Security As a Brand Security Makes All the Difference: How Highly Complex Security Features Protect Against Forgery and Misuse 34

Total Page:16

File Type:pdf, Size:1020Kb

Security As a Brand Security Makes All the Difference: How Highly Complex Security Features Protect Against Forgery and Misuse 34 www.bundesdruckerei.de COMPANY BROCHURE 2014 Contents EDITORIAL Protection against attacks 3 Bundesdruckerei in figures 4 The Bundesdruckerei Group 5 I. FULL ID | GOVERNANCE Defence shield for companies How companies protect their data and communications and how processes can be implemented effciently 6 II. FULL ID | CITIZEN Who is it really? Identity protection: How ID documents prove identity beyond a trace of doubt and how border controls are becoming more effective and secure 24 III. FULL ID | OB JECTS Security as a brand Security makes all the difference: How highly complex security features protect against forgery and misuse 34 IV. BUNDESDRUCKEREI GMBH Be part of the future Bundesdruckerei – a popular employer in the region and an innovator for the academic sector 40 References & publishing details 48 3 Protection against attacks What we are seeing today is the global networking of goods and services. Industry 4.0 is the topic of the day. The networked factory where machines and workpieces permanently exchange information is now reality. Many industrial companies are working with networked production sites. However, when we produce in networks, when data is exchanged across borders together with freight and goods, when work takes place in mobile environments, we also have to ask how these processes can be made secure and how the related data fows can be suffciently protected. Furthermore, we must be able to rely on the identity of the people, objects and processes involved, i.e. we must be able to trust them. In a nutshell, what we need is authentic, secure and binding communication. We still have work to do here. Industry association Bitkom has warned against digital carelessness. Digitised production processes not only offer huge oppor tunities, they also pose enormous risks. The increase in the number of cyber attacks is a threat to competitiveness and to the intellectual property of successful companies. The damage caused by data and identity theft is worth billions. And as easy as it is today to do business around globe, the new risks arising are often casually accepted. We at Bundesdruckerei believe that it is a task for society as a whole to protect digital infrastructures, processes and data, as well as digital identities. As a leading high-security company, we have assumed responsibility for Germany. With our expertise in identity management and our innovative strength, we see ourselves as a technology partner for private companies and public authorities who need to secure their digital infrastructures and production workfows. With our Full ID | Governance, we not only supply technological solutions, but complete, holistic IT security strategies based on secure digital identities. After all, we ourselves are a medium-sized production company and all too aware of the need for security at companies like ours. In other words, we know what we’re talking about when it comes to digitisation. Ulrich Hamann CEO Bundesdruckerei GmbH 4 5 The Bundesdruckerei Group Bundesdruckerei in figures Subsidiaries Shareholdings D-TRUST GmbH Shanghai Mite Speciality & Certifed trust service provider Precision Printing Co. Ltd. 2014 2013 2012 – Electronic signatures – ID documents for China – PKI products and services Sales 453.4 398.6 453.7 – eID service provider of which ID 391.5 333.9 391.6 Emirates German of which banknotes / other 61.9 64.7 62.1 Security Printing LLC Personnel expenses 117.8 113.3 108.7 Maurer Electronics GmbH – ID and security solutions Investment in tangible assets, software, licenses 30.8 32.4 58.0 Secure ID development centre – UAE and the Middle East – ID systems Depreciation on tangible assets, software, licenses 24.0 25.4 27.8 – Personalisation systems Earnings before interest, taxes, depreciation and 96.3 99.5 124.2 amortization DERMALOG Identifcation in € million Systems GmbH iNCO Spółka z o.o. – Automated fngerprint – Data capture and production of identifcation systems (AFIS) 2014 2013 2012 electronic publications – Scanning services Balance sheet total 840.1 824.9 808.1 cv cryptovision GmbH – Innovative cryptography Fixed assets 569.5 593.4 609.8 – Public key infrastructure (PKI) Current assets 263.9 225.5 192.2 of which liquid funds 157.4 111.9 101.6 Equity 443.7 440.4 413.1 Veridos * in € million – International ID solutions for governments * Veridos was launched on 1 January 2015. 6 7 I. FULL ID | GOVERNANCE Defence shield for companies Cyber attacks have now become a mass phenomenon. Especially companies and operating facilities are the target of digital attacks. And yet we often see a digital carelessness when it comes to security for corporate electronic data, digital processes, online communications and IT infrastructures. But with a just a little effort, a large part of these attacks could be prevented. 8 FULL ID | GOVERNANCE DEFENCE SHIELD FOR COMPANIES 9 Damage to the German economy caused by cyber attacks each year: n terms of economic output, Germany is the country that suffers the greatest damage caused by cybercrime. This was the fnding of the US Center for Strategic and International Studies (CSIS). VDI, the Association of German IEngineers, estimates the losses suffered by German companies every year due to industrial espionage and cyber attacks alone to be in the region of €100 billion. Industry association eco assumes that the threat for German companies will continue to grow in the years to come. That’s why it is vital, also increasingly with a view to competition, to protect critical business infrastructures, digital processes and the related data fows against unauthorised access. Germany rightly claims to be a country of thinkers and inventors. It is German engineering and innovations from medium-sized companies that are held in high esteem the world over, but which also whet criminal appetites. According to a survey by Forsa Institute from 2013, 77 percent of medium-sized industrial companies consider their intellectual property to be at risk. It appears to be possible for hackers to gain access at any time to corporate networks and most attacks are not noticed until it is too late. According to KPMG Consulting, 48 percent of German companies have already fallen victim to data theft. 50 billion euro This is what motivated Bundesdruckerei to develop a holistic range of solutions for companies and institutions under the name “Full ID | Governance” that bundles consulting services and technical systems to provide effcient protection of digital business workfows against attacks from both outside and within. 10 FULL ID | GOVERNANCE DEFENCE SHIELD FOR COMPANIES 11 The entire concept centres around using secure identities as keys to infrastructures, digital processes as well as electronic communications and data – from issuing The ten most frequent visitor badges at the reception desk right through to frewalls and handling of (and hence least secure) electronic invoices. passwords world-wide GoID – The employee ID card for tomorrow Secure ID for all applications In order to enter a company, there is usually a “key”, i.e. the employee ID card. It opens doors and cabinets. It can also often be used to log into the protected network. But this also means whoever has possession of the card, also has 1. 123456 access, even if this person is not an employee. And that’s where the risk lies. Bundesdruckerei has now developed a card that enables one particular thing: the unambiguous, personal identifcation of an employee. 2. 123456789 GoID is the name of this employee card for tomorrow, a card that can only be 3. 12345678 used by the authorised holder. Since the card can only be activated with the right fngerprint, theft or intentionally passing the card on to another person is now no longer a problem. The biometric data needed for this is stored directly on the 4. password card. This data is captured here only, safely stored and, when used, compared with the user’s fngerprint. Verifcation of the biometric data is carried out on and 5. qwerty with the card itself. All the holder of the card has to do is to place their fnger on the integrated sensor for doubt-free identifcation. This is referred to as “verifcation on document” and offers high data protection and security. 6. adobe123 The identity vault for your wallet 7. 1234567 What may appear to be small and insignifcant is in fact the result of several years of research. The challenge was to pack complex technology into the tiniest of space. GoID is shaped like a credit card and with its 2.5 mm is only slightly thicker. That’s 8. 111111 because room was needed to ft everything onto the card: in addition to a fnger- print sensor and a chip where the biometric data is safely stored, GoID comes with 9. 12345 an integrated display for status messages. How to power the card was the next challenge. The solution: GoID runs without batteries. The power needed is taken from the electromagnetic feld that is generated by the reading device antenna. 10. 1234567890 The card is a “universal genius”, offering the perfect balance between security and user-friendliness for every application. For instance, when entering the employee car park with its low security level, all the employee has to do is place the card on the barrier. However, access to sensitive areas, such as a server room, can be linked 12 FULL ID | GOVERNANCE DEFENCE SHIELD FOR COMPANIES 13 Six hacker attacks that 2. During the News of the World made history eavesdropping scandal, 12,800 people had their phones hacked, including thousands of celebrities and politicians. The journalists had hacked into the victims’ voicemail messages. 3. In 2012, hacker group Antisec stole from the FBI and then published a total of 12 million ID codes containing personal details of their owners.
Recommended publications
  • Selected Quality Metrics for Digital Passport Photographs Vom
    Selected Quality Metrics for Digital Passport Photographs Vom Fachbereich Informatik der Technischen Universität Darmstadt genehmigte Dissertation Zur Erlangung des akademischen Grades Doktor-Ingenieurs (Dr.-Ing.) von Oriana Yuridia González Castillo aus Cuernavaca, Morelos Mexiko Referenten der Arbeit: Prof. Dr. José L. Encarnação, Technische Universität Darmstadt Prof. Dr. Stephen Wolthusen, Royal Holloway University of London Tag der Einreichung: 26.10.2007 Tag der mündliche Prüfung: 12.12.2007 Hochschulkennziffer D17 Acknowledgements This work was developed thanks to the facilities provided by the Fraunhofer-Institute for Com- puter Graphics Darmstadt (Fraunhofer IGD), the founds provided for the Consejo Nacional de Ciencia y Tecnología (CONACyT) México and the Deutscher Akademischer Austausch Dienst (DAAD) Germany. The development of this thesis in Germany has been one of the best experiences in my life. I learned many things which I could not have learned in any other country. This thesis rep- resents the culmination of the biggest dream I ever had. I want to thank all the people who supported me to make it possible: Stephanie Buechl, Dr. Volker Roth, Dr. Christoph Busch, Prof. José L. Encarnação, Dr. Stephen Wolthusen, Dr. Martin Schmucker, Dr. Henning Daum, Dr. Ullrich Pinsdorf, Dipl. Ing. Alexander Nouak and all the colleagues of the de- partment A8 from Fraunhofer IGD in Darmstadt. I also want to thank to: Elfriede Fitschen, Elke Frank, Sabine Bartsch, Doris Müller, Barbara Merten, Carola Eichel and my friends Ana, Adriana, Francisco, Chetna, Sebastian, Jaime, Sonja, Mariza, Erica and Roberto C. My family in Mexico has played a very important role in the development of my career.
    [Show full text]
  • Download a PDF Version of the 2017 Annual Review
    Front Back Cover for Avisan.qxp_Layout 1 11/15/17 1:27 PM Page 1 Secure Technology Alliance 191 Clarksville Road Princeton Junction, New Jersey 08550 Annual Review 2017 Alliance A Secure Publication Technology 7 Volume www.securetechalliance.org Annual Review 2017 SCA-ad 2017 resized.indd 1 10/30/2017 10:40:22 AM EXECUTIVE DIRECTOR’S LETTER: A MESSAGE FROM RANDY VANDERHOOF Delivering Value to a Diverse Market Thank you for taking the time to read the 2017 Annual Review. This publication captures the best aspects of the membership experience for 2017 that hundreds of individual members and their organizations helped to provide. This year was especially sig- nificant, as the organization expanded its mission beyond smart cards and was re-branded as the Secure Technology Alliance. The new name and scope allows the Alliance to include embedded chip technology, hardware and software, and the future of digital security in all forms. The vast number of deliverables and member-driven activities recorded in the publication illustrates the diversity of the markets we serve and the commitment of all the industry professionals who contribute their knowledge and leadership toward expanding the market for smart card and related secure chip technologies. CHANGE COMES WITH NEW OPPORTUNITIES The decision to expand the mission and rebrand the organization was driven THE DECISION TO EXPAND by the changes in the secure chip industry, mostly from mobile technol- ogy and the growth of Internet-connected devices. This does not mean the THE MISSION AND REBRAND market for smart cards has disappeared. In fact, over the last few years, the THE ORGANIZATION WAS U.S.
    [Show full text]
  • Safe and Secure Model-Driven Design for Embedded Systems Letitia Li
    Safe and secure model-driven design for embedded systems Letitia Li To cite this version: Letitia Li. Safe and secure model-driven design for embedded systems. Embedded Systems. Université Paris-Saclay, 2018. English. NNT : 2018SACLT002. tel-01894734 HAL Id: tel-01894734 https://pastel.archives-ouvertes.fr/tel-01894734 Submitted on 12 Oct 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Approche Orientee´ Modeles` pour la Suretˆ e´ et la Securit´ e´ des Systemes` Embarques´ These` de doctorat de l’Universite´ Paris-Saclay prepar´ ee´ a` Telecom ParisTech Ecole doctorale n◦580 Denomination´ (STIC) NNT : 2018SACLT002 Specialit´ e´ de doctorat: Informatique These` present´ ee´ et soutenue a` Biot, le 3 septembre` 2018, par LETITIA W. LI Composition du Jury : Prof. Philippe Collet Professeur, Universite´ Coteˆ d’Azur President´ Prof. Guy Gogniat Professeur, Universite´ de Bretagne Sud Rapporteur Prof. Maritta Heisel Professeur, University Duisburg-Essen Rapporteur Prof. Jean-Luc Danger Professeur, Telecom ParisTech Examinateur Dr. Patricia Guitton
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Artificial Intelligence (AI) in Security Aspects of Industrie 4.0 Imprint
    RESULT PAPER Artificial Intelligence (AI) in Security Aspects of Industrie 4.0 Imprint Publisher Federal Ministry for Economic Affairs and Energy (BMWi) Public Relations Division 11019 Berlin www.bmwi.de Editorial responsibility Plattform Industrie 4.0 Bertolt-Brecht-Platz 3 10117 Berlin Design PRpetuum GmbH, Munich Status February 2019 Image credits Gorodenkoff – Fotolia (title), ipopba – iStockphoto (p. 5, p. 6), matejmo– iStockphoto (p. 13, p. 17), monsitj – iStockphoto (p. 23) You can obtain this and other brochures from: Federal Ministry for Economic Affairs and Energy (BMWi) Public Relations Email: [email protected] www.bmwi.de Central ordering service: Tel.: +49 30 182722721 Fax: +49 30 18102722721 This brochure is published as part of the public relations work of the Federal Ministry for Economic Affairs and Energy. It is distributed free of charge and is not intended for sale. The distribution of this brochure at campaign events or at infor- mation stands run by political parties is prohibited, and political party-related information or advertising shall not be inserted in, printed on, or affixed to this publication. 2 Contents Introduction . 3. Management Summary . 4. 1. Artificial Intelligence: Definition and Categories ..................................................................................................................................................... 6 1.1 Historical development – Phases of artificial intelligence......................................................................................................................
    [Show full text]
  • Combined Management Report
    15 Content Combined Management Report Our Group 16 Finances and strategy 16 2019 fiscal year 21 Business focus 22 Growth drivers 29 Group strategy 37 Human Resources strategy 39 The segments 40 Automotive 45 Industrial Power Control 49 Power Management & Multimarket 52 Digital Security Solutions 56 Research and development 60 Operations 62 Internal management system 65 Sustainability at Infineon 65 The Infineon share Our 2019 fiscal year 68 Group performance 68 Review of results of operations 73 Review of financial condition 76 Review of liquidity 79 Report on outlook, risk and opportunity 79 Outlook This report combines the Group Management 83 Risk and opportunity report Report of Infineon (“Infineon” or “Group”) – comprising Infineon Technologies AG (hereafter also referred to as “the Company”) and its 95 Overall statement on Infineon’s financial condition consolidated subsidiaries – and the Management 96 Infineon Technologies AG Report of Infineon Technologies AG. 99 Corporate Governance The Combined Management Report contains forward-looking statements about the business, 99 Information pursuant to section 289a, paragraph 1, financial condition and earnings performance and section 315a, paragraph 1, of Infineon. These statements are based on assumptions and projections based on currently of the German Commercial Code (HGB) available information and present estimates. They 102 Statement on Corporate Governance pursuant are subject to a multitude of uncertainties and risks. Actual business development may therefore to section 289f, 315d of the German Commercial differ materially from what has been expected. Code (HGB)/Corporate Governance Report Beyond disclosure requirements stipulated by law, Infineon does not undertake any obligation to 103 Compensation report update forward-looking statements.
    [Show full text]
  • EAFE EQUITY 2020 Year End Report
    EAFE EQUITY 2020 Year End Report COMPOSITE PERFORMANCE (% TOTAL RETURN) FOR PERIODS ENDED DECEMBER 31, 20201 SINCE 3 MONTHS 1 YEAR 3 YEARS2 5 YEARS2 10 YEARS2 INCEPTION2,3 HL EAFE EQUITY (GROSS OF FEES) 14.94 23.89 11.50 13.92 9.54 10.85 HL EAFE EQUITY (NET OF FEES) 14.82 23.26 10.91 13.32 8.92 10.23 MSCI EAFE INDEX4,5 16.09 8.28 4.79 7.96 6.00 6.80 1The Composite performance returns shown are preliminary; 2Annualized Returns; 3Inception Date: February 28, 2010; 4The Benchmark Index; 5Gross of withholding taxes. Please read the above performance in conjunction with the footnotes on the last page of this report. Past performance does not guarantee future results. All performance and data shown are in US dollar terms, unless otherwise noted. SECTOR EXPOSURE (%) WHAT'S INSIDE HL EAFE MSCI EAFE (UNDER) / OVER THE BENCHMARK Market Review › INFO TECHNOLOGY 21.3 8.9 After a turbulent year, and CASH 3.7 — despite an escalation in the global pandemic, international CONS STAPLES 14.2 11.0 stock markets rose dramatically HEALTH CARE 15.1 12.9 following positive results for COVID-19 vaccine trials. INDUSTRIALS 16.8 15.2 MATERIALS 9.4 7.9 Performance and Attribution › ENERGY 1.7 3.1 Sources of relative return by FINANCIALS 14.1 16.3 region and sector. REAL ESTATE 0.0 3.1 Perspective and Outlook › COMM SERVICES 1.3 5.2 We revisit our quaint worries from UTILITIES 0.0 3.9 a year ago about a “world turned upside down” by unsustainable CONS DISCRETIONARY 2.4 12.5 valuations and turn to some (14.0) (7.0) 0.0 7.0 14.0 newer concerns about regulatory threats to Big Tech.
    [Show full text]
  • 2015 Conference Program
    Conference Program ESWEEK.ORG OCTOBER 4-9, 2015 AMSTERDAM SPONSORED BY: Welcome to ESWEEK 2015 in Amsterdam! Embedded Systems Week (ESWEEK) is the premier event covering all aspects of research topic priorities, the cost of security and who is willing to pay for it or possibly embedded systems and software. By bringing together three leading conferences (CASES, accept reduced comfort. CODES+ISSS, and EMSOFT), three symposia (ESTIMedia, IoT, and RSP) and several Thursday and Friday are the days for symposia and workshops. The two established workshops and tutorials, ESWEEK allows attendees to benefit from the whole range of symposia, ESTIMEDIA (Real-time Multimedia) and RSP (Rapid System Prototyping), embedded system topics in research and development. which have been part of ESWEEK for many years, are now accompanied by a third, new The 21 regular sessions with three papers each are complemented by 7 invited sessions symposium on the Internet-of-Things. The Workshop on Design, Modeling and Evaluation focusing on new research trends or challenges. The regular sessions and special sessions of Cyber Physical Systems, CyPhy, is an established event that has joined ESWEEK for the of the three conferences are organized in four parallel tracks. There is a strong emphasis first time, just like the Embedded Operating Systems Workshop, EWiLi. WESE (education) on interaction: At the end of each session, there is a poster presentation during which and WESS (security) have been with ESWEEK for a while. There is one new workshop on all presented papers are discussed with the authors. As always, the paper selection Resiliency in Embedded Electronic Systems, REES, that is organized for the first time.
    [Show full text]
  • Recommendations for Implementing the Strategic Initiative INDUSTRIE 4.0
    Securing the future of German manufacturing industry Recommendations for implementing the strategic initiative INDUSTRIE 4.0 Final report of the Industrie 4.0 Working Group April 2013 Imprint Authors Contact details / Marketing Communication Promoters Group of the Industry-Science Office of the Industry-Science Research Alliance Research Alliance: beim Stifterverband für die Deutsche Prof. Dr. Henning Kagermann Wissenschaft Ulrike Findeklee, M.A. National Academy of Science and Engineering [email protected] (Spokesperson of the Promoters Group) Prof. forschungsunion.de Dr. Wolfgang Wahlster German Research Center for Artificial Secretariat of the Platform Industrie 4.0 Intelligence Dr. Johannes Helbig Lyoner Straße 9 60528 Deutsche Post AG Frankfurt/Main kontakt@plattform- acatech – National Academy of Science and Engineering i40.de plattform-i40.de Editorial staff Ariane Hellinger, M.A. Veronika Stumpf, M.A. With the assistance of: Christian Kobsda, B.A. acatech – National Academy of Science and Engineering Publication date: April 2013 Copy editing Linda Treugut, M.A. acatech – National Academy of Science and Engineering English translation Joaquín Blasco Dr. Helen Galloway Layout and typesetting HEILMEYERUNDSERNAU QGESTALTUNG © Copyright reserved by the authors. All rights reserved. This heilmeyerundsernau.com work and all its parts are protected by copyright. Any use not explicitly permitted by copyright law shall require the written consent of the authors. Failure to obtain this consent may result Graphics in legal action. This applies in particular to reproductions, isotype.com translations, microfilming and storage in electronic systems. The HEILMEYERUNDSERNAU QGESTALTUNG authors are not liable for the accuracy of manufacturers’ data. Contents Contents Executive summary . .. .. 04 Working group members | Authors | Technical experts .
    [Show full text]
  • White Working Class Communities in Berlin
    EUROPE’S WHITE WORKING CLASS COMMUNITIES 1 BERLIN AT HOME IN EUROPE EUROPE’S WHITE WORKING CLASS COMMUNITIES BERLIN OOSF_BERLIN_cimnegyed-20150217.inddSF_BERLIN_cimnegyed-20150217.indd CC11 22015.02.17.015.02.17. 114:21:494:21:49 ©2014 Open Society Foundations This publication is available as a pdf on the Open Society Foundations website under a Creative Commons license that allows copying and distributing the publication, only in its entirety, as long as it is attributed to the Open Society Foundations and used for noncommercial educational or public policy purposes. Photographs may not be used separately from the publication. ISBN: 9781940983196 Published by OPEN SOCIETY FOUNDATIONS 224 West 57th Street New York NY 10019 United States For more information contact: AT HOME IN EUROPE OPEN SOCIETY INITIATIVE FOR EUROPE Millbank Tower, 21-24 Millbank, London, SW1P 4QP, UK www.opensocietyfoundations.org/projects/home-europe Design by Ahlgrim Design Group Layout by Q.E.D. Publishing Printed in Hungary. Printed on CyclusOffset paper produced from 100% recycled fi bres OOSF_BERLIN_cimnegyed-20150217.inddSF_BERLIN_cimnegyed-20150217.indd CC22 22015.02.17.015.02.17. 114:21:514:21:51 EUROPE’S WHITE WORKING CLASS COMMUNITIES 1 BERLIN THE OPEN SOCIETY FOUNDATIONS WORK TO BUILD VIBRANT AND TOLERANT SOCIETIES WHOSE GOVERNMENTS ARE ACCOUNTABLE TO THEIR CITIZENS. WORKING WITH LOCAL COMMUNITIES IN MORE THAN 100 COUNTRIES, THE OPEN SOCIETY FOUNDATIONS SUPPORT JUSTICE AND HUMAN RIGHTS, FREEDOM OF EXPRESSION, AND ACCESS TO PUBLIC HEALTH AND EDUCATION. OOSF_BERLIN_cimnegyed-20150217.inddSF_BERLIN_cimnegyed-20150217.indd 1 22015.02.17.015.02.17. 114:21:514:21:51 AT HOME IN EUROPE 2 ACKNOWLEDGEMENTS Acknowledgements This city report was prepared as a part of series of reports titled Europe´s White Working Class Communities.
    [Show full text]
  • Program & Exhibits Guide
    FROM CHIPS TO SYSTEMS – LEARN TODAY, CREATE TOMORROW CONFERENCE PROGRAM & EXHIBITS GUIDE JUNE 24-28, 2018 | SAN FRANCISCO, CA | MOSCONE CENTER WEST Mark You Calendar! DAC IS IN LAS VEGAS IN 2019! MACHINE IP LEARNING ESS & AUTO DESIGN SECURITY EDA IoT FROM CHIPS TO SYSTEMS – LEARN TODAY, CREATE TOMORROW JUNE 2-6, 2019 LAS VEGAS CONVENTION CENTER LAS VEGAS, NV DAC.COM DAC.COM #55DAC GET THE DAC APP! Fusion Technology Transforms DOWNLOAD FOR FREE! the RTL-to-GDSII Flow GET THE LATEST INFORMATION • Fusion of Best-in-Class Optimization and Industry-golden Signoff Tools RIGHT WHEN YOU NEED IT. • Unique Fusion Data Model for Both Logical and Physical Representation DAC.COM • Best Full-flow Quality-of-Results and Fastest Time-to-Results MONDAY SPECIAL EVENT: RTL-to-GDSII Fusion Technology • Search the Lunch at the Marriott Technical Program • Find Exhibitors www.synopsys.com/fusion • Create Your Personalized Schedule Visit DAC.com for more details and to download the FREE app! GENERAL CHAIR’S WELCOME Dear Colleagues, be able to visit over 175 exhibitors and our popular DAC Welcome to the 55th Design Automation Pavilion. #55DAC’s exhibition halls bring attendees several Conference! new areas/activities: It is great to have you join us in San • Design Infrastructure Alley is for professionals Francisco, one of the most beautiful who manage the HW and SW products and services cities in the world and now an information required by design teams. It houses a dedicated technology capital (it’s also the city that Design-on-Cloud Pavilion featuring presentations my son is named after).
    [Show full text]
  • Equity Perspectives
    MARKET GPS EQUITY PERSPECTIVES APRIL 2021 Featuring the latest quarterly insights from our investment teams: Powerful factors coalescing for a rebound in U.S. travel and leisure Health care’s innovation shifts into high gear Technology: solutions for a sustainable future in transport Emerging market equities: China’s “smart” opportunity For professional investors only | For promotional purposes | Not for onward distribution OUR EQUITY CAPABILITIES Janus Henderson provides an active approach to equity investing. The equities platform is shaped by the belief that fundamental research is the foundation for delivering long-term, market-leading risk-adjusted returns. Independent thought and unique viewpoints are central to this approach and result in portfolios that are meaningfully different to an index. Each team expresses their individual, high-conviction ideas through processes that have evolved to suit their specific areas of the market and within robust risk control frameworks. While operating with independence, the equities teams benefit from collaboration and shared research that provide a source of portfolio ideas. The culture encourages intellectual challenge and stimulating debate to test – and ultimately strengthen – investment thinking. The success of ideas is measured by overall client outcomes with the aim to deliver consistent, long-term risk-adjusted excess returns over benchmarks and peers regardless of the investment landscape. This effort is supported by award-winning, proprietary portfolio construction technology and a cultural emphasis on the client promise. The equity teams, led by Co-Heads of Equities Alex Crooke and George Maris, include 167 investment professionals, responsible for US$219.4bn in assets under management1. The teams include those with a global perspective, those with a regional focus – US, Europe, Asia Pacific and Emerging Markets – and those invested in specialist sectors.
    [Show full text]