Vendor Questions and Answers

Total Page:16

File Type:pdf, Size:1020Kb

Vendor Questions and Answers COMMUNITY COLLEGE OF ALLEGHENY COUNTY PURCHASING DEPARTMENT 800 ALLEGHENY AVENUE, PITTSBURGH, PA 15233 ADDENDUM 1 REQUEST FOR PROPOSAL 3104 NETWORK ACCESS CONTROL SOLUTION APRIL 10, 2018 The following additional information is hereby made a part of this RFP: **************************************************************************** See the accompanying vendor compliance matrix. See accompanying “Addendum A” (partial listing of network devices and protocols/services/applications that NAC solution must support). The protocols include listing from the current RFPs’ appendixes. It should be noted this is not an all-inclusive list, the chosen NAC solution should support all standard protocols or provide explanation of non- support. See accompanying Addendum B - Partial listing existing desktop and server software applciartions (referred to in questions 27 on page 9 of the RFP). “Addendum C” – listing of existing college network equipment Vendor Questions and Answers: 1. What is the VPN Gateway technology being used? (sec 2.1) Fortinet FortiGate 2. Can further clarifications be made regarding "specific settings to the endpoint to operate." be identified? Is the provisioning of administrative accounts per host impacted by this function? (Section 3.1 statement 7) It is desired that the proposed NAC solution should not require or expect any specific setting or component on the end-user system to be exist or configured in order the NAC solution to provide all its functionality. If the NAC solution requires certain software component(s) to exist on the end user systems, the vendors must provide detailed information about their proposed system and how it would function in the college’s environment. 3. Please elaborate on what "relevant information" refers to, respective to information being shared with other college systems. (sec 2.3 statement 7) The college expects the proposed solution to collect and store information about network connected college and end-user devices, user activities, and the health of these connected systems. This information can be very valuable to resolve security related and operational issues. For this reason, college desires to have this information shared with other tools. ADDENDUM 1 REQUEST FOR PROPOSAL 3104 NETWORK ACCESS CONTROL SOLUTION APRIL 10, 2018 4. Is the requirement regarding copper interfaces related to CCAC's options for the placement of the NAC solution, or assumed performance requirements to satisfy CCAC's objectives? (sec 3.1 statement 32) Please refer to the RFP. 5. Please elaborate on specific expectations with an Active/Active High Availability options. (section 3.1 statement 34) In Active/Active High Availability mode the participating NAC components would handle the workloads simultaneously and load-sharing manner instead of waiting to take-over the workload as a standby. 6. Please elaborate section 3.1 statement 40. Specifically what are the open standards the vendor must consider and how does it relate to in reference to "network", "security" and leading "applications"? Can specific identification to "Leading network and security platforms and leading applications" be made? Please refer to attachment A for the network protocols that the college would like proposed NAC solution to support. If your solution does not fully support some of these network protocols, please clearly mark them as “Not Supported”. For the applications, please refer to attachment B. 7. Can further detail regarding the CCAC's network and system automation and orchestration tools be disclosed? (sec 3.1 statement 43). Are the Information Security Policies available for review? The college automation and orchestration will use industry standards. “Support of new generation of incident management systems is highly desired (i.e. Demisto, Phantom, Swimlanes, etc.” 8. How many total devices are will need to be authorized? Second are you going to have a matrix for vendors to fill out? Since the college does not track the number of endpoints that connect to its network through wired, wireless and VPN network, it desires to the NAC solution to provide an unlimited licensing model. The solutions that provide unlimited licensing model will be desired. Our estimation is about 13,000 endpoint devices. 9. Can you please provide the Addendums referenced in the RFP by the end of this week? Attached. ADDENDUM 1 REQUEST FOR PROPOSAL 3104 NETWORK ACCESS CONTROL SOLUTION APRIL 10, 2018 10. For license sizing purposes, can we find out the peak number of concurrent devices that are on the network in a 10 minute timeframe? Of those concurrent devices, what % are Windows, OSx machines? Please refer to answer 8 above. 11. Is there a compliance matrix that should be included with this? Also, can you send me the Word version of both for me to copy into my response and add comments. Attached. 12. Also, I see the schedule of events in the document, but I am curious if this will be implemented before the Edge switching would be installed? Due to fiscal yearend closings, the published schedule of events will be strictly followed. 13. Is the Windows supplicant considered an agentless deployment? In the context of this RFP, “Agentless” means the solution does not depend on configuration and/or existence of any software components on the target device. End of Addendum 1. *************************************************************************** Sign addendum and submit to the College with your proposal. ___________________________________ ____________________________________ Company Name Bidder’s Signature (Vendor contact person) ATTACHMENT 1 – Vendor Compliance Matrix RFP 3104 CCAC Network Access Control Solution Vendor must indicate at what level its proposed solution will meet the College’s requirements as delineated in the referenced sections of the RFP: Meet Fully Meet with Meet with Cannot Section Requirement with 3rd Other Comments meet Configuration Customizations Meet Party 1.0 Purpose The selected NAC solution is expected to improve information security, assure responsible governance, comply with various mandates, provide visibility and reduce operational costs associated with the detection, mitigation and management of college owned devices, end‐user owned devices (BYOD) and college owned Internet of Things (IoT). The selected NAC solution will be fully implemented and integrated with the college’s information technology systems by the vendor’s authorized professional services team on provided schedule in this RFP. To be considered responsive, vendors must submit a complete bid that satisfies all requirements as stated in this RFP and its addenda. This RFP also contains all major terms and conditions that the successful vendor will be expected to accept. The department of Information Technology Services (ITS) intends to implement the procured solutions starting in April and completed by the end of June 2018. 2.0 Project Background The network access control solution the college chooses through this RFP must be a centrally managed redundant system. The new solution will be deployed at the college’s Network Operations Centers at the Office of College Services and South Campus 1 | Page Company Name: Signed by: 1 ATTACHMENT 1 – Vendor Compliance Matrix RFP 3104 CCAC Network Access Control Solution Meet Fully Meet with Meet with Cannot Section Requirement with 3rd Other Comments meet Configuration Customizations Meet Party disaster recovery site that are connected through a high speed network over a leased fiber from a service provider to maintain operations during extended outage. The proposed systems must be scalable to the enterprise level with commensurate reliability. The proposed solution must be scalable to accommodate the college’s current and near future workloads without requiring costly upgrades. Please explain how your solution will improve its scalability and availability without being cost prohibitive. The procured network access control system is expected to be rolled out as a Greenfield system in successive phases. The integration and cut‐overs to the new solution will be phased in to minimally impact college’s operations The new solution is expected to be completed by the end of June 2018. Since the possible implementation period coincides with the preparations for the start of the Summer Term, the vendor of the selected solution is required to work with the college IT staff to fully implement the chosen solution without impacting college operations. The college’s intention is to choose a solution that provides best price/performance ratio and partner(s) that will meet the college’s requirements and demonstrate the ability to grow with us for many years to come. 2.2 Business Objectives The college employees and students are using their personal devices on college premises to access the college networks and resources including web applications, email, calendar, 2 | Page Company Name: Signed by: 2 ATTACHMENT 1 – Vendor Compliance Matrix RFP 3104 CCAC Network Access Control Solution Meet Fully Meet with Meet with Cannot Section Requirement with 3rd Other Comments meet Configuration Customizations Meet Party databases. Additionally, operational support equipment such as IoT devices are being connected to college networks to improve college operations. The proposed NAC solution must equally support these use cases and the NAC features offered through the solution must be available to support all college use cases equally. Proposed NAC solution also need to monitor and control the college owned endpoints’ access to the college
Recommended publications
  • Management of Large Sets of Image Data Capture, Databases, Image Processing, Storage, Visualization Karol Kozak
    Management of large sets of image data Capture, Databases, Image Processing, Storage, Visualization Karol Kozak Download free books at Karol Kozak Management of large sets of image data Capture, Databases, Image Processing, Storage, Visualization Download free eBooks at bookboon.com 2 Management of large sets of image data: Capture, Databases, Image Processing, Storage, Visualization 1st edition © 2014 Karol Kozak & bookboon.com ISBN 978-87-403-0726-9 Download free eBooks at bookboon.com 3 Management of large sets of image data Contents Contents 1 Digital image 6 2 History of digital imaging 10 3 Amount of produced images – is it danger? 18 4 Digital image and privacy 20 5 Digital cameras 27 5.1 Methods of image capture 31 6 Image formats 33 7 Image Metadata – data about data 39 8 Interactive visualization (IV) 44 9 Basic of image processing 49 Download free eBooks at bookboon.com 4 Click on the ad to read more Management of large sets of image data Contents 10 Image Processing software 62 11 Image management and image databases 79 12 Operating system (os) and images 97 13 Graphics processing unit (GPU) 100 14 Storage and archive 101 15 Images in different disciplines 109 15.1 Microscopy 109 360° 15.2 Medical imaging 114 15.3 Astronomical images 117 15.4 Industrial imaging 360° 118 thinking. 16 Selection of best digital images 120 References: thinking. 124 360° thinking . 360° thinking. Discover the truth at www.deloitte.ca/careers Discover the truth at www.deloitte.ca/careers © Deloitte & Touche LLP and affiliated entities. Discover the truth at www.deloitte.ca/careers © Deloitte & Touche LLP and affiliated entities.
    [Show full text]
  • Survey of Databases Used in Image Processing and Their Applications
    International Journal of Scientific & Engineering Research Volume 2, Issue 10, Oct-2011 1 ISSN 2229-5518 Survey of Databases Used in Image Processing and Their Applications Shubhpreet Kaur, Gagandeep Jindal Abstract- This paper gives review of Medical image database (MIDB) systems which have been developed in the past few years for research for medical fraternity and students. In this paper, I have surveyed all available medical image databases relevant for research and their use. Keywords: Image database, Medical Image Database System. —————————— —————————— 1. INTRODUCTION Measurement and recording techniques, such as electroencephalography, magnetoencephalography Medical imaging is the technique and process used to (MEG), Electrocardiography (EKG) and others, can create images of the human for clinical purposes be seen as forms of medical imaging. Image Analysis (medical procedures seeking to reveal, diagnose or is done to ensure database consistency and reliable examine disease) or medical science. As a discipline, image processing. it is part of biological imaging and incorporates radiology, nuclear medicine, investigative Open source software for medical image analysis radiological sciences, endoscopy, (medical) Several open source software packages are available thermography, medical photography and for performing analysis of medical images: microscopy. ImageJ 3D Slicer ITK Shubhpreet Kaur is currently pursuing masters degree OsiriX program in Computer Science and engineering in GemIdent Chandigarh Engineering College, Mohali, India. E-mail: MicroDicom [email protected] FreeSurfer Gagandeep Jindal is currently assistant processor in 1.1 Images used in Medical Research department Computer Science and Engineering in Here is the description of various modalities that are Chandigarh Engineering College, Mohali, India. E-mail: used for the purpose of research by medical and [email protected] engineering students as well as doctors.
    [Show full text]
  • Automated Malware Analysis Report for Microdicom-3.0.1
    ID: 153765 Sample Name: MicroDicom- 3.0.1-x64.exe Cookbook: default.jbs Time: 13:55:16 Date: 18/07/2019 Version: 26.0.0 Aquamarine Table of Contents Table of Contents 2 Analysis Report MicroDicom-3.0.1-x64.exe 4 Overview 4 General Information 4 Detection 4 Confidence 5 Classification 5 Analysis Advice 5 Mitre Att&ck Matrix 6 Signature Overview 6 AV Detection: 6 Spreading: 6 Networking: 6 Key, Mouse, Clipboard, Microphone and Screen Capturing: 6 System Summary: 7 Data Obfuscation: 7 Persistence and Installation Behavior: 7 Boot Survival: 7 Hooking and other Techniques for Hiding and Protection: 7 Malware Analysis System Evasion: 7 Anti Debugging: 8 HIPS / PFW / Operating System Protection Evasion: 8 Language, Device and Operating System Detection: 8 Behavior Graph 8 Simulations 8 Behavior and APIs 8 Antivirus and Machine Learning Detection 9 Initial Sample 9 Dropped Files 9 Unpacked PE Files 9 Domains 9 URLs 9 Yara Overview 9 Initial Sample 9 PCAP (Network Traffic) 9 Dropped Files 9 Memory Dumps 9 Unpacked PEs 9 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 10 Dropped Files 10 Screenshots 10 Thumbnails 10 Startup 11 Created / dropped Files 11 Domains and IPs 17 Contacted Domains 17 URLs from Memory and Binaries 17 Contacted IPs 17 Static File Info 17 General 18 File Icon 18 Static PE Info 18 General 18 Entrypoint Preview 18 Rich Headers 19 Copyright Joe Security LLC 2019 Page 2 of 44 Data Directories 19 Sections 20 Resources 20 Imports 20 Possible Origin 21 Network Behavior 21 Code Manipulations 21 Statistics 21
    [Show full text]
  • Schmidt BT 2020.Pdf
    FRIEDRICH-ALEXANDER-UNIVERSITÄT ERLANGEN-NÜRNBERG TECHNISCHE FAKULTÄT • DEPARTMENT INFORMATIK Lehrstuhl für Informatik 10 (Systemsimulation) Investigation and Implementation of Visualization and Reconstruction Options for Breast-CT Simon Schmidt Bachelorthesis Investigation and Implementation of Visualization and Reconstruction Options for Breast-CT Simon Schmidt Bachelorthesis Aufgabensteller: Prof. Dr.-Ing. Harald Köstler Betreuer: Dr. David Heinemann (AB-CT) Bearbeitungszeitraum: 1.6.2020 – 2.11.2020 Erklärung: Ich versichere, dass ich die Arbeit ohne fremde Hilfe und ohne Benutzung anderer als der angegebenen Quellen angefertigt habe und dass die Arbeit in gleicher oder ähn- licher Form noch keiner anderen Prüfungsbehörde vorgelegen hat und von dieser als Teil einer Prüfungsleistung angenommen wurde. Alle Ausführungen, die wörtlich oder sinngemäß übernommen wurden, sind als solche gekennzeichnet. Der Universität Erlangen-Nürnberg, vertreten durch den Lehrstuhl für Systemsimulati- on (Informatik 10), wird für Zwecke der Forschung und Lehre ein einfaches, kostenloses, zeitlich und örtlich unbeschränktes Nutzungsrecht an den Arbeitsergebnissen der Ba- chelorthesis einschließlich etwaiger Schutzrechte und Urheberrechte eingeräumt. Erlangen, den 1. November 2020 . Abstract The nu:view Breast-CT is the worlds first spiral Breast-CT. While already in clinical use, the system is still under on-going development. In the current clinical workflow, the acquired scans have to be reconstructed and then transferred to the clinical network before they can be reviewed on a workstation in another room. As the necessary amount of data for a single scan is huge, this can take long times. The goal of this thesis was therefore, to improve on those weak points by investigating viewing options which could be used in close proximity to the scanner.
    [Show full text]
  • Research Article Software Framework for the Creation and Application of Personalized Bone and Plate Implant Geometrical Models
    Hindawi Journal of Healthcare Engineering Volume 2018, Article ID 6025935, 11 pages https://doi.org/10.1155/2018/6025935 Research Article Software Framework for the Creation and Application of Personalized Bone and Plate Implant Geometrical Models Nikola Vitkovic´ , Srd�an Mladenovic´, Milan Trifunovic´, Milan Zdravkovic´, Miodrag Manic´, Miroslav Trajanovic´, Dragan Misˇic´, and Jelena Mitic´ Faculty of Mechanical Engineering, University of Niˇs, Niˇs, Serbia Correspondence should be addressed to Nikola Vitkovic´; [email protected] Received 25 June 2018; Revised 30 August 2018; Accepted 12 September 2018; Published 10 October 2018 Academic Editor: Emiliano Schena Copyright © 2018 Nikola Vitkovic´ et al. *is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Computer-Assisted Orthopaedic Surgery (CAOS) defines a set of techniques that use computers and other devices for planning, guiding, and performing surgical interventions. *e important components of CAOS are accurate geometrical models of human bones and plate implants, which can be used in preoperational planning or for surgical guiding during an intervention. Software framework which is introduced in this study is based on the Model-View-Controller (MVC) architectural pattern, and it uses 3D models of bones and plate implants developed by the application of the Method of Anatomical Features (MAF). *e presented framework may be used for preoperative planning processes and for the production of personalized plate implants. *e main idea of the research was to develop a novel integrated software framework which will provide improved personalized healthcare to the patient, and at the same time, provide the surgeon with more control over the patient’s treatment and recovery.
    [Show full text]
  • List of Computational Software
    Appendix A List of Computational Software A.1 DICOM Viewers The listed DICOM viewers have similar functionality Acculite www.accuimage.com MicroDicom www.microdicom.com DICOM Works www.dicomworks.com Sante DICOM Viewer www.santesoft.com Mango ric.uthscsa.edu/mango OsiriX (MAC) www.osirix-viewer.com AMIDE amide.sourceforge.net Irfanview www.irfanview.com XNView www.xnview.com A.2 Open Source Medical Imaging and Segmentation CVIPTools A UNIX/Win32-based package and contains a collection of C and C++computer imaging tools that includes edge/line detec- tion, segmentation, and many other functions (www.ee.siue.edu/CVIPtools) Fiji/ImageJ A Java-based image processing package that uses additional plugins for a variety of functionalities including segmentation algorithms (pacific.mpi-cbg.de/wiki/index.php/Fiji) GemIdent An interactive program that is designed for colour segmentation in images with few colours, and the objects of interest look alike with small variation (www.gemident.com) ITK-SNAP An interactive software application that allows users to nav- igate three-dimensional medical images, manually delineate anatomical regions of interest, and perform automatic image segmentation (www.itksnap.org) J. Tu et al., Computational Fluid and Particle Dynamics in the Human Respiratory System, 339 Biological and Medical Physics, Biomedical Engineering DOI 10.1007/978-94-007-4488-2, © Springer Science+Business Media Dordrecht 2013 340 Appendix A List of Computational Software Megawave 2 Made up of C library modules, that contains original algorithms written by researchers and is run using Unix/Linux (megawave.cmla.ens-cachan.fr) MITK and 3Dmed Made up of C++ library for integrated medical image process- ing, segmentation, and registration algorithms (www.mitk.net/download.htm) Slicer Has a GUI that allows manual and automatic segmentation, reg- istration, and three-dimensional visualization.
    [Show full text]
  • Şule Beste KAPÇI Danışman Dr. Öğr. Üyesi Turgay AYDOĞAN YÜKSEK
    T.C. SÜLEYMAN DEMİREL ÜNİVERSİTESİ FEN BİLİMLERİ ENSTİTÜSÜ MEDİKAL GÖRÜNTÜLER ÜZERİNDE ANALİZ VE SINIFLANDIRMA YAPMAK İÇİN BİR UYGULAMA TASARIMI Şule Beste KAPÇI Danışman Dr. Öğr. Üyesi Turgay AYDOĞAN YÜKSEK LİSANS TEZİ BİLGİSAYAR MÜHENDİSLİĞİ ANABİLİM DALI ISPARTA- 2020 © 2020 [Şule Beste KAPÇI] TEZ ONAYI Şule Beste KAPÇI tarafından hazırlanan "Medikal Görüntüler Üzerinde Analiz ve Sınıflandırma Yapmak için Bir Uygulama Tasarımı" adlı tez çalışması aşağıdaki jüri üyeleri önünde Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Bilgisayar Mühendisliği Anabilim Dalı’nda YÜKSEK LİSANS TEZİ olarak başarı ile savunulmuştur. Danışman Dr.Öğr.Üyesi Turgay AYDOĞAN .............................. Süleyman Demirel Üniversitesi Jüri Üyesi Prof.Dr.Ecir Uğur KÜÇÜKSİLLE .............................. Süleyman Demirel Üniversitesi Jüri Üyesi Dr.Öğr.Üyesi Tuna GÖKSU .............................. Isparta Uygulamalı Bilimler Üniversitesi Enstitü Müdürü Doç. Dr. Şule Sultan UĞUR .............................. İÇİNDEKİLER Sayfa İÇİNDEKİLER ......................................................................................................................... i ÖZET ......................................................................................................................................... iii ABSTRACT .............................................................................................................................. iv TEŞEKKÜR .............................................................................................................................
    [Show full text]
  • An Medical Image File Formats and Digital Image Conversion
    International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-9 Issue-1S4, December 2019 An Medical Image File Formats and Digital Image Conversion P. Sriramakrishnan, T. Kalaiselvi, S.T. Padmapriya, N. Shanthi, S. Ramkumar, N. Kalaichelvi and equipment setting. Medical image data was aligned in the Abstract: Medical image file formats make the confusing form of an array of picture element called as the pixel in two aspect to young researchers who start work with medical images. dimensional and voxel in three dimensional [2]. Medical image format conversion is still a tedious task due to the different structure of files. Digital image conversion from the Image format describes the standardized procedure to store medical image is an important pre-processing step to the process the data inside an image. Medical image dataset contains and visualizes the data. This article presents an overview of the more images to represent the three-dimensional view. major medical image file formats such as Analyze, neuro-imaging Medical image intimates the information about the number of informatics technology initiative (NIFTI), MINC, and digital pixels in the horizontal and vertical direction, number of bits imaging and communications in medicine (DICOM). Then the per pixel and number of images per subject. Further, medical characteristics and strengths of the various formats are discussed. Also the article describes the easiest way of digital image format needs to be converting into digital format for process conversion from medical image format. and visualize the images. Medical image format conversion is Keywords: Medical image, file formats, NIFTI, DICOM, a critical task for researchers that can be done by open source Analyze, file conversion software packages such as Mango, MRIcro, 3D slicer, MicroDicom, etc., [5].
    [Show full text]
  • Metodología Para El Registro Multimodal De Imágenes 3D Utilizando Información Mutua
    Metodología para el registro multimodal de imágenes 3D utilizando información mutua Oscar Andrés Vélez Martínez Director: Álvaro Ángel Orozco Gutiérrez Universidad Tecnológica de Pereira Facultad de Ingenierías Eléctrica, Electrónica, Física y Ciencias de la Computación Maestría en Ingeniería Eléctrica Pereira-Risaralda 2014 Índice general Resumen 3 1. Introducción 5 2. Justificación 7 2.1. Pertinencia . .7 2.2. Viabilidad . .7 2.3. Impacto . .8 3. Planteamiento del problema 9 3.1. Aspectos médicos . .9 3.2. Registro de imágenes médicas . .9 3.3. Formulación del problema de investigación . 10 4. Objetivos 11 4.1. General . 11 4.2. Específicos . 11 5. Antecedentes bibliográficos 12 5.1. Métodos basados en registro rígido . 12 5.2. Métodos basados registro no rígido . 14 5.3. Registro multimodal usando información mutua. 16 6. Marco Conceptual 19 6.1. Filtrado de imágenes . 19 6.2. Transformaciones . 21 6.2.1. Transformación rígida . 21 6.2.2. Transformación afín . 22 6.2.3. Transformación de perspectiva . 22 6.2.4. Transformación elástica . 22 6.3. Registro de imágenes . 23 6.3.1. Registro usando marcadores externos . 23 6.3.2. Registro usando marcadores anatómicos . 24 6.3.3. Registro usando medidas volumétricas . 24 6.3.4. Registro multimodal usando información mútua . 26 7. Materiales 28 7.1. Bases de Datos . 28 2 7.2. Cajas de herramientas . 29 7.2.1. Toolbox de Procesamiento de imágenes . 29 7.2.2. 3D Slicer . 29 7.2.3. MicroDICOM shell extension . 30 7.2.4. ITK: Herramienta de Segmentación y Registro . 31 8. Metodología 32 8.1. Módulo de Filtrado .
    [Show full text]
  • Osirix Free Download Windows Download Link Sent Successfully
    osirix free download windows Download Link Sent Successfully. A download link has been sent to the provided email address. Follow the instructions provided in this e-mail to download OsiriX Lite. If the message cannot be found, please check your Junk folder. If you didn’t receive the email, use the New User form . OsiriX MD Full-Featured Version. Get OsiriX MD, the complete edition of OsiriX. With ultrafast performance and an intuitive interactive user interface, it is the most widely used medical images viewer in the world. Download OsiriX Lite. OsiriX Lite is the complete demo version of OsiriX MD. Are you a new user or did you already download OsiriX Lite from here? Not sure? Select “New User”. OsiriX MD Full-Featured Version (from $69.99/mo) Get OsiriX MD, the complete edition of OsiriX. With ultrafast performance and an intuitive interactive user interface, it is the most widely used medical images viewer in the world. Ultrafast performance Intuitive interactive user interface The most widely used DICOM viewer in the world FDA & CE certified Install in less than 5 minutes. Disclaimer. THIS SOFTWARE IS NOT INTENDED FOR PRIMARY DIAGNOSTIC, ONLY FOR SCIENTIFIC USAGE. THIS VERSION OF OSIRIX IS NOT CERTIFIED AS A MEDICAL DEVICE FOR PRIMARY DIAGNOSIS. THERE ARE NO CERTIFICATIONS. YOU CAN ONLY USE OSIRIX AS A REVIEWING AND SCIENTIFIC SOFTWARE, NOT FOR PRIMARY DIAGNOSTIC. CERTIFIED VERSION OF OSIRIX IS AVAILABLE HERE: OSIRIX MD. All calculations, measurements and images provided by this software are intended only for scientific research. Any other use is entirely at the discretion and risk of the user.
    [Show full text]
  • COMPUTER AIDED TISSUE ENGINEERING for the GENERATION of UNIT LIBRARY STRUCTURE of SCAFFOLD for HUMAN BONE (In-Vitro)
    COMPUTER AIDED TISSUE ENGINEERING FOR THE GENERATION OF UNIT LIBRARY STRUCTURE OF SCAFFOLD FOR HUMAN BONE (in-vitro) A Thesis submitted in partial fulfilment of the requirements for the degree of Master of Technology in Biomedical Engineering by ROHAN VINAYAK BHAGWAT 213BM1002 Under The Supervision of Prof. (Mrs.) Krishna Pramanik Department of Biotechnology & Medical Engineering National Institute of Technology Rourkela-769008, Orissa, India June, 2015 National Institute of Technology Rourkela CERTIFICATE This is to certify that the thesis entitled, “COMPUTER AIDED TISSUE ENGINEERING FOR THE GENERATION OF UNIT LIBRARY STRUCTURE OF SCAFFOLD FOR HUMAN BONE (in-vitro)” submitted by Rohan Vinayak Bhagwat (213BM1002) in partial fulfillment of the requirements for the award of degree of Master of Technology in Biomedical Engineering at National Institute of Technology, Rourkela is an authentic work carried out by him under my supervision and guidance. To the best of my knowledge, the matter embodied in the thesis has not been submitted to any other University/Institute for the award of any Degree or Diploma. Place: Rourkela Supervisor Date Prof. Krishna Pramanik Department of Biotechnology and Medical Engineering National Institute of Technology, Rourkela-769008 i DECLARATION The present study entitled “COMPUTER AIDED TISSUE ENGINEERING FOR THE GENERATION OF UNIT LIBRARY STRUCTURE OF SCAFFOLD FOR HUMAN BONE (in-vitro)” is based on my original research work and no part of the thesis has been so far submitted for the award of degree in Master of Technology in Biomedical engineering or any other degree or diploma to the NIT Rourkela, Orissa, India or elsewhere. Place: Rourkela, Odhisa ROHAN VINAYAK BHAGWAT Date: ii ACKNOWLEDGEMENT It is my pleasure to take the opportunity of expressing my sincere gratitude to all those people who provided their support, collaboration and encouragement to carry out my dissertation work.
    [Show full text]
  • GPU Accelerated Applications Catalog
    GPU-ACCELERATED APPLICATIONS Test Drive the World’s Fastest Accelerator – Free! Take the GPU Test Drive, a free and easy way to experience accelerated computing on GPUs. You can run your own application or try one of the preloaded ones, all running on a remote cluster. Try it today. www.nvidia.com/gputestdrive GPU-ACCELERATED APPLICATIONS Accelerated computing has revolutionized a broad range of industries with over five hundred applications optimized for GPUs to help you accelerate your work. CONTENTS 1 Computational Finance 2 Climate, Weather and Ocean Modeling 2 Data Science and Analytics 5 Artificial Intelligence DEEP LEARNING AND MACHINE LEARNING 9 Federal, Defense and Intelligence 10 Design for Manufacturing/Construction: CAD/CAE/CAM COMPUTATIONAL FLUID DYNAMICS COMPUTATIONAL STRUCTURAL MECHANICS DESIGN AND VISUALIZATION ELECTRONIC DESIGN AUTOMATION INDUSTRIAL INSPECTION 19 Media & Entertainment ANIMATION, MODELING AND RENDERING COLOR CORRECTION AND GRAIN MANAGEMENT COMPOSITING, FINISHING AND EFFECTS EDITING ENCODING AND DIGITAL DISTRIBUTION ON-AIR GRAPHICS ON-SET, REVIEW AND STEREO TOOLS WEATHER GRAPHICS 26 Medical Imaging 29 Oil and Gas 30 Research: Higher Education and Supercomputing COMPUTATIONAL CHEMISTRY AND BIOLOGY NUMERICAL ANALYTICS PHYSICS SCIENTIFIC VISUALIZATION 41 Safety and Security 44 Tools and Management Computational Finance APPLICATION NAME COMPANY/DEVELOPER PRODUCT DESCRIPTION SUPPORTED FEATURES GPU SCALING Accelerated Elsen Secure, accessible, and accelerated back- • Web-like API with Native bindings for Multi-GPU Computing Engine testing, scenario analysis, risk analytics Python, R, Scala, C Single Node and real-time trading designed for easy • Custom models and data streams are integration and rapid development. easy to add Adaptiv Analytics SunGard A flexible and extensible engine for fast • Existing models code in C# supported Multi-GPU calculations of a wide variety of pricing transparently, with minimal code Single Node and risk measures on a broad range of changes asset classes and derivatives.
    [Show full text]