North American Energy Standards Board

Total Page:16

File Type:pdf, Size:1020Kb

North American Energy Standards Board NAESB WEQ EC Meeting Materials, 2-19-13 Page 1 of 324 North American Energy Standards Board 801 Travis, Suite 1675, Houston, Texas 77002 Phone: (713) 356-0060, Fax: (713) 356-0067, E-mail: [email protected] Home Page: www.naesb.org NORTH AMERICAN ENERGY STANDARDS BOARD WHOLESALE ELECTRIC QUADRANT EXECUTIVE COMMITTEE MEETING MATERIALS Tuesday, February 19, 2013 -- 10:00 am to 1:00 pm MT PERA Club/Mesquite Hall, Tempe, AZ NAESB WEQ EC Meeting Materials, 2-19-13 Page 2 of 324 North American Energy Standards Board 801 Travis, Suite 1675, Houston, Texas 77002 Phone: (713) 356-0060, Fax: (713) 356-0067, E-mail: [email protected] Home Page: www.naesb.org NORTH AMERICAN ENERGY STANDARDS BOARD EXECUTIVE COMMITTEE MEETING WHOLESALE ELECTRIC QUADRANT DRAFT AGENDA Tuesday, February 19, 2013 – 10:00 am to 1:00 pm MT PERA Club/Mesquite Hall (first floor of Clubhouse), Tempe, AZ # Agenda Item Page 1. Welcome • Antitrust Guidelines: http://www.naesb.org/misc/antitrust_guidance.doc 4 • Welcome to members and attendees • Quorum Establishment: Roll Call of WEQ EC Members and Alternates: 5 http://www.naesb.org/pdf4/ec_terms.pdf (EC) and http://www.naesb.org/pdf4/alt_ec_members.pdf (EC Alt) 2. Consent Agenda (simple majority to approve) • Adoption of Agenda: http://www.naesb.org/pdf4/ec021913a.docx 18 • Adoption of the EC Meeting Minutes from October 23, 2012: 32 http://www.naesb.org/pdf4/weq_ec102312dm.docx; (Supplemental material may be available prior to the meeting which would include redlines to the draft minutes) 3. Adoption of changes to the 2013 WEQ Annual Plan to be proposed to the Board of Directors: 44 http://www.naesb.org/pdf4/weq_2013_annual_plan.docx; (Revised and redlined by Ed Skiba) http://www.naesb.org/pdf4/weq_ec021913w1.docx 4. Review and consider for vote WEQ 2012 Annual Plan Item 6.a – Develop standard to support PAP 10, Energy Usage Information Model, Phase 2, Harmonization with CIM and SEP 2.0 (super majority vote) • Recommendation: http://www.naesb.org/pdf4/weq_2012_api_6a_rec.docx 64 • Request for Formal Comments: http://www.naesb.org/pdf4/weq_120312_reqcom.doc - comment 122 period ended on January 3, 2013 • Comments Submitted by the WEQ Standards Review Subcommittee: 123 http://www.naesb.org/pdf4/weq_120312_weq_srs.doc 5. Update on Next Steps for the EIR, Status of the EIR Business Practice Standards Development and e- Tag Functional Specification Update (Supplemental material may be available prior to the meeting which would include a presentation) 6. Update on Status of the OASIS Preemption Recommendation (Supplemental material may be available prior to the meeting which would include a presentation) 7. Update on Status of the Parallel Flow Visualization Effort(Supplemental material may be available prior to the meeting which would include a presentation) 8. Subcommittee / Development Updates • Triage Subcommittee: http://www.naesb.org/pdf4/tr011813agenda_revised.docx (January 18 125 Agenda) • Business Practices Subcommittee (BPS) (may be covered in agenda item 7) • Smart Grid Standards Development Subcommittee and Task Forces • OASIS Subcommittee (may be covered in agenda item 6) • Joint Electric Scheduling Subcommittee (JESS) (may be covered in agenda item 5) • Standards Review Subcommittee (SRS) • Public Key Infrastructure (PKI) Subcommittee 9. Publication Schedule Review NAESB WEQ EC Meeting Materials, 2-19-13 Page 3 of 324 North American Energy Standards Board 801 Travis, Suite 1675, Houston, Texas 77002 Phone: (713) 356-0060, Fax: (713) 356-0067, E-mail: [email protected] Home Page: www.naesb.org NORTH AMERICAN ENERGY STANDARDS BOARD EXECUTIVE COMMITTEE MEETING WHOLESALE ELECTRIC QUADRANT DRAFT AGENDA Tuesday, February 19, 2013 – 10:00 am to 1:00 pm MT PERA Club/Mesquite Hall (first floor of Clubhouse), Tempe, AZ # Agenda Item Page • WGQ Publication Schedule (Version 2.1): 126 http://www.naesb.org/misc/wgq_publication_schedule_ver2_1.doc • WEQ Publication Schedule (Version 3.1): 142 http://www.naesb.org/misc/weq_publication_schedule_ver3_1.doc • Retail Publication Schedule (Version 2.1): 144 http://www.naesb.org/misc/retail_publication_schedule_ver2_1.doc 10. Board of Directors, Board Committee and Regulatory Updates: • Board Meeting December 6, 2012: http://www.naesb.org/pdf4/bd120612dm.docx 146 • Membership Update: http://www.naesb.org/misc/membership_report_011813.doc (Membership 158 Report) • Board Revenue Efforts • Board Retail Structure Review Committee: http://www.naesb.org/pdf4/bd120612a4.docx 168 (December 6 Report); http://www.naesb.org/pdf4/rsrc011013mn.doc (January 10 Notes); http://www.naesb.org/pdf4/rsrc012413mn.docx (January 24 Notes); http://www.naesb.org/pdf4/rsrc012413w1.docx (January 24 Report) • Managing Committee: http://www.naesb.org/pdf4/managing112912_10am_notes.docx 214 (November 29 am Notes); http://www.naesb.org/pdf4/managing112912_2pm_notes.docx (November 29 pm Notes) • Regulatory Updates: 218 • November 30, 2012 – NAESB Status Report to the FERC Regarding Public Key Infrastructure Effort (Docket Nos. RM05-5-000, RM05-5-022), http://www.naesb.org/pdf4/ferc113012_naesb_pki.pdf • December 20, 2012 – NAESB Report to the FERC Regarding Errata to WEQ Version 003 (Docket Nos. RM05-5-000, RM05-5-022), http://www.naesb.org/pdf4/ferc122012_weq_version003_errata.pdf • January 29, 2013 – NAESB Report to the FERC Regarding Public Key Infrastructure Standards (Docket Nos. RM05-5-000, RM05-5-022), http://www.naesb.org/pdf4/ferc012913_pki_standards_report.pdf 11. Other Business 319 • ANSI Energy Efficiency Standardization Coordination Collaborative • Advisory Council: http://www.naesb.org/pdf4/advisory020213notes.docx • Meeting Schedule 2013: http://www.naesb.org/pdf4/2013_schedule.pdf 12. Adjourn Attire – Business Casual NAESB WEQ EC Meeting Materials, 2-19-13 Page 4 of 324 NORTH AMERICAN ENERGY STANDARDS BOARD 801 Travis, Suite 1675 • Houston, Texas 77002 • Phone: (713) 356-0060 • Fax: (713) 356-0067 email: [email protected] • Web Site Address: www.naesb.org Antitrust and Other Meeting Policies Antitrust guidelines direct meeting participants to avoid discussion of topics or behavior that would result in anticompetitive behavior including: restraint of trade and conspiracies to monopolize, unfair or deceptive business acts or practices, price discriminations, division of markets, allocation of production, imposition of boycotts, and exclusive dealing arrangements. Any views, opinions or positions presented or discussed by meeting participants are the views of the individual meeting participants and their organizations. Any such views, opinions or positions are not the views, positions or opinions of NAESB, the NAESB Board of Directors, or any NAESB Committee or Subcommittee, unless specifically noted otherwise. As it is not the purpose of the meeting to discuss any antitrust topics, if anyone believes we are straying into improper areas, please let us know and we will redirect the conversation. Participants recording any portion of a NAESB meeting or conference call are reminded that federal and state statutes mandate various disclosure and consent requirements. It is NAESB’s policy that participants comply with all applicable state and federal statutes related to the recording of conversations. As a courtesy to the meeting attendees, anyone taping a meeting should announce that they are doing so in the meeting before beginning the recording. Participants should understand that NAESB meetings are open to any interested party, who may or may not declare themselves present when attending by phone/web cast. Participants are advised to review the NAESB Intellectual Property Rights Policy Concerning Contributions and Comments. NAESB WEQ EC Meeting Materials, 2-19-13 Page 5 of 324 North American Energy Standards Board 801 Travis Street. Suite 1675, Houston, Texas 77002 Phone: (713) 356-0060, Fax: (713) 356-0067, E-mail: [email protected] Home Page: www.naesb.org NORTH AMERICAN ENERGY STANDARDS BOARD 1 2013 EXECUTIVE COMMITTEE TERMS – Wholesale Gas Quadrant PRODUCERS SEGMENT TERM END: Rhonda Denton Regulatory Advisor, BP Energy Company 12-31-2014 Pete Frost Director - Regulatory Affairs, ConocoPhillips Gas and Power 12-31-2014 Marketing Chuck Cook Manager - Regulatory Affairs, Chevron 12-31-2013 Richard D. Smith Regulatory & Compliance Manager, Noble Energy, Inc. 12-31-2013 Randy E. Parker Global Regulatory Advisor, ExxonMobil Gas and Power Marketing 12-31-2013 Company (a division of ExxonMobil Corporation) PIPELINE SEGMENT Mark Gracey Manager of Contract Management, Tennessee Gas Pipeline 12-31-2014 Company, LLC Kathryn Burch Project Manager - Standards and Regulatory, Spectra Energy 12-31-2014 Dale Davis Industry Standards Consultant, Williams Gas Pipeline 12-31-2013 Kim Van Pelt Manager of Regulatory Compliance, Boardwalk Pipeline Partners, 12-31-2015 LP Tom Gwilliam Senior Business Analyst, Iroquois Gas Transmission System 12-31-2015 LOCAL DISTRIBUTION COMPANY (LDC) SEGMENT Abdessamad Nassif Gas and Forward Trader Sr., Colorado Springs Utilities 12-31-2014 Phil Precht Management Consultant – Pricing & Regulatory Services 12-31-2014 Department, Baltimore Gas and Electric Company Archie Hickerson Director - Regulatory Affairs and Planning, AGL Resources 12-31-2013 Pete Connor Contractor, American Gas Association 12-31-2015 Craig Colombo Energy Trader III, Dominion Resources 12-31-2015 END USERS SEGMENT V A C A N C Y 12-31-2014 Valerie Crockett Senior Program Manager - Energy Markets & Policy, Tennessee 12-31-2014 Valley Authority Lori-Lynn C. Pennock Senior Fuel Supply Analyst, Salt River Project 12-31-2013
Recommended publications
  • Breaking PDF Encryption
    Practical Decryption exFiltration: Breaking PDF Encryption Jens Müller Fabian Ising Vladislav Mladenov [email protected] [email protected] [email protected] Ruhr University Bochum, Chair for Münster University of Applied Ruhr University Bochum, Chair for Network and Data Security Sciences Network and Data Security Christian Mainka Sebastian Schinzel Jörg Schwenk [email protected] [email protected] [email protected] Ruhr University Bochum, Chair for Münster University of Applied Ruhr University Bochum, Chair for Network and Data Security Sciences Network and Data Security ABSTRACT Home/Trusted Environment The Portable Document Format, better known as PDF, is one of the Decrypted Document 1. Victim opens 2. Exfiltrating Tax Declaration decrypted content most widely used document formats worldwide, and in order to en- an encrypted PDF file Scrooge McDuck with their password via the Internet sure information confidentiality, this file format supports document TOP SECRET Victim encryption. In this paper, we analyze PDF encryption and show Attacker two novel techniques for breaking the confidentiality of encrypted Victim’s PC documents. First, we abuse the PDF feature of partially encrypted documents to wrap the encrypted part of the document within Figure 1: An overview of the attack scenario: The victim attacker-controlled content and therefore, exfiltrate the plaintext opens an encrypted PDF document and unintentionally once the document is opened by a legitimate user. Second, we abuse leaks the decrypted content to an attacker-controlled server. a flaw in the PDF encryption specification to arbitrarily manipulate The encrypted PDF file was manipulated by the attacker be- encrypted content.
    [Show full text]
  • Durchleuchtet PDF Ist Der Standard Für Den Austausch Von Dokumenten, Denn PDF-Dateien Sehen Auf
    WORKSHOP PDF-Dateien © alphaspirit, 123RF © alphaspirit, PDF-Dateien verarbeiten und durchsuchbar machen Durchleuchtet PDF ist der Standard für den Austausch von Dokumenten, denn PDF-Dateien sehen auf Daniel Tibi, allen Rechnern gleich aus. Für Linux gibt es zahlreiche Tools, mit denen Sie alle Möglich- Christoph Langner, Hans-Georg Eßer keiten dieses Dateiformats ausreizen. okumente unterschiedlichster Art, in einem gedruckten Text, Textstellen mar- denen Sie über eine Texterkennung noch von Rechnungen über Bedie- kieren oder Anmerkungen hinzufügen. eine Textebene hinzufügen müssen. D nungsanleitungen bis hin zu Bü- Als Texterkennungsprogramm für Linux chern und wissenschaftlichen Arbeiten, Texterkennung empfiehlt sich die OCR-Engine Tesseract werden heute digital verschickt, verbrei- Um die Möglichkeiten des PDF-Formats [1]. Die meisten Distributionen führen das tet und genutzt – vorzugsweise im platt- voll auszureizen, sollten PDF-Dateien Programm in ihren Paketquellen: formunabhängigen PDF-Format. Durch- durchsuchbar sein. So durchstöbern Sie l Unter OpenSuse installieren Sie tesse­ suchbare Dokumente erleichtern das etwa gleich mehrere Dokumente nach be- ract­­ocr und eines der Sprachpakete, schnelle Auffinden einer bestimmten stimmten Wörtern und finden innerhalb z. B. tesseract­ocr­traineddata­german. Stelle in der Datei, Metadaten liefern zu- einer Datei über die Suchfunktion des (Das Paket für die englische Sprache sätzliche Informationen. PDF-Betrachters schnell die richtige Stelle. richtet OpenSuse automatisch mit ein.) Zudem gibt es zahlreiche Möglichkei- PDF-Dateien, die Sie mit LaTeX oder Libre- l Für Ubuntu und Linux Mint wählen ten, PDF-Dokumente zu bearbeiten: Ganz Office erstellen, lassen sich üblicherweise Sie tesseract­ocr und ein Sprachpaket, nach Bedarf lassen sich Seiten entfernen, bereits durchsuchen. Anders sieht es je- wie etwa tesseract­ocr­deu.
    [Show full text]
  • Insight MFR By
    Manufacturers, Publishers and Suppliers by Product Category 11/6/2017 10/100 Hubs & Switches ASCEND COMMUNICATIONS CIS SECURE COMPUTING INC DIGIUM GEAR HEAD 1 TRIPPLITE ASUS Cisco Press D‐LINK SYSTEMS GEFEN 1VISION SOFTWARE ATEN TECHNOLOGY CISCO SYSTEMS DUALCOMM TECHNOLOGY, INC. GEIST 3COM ATLAS SOUND CLEAR CUBE DYCONN GEOVISION INC. 4XEM CORP. ATLONA CLEARSOUNDS DYNEX PRODUCTS GIGAFAST 8E6 TECHNOLOGIES ATTO TECHNOLOGY CNET TECHNOLOGY EATON GIGAMON SYSTEMS LLC AAXEON TECHNOLOGIES LLC. AUDIOCODES, INC. CODE GREEN NETWORKS E‐CORPORATEGIFTS.COM, INC. GLOBAL MARKETING ACCELL AUDIOVOX CODI INC EDGECORE GOLDENRAM ACCELLION AVAYA COMMAND COMMUNICATIONS EDITSHARE LLC GREAT BAY SOFTWARE INC. ACER AMERICA AVENVIEW CORP COMMUNICATION DEVICES INC. EMC GRIFFIN TECHNOLOGY ACTI CORPORATION AVOCENT COMNET ENDACE USA H3C Technology ADAPTEC AVOCENT‐EMERSON COMPELLENT ENGENIUS HALL RESEARCH ADC KENTROX AVTECH CORPORATION COMPREHENSIVE CABLE ENTERASYS NETWORKS HAVIS SHIELD ADC TELECOMMUNICATIONS AXIOM MEMORY COMPU‐CALL, INC EPIPHAN SYSTEMS HAWKING TECHNOLOGY ADDERTECHNOLOGY AXIS COMMUNICATIONS COMPUTER LAB EQUINOX SYSTEMS HERITAGE TRAVELWARE ADD‐ON COMPUTER PERIPHERALS AZIO CORPORATION COMPUTERLINKS ETHERNET DIRECT HEWLETT PACKARD ENTERPRISE ADDON STORE B & B ELECTRONICS COMTROL ETHERWAN HIKVISION DIGITAL TECHNOLOGY CO. LT ADESSO BELDEN CONNECTGEAR EVANS CONSOLES HITACHI ADTRAN BELKIN COMPONENTS CONNECTPRO EVGA.COM HITACHI DATA SYSTEMS ADVANTECH AUTOMATION CORP. BIDUL & CO CONSTANT TECHNOLOGIES INC Exablaze HOO TOO INC AEROHIVE NETWORKS BLACK BOX COOL GEAR EXACQ TECHNOLOGIES INC HP AJA VIDEO SYSTEMS BLACKMAGIC DESIGN USA CP TECHNOLOGIES EXFO INC HP INC ALCATEL BLADE NETWORK TECHNOLOGIES CPS EXTREME NETWORKS HUAWEI ALCATEL LUCENT BLONDER TONGUE LABORATORIES CREATIVE LABS EXTRON HUAWEI SYMANTEC TECHNOLOGIES ALLIED TELESIS BLUE COAT SYSTEMS CRESTRON ELECTRONICS F5 NETWORKS IBM ALLOY COMPUTER PRODUCTS LLC BOSCH SECURITY CTC UNION TECHNOLOGIES CO FELLOWES ICOMTECH INC ALTINEX, INC.
    [Show full text]
  • Locklizard Safeguard Secure PDF Viewer
    Safeguard Viewer Product Manual for Windows Version 3.0 Revision 1.09 Table of Contents INSTALLATION & REGISTRATION ......................................................... 5 INTRODUCTION ............................................................................................. 5 INSTALLATION PRE-REQUISITES ......................................................................... 5 INSTALLING THE VIEWER.................................................................................. 6 INSTALLING THE VIEWER IN CORPORATE ENVIRONMENTS ......................................... 9 1.4.1 Silent (remote) Installation ............................................................................................................................ 9 1.4.2 License File Registration (silent mode) ..................................................................................................... 9 1.4.3 Disabling Automatic Updates ...................................................................................................................... 10 MANAGING PROXY SETTINGS ......................................................................... 10 1.5.1 Proxy server manual entry settings.......................................................................................................... 12 1.5.2 Proxy server installation settings.............................................................................................................. 13 REGISTERING THE VIEWER LICENSE ................................................................... 15
    [Show full text]
  • Portable Document Format
    Portable Document Format “PDF” redirects here. For other uses, see PDF (disam- 32000-2 (“Next-generation PDF”).[13] biguation). The Portable Document Format (PDF) is a file format 2 Technical foundations used to present documents in a manner independent of application software, hardware, and operating systems.[2] The PDF combines three technologies: Each PDF file encapsulates a complete description of a fixed-layout flat document, including the text, fonts, • A subset of the PostScript page description pro- graphics, and other information needed to display it. gramming language, for generating the layout and graphics. 1 History and standardization • A font-embedding/replacement system to allow fonts to travel with the documents. Main article: History and standardization of Portable • A structured storage system to bundle these ele- Document Format ments and any associated content into a single file, with data compression where appropriate. PDF was developed in the early 1990s[3] as a way to share computer documents, including text formatting and inline 2.1 PostScript images.[4] It was among a number of competing formats such as DjVu, Envoy, Common Ground Digital Paper, PostScript is a page description language run in an Farallon Replica and even Adobe's own PostScript for- interpreter to generate an image, a process requiring mat. In those early years before the rise of the World many resources. It can handle graphics and standard fea- Wide Web and HTML documents, PDF was popular tures of programming languages such as if and loop com- mainly in desktop publishing workflows. Adobe Sys- mands. PDF is largely based on PostScript but simplified tems made the PDF specification available free of charge to remove flow control features like these, while graphics in 1993.
    [Show full text]
  • Design – TAG Cyber LLC Finance – M&T Bank Administration – Navitend Research – TAG Cyber LLC Lead Author – Dr
    Design – TAG Cyber LLC Finance – M&T Bank Administration – navitend Research – TAG Cyber LLC Lead Author – Dr. Edward G. Amoroso Researchers – Liam Baglivo, Matt Amoroso, Miles McDonald Facilities – WeWork, NYC TAG Cyber LLC P.O. Box 260, Sparta, New Jersey 07871 Copyright © 2018 TAG Cyber LLC. All rights reserved. This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to request permission from the publisher, so long as the content is neither changed nor attributed to a different source. Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience, expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and recommendations contained and described herein. Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors, methods, instructions, recommendations, or ideas contained in any aspect of the 2018 TAG Cyber Security Annual volumes. The opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time without notice. September 7, 2017 To the Reader: This 2018 TAG Cyber Security Annual – Volume 1: Outlook for Fifty Cyber Security Controls is a companion guide to the report of similar name issued last year.
    [Show full text]
  • Paper "Practical Decryption Exfiltration: Breaking PDF Encryption"
    Practical Decryption exFiltration: Breaking PDF Encryption Jens Müller Fabian Ising Vladislav Mladenov [email protected] [email protected] [email protected] Ruhr University Bochum, Chair for Münster University of Applied Ruhr University Bochum, Chair for Network and Data Security Sciences Network and Data Security Christian Mainka Sebastian Schinzel Jörg Schwenk [email protected] [email protected] [email protected] Ruhr University Bochum, Chair for Münster University of Applied Ruhr University Bochum, Chair for Network and Data Security Sciences Network and Data Security ABSTRACT Home/Trusted Environment The Portable Document Format, better known as PDF, is one of the Decrypted Document 1. Victim opens 2. Exfiltrating Tax Declaration decrypted content most widely used document formats worldwide, and in order to en- an encrypted PDF file Scrooge McDuck with their password via the Internet sure information confidentiality, this file format supports document TOP SECRET Victim encryption. In this paper, we analyze PDF encryption and show Attacker two novel techniques for breaking the confidentiality of encrypted Victim’s PC documents. First, we abuse the PDF feature of partially encrypted documents to wrap the encrypted part of the document within Figure 1: An overview of the attack scenario: The victim attacker-controlled content and therefore, exfiltrate the plaintext opens an encrypted PDF document and unintentionally once the document is opened by a legitimate user. Second, we abuse leaks the decrypted content to an attacker-controlled server. a flaw in the PDF encryption specification to arbitrarily manipulate The encrypted PDF file was manipulated by the attacker be- encrypted content.
    [Show full text]
  • Download Windows Pdf Reader Free PDF Reader for Windows
    download windows pdf reader Free PDF Reader for Windows. Free PDF Reader from PDFZilla is a lightweight PDF program for Windows. It has four viewing options , which are useful when working with sizable documents. You can also navigate through the table of contents if your document has one. How does Free PDF Reader work? This PDF software is incredibly lightweight , so it won’t occupy much space on your device. After installing the software, you can open PDF files and read them. The option to save a PDF with a different file name is also available in the free version. For other features, you’ll need to purchase the main PDFZilla software. Is Free PDF Reader better than Adobe Acrobat Reader DC? No. It isn’t better. Adobe Acrobat Reader DC is the global, number one free PDF reader, and with good reason. Even though it’s free, Adobe Acrobat Reader DC allows you to do much more than just read PDFs . For example, the software also allows you to annotate, sign, and share PDFs. On the other hand, the Free PDF Reader simply does what it says, it is free and nothing more. What is the best PDF reader? Of the numerous free PDF readers available, the most complete app that we’ve found is PDF Editor by Xodo. It supports sharing, signing (with saved signatures), form filling, and real-time collaboration on PDFs. What PDF reader comes with Windows 10? Microsoft’s built-in browser, Edge (based on Chromium), is great for reading PDFs and making simple mark-ups.
    [Show full text]
  • Digital Delivery of Student and Lab Guides
    Digital Delivery of Student and Lab Guides Harold Henke, Ph.D. Principal, Flatirons Technical Communications [email protected] Delivering Content Digitally . Training organizations want to deliver content in digital format such as student and lab guides for a variety of reasons: . Go green by eliminating printing material. Improve development cycles by just in time digital fulfillment of student materials. Eliminate storing and shipping of printed materials. Training organizations achieve this goal by: . Creating and fulfilling digital content in-house. Hiring a third party to provide digital content fulfillment. Copyright 2012, Flatirons Technical Communications 2 Creating Digital Content In-House . Most prevalent method is to use Adobe Acrobat to create a digital version of the material. Material can be secured using Adobe security including ability to enable students to make notes, annotations, and so on. Can also specify whether content can be copied and printed. Content can be password protected to prevent unauthorized changes. Material can be secured with third party Digital Rights Management (DRM) tools to provide additional security. • DRM providers such as Armjisoft, CrypKey, LockLizard as well as Adobe Digital Editions, provide methods where users access digital content from a repository and unlock the content. • The DRM defines what tasks students can perform such as annotation, copying, printing, as well as features for content producers including printing watermarks and setting content expiration dates. Copyright 2012, Flatirons Technical Communications 3 Distributing Digital Content In-House . Publish PDF files to USB drive for distribution. DRM systems can be used to bind the content to the USB drive to prevent copying or unauthorized distribution.
    [Show full text]
  • PDF in Theorie Und Praxis
    PDF in Theorie und Praxis Erstellen • Analysieren • Bearbeiten • Drucken Ralf König, [email protected] Technische Universität Chemnitz, Fakultät für Informatik http://www.tu-chemnitz.de/informatik Ralf Koenig, 28. September 2004 PDF in Theorie and Praxis - p. 1/46 Inhalt ● Inhalt Theorie ● Quellen Was ist PDF? Entwicklung und Geschichte PDF-Struktur Vergleich mit PostScript PDF erstellen PDF analysieren Struktur von PDF-Dateien PDF bearbeiten PDF drucken und Praxis Troubleshooting Rechtliches Erstellen von PDF-Dateien Spezialthemen Analysieren von PDF-Dateien Ende. Bearbeiten von PDF-Dateien Drucken von PDF-Dateien Philosophie Spezialthemen Ralf Koenig, 28. September 2004 PDF in Theorie and Praxis - p. 2/46 Quellen ● Inhalt ■ PDF Reference, Fourth Edition, Version 1.5 ● Quellen http://partners.adobe.com/asn/tech/pdf/specifications.jsp Was ist PDF? ■ PDF-Struktur Thomas Merz, c’t 07/2002, Ein Rezept für alle – Was im PDF erstellen Portable Document Format steckt ■ PDF analysieren Thomas Merz, c’t 01/2003, Sorglos-Drucksache – PDF/X soll PDF bearbeiten eine reibungslose Produktion garantieren PDF drucken und ■ Troubleshooting Thomas Merz, PostScript & Acrobat/PDF, Springer 1997, Rechtliches ISBN 3-540-60854-0. ■ Spezialthemen Thomas Merz, Die PostScript- & PDF-Bibel, d.punkt Verlag Ende. 2002, ISBN 3-935320-01-9. ■ news://comp.text.pdf ■ Troubleshooting von PDF-Dateien im URZ Ralf Koenig, 28. September 2004 PDF in Theorie and Praxis - p. 3/46 ● Inhalt ● Quellen Was ist PDF? ● PDF - Ein paar Beispiele ● Entwicklung von PDF ● Gemeinsamkeiten von PostScript und PDF ● Unterschiede zwischen Was ist PDF? PostScript und PDF ● Konvertierung zwischen PostScript und PDF PDF-Struktur PDF erstellen PDF analysieren PDF bearbeiten PDF drucken und Troubleshooting Rechtliches Spezialthemen Ende.
    [Show full text]
  • Volume 1: TAG Cyber Security Fifty Controls – Volume 1 Introduces the Fifty Primary Control Areas Required for CISO Teams to Be More Effective
    Designer – Vision Creative Finance – M&T Bank Administration – navitend Promotion – Braithwaite Communications Research – TAG Cyber LLC Lead Author – Dr. Edward G. Amoroso TAG Cyber LLC P.O. Box 260, Sparta, New Jersey 07871 Copyright © 2017 TAG Cyber LLC. All rights reserved. This publication may be freely reproduced, freely quoted, freely distributed, or freely transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system without need to request permission from the publisher, so long as the content is neither changed nor attributed to a different source. Security experts and practitioners must recognize that best practices, technologies, and information about the cyber security industry and its participants will always be changing. Such experts and practitioners must therefore rely on their experience, expertise, and knowledge with respect to interpretation and application of the opinions, information, advice, and recommendations contained and described herein. Neither the author of this document nor TAG Cyber LLC assume any liability for any injury and/or damage to persons or organizations as a matter of products liability, negligence or otherwise, or from any use or operation of any products, vendors, methods, instructions, recommendations, or ideas contained in any aspect of the 2017 TAG Cyber Security Annual volumes. The opinions, information, advice, and recommendations expressed in this publication are not representations of fact, and are subject to change without notice. TAG Cyber LLC reserves the right to change its policies or explanations of its policies at any time without notice. Page 2 2017 TAG Cyber Security Annual September 1, 2016 To the Reader: I wrote every word of this 2017 TAG Cyber Security Annual based on my experience, opinion, and research – and I wrote it for one purpose: To serve as a useful guide for Chief Information Security Officer (CISO) teams.
    [Show full text]
  • What PDF Security Options Are Available?
    Updated: August 2018 White Paper: What PDF Security options are available? Please see our PDF web page for more details on many aspects of publishing PDF files. When choosing PDF security solutions there are several key questions to ask. However, there is no perfect and universal solution to all requirements, so please don’t expect one! For example, if physical printing is permitted the end user can always scan in the printout and screens can be photographed, scanned or captured and used to create a new PDF without security enabled – “intelligent watermarking” can help discourage and protect against this problem. Every protection scheme has its limitations, and the more sophisticated it is the more obtrusive and difficult it typically becomes for the end user, so there is always a trade-off between simplicity and security. Corporate and Social pressure and international copyright law are a publisher’s ultimate forms of protection – coupled with the best PDF security solutions that strongly discourage abuse of copyright and protect against the most obvious forms of piracy and copyright abuse. The question we are most often asked is “what is the difference between providing security for a standard Adobe-style PDF and Digital Rights Management (DRM) based security?”. This is perhaps best answered by highlighting a few key things to know about PDF security: 1. Adobe permissioning security is easily removed by many software packages and free online services, so has very little protective value. Even when implemented and not removed, non- Adobe PDF readers can simply ignore it and continue to allow printing, for example, without regard to the settings you have made.
    [Show full text]