Home

Results 61 - 70 of 39,088 for client's tips. Search took 13.602 seconds.  
Sort by date/Sort by relevance
Matches: > Joker Lotto Viking Lotto Keno DD V75 Specify tel. no. incl. area code: > Horoscope Today TV now Humour Offers Tip Sense Update launched Oct. 11 2000 Content to most mobile telephones The mobile telecommunications industry is moving towards 3G with huge cost burdens (licenses, network roll-out, customer acquisition etc.) Brand owners understand a need for closer customer relation/ retention/ loyalty/ services MNOs understand the opportunity to decrease customer acquisition cost substantially and simultaneously filling the network with traffic Extended regulations and ambitions for increased competition by local authorities Two kind of MVNOs will appear in future: True MVNOs with international operation Strongly branded Mobile Service Providers based on commonly used operational platforms The Facts Both MVNOs and enabling platforms are beneficial to MNOs, as this will reduce The acquisition cost for the MNO substantially The implementation cost for several new, not experienced players Need for various support functions, like customer care/ back office, billing, cash collection etc. and increase The network utilization (especially in respect to later 3G, high capacity networks) Revenue stream due to new or highly used applications and new services and attract Clients that are small and not capable to integrate systems by their own, but have an interesting customer base Clients with international background and operation who want to achieve leverage The win-win It makes Sense!
Language:English
Score: 1042260.4 - https://www.itu.int/osg/spu/ni...shop/presentations/stube_1.pdf
Data Source: un
You can easily also view the AFICS/NY website using your smartphone or tablet!   TIP:  Use landscape-mode (tilt the device sideways) for the best viewing of the site.   TIP:  You can add the link to your mobile device's homescreen for quick and easy access. Click    HERE   for our Tips &Tools  page.   Donate facebook twitter youtube flickr instagram Footer A-Z Site Index Contact Copyright FAQ Fraud Alert Privacy Notice Terms of Use
Language:English
Score: 1038110.2 - https://www.un.org/other/afics/
Data Source: un
Notes from the President | ASSOCIATION OF FORMER INTERNATIONAL CIVIL SERVANTS / NEW YORK Skip to main content Welcome to the United Nations ASSOCIATION OF FORMER INTERNATIONAL CIVIL SERVANTS / NEW YORK Search form Search Toggle navigation Home COVID-19 About AFICS/NY Governing Board Governing Board Elections Annual Assembly Notes from the President Membership Services FAFICS Affiliations New York Office Activities Ageing Smart Health Insurance Pension Fund Social & Other Events Committees Ageing Smart Health Insurance IT/Communications Membership Pension Social & Other Events Resources Bulletins Directory of Members Library List of Accountants List of Attorneys Tips & Tools UN Clubs & Classes UNHQ Information Useful Information for Seniors Volunteering UNFCU US Resident Issues Medicare Part B Social Security US Taxes Charities Foundation Galleries Photo Gallery Media Gallery Contact Us Home About AFICS/NY Notes from the President Notes from the President MEET THE PRESIDENT 26 September 2016   Greetings!  (...) My team and I will focus our efforts on the subjects and areas that are of the greatest concern to UN retirees and beneficiaries:   1) Efficient and effective service by the Pension Fund Secretariat to all Fund participants, but particularly the accurate and timely payment of all pension benefits.   2) Operational and management of the Fund's Investment Management Division under the leadership of Secretary-General's Representative for Investments, to ensure that the Fund's financial health is maintained and the acturial assumptions for investment returns are fully met.   3) Management by the UN of ASHI (After-Service-Health Insurance) in a cost-effective manner while providing quality client servicing.   4) Assistance to members (and prospective members) with special individual problems or concerns, particularly with regard to their pensions and ASHI coverage.   5) Scheduling substantive programmes of special interests to retirees; and   6) Scheduling social programmes where members can meet and interact with old and new friends, such as luncheons, boat rides etc.  
Language:English
Score: 1033825.6 - https://www.un.org/other/afics/node/443
Data Source: un
• Strong Binding • Mitigate threats of undetected document forgery • Mitigate Individual Impersonation 2 Enhance flow of traffic & Increase security Issues – Forgery & Impersonation Threats “The British travel documents were not biometric, meaning they did not have computer chips embedded in them that would make it more difficult to duplicate” Al-Jazzera • Assassination of Hamas militant, Mahmoud al-Mabhouh – Fraudulent British, German, Irish, Australian and French passports to enter and leave Dubai 3 Issues – Forgery & Impersonation Threats • British Woman Arrested in Thailand Over Passport Forgery – April 2010 • Gang jailed for 'largest ever' passport forgery – Jan 2008 400 cops raid 39 locations to disable passport forgery ring run by Middle• 400 cops raid 39 locations to disable passport forgery ring run by Middle Eastern men in Montreal and Toronto – Nov 2009 • Passport forgery immigrants jailed – June 2010 Romanian Passport Forgery Factory– Romanian Passport Forgery Factory 4 Issues – False Rejections • Canadian Woman jailed as she tried to leave Kenya – July 2009 5 Electronic Travel Documents Passports & E-Passports issued 2010 CSCA Countries: ~91 Passports: ~124 Million E P t 91 Milli CVCA E-Passports: ~91 Million Two largest deployments are US & UKTwo largest deployments are US & UK - ~50% of the e-passports today (Entrust) 6 *source: Acuity Electronic Travel Documents Estimated Number of ePassports issued CSCA 253,035,000 CVCA253,035,000 * ICAO N T h l i W ki G (NTWG) 7 *source: ICAO New Technologies Working Group (NTWG) Tipping point? Billi f D ll h b t i• Billions of Dollars have been spent on issuance…. • And Millions of eMRTD’s are in circulation• And Millions of eMRTD s are in circulation • When does it make sense to do electronic validation? (...) ICAO PKD) • ICAO Compliant Document Verification at Border Control 13 • Master List & SPOC Validation Service Entrust ePassport Technologies & Services • Country Signing Solutiony g g • Country Verifying Solution • E-Passport Concentrator CSCA • E-Passport Client CVCA • Master List Signer & SPOC 14 • Cloud Based Services Want to know more?
Language:English
Score: 1033825.6 - https://www.icao.int/Meetings/...2010/Documentation/Entrust.pdf
Data Source: un
Notes from the President | ASSOCIATION OF FORMER INTERNATIONAL CIVIL SERVANTS / NEW YORK Skip to main content Welcome to the United Nations ASSOCIATION OF FORMER INTERNATIONAL CIVIL SERVANTS / NEW YORK Search form Search Toggle navigation Home COVID-19 About AFICS/NY Governing Board Governing Board Elections Annual Assembly Notes from the President Membership Services FAFICS Affiliations New York Office Activities Ageing Smart Health Insurance Pension Fund Social & Other Events Committees Ageing Smart Health Insurance IT/Communications Membership Pension Social & Other Events Resources Bulletins Directory of Members Library List of Accountants List of Attorneys Tips & Tools UN Clubs & Classes UNHQ Information Useful Information for Seniors Volunteering UNFCU US Resident Issues Medicare Part B Social Security US Taxes Charities Foundation Galleries Photo Gallery Media Gallery Contact Us Home About AFICS/NY Notes from the President Notes from the President MEET THE PRESIDENT 26 September 2016   Greetings!  (...) My team and I will focus our efforts on the subjects and areas that are of the greatest concern to UN retirees and beneficiaries:   1) Efficient and effective service by the Pension Fund Secretariat to all Fund participants, but particularly the accurate and timely payment of all pension benefits.   2) Operational and management of the Fund's Investment Management Division under the leadership of Secretary-General's Representative for Investments, to ensure that the Fund's financial health is maintained and the acturial assumptions for investment returns are fully met.   3) Management by the UN of ASHI (After-Service-Health Insurance) in a cost-effective manner while providing quality client servicing.   4) Assistance to members (and prospective members) with special individual problems or concerns, particularly with regard to their pensions and ASHI coverage.   5) Scheduling substantive programmes of special interests to retirees; and   6) Scheduling social programmes where members can meet and interact with old and new friends, such as luncheons, boat rides etc.  
Language:English
Score: 1033825.6 - https://www.un.org/other/afics/content/notes-president
Data Source: un
Sex Work Tool Kit - targeted HIV/AIDS prevention and care in sex work settings The Sex Work Toolkit - www.who.int/hiv/toolkit/sw FACT SHEET The Sex Work Tool Kit - targeted HIV/AIDS prevention and care in sex work settings www.who.int/hiv/toolkit/sw About the toolkit - Background and aim • After more than a decade of research and intervention in sex work settings there is a substantial body of knowledge on the behaviours that put sex workers, their clients and regular partners at risk and on the contextual factors that create vulnerability to HIV/AIDS. (...) These handbooks, written by experienced sex worker groups and service providers to assist programme managers in setting up and maintaining projects as well as measuring their success in the European and global context. • Technical tools like 'Algorithmes de Diagnostic et Traitement des IST chez les Femmes a la Clinique de Confiance' - an easy-to-use table on how to diagnose and treat sexual transmitted infections created by a clinic for sex workers in Côte d'Ivoire. • Examples of Peer Educator programmes and activities like 'Of Veshyas, Vamps, Whores and Women' - a peer education campaign to empower sex workers in India • Case studies like Police and Sex Workers in Papua New Guinea - an example of how successful workshops with the police in Papua New Guinea reduced "police line ups" and group rapes and involved the recruitment of police peer educators to inform colleagues about HIV. • Tools targeting male sex workers like 'Tips, Tricks and models of good practice for service providers considering, planning or implementing services for male sex workers' - a model of good practice containing practical oriented advice on starting activities, methods and services, training, networking and data collection.
Language:English
Score: 1033825.6 - https://www.who.int/3by5/en/toolkitfactsheet.pdf
Data Source: un
IMPLEMENTATION OF THE INTERNATIONAL COVENANT ON ECONOMIC, SOCIAL AND CULTURAL RIGHTS :4TH PERIODIC REPORTS SUBMITTED BY STATES PARTIES UNDER ARTICLES 16 AND 17 OF THE COVENANT : ADDENDUM : THE NETHERLANDS - ARUBA
GE.10-45901 (E) 271010 Substantive session of 2010 Implementation of the International Covenant on Economic, Social and Cultural Rights Fourth periodic report submitted by States
Language:English
Score: 1033252.9 - https://daccess-ods.un.org/acc...n&DS=E/C.12/NLD/4/ADD.2&Lang=E
Data Source: ods
Supercomputers Distributed Computing Systems BOINC – Used for SETI@Home, Atomic Physics People agree to donate spare computing resources Botnets: A special case of Distributed Computing Without the consent of the computers’ owners More computing power than a supercomputer – for free 3October 2007 The Botnet Economy Virus Writers, Botherders, Clients Virus writer writes malware, infects computers to create a botnet Botherder operates the botnet’s “command and control” (C&C) Clients hire botnets to use for Spam, DDoS, Identity Theft Highly developed underground economy Underground channels of communication “Secret” forums and chat rooms that frequently shift location Access shared on a need to know basis, new entrants may need to be vouched for by an existing participant Botherders offer support contracts to clients Guaranteed replacement of botnet in case antivirus researchers release a fix for the malware, or the botnet is taken down Organized crime involved in all stages of the economy Employ virus writers to create malware Carry out spam campaigns, espionage, ID theft, cyber attacks Launder money stolen from victims 4October 2007 Evolution of Botnets C&C centers harder to trace Originally hosted on public IRC channels Now encrypted, access restricted C&C software C&C centers may be hosted on botnets Increased redundancy Makes takedown harder New “headless” single use botnets No centralized control or C&C required Instructions embedded into the malware New malware and botnet created for a new task Cannot stop botnet by taking down its C&C 5October 2007 Evolution of Malware Malware is Self Propagating Infected hosts infect other hosts Infection vectors include email, P2P networks, open shared network folders, visiting an infected website Newer malware spreads faster than older generations of malware Its spread resembles that of a global pandemic (SARS, Bird Flu) Similar threat models and mitigation mechanisms can be applied Malware is becoming increasingly sophisticated Earlier, mostly spread through infected floppy disks Spreads much faster over the internet Email, IM, compromised websites, P2P, network shared folders) Principles of software engineering evident in recent malware Analysis, Detection and Removal more difficult Self destruct mechanisms to destroy data if the malware is removed “Droppers” download more malware onto a compromised host Encryption and Debugger / VM traps to prevent forensic analysis 6October 2007 What can you do with a Botnet? Spam The most visible use of botnets Botnets can host an entire spam campaign DNS servers, website hosting, spam sending Content can change location from PC to PC, country to country, in minutes “Take” from a spam run can be reused 419 scam artists now buying lists of compromised accounts from botherders, using these to spam Spam is just the tip of the iceberg. 7October 2007 What else can you do with a botnet?
Language:English
Score: 1030074 - https://www.itu.int/ITU-D/cyb/...roject-buenos-aires-oct-07.pdf
Data Source: un
IMPLEMENTATION OF THE INTERNATIONAL COVENANT ON ECONOMIC, SOCIAL AND CULTURAL RIGHTS : CONSIDERATION OF REPORTS SUBMITTED BY STATES PARTIES IN ACCORDANCE WITH ARTICLE 16 OF THE INTERNATIONAL COVENANT ON ECONOMIC, SOCIAL AND CULTURAL RIGHTS
The Labour Inspectorate can conduct an investigation on the basis of tips or reports of underpayment and pass on the results to the interested parties, including the trade unions, which can then initiate civil proceedings. (...) The Labour Inspectorate can conduct an investigation on the basis of tips or reports of underpayment and pass on the results to the interested parties, including the trade unions, which can then initiate civil proceedings. (...) In a few cases, this happens because the person’s behaviour is too disruptive to the other clients in the institution. Sometimes when people are released from prison they have no home to go to.
Language:English
Score: 1027964.1 - daccess-ods.un.org/acce...DS=E/C.12/NLD/Q/3/ADD.1&Lang=E
Data Source: ods
Such measures shall ensure that the identity documentation procedures are no less effective than where the customer appears in person, and should require additional documentary evidence, or supplementary measures to verify or certify the documents supplied, or certified confirmation from a trusted financial institution (at which the client maintains a client relationship or the previous financial institution at which the client had a relationship) or equally reliable documentary evidence. 3.3 Beneficial Owner Requirements: Financial institutions shall identify the natural persons who are beneficial owners of legal entities and or natural persons. Where it is not possible to identify them with certainty, the financial institution shall make a responsible determination as to whether to open or continue the account, or classify the account as a high risk account. 3.4 Know Your Customer (KYC) - understanding the purpose and nature of accounts and transactions: To effectively identify suspicious transactions in fulfillment of the suspicious transaction reporting obligation, in addition to fulfilling customer identity requirements, financial institutions shall REGULATION NO CBL/RSD/004/2013 9 obtain and maintain sufficient information and data from each client to have a sufficient understanding of the profile of expected transactions and account activity for the client in view of the client‟s stated business and sources of income. 3.5 Risk classification 3.5.1 Financial institutions shall classify all client accounts and business relationships with respect to level of risk and perform on-going and enhanced due diligence procedures in accordance with the risk classification. 3.5.2 At minimum, high risk clients must be classified as such and appropriate enhanced due diligence procedures shall be applied and appropriately documented. (...) The CBL and FIU shall have complete access to all documentation, data, records, transaction records, client and correspondence files to carry out such inspections.
Language:English
Score: 1025443.75 - https://www.wto.org/english/th..._e/lbr_e/WTACCLBR15_LEG_12.pdf
Data Source: un