In Re Equifax Inc. Securities Litigation 17-CV-03463-Consolidated Class

Total Page:16

File Type:pdf, Size:1020Kb

In Re Equifax Inc. Securities Litigation 17-CV-03463-Consolidated Class Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 1 of 198 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF GEORGIA ATLANTA DIVISION IN RE EQUIFAX INC. SECURITIES Consolidated Case No. LITIGATION 1:17-cv-03463-TWT CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 2 of 198 TABLE OF CONTENTS Page I. PRELIMINARY STATEMENT .....................................................................2 II. PARTIES .......................................................................................................10 A. Lead Plaintiff ...................................................................................... 10 B. Defendants .......................................................................................... 10 1. Equifax, Inc. ............................................................................. 10 2. Individual Defendants .............................................................. 12 III. JURISDICTION AND VENUE ....................................................................13 IV. SUMMARY OF THE FRAUD .....................................................................13 A. Equifax’s Business is to Collect and Sell Sensitive Personal Information About Global Consumers ............................................... 13 B. Defendants Knew that Securing the Information Equifax Collected Was Critical to the Company’s Business ........................... 16 C. Defendants Issue Statements Touting Cybersecurity, Compliance with Data Protection Laws and Regulations, and Certifying the Integrity of Equifax’s Internal Controls ..................... 24 1. Defendants Touted the Security of Equifax’s Data Systems’ and The Company’s Efforts to Protect Consumer Information ............................................................. 25 2. Defendants Assured Investors That Equifax Zealously Complied with Data Protection Laws, Regulations, and Industry Best Practices ............................................................. 27 i Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 3 of 198 3. Defendants Assured Investors That Equifax Had Adequate Internal Controls ...................................................... 28 D. In Truth, Equifax Failed to Adequately Secure and Protect Sensitive Consumer Information ........................................................ 29 E. Equifax Ignored Numerous Warnings That Its Data Protection Measures Were Inadequate to Protect Sensitive Information ............ 33 1. In 2013 and 2014 Equifax Experiences Breaches Due to Inadequate Cybersecurity ......................................................... 33 2. KPMG Flags Equifax’s Unsafe Encryption Practices ............. 35 3. Equifax’s “Attack Surface” Becomes Too Large to Defend ...................................................................................... 35 4. The W2Express Breach ............................................................ 36 5. Equifax Is Warned Repeatedly About Patching Deficiencies .............................................................................. 38 6. Throughout the Class Period Security Researchers Continue to Warn Equifax About Serious Cybersecurity Deficiencies, but These Warnings are Ignored ........................ 40 7. The LifeLock Breach ............................................................... 43 8. The TALX Breach ................................................................... 43 9. Equifax Hires Mandiant, But Ignores Its Advice .................... 46 F. Equifax’s Failure to Implement Basic Data Protection Measures Leads to The Massive Data Breach .................................................... 47 G. The Truth About Equifax’s Inadequate Cybersecurity Is Finally Revealed to Investors ......................................................................... 61 1. Revelations Affecting Trading on September 8, 2017 ............ 62 2. Revelations Affecting Trading on September 11, 2017 .......... 68 ii Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 4 of 198 3. Revelations Affecting Trading on September 13, 2017 .......... 72 4. Revelations Affecting Trading on September 14, 2017 .......... 77 5. Revelations Affecting Trading on September 15, 2017 .......... 80 H. Post-Class Period Developments ....................................................... 81 1. Smith Departs the Company Without Severance .................... 81 2. Defendants Have Now Admitted that There Were Numerous Serious Deficiencies in Equifax’s Data Security Posture ....................................................................... 82 3. Equifax’s Data Protection Measures Are Severely Criticized by Experts, Lawmakers, and Others ....................... 87 4. Equifax’s Business Continues to Experience Significant Harm As a Result of the Data Breach ...................................... 93 I. Equifax’s Data Protection Measures Were Grossly Inadequate, and Failed to Meet Either Basic Industry Standards or Applicable Legal Requirements ......................................................... 94 1. Equifax Failed to Implement an Adequate Patch Management Process and Routinely Failed to Address Known Vulnerabilities ............................................................. 95 2. Equifax Failed to Encrypt Sensitive Data .............................. 100 3. Equifax Failed to Implement Adequate Authentication Measures ................................................................................ 103 4. Equifax Failed to Adequately Monitor Its Networks ............ 107 5. Equifax Allowed Sensitive Data to be Easily Accessed On Public-Facing Servers and Also Failed to Partition It ..... 109 6. Equifax Inappropriately Relied on Outdated and Obsolete Security Systems and Software .............................................. 111 iii Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 5 of 198 7. Equifax Allowed Its “Attack Surface” to Balloon ................. 114 8. Equifax Allowed Unused Data to Accumulate on Vulnerable Systems and Failed to Dispose of Unneeded Data ........................................................................................ 115 9. Equifax Failed to Restrict Access to Sensitive Data ............. 116 10. Equifax Management Failed to Foster a Strong Security Culture and Ensure Adequate Training of Security Personnel ................................................................................ 118 11. Equifax Failed to Perform Adequate Security Reviews ........ 122 12. Equifax Failed to Develop an Adequate Data Breach Plan ... 124 V. ADDITIONAL ALLEGATIONS OF SCIENTER .....................................126 VI. DEFENDANTS’ MATERIALLY FALSE AND MISLEADING STATEMENTS ...........................................................................................139 A. Defendants’ Materially False and Misleading Statements Concerning Equifax’s Cybersecurity and the Company’s Efforts to Protect Consumer Information ......................................... 139 1. False and Misleading Statements Published on the Equifax Website ..................................................................... 139 2. Equifax’s SEC Filings ............................................................ 146 3. Equifax Investor Conferences and Presentations .................. 150 B. Defendants’ Materially False and Misleading Statements Concerning Equifax’s Compliance with Data Protection Laws, Regulations, and Industry Best Practices ......................................... 160 1. False and Misleading Statements Published on the Equifax Website ..................................................................... 160 2. Equifax’s SEC Filings ............................................................ 162 iv Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 6 of 198 C. Defendants’ False and Misleading Statements Concerning Equifax’s Internal Controls .............................................................. 166 VII. LOSS CAUSATION ...................................................................................168 VIII. PRESUMPTION OF RELIANCE ..............................................................176 IX. INAPPLICABILITY OF THE STATUTORY SAFE HARBOR ...............177 X. CLASS ACTION ALLEGATIONS ............................................................177 XI. COUNTS .....................................................................................................180 XII. PRAYER FOR RELIEF ..............................................................................185 XIII. JURY DEMAND .........................................................................................185 v Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 7 of 198 Lead Plaintiff Union Asset Management Holding AG (“Union”) brings this action under Sections 10(b) and 20(a) of the Securities Exchange Act of 1934 (the “Exchange Act”) on behalf of itself and all other similarly situated purchasers of the securities of Equifax, Inc. (“Equifax” or the “Company”) from February 25, 2016 through September 15, 2017, inclusive (the “Class Period”). Lead Plaintiff alleges the following upon personal knowledge as to itself and its own acts, and upon information and belief as to all other matters. Lead Plaintiff’s information and belief is based on, among other things, the independent investigation of Court-appointed Lead Counsel Bernstein Litowitz Berger & Grossmann LLP. This investigation included, among other things, a review and analysis of: (i) Equifax’s public filings with the SEC;
Recommended publications
  • Impassive Modernism in Arabic and Hebrew Literatures
    UNIVERSITY OF CALIFORNIA Los Angeles Against the Flow: Impassive Modernism in Arabic and Hebrew Literatures A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Comparative Literature by Shir Alon 2017 © Copyright by Shir Alon 2017 ABSTRACT OF THE DISSERTATION Against the Flow: Impassive Modernism in Arabic and Hebrew Literatures by Shir Alon Doctor of Philosophy in Comparative Literature University of California, Los Angeles, 2017 Professor Gil Hochberg, Co-Chair Professor Nouri Gana, Co-Chair Against the Flow: Impassive Modernism in Arabic and Hebrew Literatures elaborates two interventions in contemporary studies of Middle Eastern Literatures, Global Modernisms, and Comparative Literature: First, the dissertation elaborates a comparative framework to read twentieth century Arabic and Hebrew literatures side by side and in conversation, as two literary cultures sharing, beyond a contemporary reality of enmity and separation, a narrative of transition to modernity. The works analyzed in the dissertation, hailing from Lebanon, Palestine, Israel, Egypt, and Tunisia, emerge against the Hebrew and Arabic cultural and national renaissance movements, and the establishment of modern independent states in the Middle East. The dissertation stages encounters between Arabic and Hebrew literary works, exploring the ii parallel literary forms they develop in response to shared temporal narratives of a modernity outlined elsewhere and already, and in negotiation with Orientalist legacies. Secondly, the dissertation develops a generic-formal framework to address the proliferation of static and decadent texts emerging in a cultural landscape of national revival and its aftermaths, which I name impassive modernism. Viewed against modernism’s emphatic features, impassive modernism is characterized by affective and formal investment in stasis, immobility, or immutability: suspension in space or time and a desire for nonproductivity.
    [Show full text]
  • View Final Report (PDF)
    TABLE OF CONTENTS TABLE OF CONTENTS I EXECUTIVE SUMMARY III INTRODUCTION 1 GENESIS OF THE PROJECT 1 RESEARCH QUESTIONS 1 INDUSTRY SITUATION 2 METHODOLOGY 3 GENERAL COMMENTS ON INTERVIEWS 5 APT1 (CHINA) 6 SUMMARY 7 THE GROUP 7 TIMELINE 7 TYPOLOGY OF ATTACKS 9 DISCLOSURE EVENTS 9 APT10 (CHINA) 13 INTRODUCTION 14 THE GROUP 14 TIMELINE 15 TYPOLOGY OF ATTACKS 16 DISCLOSURE EVENTS 18 COBALT (CRIMINAL GROUP) 22 INTRODUCTION 23 THE GROUP 23 TIMELINE 25 TYPOLOGY OF ATTACKS 27 DISCLOSURE EVENTS 30 APT33 (IRAN) 33 INTRODUCTION 34 THE GROUP 34 TIMELINE 35 TYPOLOGY OF ATTACKS 37 DISCLOSURE EVENTS 38 APT34 (IRAN) 41 INTRODUCTION 42 THE GROUP 42 SIPA Capstone 2020 i The Impact of Information Disclosures on APT Operations TIMELINE 43 TYPOLOGY OF ATTACKS 44 DISCLOSURE EVENTS 48 APT38 (NORTH KOREA) 52 INTRODUCTION 53 THE GROUP 53 TIMELINE 55 TYPOLOGY OF ATTACKS 59 DISCLOSURE EVENTS 61 APT28 (RUSSIA) 65 INTRODUCTION 66 THE GROUP 66 TIMELINE 66 TYPOLOGY OF ATTACKS 69 DISCLOSURE EVENTS 71 APT29 (RUSSIA) 74 INTRODUCTION 75 THE GROUP 75 TIMELINE 76 TYPOLOGY OF ATTACKS 79 DISCLOSURE EVENTS 81 COMPARISON AND ANALYSIS 84 DIFFERENCES BETWEEN ACTOR RESPONSE 84 CONTRIBUTING FACTORS TO SIMILARITIES AND DIFFERENCES 86 MEASURING THE SUCCESS OF DISCLOSURES 90 IMPLICATIONS OF OUR RESEARCH 92 FOR PERSISTENT ENGAGEMENT AND FORWARD DEFENSE 92 FOR PRIVATE CYBERSECURITY VENDORS 96 FOR THE FINANCIAL SECTOR 96 ROOM FOR FURTHER RESEARCH 97 ACKNOWLEDGEMENTS 98 ABOUT THE TEAM 99 SIPA Capstone 2020 ii The Impact of Information Disclosures on APT Operations EXECUTIVE SUMMARY This project was completed to fulfill the including the scope of the disclosure and capstone requirement for Columbia Uni- the disclosing actor.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • A Framework for Toxic Tort Litigation
    A FRAMEWORK FOR TOXIC TORT LITIGATION Joe G. Hollingsworth Katharine R. Latimer Hollingsworth LLP Foreword Dorothy P. Watson Vice President and General Counsel Novartis Pharmaceuticals Corporation WASHINGTON LEGAL FOUNDATION Washington, D.C. This Monograph is one of a series of original papers published by the Legal Studies Division of the Washington Legal Foundation. Through this and other publications, WLF seeks to provide the national legal community with legal studies on a variety of timely public policy issues. Additional copies of this Monograph may be obtained by writing to the Publications Department, Washington Legal Foundation, 2009 Massachusetts Avenue, N.W., Washington, D.C. 20036. Other recent studies in the WLF Monograph series include: Science Through the Looking-Glass: The Manipulation of “Addiction” & Its Influence over Obesity Policy by Dr. John C. Luik. Foreword by Daniel J. Popeo, Washington Legal Foundation. 2007. Library of Congress No. 2007931992. Ideology Masked As Scientific Truth: The Debate About Advertising And Children by Dr. John C. Luik. Foreword by Professor Todd J. Zywicki, George Mason University Law School. 2006. Library of Congress No. 2006927394 Waiver Of The Attorney-Client Privilege: A Balanced Approach by The Honorable Dick Thornburgh, Kirkpatrck & Lockhart Nicholson Graham LLP. Foreword by The Honorable John Engler, President and CEO, National Association of Manufacturers. Introduction by Laura Stein, Senior Vice President – General Counsel and Corporate Secretary, The Clorox Company. 2006. Library of Congress No. 2006927395. Exporting Precaution: How Europe’s Risk-Free Regulatory Agenda Threatens American Free Enterprise by Lawrence A. Kogan, Institute for Trade, Standards and Sustainable Development, Inc. Commentary by The Honorable James C.
    [Show full text]
  • Religion and the Return of Magic: Wicca As Esoteric Spirituality
    RELIGION AND THE RETURN OF MAGIC: WICCA AS ESOTERIC SPIRITUALITY A thesis submitted for the degree of PhD March 2000 Joanne Elizabeth Pearson, B.A. (Hons.) ProQuest Number: 11003543 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a com plete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. uest ProQuest 11003543 Published by ProQuest LLC(2018). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States C ode Microform Edition © ProQuest LLC. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106- 1346 AUTHOR’S DECLARATION The thesis presented is entirely my own work, and has not been previously presented for the award of a higher degree elsewhere. The views expressed here are those of the author and not of Lancaster University. Joanne Elizabeth Pearson. RELIGION AND THE RETURN OF MAGIC: WICCA AS ESOTERIC SPIRITUALITY CONTENTS DIAGRAMS AND ILLUSTRATIONS viii ACKNOWLEDGEMENTS ix ABSTRACT xi INTRODUCTION: RELIGION AND THE RETURN OF MAGIC 1 CATEGORISING WICCA 1 The Sociology of the Occult 3 The New Age Movement 5 New Religious Movements and ‘Revived’ Religion 6 Nature Religion 8 MAGIC AND RELIGION 9 A Brief Outline of the Debate 9 Religion and the Decline o f Magic? 12 ESOTERICISM 16 Academic Understandings of
    [Show full text]
  • Aranea—Web Framework Construction and Integration Kit
    Aranea—Web Framework Construction and Integration Kit Oleg Murk¨ Jevgeni Kabanov Dept. of Computer Science and Engineering, Dept. of Computer Science, Chalmers University of Technology, University of Tartu, SE-412 96 Goteborg,¨ Sweden J. Liivi 2, EE-50409 Tartu, Estonia [email protected] [email protected] ABSTRACT proaches and ideas are tried out. Indeed, many very good Currently there exist dozens of web controller frameworks ideas have been proposed during these years, many of which that are incompatible, but at the same time have large por- we will describe later in this paper. On a longer time- tions of overlapping functionality that is implemented over scale the stronger (or better marketed) frameworks and ap- and over again. Web programmers are facing limitations on proaches will survive, the weaker will diminish. However, in code reuse, application and framework integration, extensi- our opinion, such situation also has a lot of disadvantages. bility, expressiveness of programming model and productiv- 1.1 Problem Description ity. In this paper we propose a minimalistic component model First of all let’s consider the problems of the web frame- Aranea that is aimed at constructing and integrating server- work ecosystem from the viewpoint of application develop- side web controller frameworks in Java. It allows assembling ment. Framework user population is very fragmented as a most of available web programming models out of reusable result of having many incompatible frameworks with simi- components and patterns. We also show how to integrate lar programming models. Each company or even project, is different existing frameworks using Aranea as a common using a different web framework, which requires learning a protocol.
    [Show full text]
  • Cyber Threat Data Model and Use Cases Final Report
    CAN UNCLASSIFIED TA-35—Cyber Threat Data Model and Use Cases Final Report Dr. Antoine Lemay International Safety Research (ISR) Prepared by: ISR 38 Colonnade Road North Ottawa, Ontario Canada K2E 7J6 Contractor's document number: ISR Report 6099-01-03 Version 2.0 PSPC Contract Number: W7714-156105-T35 Technical Authority: Melanie Bernier, Defence Scientist Contractor's date of publication: September 2017 Defence Research and Development Canada Contract Report DRDC-RDDC-2017-C290 November 2017 CAN UNCLASSIFIED CAN UNCLASSIFIED IMPORTANT INFORMATIVE STATEMENTS The information contained herein is proprietary to Her Majesty and is provided to the recipient on the understanding that it will be used for information and evaluation purposes only. Any commercial use including use for manufacture is prohibited. Disclaimer: This document is not published by the Editorial Office of Defence Research and Development Canada, an agency of the Department of National Defence of Canada, but is to be catalogued in the Canadian Defence Information System (CANDIS), the national repository for Defence S&T documents. Her Majesty the Queen in Right of Canada (Department of National Defence) makes no representations or warranties, expressed or implied, of any kind whatsoever, and assumes no liability for the accuracy, reliability, completeness, currency or usefulness of any information, product, process or material included in this document. Nothing in this document should be interpreted as an endorsement for the specific use of any tool, technique or process examined in it. Any reliance on, or use of, any information, product, process or material included in this document is at the sole risk of the person so using it or relying on it.
    [Show full text]
  • Moderní Rámce Pro Tvorbu Webových Aplikací
    MASARYKOVA UNIVERZITA F}w¡¢£¤¥¦§¨ AKULTA INFORMATIKY !"#$%&'()+,-./012345<yA| Moderní rámce pro tvorbu webových aplikací DIPLOMOVÁ PRÁCE Jakub Mahdal Brno, jaro 2006 Prohlášení Prohlašuji, že tato diplomová práce je mým p ˚uvodnímautorským dílem, které jsem vypra- coval samostatnˇe.Všechny zdroje, prameny a literaturu, které jsem pˇrivypracování použí- val nebo z nich ˇcerpal,v práci ˇrádnˇecituji s uvedením úplného odkazu na pˇríslušnýzdroj. Vedoucí práce: Mgr. Jan Pavloviˇc ii Podˇekování Chtˇelbych podˇekovatvedoucímu práce Mgr. Janu Pavloviˇcoviza podklady a pˇripomínky k mé diplomové práci. iii Shrnutí Cílem této práce je seznámit se s technologiemi pro tvorbu webových aplikací. Provést analýzu webových rámc ˚u- Apache Struts, JSF, MFC, ADF, WebWork, Maverick, Springs, Cocoon, Jakarta Tapestry, Turbine, Lakeshore, FreeMaker, Stripes, Rife, Ruby on Rails. Po- psat jejich vlastnosti a navrhnout kritéria pro hodnocení použitelnosti a zejména pro volbu vhodné technologie. iv Klíˇcováslova Webová aplikace, webový rámec, framework, Model-View-Controller, MVC, Apache Struts, JSF, MFC, ADF, WebWork, Maverick, Springs, Cocoon, Jakarta Tapestry, Turbine, Lakeshore, FreeMaker, Stripes, Rife, Ruby on Rails v Obsah 1 Architektura software a webové aplikace ........................ 2 1.1 Architektura software ................................ 3 1.1.1 Architektura mainfram ˚u. 3 1.1.2 Architektura sdílených soubor ˚u(není ještˇepovažováno za klient-server) 3 1.1.3 Architektura klient-server . 4 1.1.4 Dvouvrstvá architektura . 4 1.1.5 Tˇrívrstváarchitektura . 4 1.2 Servisnˇeorientovaná architektura (SOA) ...................... 5 1.3 Modelovˇeˇrízenáarchitektura (MDA) ....................... 5 1.4 WEB 2.0 - smˇervývoje webu? ............................ 7 2 Tvorba webových aplikací ................................ 9 2.1 Rámce pro tvorbu webových aplikací ....................... 9 2.2 Koncept MVC ..................................... 10 2.2.1 Model . 10 2.2.2 View .
    [Show full text]
  • Seaside – a Multiple Control Flow Web Application Framework ?
    Seaside – A Multiple Control Flow Web Application Framework ? St´ephane Ducasse a Adrian Lienhard b Lukas Renggli b aSoftware Composition Group Institut f¨urInformatik und angewandte Mathematik Universit¨atBern, Switzerland bnetstyle.ch GmbH Bern, Switzerland Abstract Developing web applications is difficult since (1) the client-server relationship is asymmetric: the server cannot update clients but only responds to client requests and (2) the navigation facilities of web browsers lead to a situation where servers cannot control the state of the clients. Page-centric web application frameworks fail to offer adequate solutions to model control flow at a high-level of abstrac- tion. Developers have to work manually around the shortcomings of the HTTP protocol. Some approaches offer better abstractions by composing an application out of components, however they still fail to offer modeling control flow at a high level. Continuation-based approaches solve this problem by providing the facilities to model a control flow over several pages with one piece of code. However combining multiple flows inside the same page is difficult. This article presents Seaside. Seaside is a framework which combines an object- oriented approach with a continuation-based one. A Seaside application is built out of components (i.e., objects) and the logic of the application benefits from the continuation-based program flow infrastructure. Seaside offers a unique way to have multiple control flows on a page, one for each component. This enables the developer to write components that are highly reusable and that can be used to compose complex web applications with higher quality in less time.
    [Show full text]
  • Choosing a JVM Web Framework
    Choosing a JVM Web Framework Matt Raible [email protected] http://raibledesigns.com © 2007 Raible Designs, Inc. Today’s Agenda Introductions The Problem Is there a solution to The Problem? How do you choose? 6 Important Factors Case Studies What do I think? Q and A © 2007 Raible Designs, Inc. Audience Matters This talk is designed for teams trying to navigate the confusion in the JVM Web Framework space It is designed to be a discussion, not a presentation These are my opinions... ... and options are like ... Your opinions will influence mine So please share them! © 2007 Raible Designs, Inc. Introductions Your experience with web applications? Your experience with Java EE? What do you want to get from this session? Experience with Maven, Tomcat, Hibernate, Spring? Web Framework Experience: Spring MVC, Struts 2, Stripes, JSF, Tapestry, Wicket, Rails, Grails, Flex © 2007 Raible Designs, Inc. Who is Matt Raible? Power user of Java Open Source Frameworks Author of Spring Live and Pro JSP 2.0 Founder of AppFuse and AppFuse Light Member of Java EE 5, JSF 1.2 and Bean Validation Expert Groups Committer on Apache Projects: Roller and Struts Java Blogger since 2002 © 2007 Raible Designs, Inc. The Problem © 2007 Raible Designs, Inc. The Problem © 2007 Raible Designs, Inc. How do you choose? © 2007 Raible Designs, Inc. Eliminate, don’t Include © 2007 Raible Designs, Inc. © 2007 Raible Designs, Inc. 6 Important Factors Request, Component or RIA Framework Ease of Development Project Community Project Future and Roadmap Maintenance Technical Features © 2007 Raible Designs, Inc. Request, Component or RIA Are you developing..
    [Show full text]
  • E.2 Instalación Del Sistema De Monitoreo Web De Signos Vitales 168 E.2.1 Instalación De Noisette 168
    INSTITUTO POLITÉCNICO NACIONAL UNIDAD PROFESIONAL INTERDISCIPLINARIA EN INGENIERÍA Y TECNOLOGÍAS AVANZADAS UPIITA Trabajo Terminal Desarrollo de un Sistema de Monitoreo Web de Signos Vitales Que para obtener el título de “Ingeniero en Telemática” Presenta Mario Alberto García Torrea Asesores Ing. Francisco Antonio Polanco Montelongo M. en C. Noé Sierra Romero Dr. en F. Fernando Martínez Piñón México D. F. a 29 de mayo del 2008 INSTITUTO POLITÉCNICO NACIONAL UNIDAD PROFESIONAL INTERDISCIPLINARIA EN INGENIERÍA Y TECNOLOGÍAS AVANZADAS UPIITA Trabajo Terminal Desarrollo de un Sistema de Monitoreo Web de Signos Vitales Que para obtener el título de “Ingeniero en Telemática” Presenta Mario Alberto García Torrea Asesores Ing. Francisco Antonio M. en C. Noé Sierra Dr. en F. Fernando Polanco Montelongo Romero Martínez Piñón Presidente del Jurado Profesor Titular M. en C. Miguel Félix Mata M. en C. Susana Araceli Sánchez Rivera Nájera Agradecimientos A mi familia Por enseñarme a creer y ayudarme a crecer; porque siempre han estado ahí cuando los he necesitado; por enseñarme que las mejores cosas de la vida no son más que aquellas que hacemos con el corazón, en las que podemos soñar y alcanzar, y por las que debemos de luchar. Gracias papá por tu sabiduría y por todos los consejos que me has brindado. Gracias mamá por procurarnos sencillez y por enseñarnos a amar. Gracias hermano porque – aunque siempre buscas la forma de molestarme – estás ahí creyendo en mí. A mis amigos Porque han creido en mí y me han apoyado con su compañía, su alegría y consejos. Gracias por ayudarme a crecer y a creer que todo es posible si realmente queremos que así lo sea; y sobre todo si creemos en nosotros mismos.
    [Show full text]
  • Charting Caregiver Movement Using a Complexity Science Framework
    Charting Caregiver Movement Using a Complexity Science Framework: An Emergent Perspective by Jennifer Anne Eve Krahe A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Approved July 2013 by the Graduate Supervisory Committee: Gerri Lamb, Chair Linda Larkey Bronwynne Evans ARIZONA STATE UNIVERSITY August 2013 ABSTRACT Health and healing in the United States is in a moment of deep and broad transformation. Underpinning this transformation is a shift in focus from practitioner- and system-centric perspectives to patient and family expectations and their accompanying localized narratives. Situated within this transformation are patients and families of all kinds. This shift’s interpretation lies in the converging and diverging trails of biomedicine, a patient-centric perspective of consensus between practitioner and patient, and postmodern philosophy, a break from prevailing norms and systems. Lending context is the dynamic interplay between increasing ethnic/cultural diversity, acculturation/biculturalism, and medical pluralism. Diverse populations continue to navigate multiple health and healing paradigms, engage in the process of their integration, and use health and healing practices that run corollary to them. The way this experience is viewed, whether biomedically or philosophically, has implications for the future of healthcare. Over this fluid interpenetration, with its vivid nuance, loom widespread health disparities. The adverse effects of static, fragmented healthcare systems unable to identify and answer diverse populations’ emergent needs are acutely felt by these individuals. Eradication of health disparities is born from insight into how these populations experience health and healing. The resulting strategy must be one that simultaneously addresses the complex intricacies of patient-centered care, permits emergence of more localized narratives, and eschews systems that are no longer effective.
    [Show full text]