some document regarding the configuration pls give me the link for reference,
    thanks and regards
    Praveen.J

    Praveen.J
    As far as functionality is concerned, I would take a look at the [SAP Help|http://help.sap.com/saphelp_erp60_sp/helpdata/en/b0/df293581dc1f79e10000009b38f889/frameset.htm]
    For the Customising I would recommend the [PM training courses|http://www.sapfans.com/forums/viewtopic.php?p=607188]
    These forums are usually for helping with issues, not for training...
    PeteA

  • Any best practice for Key Management with Oracle Obfuscation?

    Hi,
    I was wondering if anyone is aware if there are any best practices regarding key management when using Oracle's DBMS_OBFUSCATION_TOOLKIT? I'm particularly interested in how we can protect the encryption/decryption key that we would use.
    Thanks,
    Jim

    Oracle offers this document, which includes a strategy for what you're after:
    http://download-west.oracle.com/docs/cd/B13789_01/network.101/b10773/apdvncrp.htm#1006234
    -Chuck

  • Most Important Conference for Enterprise Content Management (ECM) marketplace in India

    Enterprise Content Management (ECM) is no longer just about
    technology, or just about content. It is about content, community,
    and context. The deluge of data and information, coupled with the
    ever-increasing need for compliance is forcing enterprises to take
    a strategic look at ECM and its associated disciplines. To stack up
    to competition, enterprises are looking up to faster, flexible, and
    efficient business processes that can channelise copious,
    unstructured information into meaningfully optimised, governed, and
    digitally delivered data that is available to the right
    stakeholders at the right time.
    C-level executives, senior IT process management personnel,
    marketing and content managers are looking to find the precise
    solution that will fit the needs of their organization. What are
    these available solutions, and how do they stack up to the needs of
    a specific enterprise? What roles do strategic topics such as
    Governance, Collaboration, Enterprise 2.0 play in the evaluation of
    these solutions? What is a promising approach, and how do I find
    the correct partners? The ECM track at Business Technology Summit
    2008 offers strategic, technical, and business insights into all
    aspects of ECM, including Business Process Management (BPM),
    Business Rules Management (BRM), Master Data Management (MDM), Data
    Warehousing & Knowledge Management, and Enterprise 2.0. The
    summit will be held 22-26 September 2008 in Mumbai and Bangalore.
    Summit website:
    http://www.btsummit.com

    * Ismael Ghalimi is the father of Office 2.0. He is also
    credited with creating the first standards-based BPMS?
    * Nitin Borwankar is the father of Data 2.0?
    * Alan Pelz Sharpe is an expert guest on BBC, CNN and ABC
    Television
    * Robert Marcus has been at the helm of technology at General
    Motors, Boeing, Rogue Wave Software, MCC and HP?
    * Peter Coffee, formerly technology editor at eWeek, has
    appeared on CBS, NBC, CNN, Fox, and PBS newscasts.
    * Kiran Datar co-introduced the concept of conferencing
    services in India
    * THAT YOU CAN REACH OUT TO ALL THESE CELEBRITY SPEAKERS AT
    BT SUMMIT 2008?
    VIEW THE COMPLETE SCHEDULE:
    http://www.btsummit.com/summitSchedule.html
    REGISTER NOW FOR AS LOW AS INR 2999/-:
    http://www.btsummit.com/registration.html

  • Enterprise Learning Management for External Learners

    I need to roll-out enterprise learning management to 300k users who need self service access to create and access their account. Does anyone have experience doing so with Enterprise Learning Management? What did you use to enable the user to create their own account? How was the account validated? How did you enable them to pay for their own class?

    Jimmy, I greatly appreciate your reply. I have never worked with ELM, I took this position to get experience in peoplesoft and experience in Project management. But sense I used to be a .Net developer I want to understand the back in of ELM more than just trying to implement ELM 9.0
    Of course I'm new to this forum as well. Any help you can give me during my process of trying to implement ELM 9.0 would be greatly appreciated.
    Currently where i'm working they are bringing in ELM guy to help with the implentation process. I will be shadowing him to learn the process and then I'll be trying to implent ELM for my gov agency as well as other agencies.
    So I will be posting ELM 9.0 questions quite frequently for the next 12- 16 months.
    Thanks again for your reply and any help you can give me in the future.
    Edited by: peebman on Feb 22, 2009 11:36 AM

  • Sign Up for NEW APJ Business Process Management Experts Call

    APJ Business Process Management Experts Call
    SAP is announcing a Business Process Management Experts Call for Asia Pacific. During this new bi-monthly call, we will share customer experiences on BPM, discuss BPM trends & directions, and discuss solutions to common BPM problems.
    Date:   20 Aug, Thursday*
    *Time:   2pm SG / 4pm Sydney / 11.30am Mumbai
    [Click here to see the full invite in your browser|http://www28.sap.com/mk/get/APJ_09_BPM_EXPERTS_AUG18_INV]
    [Sign Up Here |http://www.sap-webinars.com/bus_process_mgmt/register.php]
    On our first call, the following topics will be covered:
         u2022 Evolution to BPMN 2.0 - Learn about why Business Process Modeling Notation (BPMN) 2.0 is an important step forward for business process standards and why it needs to be in your IT and business process roadmap
         u2022 Proving the BPM ROI - Learn how an APJ customer is planning to save more than USD 20K a year from one process
         u2022 SAP's Process Modelling Strategy - Learn about the common process layer, a common design- and runtime layer for business processes catering the needs for developers, process architects as well as business process experts
    [Register for this webcast|http://www.sap-webinars.com/bus_process_mgmt/register.php] on Aug 20, Thursday at 2pm (SG) by clicking on the link above.
    Edited by: Adelyne Loke on Aug 17, 2009 10:29 AM

    SIGN UP FOR #2 BPM EXPERTS CALL ON NOV 17 (@ 1PM SG TIME)
    In this 2nd session of the BPM Experts call series, our BPM expert will share with you how BPM can be made more accessible to the general business user.
    Discover some of the upcoming technology features from SAP that can help speed up the adoption of BPM within your organization. You will learn about some of the BPM Research work we are advancing with Web 2.0 technology from Google, and look at how we can use Adobe forms for increased office productivity.
    We will also take this opportunity to share one of our customer's experiences with BPM Methodology, and why having the right methodology is important to a sustainable BPM initiative in your organization.
    Register for this webcast on Nov 17, Tuesday at 1pm (SG) below.
    To view the eDM on your browser: [Click Here|http://www28.sap.com/mk/get/SG_09_BPMXPERTS_NOV17_INV]
    REGISTER FOR BUSINESS PROCESS MANAGEMENT WEBCAST
    Date: 17 Nov, Tuesday
    Time: 1.00pm SG / 4.00 pm Sydney / 10.30am Mumbai
    [Register Here|http://sap-webinars.com/bpm_experts_call/register.php]

Maybe you are looking for